Re: [Pce] Question on draft-ietf-pce-local-protection-enforcement
John Scudder <jgs@juniper.net> Tue, 16 May 2023 00:21 UTC
Return-Path: <jgs@juniper.net>
X-Original-To: pce@ietfa.amsl.com
Delivered-To: pce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D9901C15107D; Mon, 15 May 2023 17:21:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="ssfyJi38"; dkim=pass (1024-bit key) header.d=juniper.net header.b="BxBn6uXS"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OoixQBeZYiRJ; Mon, 15 May 2023 17:21:32 -0700 (PDT)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E46BDC151080; Mon, 15 May 2023 17:21:26 -0700 (PDT)
Received: from pps.filterd (m0108158.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 34FFOkWe023257; Mon, 15 May 2023 17:21:20 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=f+H+eFkMSvoHwloDZTxAazE9P8gW43/Pu52ePTMRLJM=; b=ssfyJi387OAUgk5KFr8EfcOtGmNtdUGEkchnSky92ZXGo+/6bUDkLhJSN4+kT8FnBkd4 7isvPCxj6B3h14SfqllzJ8vsnSKdXwRJZ8IN6F+WwuNWQyBBJy+Mq/lLPatLaCnKx/NP KxHhvv0NS59YBSw/Ava9YJTo2e5WLhkOK6qxnu/F1l11dE9d3DqG2HFHO0VAn/QAvHf/ ky9uNmfHOh5oO/r+TvSGT9kcGG/PZW8twNvcI9JUxTB/9X7ZJiXTyLHx9IiHIxK/aXxJ PBFrjLdOpW2zst/x1iFQlCqraHTYgjgFsSSC1LTGDAu7WpYZHwpZRlORszueL8T4w3DB tA==
Received: from co1pr02cu001.outbound.protection.outlook.com (mail-westus2azlp17011011.outbound.protection.outlook.com [40.93.10.11]) by mx0a-00273201.pphosted.com (PPS) with ESMTPS id 3qkqbsrwe5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 15 May 2023 17:21:20 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=S6lw166s0HsBBSgXoRZ96xJz6SP8UejXjPnAabQrERXRGT2mRY1ueAZoh/7R7MiG3JCmV7j5u/koQR+i7+U8RwsvTg4OnqmXiX7BIHowvcF4oMdbv6QOjC0BrwQPGZrjsvNDnZYcka1e8C9PNHS5tLVi2eDfkV9d89+2aeCyUJjh2+CFhLK0eKNbzNOlN3RN5jaBYsvJB8kN39/lxZiK+50XZ1jwf2I5aCIgit8Ryh9hY/QBLlqnwC2039klFhmVb1jUNL7hnnZCXoTwk7LBAFkg0wrgKvfy3gmP7+ZJRS8aBqenanQt9GH2m/fTfA/gs65grwaT4ZFyCTVaSv2+PA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=f+H+eFkMSvoHwloDZTxAazE9P8gW43/Pu52ePTMRLJM=; b=MQGRhZYPX3x5b3nuN+x0ahFfDOWwoxaK1Qya9VJUErd6ZsBX70yYqP32w7urhMpu5K2Q7Dbho7PJYiyC9wTEsB2GK7oOoZnncX3LqFFmEsYqT/z8Yv56WJJx5WiuyD/mSRRrHESyOoSDp1HVw3p41xIZwmXaIxykoftDT3Js/hhl+eo2IgMJFAggC5sJYu4wdQMNHQkzPIva9O+/7CiiB67xC0BcgNSCHsU3wzAcfs3ahSIA3KPzXkrf3JtYKZ+GCBXWrb8ErBPYdTz95RvtVcslzjy7iNEz5A3c4dMpn4yutZwJDLKk21itNIsMgOWVmDdDzkuPHOXTTaYF36eJiw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=f+H+eFkMSvoHwloDZTxAazE9P8gW43/Pu52ePTMRLJM=; b=BxBn6uXStdCgwDQ/Ku5r1dOxy5mU8nzqbzw9OIFNbJWRq9aXe+DWR05nTp3IlG/bmefxpDPUU3VWmd6rB5uwZ/apejE51bULeTw4gzmPZ1QyfIuILPWOZFrip9yC6NMK4vA+mHVKjbzwPI6WOtt9uQhr5DjMu3wYvlXDNe4RjrU=
Received: from MN2PR05MB6109.namprd05.prod.outlook.com (2603:10b6:208:c4::20) by BLAPR05MB7411.namprd05.prod.outlook.com (2603:10b6:208:29b::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6387.32; Tue, 16 May 2023 00:21:15 +0000
Received: from MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::9ab0:387b:409:ee41]) by MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::9ab0:387b:409:ee41%6]) with mapi id 15.20.6387.030; Tue, 16 May 2023 00:21:15 +0000
From: John Scudder <jgs@juniper.net>
To: "Andrew Stone (Nokia)" <andrew.stone@nokia.com>
CC: "Samuel Sidor (ssidor)" <ssidor@cisco.com>, Dhruv Dhody <dhruv.ietf@gmail.com>, Vishnu Pavan Beeram <vishnupavan@gmail.com>, "pce@ietf.org" <pce@ietf.org>, "draft-ietf-pce-local-protection-enforcement@ietf.org" <draft-ietf-pce-local-protection-enforcement@ietf.org>
Thread-Topic: [Pce] Question on draft-ietf-pce-local-protection-enforcement
Thread-Index: AQHZh4xTqjGB0tblQk6rsEWWXK3Gug==
Date: Tue, 16 May 2023 00:21:15 +0000
