Re: BFD chair response to presentation on draft-mirmin-bfd-extended

Dave Katz <dkatz@juniper.net> Fri, 22 November 2019 21:35 UTC

Return-Path: <dkatz@juniper.net>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A3F8B120125; Fri, 22 Nov 2019 13:35:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=jxT/agB2; dkim=pass (1024-bit key) header.d=juniper.net header.b=WOCzPhWA
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xg_X7KppyS_N; Fri, 22 Nov 2019 13:35:17 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCBB21200B4; Fri, 22 Nov 2019 13:35:17 -0800 (PST)
Received: from pps.filterd (m0108156.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xAMLX2xI011913; Fri, 22 Nov 2019 13:35:15 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=x2nF82bk2Maqf9Wr2HMPIebrftl+eR2bKQN6H1w1A6w=; b=jxT/agB2LGwKtTRGwaezMkg99xHrWpuUDukXj0z3rlEc+0GCFRFoh75DVdNJqYoxPQbc SaYASgAPnc6X5xsK/3TRa3yvczG8JKIFJW/bv0ii4glLLLhC4UFk/PVXHO0/PXwOTMci 4Hx0NjfJJnj1tX9Yr+xuDzQzXxcHHX3E96bdB3JWJ+Ofj9rZgMgzQsl9HG8SjO/BQgfs D1kEqZUAVyzkJGJHCTfZy2p23AoHbS1oxUUzz8ttEMVAEJkU5dt4osRZsWSmKKVm9scD M9VhrQJFtMoGlbO5wBDpbXCmjNs9uJHmPl3wBa90Ef4NA18zB7IdIlIFkUk4aqNNyR+c 1w==
Received: from nam03-co1-obe.outbound.protection.outlook.com (mail-co1nam03lp2050.outbound.protection.outlook.com [104.47.40.50]) by mx0a-00273201.pphosted.com with ESMTP id 2wda99cqgf-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 22 Nov 2019 13:35:15 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=A1xTtN2buWmm3kfn3DBeQGd91IOJvTBquZ75oxqA/Oe036g+5lWm/9kCM0WS5kZw86FQR2ca4peypqZsWEaGRf/czmLcpeXadGMdRVu5Zh2Ayxn18a7XmNBQxkJ+pTy5c65FJqeWgRKGTv971LKj7JY3wrG5qKKgoFNHdcVuPHENPl6Xo4lOcjXin0Vnt5aVXSSoUPq2f/DgnsUmW/eUqq1USVuxrx0NNB3s3iE1OMv+t8Bbf8EcDdkTx54oEFOSyH5TlVijURhZSjMBXL3EvCiupgUyGbFzwPlGfHATvLD06iliVGxpG3oS0pKKKTX3KVGpn5PLAFZdbrgQIP9sdw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=x2nF82bk2Maqf9Wr2HMPIebrftl+eR2bKQN6H1w1A6w=; b=JCEfNs+5m/MBVz/XE/C61XNzkCJnog3oI337/s4YCcgT/H9F361t2AF5m4GN4hh6cWcPPLPDYfffWYi46AOdkKyLveA/q/76+PfYF0456PsjQoCxcjV3524YGGi5u/nLeOcrqHpYtxCD7bmh094+dBA7jQYbXdqW5ZXXFIjtGfNsu8EQZtjwgmZMIQBxixbV7mUpdh/ABc2j6U0QODk/p7UY5jkf1y+FyaN1xSecD7hePpgxeGGYg9t7oba39qHwkOxHrchjacM+XYv1UIqZ4Pgl8vqiBj9UI2CFA0iB6/B3sG7Dh+inc+qZu8sEy8FRd6DPe7QktTbA5efwTiy1OQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=x2nF82bk2Maqf9Wr2HMPIebrftl+eR2bKQN6H1w1A6w=; b=WOCzPhWAzf9ri9Q/55GfSi1f/szfjNidS4JzTj2YKmDpobmVEKTtZxxRYOEtiK7TifFb/STIvZkwsOHS5IrBsPEpuYtk+qxsPlUlRu+HU8Z0grr7DYLxnpH6Apt2281PK7GhYJaUXoZGP6c0WBbsH2f7DpJifSQN15my2PMdYoI=
Received: from BYAPR05MB6069.namprd05.prod.outlook.com (20.178.196.149) by BYAPR05MB6008.namprd05.prod.outlook.com (20.178.55.202) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2451.16; Fri, 22 Nov 2019 21:35:13 +0000
Received: from BYAPR05MB6069.namprd05.prod.outlook.com ([fe80::c86c:ed2b:231e:795b]) by BYAPR05MB6069.namprd05.prod.outlook.com ([fe80::c86c:ed2b:231e:795b%2]) with mapi id 15.20.2474.021; Fri, 22 Nov 2019 21:35:13 +0000
From: Dave Katz <dkatz@juniper.net>
To: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
CC: Jeffrey Haas <jhaas@pfrc.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Subject: Re: BFD chair response to presentation on draft-mirmin-bfd-extended
Thread-Topic: BFD chair response to presentation on draft-mirmin-bfd-extended
Thread-Index: AQHVoN9nFqbwB2FutE22inBbkJmFM6eWz6SAgADoDgA=
Date: Fri, 22 Nov 2019 21:35:12 +0000
Message-ID: <5013C7DE-81C0-44B6-B15B-8701527358E9@juniper.net>
References: <20191122025255.GW21134@pfrc.org> <MWHPR11MB1341FAFAD5169AC6E8843D20C1490@MWHPR11MB1341.namprd11.prod.outlook.com>
In-Reply-To: <MWHPR11MB1341FAFAD5169AC6E8843D20C1490@MWHPR11MB1341.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.104.11)
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 0242e67d-f861-4dd5-0f0e-08d76f93db9f
x-ms-traffictypediagnostic: BYAPR05MB6008:
x-microsoft-antispam-prvs: <BYAPR05MB60087EF8E903C87FB0F5A157B4490@BYAPR05MB6008.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:5516;
x-forefront-prvs: 02296943FF
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(39860400002)(136003)(376002)(366004)(346002)(13464003)(199004)(189003)(6116002)(81156014)(6916009)(478600001)(3846002)(66946007)(8936002)(81166006)(66556008)(33656002)(66476007)(11346002)(446003)(2906002)(66446008)(256004)(14444005)(76116006)(64756008)(229853002)(6506007)(6246003)(305945005)(6486002)(6436002)(71190400001)(6512007)(50226002)(8676002)(25786009)(2616005)(71200400001)(316002)(53546011)(99286004)(4326008)(102836004)(186003)(54906003)(36756003)(26005)(5660300002)(66066001)(76176011)(14454004)(86362001)(7736002); DIR:OUT; SFP:1102; SCL:1; SRVR:BYAPR05MB6008; H:BYAPR05MB6069.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: RjPX4J/98ARSjMafFcUfUT8doatMd85WT4U/ZkuXc9z42+O81GQUclDCIKbCOmPCBNnt6kN9T6Y5G3/COEQiZEP1npB9xQouZLk3zb2V/W1SxpTYsNwtbp9lUD4gqtM/jNPDFsZ1QLjpsbweD4thlCZqkp2H3DHjZ9a7HnjpGWhFR5sylATKoE0LprzDSbwFE/+z5FUP08SnByw/5AuIIP82P4P2ZTw62X3x/f/1PUjA5V/9LUjSLMfVWzBPtj9gXkswiugdwUwD5NTH/udoANnF7fkQYvuARmVIroovVeGIdcbUoqUQvE+B0zyKW5Z4LuOlV9XpfSrp4z0tmdX+w9uVQplnqSp/DLh3WFa1Yc3+yNl6OklgXjtgEyxGCnGvlEf2NWJO0qwcqQlZjT7ATnBnoOPGSbWFVgwFtd5v/+jbz3HUL8jlSdodgLp6o7Mx
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <CCB11F2A5B2CC744BC720465B3A62AEB@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 0242e67d-f861-4dd5-0f0e-08d76f93db9f
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Nov 2019 21:35:12.9705 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3c4q+oR2kPNoqhtPzTbhNH5s0ukbPokEUcwIPw+TFgcyMvNF7nt+aeR0FxiDIsN4raTNUiNxSWCVoIHSknqAHA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB6008
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-11-22_05:2019-11-21,2019-11-22 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 impostorscore=0 malwarescore=0 suspectscore=0 bulkscore=0 mlxlogscore=999 adultscore=0 lowpriorityscore=0 clxscore=1011 phishscore=0 mlxscore=0 spamscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1910280000 definitions=main-1911220173
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/1AKnzENd3a9IhktUzC6BhcDD9m0>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Nov 2019 21:35:20 -0000

