Re: [Pce] Review of draft-ietf-pce-segment-routing-policy-cp-15 from SR Policy Arch POV

Ketan Talaulikar <ketant.ietf@gmail.com> Mon, 08 April 2024 15:34 UTC

Return-Path: <ketant.ietf@gmail.com>
X-Original-To: pce@ietfa.amsl.com
Delivered-To: pce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 337A4C151553; Mon, 8 Apr 2024 08:34:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5FAVCB5iFCu6; Mon, 8 Apr 2024 08:34:55 -0700 (PDT)
Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [IPv6:2a00:1450:4864:20::633]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9185CC1516F3; Mon, 8 Apr 2024 08:34:55 -0700 (PDT)
Received: by mail-ej1-x633.google.com with SMTP id a640c23a62f3a-a519e1b0e2dso453276966b.2; Mon, 08 Apr 2024 08:34:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1712590493; x=1713195293; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=MjeHT0v+nECXeVGtJuD7itwz2tMinsAu9cgE0oMg2Ds=; b=kjYV4UxfFwuQlrFIZPZ0xVxORBgpXgKqUub4FgOGoH2l4C9uKgu8sQ8ezX6yO91FPV KLtJfZWwhahVybpfRu7KVnj4ut7mSHVXz8yM22dSD/vQVd2K/Cs3TS67PSLsdPW3fjTd WllqM2tdPpkE1Hhqg9/x4b/LsXuB0wCyPEFmEw71mJ3TIL2ANK7XjcsPMMiT0G7COMEc eQUDyRYyfB/50QNgf8xzgJyZez449zB4yBgYodFXL9pIPbmudjlBtpuUMHe81PzvGZGi AHLp2+PETcFKNQCofdc1XV776k317S8z7OFjaceEqT7BR4B2m6UMILL70VkHR8ZSqOfm xpMw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712590493; x=1713195293; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=MjeHT0v+nECXeVGtJuD7itwz2tMinsAu9cgE0oMg2Ds=; b=WDjc827h4S6+W5EjQKJuV+vuUxWGpXLcvYya3VbvQdmcXak/8GUmenWhNMQf4KIj7P b+p0/u3RBj1UmoF6PPeSJe8K5P/85cgUa94MdfLQVvEfI3TV10Stsb4lydXo4zdwuB2I 1M6JR+oU995isNb633IIV+Lu6OIMiCB4wJsmB+1SoyoARKNL+gHIqtVE0ChmXbQEI9xh Q/GDpagcbRkgAZhiZUyu2pu4gcpBhbN8gFfmCwyzsOdtS3KFtmR4wxsVUq/Cf0ieBjpw CWtKnBJHBjaXJRRfHOL/SvDVpYhyh1OFXIjKd1cbc0O/xs5akylA/BFzhAtoK3DI22Ub CEcQ==
X-Forwarded-Encrypted: i=1; AJvYcCV5wigPYfUlQWwetek9zWfnIMtSrmTzVQzePYWTSmxU5yxFtVSSq8RfvQYZK51ISQ7jnde/1wvj2v+vUZXZbYG1hracMD+ZYJibZvlw4dtaP6uGRoSb3kEOVW+IfSdIanOe
X-Gm-Message-State: AOJu0YxK+lVtsBjyCm0jluUS5IuFnbdx07xelG8TC8bjmNEI1Srx/ndb KSb/8Dfl8oggFwxXGIPdjt9e2usc85Qq19NZbnYdti/sCNs4eZeXqhlFGUXTOBHlbIYsKkZwux1 xiHvbNM8qZsHlR0w5C7tk0s80fug=
X-Google-Smtp-Source: AGHT+IH0/cJG4xTYQ4yUxW9L54ZfxqN3fR12oVX8Xu4tySZpDNh1JHTjAan0n7iRvm8q4P9jTakb6LtvdP/bBgWU5XM=
X-Received: by 2002:a17:906:ecb6:b0:a50:4ade:b414 with SMTP id qh22-20020a170906ecb600b00a504adeb414mr6463530ejb.3.1712590493174; Mon, 08 Apr 2024 08:34:53 -0700 (PDT)
MIME-Version: 1.0
References: <CAH6gdPy_uh-ZdomgDmD83=gmBq_0OvA=H8_yXgzMtrZNbsySSQ@mail.gmail.com> <CAB75xn4tzQt7+S4i+RnOvge6gG9nE_KAqSURPHB8gvxy589d4A@mail.gmail.com>
In-Reply-To: <CAB75xn4tzQt7+S4i+RnOvge6gG9nE_KAqSURPHB8gvxy589d4A@mail.gmail.com>
From: Ketan Talaulikar <ketant.ietf@gmail.com>
Date: Mon, 08 Apr 2024 21:04:41 +0530
Message-ID: <CAH6gdPwkyaNx53BF5CKGLQkBKO-ZTocvHmiA7FgO=FTJ=BPipg@mail.gmail.com>
To: Dhruv Dhody <dhruv.ietf@gmail.com>
Cc: pce@ietf.org, draft-ietf-pce-segment-routing-policy-cp@ietf.org, Dhruv Dhody <dd@dhruvdhody.com>
Content-Type: multipart/alternative; boundary="000000000000fdd23d0615978b30"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/sRAvI0__cdfma3tj6yNA-Lv1LM4>
Subject: Re: [Pce] Review of draft-ietf-pce-segment-routing-policy-cp-15 from SR Policy Arch POV
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Apr 2024 15:34:57 -0000