Message-ID: <C77A0CE6-9DE7-42FA-9748-D78B582E4A4C@juniper.net>
References: <CA+YzgTu2F-d0Z7kwa=A3+p9Exepf1OTNpzRdPYin7_46J3+a4g@mail.gmail.com> <CAB75xn7jNJwh_=UKoDjQuvZiB8Sf4VQ8ei9j+_r1XiuxWU2Ejg@mail.gmail.com> <CA+YzgTsuMNVEgp3S44QQXr4ygyDw5Wa4R=MFJPfFiaJQztrR6Q@mail.gmail.com> <CAB75xn5yejHirzd6ahUpxTKr8WZFNdo8xMSic5_Akz5tPMoXEw@mail.gmail.com> <DM6PR11MB4122A40981A5B71EB40B19A2D0FC9@DM6PR11MB4122.namprd11.prod.outlook.com> <6CABECD3-245B-41B4-9ECF-DDB08185B6E9@nokia.com>
In-Reply-To: <6CABECD3-245B-41B4-9ECF-DDB08185B6E9@nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.2)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR05MB6109:EE_|BLAPR05MB7411:EE_
x-ms-office365-filtering-correlation-id: fe1333fb-e236-4954-db00-08db55a3762a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 5mWZixvSff6T2rjty9AfprPE13lCxY4/7XzQW1n+vngJZjlAgV3T4PYcw69MFrwxq0V7gzDxVrWU2EtPiDO8RCrJOYePfOdFbFKDOuETodfD7PequLPp2pLktvqj9fbWQvcM0bN+bbx8bzouqSbF890sMhpFj6DIA8BxS/9CfzggGVhaIPaDv3w7dRvFmnA8CCkTtVH7+rNAULVcewk3LKgXgMN+AoUlMJbeN5nVx2zB/n9kT8or6AH9Bs+6aueZiU7SO/u8na80q+iCO3roDDFmr7gQvksSCoEL/TLQQLhGa+jIPsAm3V4BmTUZ3p0I+jB2ribU5+cJiyvhHDjltB9g/lkL+l+Wo2mENMP/GjLxGZTjLj0Y1g2cj8Hi6fs5U/K0yrx75bE7/PNNJc/h/SAvLuHHQ1QnA29jWZ0TX9XLkapOD5ASJ4eXXT1FoYZkin8LriKC/A5NxFbdRkkO5tKP5Su7KUoPIMLLTUaoxSqMy/KHaGgHVAog+LSt+yONE5m9zX+kjmclkuEaKwKO4K7TA348/jf1uKG+YdIDyzHJ0F0H4osfPnD1khYYfPZnnp1aZG6xDm5Xzh7na4AuCjB+fIUP11zERx7ySO0OXTqafMngA517XNQj1GGqufy89Mmnc89A5wJRprY7kk3eq4yogLvjpUtoYlNN6/EwtHZi9qvN7dlJJVIu5/+ez7Vu
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR05MB6109.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(396003)(376002)(39860400002)(366004)(346002)(451199021)(5660300002)(76116006)(66476007)(6916009)(64756008)(66446008)(66556008)(2906002)(91956017)(66946007)(38070700005)(41300700001)(316002)(296002)(86362001)(4326008)(54906003)(8936002)(8676002)(478600001)(71200400001)(38100700002)(122000001)(6486002)(966005)(186003)(36756003)(26005)(6506007)(6512007)(53546011)(2616005)(33656002)(83380400001)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <A4F36CB642C8F048B5117CB42F789987@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR05MB6109.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fe1333fb-e236-4954-db00-08db55a3762a
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 May 2023 00:21:15.2988 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 06Av+VnaJgu9RU4xFj2tCA1FeGaec6sTKL9PdUNWwHXWkn+kgQHhoxDMxiVkHNqs
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLAPR05MB7411
X-Proofpoint-ORIG-GUID: DfkPBlb2A6xZ2zSoRI0dwKtopVF49McX
X-Proofpoint-GUID: DfkPBlb2A6xZ2zSoRI0dwKtopVF49McX
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-05-15_21,2023-05-05_01,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 suspectscore=0 spamscore=0 mlxlogscore=999 malwarescore=0 phishscore=0 lowpriorityscore=0 mlxscore=0 impostorscore=0 clxscore=1011 priorityscore=1501 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2304280000 definitions=main-2305160000
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/Ai6XH04JtVZCIPNTLLszytFC8FU>
Subject: Re: [Pce] Question on draft-ietf-pce-local-protection-enforcement
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 May 2023 00:21:35 -0000
