RE: Couple comments on draft-ali-spring-bfd-sr-policy

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Wed, 21 March 2018 16:51 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F7861270AB; Wed, 21 Mar 2018 09:51:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level:
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UbjLA9bgm51q; Wed, 21 Mar 2018 09:51:04 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8DFC126CC7; Wed, 21 Mar 2018 09:51:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=42406; q=dns/txt; s=iport; t=1521651064; x=1522860664; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=NdA0SWQBkZYjN9wLZ6XzcBY/ADPm9UOJO0QcAdkqOIU=; b=k68d3E+pEwa9NIDANjcq7mRbCxfQ1CAYl6OH3wIc+Kbhi9j7YlGWlsz3 0sXdrg/o5cObXVqDQQ8TkRvTiwi03Z2knSHsOj/EAVEC3jW1OmHtM0CYU ARrzuBotUIcFOETyWfJVbnwTVu/FPD95kwBwFJdTiLzVMlJ8cOdQaHSu1 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AiAQAQjbJa/5JdJa1dGQEBAQEBAQEBAQEBAQcBAQEBAYJJRS9hcCgKg1KHf40NgXGBEIZxjDcUgXULI4RiAhqDPCE0GAECAQEBAQEBAmsohSUBAQEEIwpMEAIBCBEBAwEBIQEGAwICAh8RFAMGCAIEDgUIE4QPTAMVD6tugiCHDw2BLIIJBYdDgVNAgQ0BgwqCUUIBAQOBJl4QgkuCVAOYDC8JAoYMhgeDF4FNg36CdINjgRaJMzuGIQIREwGBJQEcOIFScBUZgmSQT3COYIEWAQE
X-IronPort-AV: E=Sophos; i="5.48,340,1517875200"; d="scan'208,217"; a="87343134"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Mar 2018 16:51:03 +0000
Received: from XCH-ALN-010.cisco.com (xch-aln-010.cisco.com [173.36.7.20]) by rcdn-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id w2LGp2Si009749 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 21 Mar 2018 16:51:02 GMT
Received: from xch-aln-008.cisco.com (173.36.7.18) by XCH-ALN-010.cisco.com (173.36.7.20) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Wed, 21 Mar 2018 11:51:02 -0500
Received: from xch-aln-008.cisco.com ([173.36.7.18]) by XCH-ALN-008.cisco.com ([173.36.7.18]) with mapi id 15.00.1320.000; Wed, 21 Mar 2018 11:51:01 -0500
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: "draft-ali-spring-bfd-sr-policy@ietf.org" <draft-ali-spring-bfd-sr-policy@ietf.org>, spring <spring@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Subject: RE: Couple comments on draft-ali-spring-bfd-sr-policy
Thread-Topic: Couple comments on draft-ali-spring-bfd-sr-policy
Thread-Index: AQHTwCliZSgj8IC1WU62rDDDt8alhaPZThjQgABegoCAALkgIIAAW9gAgAAICnA=
Date: Wed, 21 Mar 2018 16:51:01 +0000
Message-ID: <4b8a90781fb14ea3ace1e576f1663b0f@XCH-ALN-008.cisco.com>
References: <CA+RyBmVcp9MHSke2Jn3iC54=E5hZgWyrvHzZBjrS=4ZD63ryqg@mail.gmail.com> <c5643640df0f49a7a24521a389c582c3@XCH-ALN-008.cisco.com> <CA+RyBmVmBws9jkAKkjyDn+_pcEr5MZbq+aHEY8MsGSn=H4nMcQ@mail.gmail.com> <5e282f2cae0d4d5f8f9d8950b0b7bec4@XCH-ALN-008.cisco.com> <CA+RyBmVvfiimV1VvW_pFkjDhHLt5hdCnf7Et3kN7Pn4Sex3M=Q@mail.gmail.com>
In-Reply-To: <CA+RyBmVvfiimV1VvW_pFkjDhHLt5hdCnf7Et3kN7Pn4Sex3M=Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.61.199.58]
Content-Type: multipart/alternative; boundary="_000_4b8a90781fb14ea3ace1e576f1663b0fXCHALN008ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/Lj4cZIsxHSZP7ym0D4bYb3yioB0>
X-Mailman-Approved-At: Wed, 21 Mar 2018 10:07:16 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Mar 2018 16:51:06 -0000

Hi Greg,

I am familiar with draft-ietf-mpls-bfd-directed and that it provides a way for signalling the reverse path to be used by the egress. This relies on LSP ping bootstrap. Fully support this work in general.

When using SBFD for monitoring of SR Policy, the reverse path failure can cause false negatives. This I agree and is well known. The other draft-ietf-mpls-bfd-directed allows the head-end to specify another alternative reverse path that IP shortest path. But even that can fail and result in similar false positive.

I find it totally confusing when you say it like “convergence time of IP network” and “convergence of the IP network will play role”. What exactly has convergence got to do with false negatives with reverse path failures at BFD level?