Hi Dhruv,

Please check inline for responses/clarifications with KT.


On Mon, Apr 8, 2024 at 7:54 PM Dhruv Dhody <dhruv.ietf@gmail.com> wrote:

> Hi Ketan, Authors,
>
> I am just responding to a few comments as a Shepherd. Please work with
> each other and let's resolve these comments....
>
> On Mon, Apr 8, 2024 at 5:15 PM Ketan Talaulikar <ketant.ietf@gmail.com>
> wrote:
>
>> Hello Authors/All,
>>
>> I've reviewed the draft from the perspective of consistency with the SR
>> Policy Arch RFC9256 as well as the BGP SR Policy SAFI IDR draft. As such, I
>> find some issues that I think need to be addressed before publication.
>>
>> Note that these may seem editorial (no change needed in PCEP signaling),
>> but they are semantically important for this document to convey the intent
>> and operations for these extensions.
>>
>> My comments are embedded in the idnits format below.
>>
>> Thanks,
>> Ketan
>>
>>
>> 13 Path Computation Element Communication Protocol (PCEP) Extensions for
>> 14              Segment Routing (SR) Policy Candidate Paths
>>
>> *[major] A more appropriate title would be "PCEP Extensions for SR
>> Policy" *
>> *since this is not just about CPs but support for SR Policy construct.*
>>
>>
> Dhruv: In PCEP the key construct that we signal is a CP and thus I
> consider the title to be apt.
>

KT> The unit of signaling is a CP, but by virtue of the SRPA what is
introduced is the ability to signal an SR Policy. Isn't it?


>
>
>
>> 15              draft-ietf-pce-segment-routing-policy-cp-15
>>
>> 17 Abstract
>>
>> 19   Segment Routing (SR) allows a node to steer a packet flow along any
>> 20   path.  SR Policy is an ordered list of segments (i.e., instructions)
>> 21   that represent a source-routed policy.  Packet flows are steered into
>> 22   an SR Policy on a node where it is instantiated called a headend
>> 23   node.  An SR Policy is made of one or more candidate paths.
>>
>> 25   This document specifies Path Computation Element Communication
>> 26   Protocol (PCEP) extension to associate candidate paths of the SR
>> 27   Policy.  Additionally, this document updates [RFC8231] to allow
>> 28   stateful bringup of an SR LSP, without using PCReq/PCRep messages.
>> 29   This document is applicable to both Segment Routing over MPLS and to
>> 30   Segment Routing over IPv6 (SRv6).
>>
>>
>>
>> *[major] This document has the specifications that actually align the
>> PCEPextensions (e.g. RFC8664) for SR defined prior to this document to the *
>> *SR Policy architecture RFC9256. This should be the most important thing
>> to call out and that this spec formally updates RFC8664 and *
>> *RFC-draft-ietf-pce-segment-routing-ipv6.*
>>
>>
> Dhruv: Happy for the authors to make it clearer but I don't think there is
> a need for a formal update. "Update" makes sense when there is some text in
> those RFCs that require changes. It is just a normal extension. From PCEP
> POV, SR-MPLS and SRv6 extensions for those path setup types exist on their
> own. If SR Policy is in use, then of course this document should be used.
>

KT> What is being signaled via RFC8664 is something that is not defined in
SR Architecture but those specs are still called SR extensions. Putting a
formal "update" points readers that this document is what extends those
previous documents for SR Policy (and thereby SR) extensions.


