[Pce] AD review of draft-ietf-pce-local-protection-enforcement-09

John Scudder <jgs@juniper.net> Tue, 16 May 2023 18:27 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: pce@ietfa.amsl.com
Delivered-To: pce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C39DC16B5C6; Tue, 16 May 2023 11:27:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.086
X-Spam-Level:
X-Spam-Status: No, score=-7.086 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_HTML_ATTACH=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="g/pkglMR"; dkim=pass (1024-bit key) header.d=juniper.net header.b="ek+1L1FD"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z1Zghj3JhKN3; Tue, 16 May 2023 11:27:51 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B29B0C16B5B4; Tue, 16 May 2023 11:27:51 -0700 (PDT)
Received: from pps.filterd (m0108161.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 34GDTndp018238; Tue, 16 May 2023 11:27:43 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : content-type : mime-version; s=PPS1017; bh=PXw6nK330zNU33CH2myMXu9nDSS/eKF3WUCIMeDMQuQ=; b=g/pkglMRGDPFkbPeGHK8qct/jadm2ZY8rHPV9pkqyaUthooWMNK7sA7gY5BuHnZDHjC0 orfMuP51kQUzGrt4Z9wQkkC4wBGHtQCTIdk3ygZuKEfeLNhdLf74UoeiJxtOGNh03Yud j18XY4sp90ScuH2OsVGGni2LqgtSFqFm4l+I0JX1LvEbfL7GBv1QR9haOszjagjiR6H5 yc5xvIQH6D0KTYVeiWCKc+2UVb9oUKsnrUgb1BEuXkdbCeutSFYQ3UPKnZLV4bYCTz6V CVVZVkt8SoQ+FXFjYdS4b6Z+y2j3CB4hFsa7dxUbtL1yEXjhGaxYGF8UCpH/yBNKKYGm CA==
Received: from dm4pr02cu002.outbound.protection.outlook.com (mail-centralusazlp17013033.outbound.protection.outlook.com [40.93.13.33]) by mx0b-00273201.pphosted.com (PPS) with ESMTPS id 3qkqc8ayf2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 16 May 2023 11:27:42 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=e1rXchRSF36c/5lUtw0DfH3CB3PKvAtaeSCohxCprvF2yl6ndJDwMHHetFFgwyowqcn/d73IZwRsxCUR0JXqmWCsZ+uBPdUpx3wBY9KSqynV4kEKygjpP3JHLnM43Z3DhgXc7xrK5jrTvZCeUQNcWCri1NDSSWhb87LnlCy98OuNEMzedBZKyOjcD3DO+j6v+1PksxK6hE5DK4BGLxyUOJ9DashtZVAm+rfet5dqTsVZIa1GJNdnpX1tdqtU4fauP3pC8/lpPX2JAa5xyObqjloQVAofLGA3/PjnD/ZZdnaShiM/zS9mj6V2LONrF+JkhX57AIrLF12w1oJ4Px9xUg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PXw6nK330zNU33CH2myMXu9nDSS/eKF3WUCIMeDMQuQ=; b=GGCTugjeHUk8BXEwwKD1ce3GqUbE8ou66+O0L2XSy6mDCyPCiPRDUCGFnaIXxs8/sY7ck60wUKoOCqGeflAdDBCwt4VDNThqiv+fxD6WJ0Z2SMmeGGKvss+M1alIzbQWz6G+/49BhFbB8ADQd3jJvzHZvVrdyV+yALT98Dd9aSWRtmYtOpNbyPMkaiazAPS47eUW9YMQdnDYZNJD7EYKivFw/C9Mjk8azOFpdfK6KJ0hsLOTzJRrlqXycy9nWng9Ws9Iak79j3fpCF05Vxcrh927/REZTf3KdRYqCL7oKASZAua6aF/zIoL5JvRNNMrWAN4AQP3+8b5zmk5MEncaDw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PXw6nK330zNU33CH2myMXu9nDSS/eKF3WUCIMeDMQuQ=; b=ek+1L1FDLDx9Y1n0k77xD58XAjsp6DsiZwHswP05ZsCNxYp9Y7NKsc3MbjWjVtbScPqXaaPT9Pav5pxImRIlGhccvc6l3TIuDI35577Vrj7l93CVgAKp5iHN6gatPwnsZDdGBpz3OkR1IYiHkI10hkY7Lphu2YNwKzGwhpAxfSA=
Received: from MN2PR05MB6109.namprd05.prod.outlook.com (2603:10b6:208:c4::20) by BY3PR05MB8050.namprd05.prod.outlook.com (2603:10b6:a03:36c::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6387.33; Tue, 16 May 2023 18:27:31 +0000
Received: from MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::9ab0:387b:409:ee41]) by MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::9ab0:387b:409:ee41%6]) with mapi id 15.20.6387.030; Tue, 16 May 2023 18:27:30 +0000
From: John Scudder <jgs@juniper.net>
To: "draft-ietf-pce-local-protection-enforcement@ietf.org" <draft-ietf-pce-local-protection-enforcement@ietf.org>
CC: "pce@ietf.org" <pce@ietf.org>, "andrew.stone@nokia.com" <andrew.stone@nokia.com>, "mustapha.aissaoui@nokia.com" <mustapha.aissaoui@nokia.com>, "ssidor@cisco.com" <ssidor@cisco.com>, "ssivabal@ciena.com" <ssivabal@ciena.com>
Thread-Topic: AD review of draft-ietf-pce-local-protection-enforcement-09
Thread-Index: AQHZiCQTSMjzga3oAkO9qp4CFS4CHg==
Date: Tue, 16 May 2023 18:27:30 +0000
Message-ID: <AB24087A-B877-4793-ABA9-6866C623487A@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.2)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR05MB6109:EE_|BY3PR05MB8050:EE_
x-ms-office365-filtering-correlation-id: ff18cca4-19e7-464b-b716-08db563b3599
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR05MB6109.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(366004)(39860400002)(396003)(376002)(346002)(136003)(451199021)(66899021)(83380400001)(36756003)(38070700005)(4326008)(38100700002)(2906002)(86362001)(8676002)(316002)(5660300002)(99936003)(8936002)(64756008)(66946007)(76116006)(66446008)(66476007)(6916009)(66556008)(122000001)(91956017)(966005)(6506007)(26005)(6512007)(33656002)(186003)(6486002)(71200400001)(478600001)(41300700001)(54906003)(2616005)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/mixed; boundary="_003_AB24087AB8774793ABA96866C623487Ajunipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR05MB6109.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ff18cca4-19e7-464b-b716-08db563b3599
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 May 2023 18:27:30.4968 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: DlwdRlOeyw3YwF8gp+w4pmiS/D8bz9IBVt+Rgw51w5p7gXS9Ni3Wk9+YnKddnQ70
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY3PR05MB8050
X-Proofpoint-GUID: jkquL9iFDClDUD2bzMFOAmG2KfPcrvLQ
X-Proofpoint-ORIG-GUID: jkquL9iFDClDUD2bzMFOAmG2KfPcrvLQ
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-05-16_10,2023-05-16_01,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 lowpriorityscore=0 adultscore=0 spamscore=0 clxscore=1011 bulkscore=0 mlxlogscore=999 impostorscore=0 priorityscore=1501 mlxscore=0 phishscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2304280000 definitions=main-2305160155
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/LZFULU-rBrXXxC9HpcuHhYQatqA>
Subject: [Pce] AD review of draft-ietf-pce-local-protection-enforcement-09
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 May 2023 18:27:56 -0000