For what it’s worth, BFD was intended to be simple in semantics and implementation.  It makes a terrible transport protocol because the packet latency is utterly unpredictable (one of the two goals for the protocol was to make the detection time, and thus the interpacket time, changeable in realtime without affecting the session state).  When you throw in Demand Mode, the latency may be unbounded.

Part of the issue is that the IETF hasn’t bothered to put together a set of generic transports to build things like this on top of.  OSPF is a pretty simple routing protocol built on top of a very complex reliable multicast transport with certain semantics;  the world would be a better place if the two had been separated at birth and the transport was generalized.

In the case of BFD, the transport semantic is unicast reliability by periodicity, with liveness detection.  It would be stupid simple to build a protocol that had the same repetitive semantics  but could carry anything.  If the reliable session-down semantics are interesting, these could be included as well.  What’s not needed is any of the higher layer stuff, the adaptive timers, demand mode, echo mode, multipoint mode, etc. etc.

I’ve been quoted in the past that BGP, used as a transport, is “TCP with beard.”  It would have been trivial to split out the minimal semantics the actual BGP protocol brought to the table.

The problem is that this is protocol hackery, plain and simple, and it quickly becomes at cross purposes with the not-really-a-transport-protocol chosen to carry it (“That’s OK, we don’t need variable timers…”)

If BFD’s transport semantics are that interesting, someone could take a week and whip up a transport that looks rather like BFD but is properly suited for the purpose.  That would make all of these issues go away, and would provide a common mechanism that could be used more broadly, and someone would have an RFC to be proud of.