Hi All, I’m coming back to this old thread as I follow up on my AD review of the draft. My attention was caught by Samuel’s point that the SHOULD/MAY is justified by, "PCE can still have a way to detect that it is talking to legacy PCCs and it can fallback to original behavior to do not break backward compatibility.” If this is indeed the reason for the SHOULD/MAY, I think it’s desirable to make it as clear as possible in the spec, for example (added sentence) OLD: When both L flag and E flag are set to 0, then the PCE SHOULD consider the protection eligibility as an UNPROTECTED PREFERRED constraint but MAY consider protection eligibility as an UNPROTECTED MANDATORY constraint. NEW: When both L flag and E flag are set to 0, then the PCE SHOULD consider the protection eligibility as an UNPROTECTED PREFERRED constraint but MAY consider protection eligibility as an UNPROTECTED MANDATORY constraint. An example of when the latter behavior might be chosen is if the PCE has some means (outside the scope of this document) to detect that it’s interacting with a legacy PCC that expects the legacy behavior. I think some change like this would go a long way toward heading off further questions on this point during IETF Last Call and IESG review. Thanks, —John > On Jan 11, 2023, at 11:28 AM, Andrew Stone (Nokia) <andrew.stone@nokia.com> wrote: > > > Hi Pavan, Dhruv, Samuel, > > Correct – that text is trying to steer implementors to use unprotected preferred but is keeping the option of unprotected mandatory for backwards compatibility.https://mailarchive.ietf.org/arch/msg/pce/4EX28antvCp_2CY--7RJmCvR-jo/ discusses it a bit from a different angle (I assume the thread pointer comment below is for this thread. > > Thanks > Andrew > > From: "Samuel Sidor (ssidor)" <ssidor@cisco.com> > Date: Wednesday, January 11, 2023 at 4:36 AM > To: Dhruv Dhody <dhruv.ietf@gmail.com>, Vishnu Pavan Beeram <vishnupavan@gmail.com>, "Andrew Stone (Nokia)" <andrew.stone@nokia.com> > Cc: "pce@ietf.org" <pce@ietf.org>, "draft-ietf-pce-local-protection-enforcement@ietf.org" <draft-ietf-pce-local-protection-enforcement@ietf.org> > Subject: RE: [Pce] Question on draft-ietf-pce-local-protection-enforcement > > Hi Dhruv, Vishnu, > > “I think we can differentiate between an implementation that supports this extension - that MUST use UNPROTECTED PREFERRED whereas a legacy implementation would handle it as per their understanding of RFC 5440 which could be UNPROTECTED PREFERRED or UNPROTECTED MANDATORY.” > > Wouldn’t such change break backward compatibility? > > Consider that there is vendor, with original behavior L=0 -> unprotected mandatory (on both PCC and PCE side) – as Dhruv mentioned, such implementation would be completely valid with original L flag definition. Same old PCC will connect to new PCE (with draft supported) and suddenly (unexpected) different path-computation result is provided, because behavior has changed. > > PCE can still have a way to detect that it is talking to legacy PCCs and it can fallback to original behavior to do not break backward compatibility. > > I’ll keep Andrew to comment as he is main author. > > Regards, > Samuel > > From: Pce <pce-bounces@ietf.org> On Behalf Of Dhruv Dhody > Sent: Wednesday, January 11, 2023 9:29 AM > To: Vishnu Pavan Beeram <vishnupavan@gmail.com> > Cc: pce@ietf.org > Subject: Re: [Pce] Question on draft-ietf-pce-local-protection-enforcement > > Hi Pavan, > > > On Wed, Jan 11, 2023 at 12:46 PM Vishnu Pavan Beeram <vishnupavan@gmail.com> wrote: >> Dhruv, Hi! >> >> Thanks for the response! Please see inline.. >> >> Regards, >> -Pavan >> >> On Wed, Jan 11, 2023 at 12:03 PM Dhruv Dhody <dhruv.ietf@gmail.com> wrote: >>> Hi Pavan, >>> >>> On Wed, Jan 11, 2023 at 11:02 AM Vishnu Pavan Beeram <vishnupavan@gmail.com> wrote: >>>> I would like to get some clarification on the text below (understand that a publication request