Hi Andrew and all,

Thanks for your replies to my previous review, and for the new version, it clears up most of my concerns. In reviewing the changes, I did come upon some other things, some of which were introduced in 09 and others which were things I’d overlooked on my first pass. I’m sorry not to have gotten these the first time through, but better late than never.

Once we’ve closed on these points [*] I think we’ll be ready for IETF Last Call.

Thanks,

—John

[*] Keeping in mind that “we’ve considered your input but decided to keep the text as written” is usually a way to resolve any given point. :-) 

--- draft-ietf-pce-local-protection-enforcement-09.txt	2023-05-15 20:21:43.000000000 -0400
+++ draft-ietf-pce-local-protection-enforcement-09-jgs-comments.txt	2023-05-16 14:19:03.000000000 -0400
@@ -130,6 +130,9 @@
    PCEP Extensions for Segment Routing ([RFC8664]) extends support in
    PCEP for Segment Routed paths.  The path list is encoded with Segment
    Identifiers, each of which offer local protection.  The PCE may
+---
+jgs: Should that be "each of which might offer"?
+---
    discover the protection eligibility for a Segment Identifier (SID)
    via BGP-LS [RFC9085] and take the protection into consideration as a
    path constraint.
@@ -156,6 +159,17 @@
 3.  Terminology
 
    This document uses the following terminology:
+---
+jgs: While I don't insist, I think the document will have a smoother
+approval path if the terms below were not rendered in ALL CAPS. If the
+WG feels that ALL CAPS is necessary or preferable, so be it, I'll take
+it forward that way -- I don't have a strong preference about this
+myself, but I know for certain that some reviewers will see it as 
+unnecessarily confusing vs. RFC 2119 keywords. 
+
+Another option would be to use initial caps as many specs do with terms
+they define, e.g. "Protection Mandatory", "Unprotected Mandatory", etc.
+---
 