>
> <snip>
>
>
>
>>
>> 126   Segment Routing Policy for Traffic Engineering [RFC9256] details the
>> 127   concepts of SR Policy and approaches to steering traffic into an SR
>> 128   Policy.
>>
>> 130   PCEP Extensions for Segment Routing [RFC8664] specifies extensions
>> to
>> 131   the Path Computation Element Protocol (PCEP) that allow a stateful
>> 132   PCE to compute and initiate Traffic Engineering (TE) paths, as well
>> 133   as a PCC to request a path subject to certain constraint(s) and
>> 134   optimization criteria in SR networks.
>>
>> 136   PCEP Extensions for Establishing Relationships Between Sets of LSPs
>> 137   [RFC8697] introduces a generic mechanism to create a grouping of
>> LSPs
>> 138   which can then be used to define associations between a set of LSPs
>> 139   and a set of attributes (such as configuration parameters or
>> 140   behaviors) and is equally applicable to stateful PCE (active and
>> 141   passive modes) and stateless PCE.
>>
>>
>>
>> *[major] It may be somewhat misleading to give an impression that
>> thepurpose for introducing the SRPA is "to create a grouping of LSPs". *
>>
>>
>> *For sure, the SRPA enables the  grouping of CPs associated with a single
>> SR Policy. However, SRPA is  absolutely necessary even when signaling a
>> single SR Policy CP as it is  indicating the Color of the SR Policy and
>> the identifiers of the SR Policy CP  **as per RFC9256.*
>>
>>
> Dhruv: In PCEP, association can exist with a single LSP in the association
> group. If authors feel they need to be explicit about it, it is fine with
> me.
>

KT> Agree. A clarification is important in this context since the SRPA is
necessary (I would say mandatory) even for a single CP in the context of
this document for conformance with SR Policy architecture.


>
> <snip>
>
>
>
>> 156   Endpoint:  The IPv4 or IPv6 endpoint address of the SR Policy in
>> 157      question, as described in [RFC9256].
>>
>> 159   SRPA:  SR Policy Association.  A new association type 'SR Policy
>> 160      Association' is used to group candidate paths belonging to the SR
>> 161      Policy.  Depending on discussion context, it can refer to the
>> PCEP
>> 162      ASSOCIATION object of SR Policy type or to a group of LSPs that
>> 163      belong to the association.
>>
>> 165   Association Parameters:  As described in [RFC8697], refers to the
>> key
>> 166      data, that uniquely identifies the Association.
>>
>> 168   Association Information:  As described in [RFC8697], refers to the
>> 169      non-key information about the Association.
>>
>> 171 3.  Overview
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> *[major] What we are missing here is some text about the motivation for
>> whythese extensions are a MUST have for SR Policy signaling via PCEP. I
>> will try tosummarize:a) To align with SR Policy construct per RFC9256b) To
>> ensure that the headend is able to "associated" a SR Policy CP signaledvia
>> PCEP with other CPs of the same SR Policy from other sources - e.g.,locally
>> configured or via BGP.c) To indicate the intent of the SR Policy via
>> "color" that can then be usedon the headend for steering BGP service routes
>> over the SR Policy provisionedvia PCEP (PCE initiated).None of these were
>> possible without this extension for certain deploymentdesigns - especially
>> PCE initiated.*
>>
>>
> Dhruv: I don't disagree but this section is an overview of the extensions
> and not motivation. If authors wish to add a motivation section, sure they
> can do that.
>

KT> The section says "Overview" and not "Overview of the extensions" - but
these are editorial things which I would leave to the authors. My comment
was on the necessity of these extensions for supporting SR Policy construct
in PCEP.


