[Pce] AD review of draft-ietf-pce-local-protection-enforcement-08

John Scudder <jgs@juniper.net> Thu, 20 April 2023 19:35 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: pce@ietfa.amsl.com
Delivered-To: pce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D032C151B13; Thu, 20 Apr 2023 12:35:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.087
X-Spam-Level:
X-Spam-Status: No, score=-7.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_HTML_ATTACH=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="p5HoE6AO"; dkim=pass (1024-bit key) header.d=juniper.net header.b="jJFGL6Cr"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H-PxSry5Hday; Thu, 20 Apr 2023 12:35:27 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3D92C14CF0D; Thu, 20 Apr 2023 12:35:24 -0700 (PDT)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 33KBTX9u003477; Thu, 20 Apr 2023 12:35:16 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : content-type : mime-version; s=PPS1017; bh=DOfqcXJgtHPVHJh1QekY6Pije9giqsMfwhhz9Er4qBU=; b=p5HoE6AOy+1eMp+MIEvOXL3R8P4pw56fuXBHrwg2hcTCw7dctBKgKbWCl/SnWwBE6xNH AId4V9vkzuzwYsdAaTjHN5OzcvG7L930FUWL/q0VO3IJHqmEuzMxqcRzicpvLo5/S5rz ruaqh2vDz+JNerKE8yw9cbT+lPTb7u9o5U9scxG3Fs70uINW7jc+VD47TXkHbAyW/rzb WBpA/m09ucj43Hm8Ct7bng6ZqFn7s01IfZVApKYqeq/zf6qGToe8CPh5MhKOqH4LyTn9 OM0rZt9iJ46Pmwb1NshLJ5UnJQ3o6Xmj5ue22Yuz1RBDVGxVAGOoHY8g9P6qPS3QxfQH aA==
Received: from cy4pr02cu007.outbound.protection.outlook.com (mail-westcentralusazlp17011011.outbound.protection.outlook.com [40.93.6.11]) by mx0b-00273201.pphosted.com (PPS) with ESMTPS id 3q34jms4e7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 20 Apr 2023 12:35:15 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=D9soe2rRy1xWq3N52KsPCLneWLB11OPr78PSdtHyQn+dyQY4hEswKXB7KI4Lc+cSpfbhQuZvYPJMF4uy1tDYLWGb21ycMLiOXNLjgrhh3jYLlOgnSHi4lhKmYvaz388C3pShhTcEBKyJSaUV6vegyKVvRpBLbo+creZTrQLxzXkgtjvA9+KXg9nukJifOx+/8MxzrDw3ceqT9WThqveH8yd21ChiOUZO5OLCGXbb2Q0/prARr0wptDKpjQvFTSvq+2FwmrgKTfQV/EiOrxDGltKh0Bn2GGt4rNqfioXT0C/mWbdyRi6KFgAUGLYCzKxl8vqV63k4woMDVkNGfjkZHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DOfqcXJgtHPVHJh1QekY6Pije9giqsMfwhhz9Er4qBU=; b=Qo5rDHReBScduEDy64jLNNWDbMlx2z2iMuhET5FLbJJn6PsNNBJETPEySA0XEraRaq/tDP9Jzc1PcJZImcApfLWb6WAxJbY8cG9zhO16RRVt0xCDLXEZ3y2FyibsI8uaQG9kpN2wAyWDSxJS0B4j07/zMbra9Iy+4LJiv41TqBMA9moU5MOpVnvrm9kWt2h8gyQcAQc0fX1pBEmid34LJsy6m9JEHdYUIk6YeYfE+jLS2jiUyvyBYJppFsnehhYU3Uo4Yh3diqzXKirl9ydaPUsvxBe18J76XQAIvS4kliB1f+zKaSO1ZDo+NhyhmoC26KM04GEzX5HMnFWiHbkslQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DOfqcXJgtHPVHJh1QekY6Pije9giqsMfwhhz9Er4qBU=; b=jJFGL6Cr9mlyPWToZRhF4NHWihi5KgyIan4uaQZ518rD8oQYdmqkBIz/AheWo6wd1mlE492ly6JVc+J9G5RncbGZUn9Wd5QS0eVe1ZE50i2La18AErlJQjzAxak5v1ejB8vdNyiggahvVJ9UWm1wEDIiZuQm7GsxSvUecCq0OMg=
Received: from BN8PR05MB6098.namprd05.prod.outlook.com (2603:10b6:408:45::29) by SN4PR0501MB3726.namprd05.prod.outlook.com (2603:10b6:803:50::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6319.20; Thu, 20 Apr 2023 19:35:13 +0000
Received: from BN8PR05MB6098.namprd05.prod.outlook.com ([fe80::9a58:b09f:20c4:9c74]) by BN8PR05MB6098.namprd05.prod.outlook.com ([fe80::9a58:b09f:20c4:9c74%4]) with mapi id 15.20.6319.022; Thu, 20 Apr 2023 19:35:12 +0000
From: John Scudder <jgs@juniper.net>
To: "draft-ietf-pce-local-protection-enforcement@ietf.org" <draft-ietf-pce-local-protection-enforcement@ietf.org>
CC: "pce@ietf.org" <pce@ietf.org>, "andrew.stone@nokia.com" <andrew.stone@nokia.com>, "mustapha.aissaoui@nokia.com" <mustapha.aissaoui@nokia.com>, "ssidor@cisco.com" <ssidor@cisco.com>, "ssivabal@ciena.com" <ssivabal@ciena.com>
Thread-Topic: AD review of draft-ietf-pce-local-protection-enforcement-08
Thread-Index: AQHZc785Ha6Efjr470+t1KkVB2Ttcg==
Date: Thu, 20 Apr 2023 19:35:12 +0000
Message-ID: <FE8AE71A-EF4A-42BD-8373-49A1747B5066@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.2)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN8PR05MB6098:EE_|SN4PR0501MB3726:EE_
x-ms-office365-filtering-correlation-id: c566b45e-3531-493f-f9d4-08db41d65c2c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN8PR05MB6098.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(396003)(346002)(366004)(39860400002)(376002)(136003)(84040400005)(451199021)(6916009)(66556008)(316002)(54906003)(64756008)(66476007)(66446008)(66946007)(91956017)(76116006)(4326008)(36756003)(186003)(6506007)(26005)(6512007)(38100700002)(122000001)(2616005)(66574015)(83380400001)(8676002)(5660300002)(41300700001)(8936002)(478600001)(6486002)(71200400001)(38070700005)(33656002)(99936003)(2906002)(86362001)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/mixed; boundary="_003_FE8AE71AEF4A42BD837349A1747B5066junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN8PR05MB6098.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c566b45e-3531-493f-f9d4-08db41d65c2c
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Apr 2023 19:35:12.8053 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WR69+v9EZTIjadfQgyVqSKcVM4Q0Qx+xpWhho/N1giliqDUTwdvly1hrvJhYcEav
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR0501MB3726
X-Proofpoint-ORIG-GUID: qRcM4L2fUyH37D4UspWP5MwUoEJXlsOA
X-Proofpoint-GUID: qRcM4L2fUyH37D4UspWP5MwUoEJXlsOA
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-04-20_15,2023-04-20_01,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 bulkscore=0 phishscore=0 spamscore=0 mlxscore=0 suspectscore=0 clxscore=1011 mlxlogscore=999 impostorscore=0 priorityscore=1501 adultscore=0 malwarescore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2303200000 definitions=main-2304200163
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/uluM_ROWNWD1WUC074izfTsQU7o>
Subject: [Pce] AD review of draft-ietf-pce-local-protection-enforcement-08
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Apr 2023 19:35:32 -0000