In any case, the main point about draft-ali-spring-bfd-sr-policy is about presenting the analysis of choice of BFD/sBFD for SR Policy and recommending SBFD. It is an informational draft for the Spring WG to evaluate against other proposals being presented for doing BFD for SR Policies.

There is no change in BFD mechanism proposed at all but still appreciate the viewpoints of the BFD WG on this debate. However, the authors of draft-ali-spring-bfd-sr-policy request that the analysis be done with SR architecture in mind and not just bringing in concepts from stateful and circuit oriented MPLS LSPs into SR Policies.

Thanks,
Ketan

From: Greg Mirsky <gregimirsky@gmail.com>
Sent: 21 March 2018 09:29
To: Ketan Talaulikar (ketant) <ketant@cisco.com>
Cc: draft-ali-spring-bfd-sr-policy@ietf.org; spring <spring@ietf.org>; rtg-bfd@ietf.org
Subject: Re: Couple comments on draft-ali-spring-bfd-sr-policy

Hi Ketan,
I'd point that even though you believe that S-BFD session monitors only the SR tunnel, it, in fact, monitors the return path from egress to the ingress of the tunnel. And that is where convergence of the IP network will play role. I can provide you with more detailed explanation of the scenario or you can read the draft-ietf-mpls-bfd-directed as it is applicable to all TE paths monitored by xBFD.

Regards,
Greg

On Wed, Mar 21, 2018 at 9:05 AM, Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>> wrote:
Hi Greg,

S-BFD allows for continuous monitoring of the SR path corresponding to the SR Policy. The proposal is to use it for continuous monitoring. This is where there is perhaps a disconnect?

They key part is that the authors of draft-ali-spring-bfd-sr-policy do not propose to have ANY SR policy specific state on any router other than the head-end. The mechanism is otherwise stateless and does not involve any bootstrapping of state or such mechanism. This is entirely in sync with the spirit of SR and draft-filsfils-spring-segment-routing-policy.

Your proposals are very interesting and perhaps relevant to other signalled circuits and TE paths like RSVP-TE or MPLS-TP, but they do not seem appropriate for SR Policies to me.

Thanks,
Ketan

From: Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>
Sent: 20 March 2018 16:58
To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Cc: draft-ali-spring-bfd-sr-policy@ietf.org<mailto:draft-ali-spring-bfd-sr-policy@ietf.org>; spring <spring@ietf.org<mailto:spring@ietf.org>>; rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>
Subject: Re: Couple comments on draft-ali-spring-bfd-sr-policy

Hi Ketan,
thank you for the most expedient and very detailed response. I'd note that using S-BFD leaves fault detection dependent on convergence time of the IP network. This problem discussed in details in draft-ietf-mpls-bfd-directed and draft-mirsky-spring-bfd.

Regards,
Greg

On Tue, Mar 20, 2018 at 4:42 PM, Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>> wrote:
Hi Greg,

Thanks for your review and comments. Please check inline below for responses.


From: Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>
Sent: 20 March 2018 08:57
To: draft-ali-spring-bfd-sr-policy@ietf.org<mailto:draft-ali-spring-bfd-sr-policy@ietf.org>; spring <spring@ietf.org<mailto:spring@ietf.org>>; rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>
Subject: Couple comments on draft-ali-spring-bfd-sr-policy

Dear Authors,
I've read the new draft and would appreciate your consideration of my comments and questions:

  *   if I understand correctly, you prefer using S-BFD in SR domain over use of the base BFD. Without arguing with your choice, I'll note that the title of the draft doesn't reflect your preference;
[KT] The choice of title seemed correct since the draft does analysis of the different BFD options for SR Policies before preferring SBFD.

  *   section 3.4 RFC 7882 already describes use of S-BFD in SR domain. What you is missing in the RFC 7882?
[KT] RFC7882 describes the SBFD use cases and its applicability to SR. This draft does comparison between the BFD modes that borrows from RSVP-TE tunnels usage against S-BFD mode to analyze what is more suitable for SR Policies. This analysis is important to document and to indicate why the authors propose S-BFD rather than BFD is more suitable for SR Policies.

  *   on more technical side. Use of S-BFD will still result in multiplicity of S-BFD packets reflected by egress to ingress. To avoid that we propose method to use BFD Demand mode in MPLS data plane as described in draft-mirsky-bfd-mlps-demand<https://tools.ietf.org/html/draft-mirsky-bfd-mpls-demand-02>. It will be presented in BFD WG meeting and discussed in SPRING as part of BFD in SPRING presentation.
[KT] The BFD on-demand proposal along with the draft-mirsky-spring-bfd basically re-uses concepts like need for bootstrap with LSP ping, setup of state on the egress router from RSVP-TE and IMHO is not suitable for SR Policies unlike S-BFD which is a much simpler and scalable solution that does not setup a per SR Policy state on the egress node.
Thanks,
Ketan
Regards,
Greg