    PROTECTION MANDATORY: The Path MUST have protection eligibility on
    all links.
@@ -173,10 +187,59 @@
    PROTECTION PREFERRED: The Path SHOULD have protection eligibility on
    all links but MAY contain links which do not have protection
    eligibility.
+---
+jgs: I'm sorry to not have raised this in my first round of review, but
+I just noticed it. It's clear to me what your intent is (or, what I
+think it is!), which is probably why I didn't pick up on this earlier,
+but I think if subjected to a close reading of the RFC 2119 definitions
+of SHOULD and MAY this doesn't work right.
+
+Let's recall how SHOULD and MAY are defined in RFC 2119:
+
+```
+3. SHOULD   This word, or the adjective "RECOMMENDED", mean that there
+   may exist valid reasons in particular circumstances to ignore a
+   particular item, but the full implications must be understood and
+   carefully weighed before choosing a different course.
+
+5. MAY   This word, or the adjective "OPTIONAL", mean that an item is
+   truly optional.  One vendor may choose to include the item because a
+   particular marketplace requires it or because the vendor feels that
+   it enhances the product while another vendor may omit the same item.
+   An implementation which does not include a particular option MUST be
+   prepared to interoperate with another implementation which does
+   include the option, though perhaps with reduced functionality. In the
+   same vein an implementation which does include a particular option
+   MUST be prepared to interoperate with another implementation which
+   does not include the option (except, of course, for the feature the
+   option provides.)
+```
+
+So if we did a "macro expansion" of your sentence, using those
+definitions, we'd find that the Path has to have protection eligibility
+on all links unless the implementor has understood and carefully weighed
+the implications of not doing so... but optionally (and this is truly
+optional) some vendors might choose to include links that don't have
+protection eligibility (and might choose this regardless of whether a
+protection-elegible link was also available).
+
+I bet this isn't what you mean to say. If it is, let's have a
+discussion. But I'm guessing what you really intend is that the Path
+will be built using protection-eligible links, unless it's not possible
+to form a Path in that way, in which case gaps may be closed using
+whatever links are available. If the latter is the case, let's find some
+wording that says that, without abusing RFC 2119 terms. A minimal fix
+would be to simply swap out the 2119 SHOULD/MAY for normal lower-case
+should/may, but I'd encourage you to do a little more if you're up for
+it. 
+---
 
    UNPROTECTED PREFERRED: The Path SHOULD NOT have protection
    eligibility on all links but MAY contain links which have protection
    eligibility.
+---
+jgs: same comment applies here.
+---
 
    PCC: Path Computation Client.  Any client application requesting a
    path computation to be performed by a Path Computation Element.
@@ -346,12 +409,29 @@
    consider the protection eligibility as an UNPROTECTED PREFERRED
    constraint but MAY consider protection eligibility as an UNPROTECTED
    MANDATORY constraint.
+---
+jgs: See my comment at https://mailarchive.ietf.org/arch/msg/pce/Ai6XH04JtVZCIPNTLLszytFC8FU/
+
+Repeated here for convenience, my suggestion in that comment --
+
+NEW:
+   When both L flag and E flag are set to 0, then the PCE SHOULD
+   consider the protection eligibility as an UNPROTECTED PREFERRED
+   constraint but MAY consider protection eligibility as an UNPROTECTED
+   MANDATORY constraint. An example of when the latter behavior might
+   be chosen is if the PCE has some means (outside the scope of this
+   document) to detect that it’s interacting with a legacy PCC that 
+   expects the legacy behavior.
+
+Or something to that effect -- an example and/or explanation of the
+circumstances under which the SHOULD might reasonably be disregarded.
+---
 
    When L flag is set to 0 and E flag is set to 1, then the PCE MUST
    consider the protection eligibility as an UNPROTECTED MANDATORY
    constraint.
 
-   If a PCE is unable to infer protection status of a resource, PCE MAY
+   If a PCE is unable to infer the protection status of a resource, the PCE MAY
    use local policy to define protected status assumptions.  When
    computing a Segment Routed path, It is RECOMMENDED that a PCE assume
    a Node SID is protected.  It is also RECOMMENDED that a PCE assume an
@@ -397,6 +477,11 @@
    behaviour specified in [RFC5440] and will ignore the E flag.  Thus,
    it may compute a path which may not respect the enforcement
    constraint.
+---
+jgs: this is only a small point, but I like to avoid "may" where possible
+for avoidance of confusion with MAY, so I might reword as "Thus, it could
+compute a path which might not respect..."
+---
 
    For PCC-initiated LSPs, the PCC SHOULD ignore the E flag value
    received from the PCE in a PCUpd message as it may be communicating
@@ -406,6 +491,13 @@
    from the PCE in a PCUpd message.  The PCE SHOULD ignore the E flag
    value received from the PCC in a PCRpt message as it may be
    communicating with a PCC which does not support this document.
+---
+jgs: While I have my RFC 2119 eyes peeled, I guess in the case of the
+two SHOULD above, you are deliberately leaving the door open for a 
+PCE implementation which either has a strict-mode knob, or which is
+a greenfield implementation and doesn't want to bother with 
+support of legacy behaviors. Or...?
+---
 
 6.  Implementation Status