Re: WGLC for BFD over Link Aggregate Group Interfaces - ends November 8

Jeffrey Haas <jhaas@pfrc.org> Thu, 31 October 2013 22:20 UTC

Return-Path: <jhaas@slice.pfrc.org>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E3A3921F9F20 for <rtg-bfd@ietfa.amsl.com>; Thu, 31 Oct 2013 15:20:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.245
X-Spam-Level:
X-Spam-Status: No, score=-102.245 tagged_above=-999 required=5 tests=[AWL=0.020, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tZe3ttmvBT+8 for <rtg-bfd@ietfa.amsl.com>; Thu, 31 Oct 2013 15:20:18 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id 6659E11E8254 for <rtg-bfd@ietf.org>; Thu, 31 Oct 2013 15:20:18 -0700 (PDT)
Received: by slice.pfrc.org (Postfix, from userid 1001) id 08497C3A3; Thu, 31 Oct 2013 18:20:18 -0400 (EDT)
Date: Thu, 31 Oct 2013 18:20:17 -0400
From: Jeffrey Haas <jhaas@pfrc.org>
To: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
Subject: Re: WGLC for BFD over Link Aggregate Group Interfaces - ends November 8
Message-ID: <20131031222017.GA4446@pfrc>
References: <20131024191431.GO17538@pfrc> <315041E4211CB84E86EF7C25A2AB583D337EBFB3@xmb-rcd-x15.cisco.com> <425296D4-F96F-49FF-86D2-40737B64E117@gmail.com> <20211F91F544D247976D84C5D778A4C32E4EEE0D@SG70YWXCHMBA05.zap.alcatel-lucent.com> <CAAchPMsYyDTiONE1v=vKsebF8JPnnHiOFWEE_b0uR6zh8W+E=g@mail.gmail.com> <20211F91F544D247976D84C5D778A4C32E4F2A93@SG70YWXCHMBA05.zap.alcatel-lucent.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20211F91F544D247976D84C5D778A4C32E4F2A93@SG70YWXCHMBA05.zap.alcatel-lucent.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-bfd>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Oct 2013 22:20:23 -0000

For Mahesh,

On Wed, Oct 30, 2013 at 04:10:51AM +0000, Bhatia, Manav (Manav) wrote:
> > have stood the test of time, like TCP, do not look beyond their own layers in the frame 
> > for validation of a frame. Even if we have breached the OSI layer, at least we have 
> > restricted ourselves to looking at what is in the frame.
> 
> This happens all the time. Multicast often takes hints from the data plane before triggering events in the control plane (pruning the RPT, sending Register Stop messages, sending ASSERTs, etc).

I want to strongly support this point since it seems to be the big item of
contention here.  IP implementations have been able to tell what interface
datagram protocols come in for a rather long time.  

If you were to base your argument largely upon this point, you'll have to
throw out a large chunk of deployed multicast protocols. :-)

FYI:
http://linux.die.net/man/7/ip - see IP_PKTINFO

> > The other would be use the individual link MAC address as a way to co-relate a BFD packet to 
> > a particular link both to set up a BFD session (when the discriminator is zero) and for future validation 
> 
> This is precisely what I had meant by this being an implementation specific issue. Your implementation can always look at the dest MAC to figure out the link that the packet arrived on. It doesn't make sense to explicitly state this in the draft since this is an implementation specific issue. There are several devices that may use a chassis MAC address and MAY not allocate a unique MAC per link.

The draft effectively says "figure out what interface it came in on".  If a
given implementation of an IP stack has deficiencies compared to others,
there are options.  The real question is whether the text is clear enough
about this point.

-- Jeff