>
> <snip>
>
>
>>
>> 283   The Association Source MUST be set to the headend value of the SR
>> 284   Policy, as defined in [RFC9256] Section 2.1.
>>
>> 286   The 16-bit Association ID field in the ASSOCIATION object MUST be
>> set
>> 287   to the value of "1".
>>
>> 289   The Extended Association ID TLV MUST be included and it MUST be in
>> 290   the following format:
>>
>> 292       0                   1                   2                   3
>> 293       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>> 294      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 295      |           Type = 31           |       Length = 8 or 20        |
>> 296      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 297      |                             Color                             |
>> 298      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 299      ~                           Endpoint                            ~
>> 300      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> 302                Figure 1: Extended Association ID TLV format
>>
>> 304   Type: Extended Association ID TLV, type = 31 [RFC8697].
>>
>> 306   Length: Either 8 or 20, depending on whether IPv4 or IPv6 address is
>> 307   encoded in the Endpoint field.
>>
>> 309   Color: SR Policy color value, non-zero as per [RFC9256] Section 2.1.
>>
>> 311   Endpoint: can be either IPv4 or IPv6.  This value MAY be different
>> 312   from the one contained in the Destination address field in the END-
>> 313   POINTS object, or in the Tunnel Endpoint Address field in the LSP-
>> 314   IDENTIFIERS TLV.
>>
>> 316   If the PCEP speaker receives an SRPA object whose Association
>> 317   Parameters do not follow the above specification, then the PCEP
>> 318   speaker MUST send PCErr message with Error-Type = 26 "Association
>> 319   Error", Error-Value = 20 "SR Policy Identifier Mismatch".
>>
>> 321   The purpose of choosing the Association Parameters in this way is to
>> 322   guarantee that there is no possibility of a race condition when
>> 323   multiple PCEP speakers want to associate the same SR Policy at the
>> 324   same time.  By adhering to this format, all PCEP speakers come up
>> 325   with the same Association Parameters independently of each other
>> 326   based on the SR Policy [RFC9256] parameters.  Thus, there is no
>> 327   chance that different PCEP speakers will come up with different
>> 328   Association Parameters for the same SR Policy.
>>
>> 330   The last hop of the computed SR Policy Candidate Path MAY differ
>> from
>> 331   the Endpoint contained in the <headend, color, endpoint> tuple.  An
>> 332   example use case is to terminate the SR Policy before reaching the
>> 333   Endpoint and have decapsulated traffic go the rest of the way to the
>> 334   Endpoint node using the native IGP path(s).  In this example, the
>> 335   destination of the SR Policy Candidate Paths will be some node
>> before
>> 336   the Endpoint, but the Endpoint value is still used at the head-end
>> to
>> 337   steer traffic with that Endpoint IP into the SR Policy.  Destination
>> 338   of the SR Policy Candidate Path is signaled using the END-POINTS
>> 339   object and/or LSP-IDENTIFIERS TLV, as per the usual PCEP procedures.
>> 340   When neither END-POINTS object nor LSP-IDENTIFIERS TLV is present,
>> 341   the PCEP speaker MUST extract the destination from the Endpoint
>> field
>> 342   in the SRPA Extended Association ID TLV.
>>
>> *[major] What about the null endpoint support?*
>>
>>
> Dhruv: One can still use the values 0.0.0.0 and ::
>

KT> It would be good to explicitly call that out. There may be
misunderstandings otherwise.