Hi Authors, WG,

Thanks for this spec. I can see the need to clear up this ambiguity. 

I’ve supplied most of my questions and comments in the form of an edited copy of the draft. Minor editorial suggestions I’ve made in place without further comment, most of my more substantive questions and comments are done in-line and prefixed with “jgs:”. You can use your favorite diff tool to review them; I’ve attached the iddiff output for your convenience if you’d like to use it. I’ve also pasted a traditional diff below in case you want to use it for in-line reply. 

In addition to my various inline comments, I have a general question/comment. The spec, as far as I can tell, is technology-agnostic: it introduces the E flag and codifies the interpretation of the E+L flags. It doesn’t restrict this to any particular data plane. That seems like the right choice. But, the draft also opens with several paragraphs of discussion of Segment Routing in the Introduction, and its normative language is SR-specific (search for “SID” in the document to see what I mean, SIDs are an SR construct).

Is the applicability of the document intended to be specific to Segment Routing? If so I think this needs to be made clearer. Or, if the document is NOT intended to be restricted to SR, then revisions are needed everywhere after the Introduction where the string ‘SID’ occurs, to make it technology-agnostic. (Less importantly, one might also ask why the Introduction needs to contain a tutorial on SR.)

Thanks,

—John

--- draft-ietf-pce-local-protection-enforcement-08.txt	2023-04-20 14:28:28.000000000 -0400
+++ draft-ietf-pce-local-protection-enforcement-08-jgs-comments.txt	2023-04-20 15:25:51.000000000 -0400
@@ -148,15 +148,21 @@
    calculated to include other segment identifiers which are not
    applicable to having their protection state advertised, as they may
    only be locally significant for each router processing the SID, such
-   as Node SIDs, it may not be possible for PCE to include the
+   as Node SIDs, it may not be possible for the PCE to include the
    protection constraint as part of the path calculation.
 
-   It is desirable for an operator to define the enforcement, or
+   It is desirable for an operator to be able to define the enforcement, or
    strictness of the protection requirement when it can be applied.
+---
+jgs: I don't follow what you mean by "... or strictness of the protection
+requirement when it can be applied." I'm getting hung up on the "when it 
+can be applied" part. Would it be correct to just delete those words? Or 
+if it wouldn't, can you help me understand what work they're doing? Thanks.
+---
 
    This document updates [RFC5440] by further describing the behaviour
-   with Local Protection Desired Flag (L flag) and extends on it with
-   the introduction of Enforcement Flag (E flag).
+   with the Local Protection Desired Flag (L flag) and extends on it with
+   the introduction of the Enforcement Flag (E flag).
 
