RE: Ability to detect swapped/merged LSPs
richard.spencer@bt.com Tue, 01 March 2005 19:11 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29805; Tue, 1 Mar 2005 14:11:36 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D6CnR-0003Y0-Qn; Tue, 01 Mar 2005 14:12:42 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D6Cl2-0005jY-5t; Tue, 01 Mar 2005 14:10:12 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D6Cl1-0005jP-74 for rtg-bfd@megatron.ietf.org; Tue, 01 Mar 2005 14:10:11 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29675 for <rtg-bfd@ietf.org>; Tue, 1 Mar 2005 14:10:08 -0500 (EST)
From: richard.spencer@bt.com
Received: from smtp4.smtp.bt.com ([217.32.164.151]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D6Cm1-0003W7-GW for rtg-bfd@ietf.org; Tue, 01 Mar 2005 14:11:13 -0500
Received: from i2km98-ukbr.domain1.systemhost.net ([193.113.197.85]) by smtp4.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.80); Tue, 1 Mar 2005 19:10:01 +0000
Received: from i2km41-ukdy.domain1.systemhost.net ([193.113.30.29]) by i2km98-ukbr.domain1.systemhost.net with Microsoft SMTPSVC(5.0.2195.6713); Tue, 1 Mar 2005 19:10:01 +0000
X-MimeOLE: Produced By Microsoft Exchange V6.0.6603.0
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 01 Mar 2005 19:10:00 -0000
Message-ID: <B5E87B043D4C514389141E2661D255EC0A8358D2@i2km41-ukdy.domain1.systemhost.net>
Thread-Topic: Ability to detect swapped/merged LSPs
thread-index: AcUeh1tlNAqxXy3mTiatex7dKSXq7QAAroKw
To: tnadeau@cisco.com
X-OriginalArrivalTime: 01 Mar 2005 19:10:01.0293 (UTC) FILETIME=[447B7FD0:01C51E92]
X-Spam-Score: 0.3 (/)
X-Scan-Signature: 21bf7a2f1643ae0bf20c1e010766eb78
Content-Transfer-Encoding: quoted-printable
Cc: rtg-bfd@ietf.org
Subject: RE: Ability to detect swapped/merged LSPs
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
Sender: rtg-bfd-bounces@ietf.org
Errors-To: rtg-bfd-bounces@ietf.org
X-Spam-Score: 0.3 (/)
X-Scan-Signature: d16ce744298aacf98517bc7c108bd198
Content-Transfer-Encoding: quoted-printable
Tom, Thanks for your response. Having thought about the defects again I agree that both will be detected, if BFD packets are being sent to the wrong place then you're going to get a detection timeout somewhere, regardless of whether the LSPs are swapped or merged. The only downside to the BFD approach is that in both cases the defect code will just be "1 -- Control Detection Time Expired", i.e. BFD will not provide any indication of what the defect might be. Saying that, the main point is that the problem will be detected, other tools such as LSP ping can be used to diagnose and locate the problem. Regards, Richard > -----Original Message----- > From: Thomas D. Nadeau [mailto:tnadeau@cisco.com] > Sent: 01 March 2005 17:52 > To: Spencer,R,Richard,XDE73 R > Cc: rtg-bfd@ietf.org > Subject: Re: Ability to detect swapped/merged LSPs > > > > >> From the current base draft "If the Your Discriminator field is > >> nonzero, it MUST be used to select the session with which this BFD > >> packet is associated. If no session is found, the packet MUST be > >> discarded." > > > > If a node receives a BFD packet with a Discriminator field that it > > doesn't have a session for then there is a problem somewhere in the > > network, so why is the packet simply dropped and no further action > > taken? > > The packet is discarded, but the device can certainly > take note of it. > It > just has to make sure this will not result in a DoS attack on the > device. > > > If we get a swapped LSP (e.g. due to a corrupted forwarding > table or > > configuration error) then all BFD packets received for the > > corresponding session will be dropped and the session will > be declared > > down as a detection timeout will occur. However, if we get > a merging > > defect where a node receives both valid BFD packets in addition to > > invalid BFD packets then this defect will not be detected. > > Hi Richard, > > The defect will be detected in both cases due to the > fact that the BFD > session ID information at the receiver should be incorrect. Lets > consider both > cases: > > 1) Correct LSP, but corrupted BFD session parameters. > > This is the case you describe above. It is easily > handled by virtue > of BFD session parameter mismatch. > > 2) Incorrect LSP due to corrupted TFIB, but the payload remains > intact and thus valid BFD session parameters. > > In this case the packet might make it to an LSR that > happens to have > BFD running. > If it does, the BFD session information will not match with the > source/destination. > Thus, that should be detected as a failure since that > node will not > respond. > The only case I think can't be detected with just BFD > is the case where > the mis-merged LSP happens to swap to a label that gets > you to the > correct destination LSR, albeit with the wrong label > stack, and thus > over the > wrong last bit of the LSP. In this case, since the BFD > information is > valid, > this MIGHT work okay, but not in all cases. For > instance, if the end > node is > a PE for L3 or L2 VPN/PWs (i.e.: in VCCV), the > application label will > also be bound to > the BFD session, and thus will fail. So there seems to be some > unlikely corner cases > where the basic mechanism can fail. The good news is > that in all > cases, if you just > run LSP ping "every now and then", you can detect all > of these corner > cases > as well due to the diag. processing in LSP ping. > > --Tom > > > > In both cases, traffic is being forwarded onto the wrong > destination > > and therefore these defects need to be detected and appropriate > > actions taken, e.g. raise an alarm and inform the LSP source (using > > the appropriate BFD status code) that a defect has occurred so that > > the source can stop forwarding packets or switch over to an > > alternative path if one exists. > > > > I know that the idea behind the BFD draft is to keep it as > simple as > > possible, but speaking as an operator, I would consider > these defects > > to be just as important as loss of connectivity defects. They might > > not occur as frequently but are potentially more dangerous, e.g. I > > don't want to unknowingly be sending packets from customer > As network > > to customer Bs network. > > > > By adding new processing rules and status codes, both of > these defects > > could be detected using BFD. An alternative would be to use > LSP ping > > but it would not provide the same defect detection speed, > i.e. an LSP > > might only get tested using LSP pings every 30mins or maybe > every hour > > in a large network with hundreds of thousands of PWs/LSPs, > as opposed > > to BFD packets that can be sent every second. > > > > Does anyone have any arguments for/against adding the ability to > > detect these defects into BFD? > > > > Thanks, > > Richard > > > > > > > > > > > > > > > > > > > > >
- Ability to detect swapped/merged LSPs richard.spencer
- Re: Ability to detect swapped/merged LSPs Thomas D. Nadeau
- Re: Ability to detect swapped/merged LSPs Jeffrey Haas
- RE: Ability to detect swapped/merged LSPs richard.spencer
- RE: Ability to detect swapped/merged LSPs richard.spencer