>
>
>
>>
>> 394 4.2.2.  SR Policy Candidate Path Identifier TLV
>>
>> 396   The SRPOLICY-CPATH-ID TLV is a mandatory TLV for the SRPA object.
>>
>> 398       0                   1                   2                   3
>> 399       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>> 400      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 401      |             Type              |             Length            |
>> 402      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 403      | Proto. Origin |                      MBZ                      |
>> 404      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 405      |                         Originator ASN                        |
>> 406      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 407      |                                                               |
>> 408      |                       Originator Address                      |
>> 409      |                                                               |
>> 410      |                                                               |
>> 411      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 412      |                         Discriminator                         |
>> 413      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>
>> 415                 Figure 3: The SRPOLICY-CPATH-ID TLV format
>>
>> 417   Type: 57 for "SRPOLICY-CPATH-ID" TLV.
>>
>> 419   Length: 28.
>>
>> 421   Protocol Origin: 8-bit value that encodes the protocol origin, as
>> 422   specified in Section 6.5.  Note that in PCInitiate message
>> [RFC8281],
>> 423   the Protocol Origin is always set to 10 (PCEP).
>>
>> 425   MBZ: Must be zero.
>>
>> 427   Originator ASN: Represented as 4-byte number, part of the originator
>> 428   identifier, as specified in [RFC9256] Section 2.4.  If 2-byte ASNs
>> 429   are in use, the low-order 16 bits is used, and the high-order bits
>> 430   are set to 0.  When sending PCInitiate message [RFC8281], the PCE is
>> 431   acting as the originator and therefore MUST set this to an ASN that
>> 432   it belongs to.
>>
>>
>>
>> *[major] This is an unnecessary restriction on PCEP which does not use
>> ASN.RFC9256 section 2.4 allows the value of 0 to be used by PCEP when ASN
>> is notavailable/known.*
>>
>>
> Dhruv: Good catch!
>
> <snip>
>
>
>
>> 622 5.4.  Invalidation TLV
>>
>> 624   The INVALIDATION TLV is an optional TLV for the LSP object.  It is
>> 625   used to control traffic steering into the LSP during the time when
>> 626   the LSP is operationally down/invalid.  In the context of SR Policy,
>> 627   this TLV facilitates the Drop-upon-invalid behavior, specified in
>> 628   Section 8.2 of [RFC9256].  Normally, if the LSP is down/invalid then
>> 629   it stops attracting traffic and traffic that would have been
>> destined
>> 630   to that LSP is redirected somewhere else, such as via IGP or via
>> 631   another LSP.  The Drop-upon-invalid behavior specifies that the LSP
>> 632   keeps attracting traffic and the traffic has to be dropped at the
>> 633   head-end.  Such an LSP is said to be "in drop state".  While in the
>> 634   drop state, the LSP operational state is "UP", as indicated by the
>> 635   O-flag in the LSP object.  However the ERO object MAY be empty, if
>> no
>> 636   valid path has been computed.
>>
>> 638   The INVALIDATION TLV is used in both directions between PCEP peers:
>>
>> 640   *  PCE -> PCC: PCE specifies to the PCC whether to enable or disable
>> 641      Drop-upon-invalid (Config).
>>
>> 643   *  PCC -> PCE: PCC reports the current setting of the Drop-upon-
>> 644      invalid (Config) and also whether the LSP is currently in the
>> drop
>> 645      state (Oper).
>>
>> 647       0                   1                   2                   3
>> 648       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>> 649      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 650      |             Type              |             Length            |
>> 651      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 652      |   Oper        |   Config      |              MBZ              |
>> 653      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> 654                   Figure 9: The INVALIDATION TLV format
>>
>> 656   Type: 70 for "INVALIDATION" TLV.
>>
>> 658   Length: 4.
>>
>> 660   Oper: encodes the current state of the LSP, i.e., whether it is
>> 661   actively dropping traffic right now.  This field can be set to non-
>> 662   zero values only by the PCC, it MUST be set to 0 by the PCE and
>> 663   SHOULD be ignored by the PCC.
>>
>> 665                               0 1 2 3 4 5 6 7
>> 666                              +-+-+-+-+-+-+-+-+
>> 667                              |             |D|
>> 668                              +-+-+-+-+-+-+-+-+
>>
>> 670             Figure 10: Oper state of Drop-upon-invalid feature
>>
>> 672   *  D: dropping - the LSP is currently attracting traffic and
>> actively
>> 673      dropping it.
>>
>> 675   *  The unassigned bits in the Flag octet MUST be set to zero upon
>> 676      transmission and MUST be ignored upon receipt.
>>
>> 678   Config: encodes the current setting of the Drop-upon-invalid
>> feature.
>>
>> 680                               0 1 2 3 4 5 6 7
>> 681                              +-+-+-+-+-+-+-+-+
>> 682                              |             |D|
>> 683                              +-+-+-+-+-+-+-+-+
>>
>> 685            Figure 11: Config state of Drop-upon-invalid feature
>>
>> 687   *  D: drop enabled - the Candidate Path has Drop-upon-invalid
>> feature
>> 688      enabled.
>>
>> 690   *  The unassigned bits in the Flag octet MUST be set to zero upon
>> 691      transmission and MUST be ignored upon receipt.
>>
>>
>>
>> *[major] Was there a specific reason to specify this as a boolean instead
>> ofbits/flags?*
>>
>
> Dhruv: There were more flags before but were removed, the aim is to allow
> extensibility. I suggested authors turn this into a registry!
>

KT> I did see some flags being used in the previous versions, but those are
very generic and applicable for any CP invalidation scenario in general and
not specific to the invalidation case. So my question is what future
extensibility do we foresee here? I am also looking at this from alignment
across to BGP-LS (in case we have missed something there).

Thanks,
Ketan


>
> <snip>
>
> Thanks!
> Dhruv
>