has been made for the draft). >>>> >>>> ** >>>> From Section 5: >>>> When L-flag is not set and E-flag is not set then PCE SHOULD consider >>>> the protection eligibility as UNPROTECTED PREFERRED but MAY consider >>>> protection eligibility as UNPROTECTED MANDATORY constraint. >>>> When L-flag is not set and E-flag is set then PCE MUST consider the >>>> protection eligibility as UNPROTECTED MANDATORY constraint. >>>> >>>> >>>> ** >>>> For the scenario where both the L-flag and the E-flag are not set (first statement above), it seems okay to just say >>>> that the "PCE MUST consider the protection eligibility as UNPROTECTED PREFERRED". Is there a good reason >>>> for both the "SHOULD (UNPROTECTED PREFERRED)" and "MAY (UNPROTECTED MANDATORY)" clauses to >>>> be included here (and keep things ambiguous)? >>>> >>> >>> Dhruv: If I recall correctly (and the authors can confirm that), this was done for the sake of backward compatibility. I remember it being discussed on the mailing list as well. >>> >> [VPB] Thanks for the pointer to the mailing list thread (should have searched there first; apologies for re-opening the topic) -- it was useful! However, the backwards compatibility section (5.1) seems to be silent about this particular scenario. >> >>> If a PCEP speaker does not understand this document (and thus ignores the E flag) and L flag is set to 0, would behave as per RFC 5440 where the concept of enforcement is undefined and some implementation could understand it to be handled as UNPROTECTED MANDATORY instead of UNPROTECTED PREFERRED. And the text allows for it. >> >> [VPB] I understand that there was ambiguity with how the (presence/absence of the) L-flag was interpreted prior to this draft. I was hoping that there would be no ambiguity left when this draft is implemented -- but that doesn't seem to be the case. Let's say a PCC implementation assumes [L 0, E 0] to mean "UNPROTECTED PREFERRED" (SHOULD clause), while the PCE implementation assumes it to mean "UNPROTECTED MANDATORY" (MAY clause) -- this may result in no path being returned (if only protected SIDs are available on some links along the viable paths). Do we need to retain this ambiguity? > > Dhruv: You have a point. I think we can differentiate between an implementation that supports this extension - that MUST use UNPROTECTED PREFERRED whereas a legacy implementation would handle it as per their understanding of RFC 5440 which could be UNPROTECTED PREFERRED or UNPROTECTED MANDATORY. > > Let's see what the authors think about it. > > Thanks! > Dhruv > >> >>> >>> Happy to get additional eyes and confirm if it still makes sense! >>> >>> Thanks! >>> Dhruv >>> >>> >>>> Regards, >>>> -Pavan >>>> _______________________________________________ >>>> Pce mailing list >>>> Pce@ietf.org >>>> https://www.ietf.org/mailman/listinfo/pce > _______________________________________________ > Pce mailing list > Pce@ietf.org > https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/pce__;!!NEt6yMaO-gk!H6D_HNYqOpwYC24iSWxhm7xZ9FKY79qeElf0QTHJ8C8OcWMV5lxd7d4Ute5slfYbGrxvhykirvaoVIndRMQ$
- [Pce] Question on draft-ietf-pce-local-protection… Vishnu Pavan Beeram
- Re: [Pce] Question on draft-ietf-pce-local-protec… Dhruv Dhody
- Re: [Pce] Question on draft-ietf-pce-local-protec… Vishnu Pavan Beeram
- Re: [Pce] Question on draft-ietf-pce-local-protec… Dhruv Dhody
- Re: [Pce] Question on draft-ietf-pce-local-protec… Samuel Sidor (ssidor)
- Re: [Pce] Question on draft-ietf-pce-local-protec… Andrew Stone (Nokia)
- Re: [Pce] Question on draft-ietf-pce-local-protec… John Scudder