 
 
@@ -286,6 +292,25 @@
    the PCE a preference on which SID to select, as the behaviour of the
    LSP would differ during a local failure depending on which SID is
    selected.
+---
+jgs: I thought this paragraph was going to answer a question I have,
+when it began with "... cases where there is simply no requirement to
+enforce protection or no protection ..." That is, sometimes the 
+operator may simply _not care_ at all, they just want (for example)
+the lowest-latency path. 
+
+But then my hopes were dashed, because at the end of the paragraph
+you segue (without explaining why) into "... give the PCE a preference".
+But isn't the case you introduced, the one where there literally is no
+preference? 
+
+As this is written, it seems as though there is missing support for the
+true "don't care" case. If this was discussed in the WG and the consensus
+was that, er, the WG doesn't care about the "don't care" case, I'd like
+to know that. If I'm confused and somehow "don't care" is properly 
+captured by one (both?!?) of these options, I'd like to know that, and
+understand how. If I'm terribly confused, I'd like to know that, too. :-)
+---
 
 5.  Protection Enforcement Flag (E flag)
 
@@ -359,6 +384,16 @@
    consider the protection eligibility as an UNPROTECTED PREFERRED
    constraint but MAY consider protection eligibility as an UNPROTECTED
    MANDATORY constraint.
+---
+jgs: It's not self-evident why this SHOULD/MAY is written this way. The
+obvious choice would have been to make the SHOULD a MUST and omit the
+MAY -- indeed, if 'enforcement' is set to false, it's hard to see a
+justification for making enforcement mandatory! So it seems as though
+there must be some backstory here. Can you help me understand? (Or
+better yet, make the SHOULD a MUST...)
+
+See also my comment just below.
+---
 
    When L flag is set to 0 and E flag is set to 1, then the PCE MUST
    consider the protection eligibility as an UNPROTECTED MANDATORY
@@ -368,10 +403,27 @@
    they indicate the preference of selection of a SID if PCE has an
    option of either protected or unprotected available on a link.  The
    definition of UNPROTECTED PREFERRED is primarily as a guidance on how
-   PCE should behave when L bit is not set, maintaining compatibility
+   PCE should behave when the L bit is not set, maintaining compatibility
    with existing known implementations prior to this document.  When
    presented with either option, PCE SHOULD select the SID which has a
    protection state matching the state of the L flag.
+---
+jgs: I'm afraid I had a hard time making sense of this paragraph. :-( I
+think maybe it's mashing together a couple different and only
+loosely-related thoughts?
+
+One of them is (perhaps?) the answer to my question above, and in effect
+is saying "some implementations do one thing and some do another and we
+didn't want to make any of them noncompliant so we threw in a MAY",
+which I'm not sure is a strong enough reason (we can discuss further).
+
+The final sentence seems like it doesn't belong, and in fact it seems
+like it should be removed. As far as I can tell it's redundant with the
+two "... and the E flag ... set to 0" paragraphs above. It also subtly
+conflicts with the first of those paragraphs. It's better to specify
+things just once, for this reason -- I suggest you remove the final
+sentence.
+---
 
    The protection enforcement constraint can only be applied to resource
    selection in which the protection state or eligibility for protection
@@ -394,7 +446,7 @@
 Internet-Draft           Protection Enforcement            November 2022
 
 
-5.1.  Backwards Compatibility
+5.1.  Backward Compatibility
 
    Considerations in the message passing between the PCC and the PCE for
    the E flag bit which are not supported by the entity are outlined in
@@ -419,18 +471,33 @@
    the E flag set to 0 for PCE-initiated LSPs even if set to 1 in the
    prior PCInitiate or PCUpd.
 
-   For a PCC which does support this document, it MAY set E flag to 1
+   For a PCC which does support this document, it MAY set the E flag to 1
    depending on local configuration.  If communicating with a PCE which
    does not yet support this document, the PCE follows the behaviour
    specified in [RFC5440] and will ignore the E flag.  Thus, it will not
    compute a path respecting the enforcement constraint.
+---
+jgs: It *will* not compute a path respecting the constraint? Or it
+*might* not? All the introductory material, about the ambiguity of
+how implementations handle the L flag, makes me think it *might*
+not, or alternately, it cannot be guaranteed to respect the 
+constraint. As you've written it, it says that is guaranteed not to
+respect the constraint, which I think is probably wrong.
+---
 
    For PCC-initiated LSPs, the PCC SHOULD ignore the E flag value
    received from the PCE in a PCUpd message.
+---
+jgs: What would it mean for the PCC not to ignore the E flag? Is there
+any reason for this to be SHOULD and not MUST?
+---
 
    For PCE-initiated LSPs, the PCC MAY process the E flag value received
-   from the PCE in a PCUpd message.  PCE SHOULD ignore the E flag value
+   from the PCE in a PCUpd message.  The PCE SHOULD ignore the E flag value
    received from the PCC in a PCRpt message.
+---
+jgs: same question about this SHOULD.
+---
 
 6.  Implementation Status