I guess the irony of all of this is that when the BFD WG was formed it was expected to be the shortest-lived WG in history.  Now I suspect it’s going for a record in the other direction.  ;-)

—Dave

> On Nov 22, 2019, at 2:44 AM, Les Ginsberg (ginsberg) <ginsberg@cisco.com> wrote:
> 
> For the record, I agree with Jeff's summary and comments.
> 
> I was really surprised that Greg did not wait until IETF 107 - which the BFD chairs had already indicated would be the time to resume discussions of this work.
> However well intentioned, both the timing and the WG were inappropriate for this presentation.
> 
>   Les
> 
> 
>> -----Original Message-----
>> From: Rtg-bfd <rtg-bfd-bounces@ietf.org> On Behalf Of Jeffrey Haas
>> Sent: Thursday, November 21, 2019 6:53 PM
>> To: rtgwg@ietf.org
>> Cc: rtg-bfd@ietf.org
>> Subject: BFD chair response to presentation on draft-mirmin-bfd-extended
>> 
>> In the interest of permitting the presentations to move smoothly at this
>> Friday's rtgwg session, I withheld my comments from microphone.  However,
>> please consider these comments for the record for IETF-106.
>> 
>> Firstly, I'm surprised the chairs had a BFD presentation at rtgwg.  rtgwg is
>> indeed intended to be a general purpose dispatch group for work without a
>> home, but that's not the case for BFD.
>> 
>> Secondly, Reshad and I intentionally did not schedule work on BFD extension
>> work, including Greg's presentation, for this IETF.  This is because there
>> is open charter discussions we're starting with the IESG on this space.
>> 
>> -----
>> 
>> Specific comments on BFD extension work and the charter discussions:
>> 
>> During prior IETFs, and culminating at IETF-105, we've seen regular work to
>> try to stuff BFD with additional features of various forms.  The litmus test
>> generally used for BFD's core use case over the years has been "what do you
>> want to hear every 3.3ms?"  To that end, things that enhance BFD's core
>> continuity verification uses cases have ended up in the protocol.
>> 
>> Somewhat similar to other popular protocols such as DNS and BGP, BFD has
>> nice properties that make it an appealing place to try to extend.  In
>> particular, it's a continuing conversation between two systems.
>> 
>> During IETF-105, the IPPM group members attending explicitly noted that they
>> did not want to see their mechanisms present in BFD and did not consider it
>> a good fit.
>> 
>> As part of that discussion, the chairs noted that one option potentially
>> open is that we permit the "BFDv2" option we have discussed at IETF-105 and
>> previous to permit an option where we do not use the core BFDv1 session used
>> for continuity for these extensions, and use a different protocol version
>> and port set to enable the other use cases.
>> 
>> Thus, the discussion with the IESG is whether BFD hands over the "gift" of a
>> general and mature mechanism for a conversation between two systems that
>> may
>> be generally extended to carry "interesting" information.
>> 
>> This addresses Tony Li's point about "please don't make BFD difficult to
>> implement in hardware".
>> 
>> -----
>> 
>> Specific comments on draft-mirmin-bfd-extended:
>> 
>> The somewhat peculiar extension mechanism shown in Greg's draft was
>> originally seeded by work I started in BFD for draft-ietf-bfd-large-packets.
>> In fairness to history, this was similar to work that was done in OSPF years
>> back for how the authentication mechanism was spliced onto the protocol.
>> The one sentence description of that use case is "make the packet padded to
>> test MTU".  It's a hack, but one that does a reasonable job of its use case.
>> 
>> However, with regard to leveraging this hack for a general purpose extension
>> mechanism, I don't find it a good fit.  BFDv1 does not expect to find
>> information regarding the packet or state machine outside of the main PDU..
>> It is likely a new version number will need to be used to establish future
>> semantics.  (Per prior discussion in the working group.)
>> 
>> The capabilities mechanism will likely require either integration into some
>> form of an updated state machine for the new version header, or a different
>> form.  IMO, I find it likely that a "capability advertisement" mechanism
>> would be necessary rather than negotiation to avoid a wholesale replacement
>> of the BFD state machinery.  And if we replace that much of the machinery,
>> let's just stop calling this BFD at all and move on.
>> 
>> With regard to IPPM style content for the draft, I refer you to the IPPM
>> members comments above from IETF-105.
>> 
>> With regard to authentication, there are two possibilities here:
>> - Faster authentication of BFD style packets is covered by work completing
>>  BFD WGLC draft-ietf-bfd-optimitizing-authentication.  I'd encourage other
>>  working groups in need of a faster per-packet authentication mechanism to
>>  consider whether it's an appropriate fit.
>> - In the case that such a future BFD, or mechanism built on similar
>>  machinery, want a way to autenticate the payload different from the
>>  headers, there will likely need to be discussion about not only what
>>  envelope is used, but also strength vs. periodicity.  (And if you don't need
>>  this stuff periodically, why use something like BFD?)
>> 
>> -- Jeff
>