Re: BFD stability follow-up from IETF-91

"MALLIK MUDIGONDA (mmudigon)" <mmudigon@cisco.com> Mon, 08 December 2014 08:27 UTC

Return-Path: <mmudigon@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2B391A700D for <rtg-bfd@ietfa.amsl.com>; Mon, 8 Dec 2014 00:27:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level:
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3SgT3ZXhTWme for <rtg-bfd@ietfa.amsl.com>; Mon, 8 Dec 2014 00:27:25 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73B3C1A6FC9 for <rtg-bfd@ietf.org>; Mon, 8 Dec 2014 00:27:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12240; q=dns/txt; s=iport; t=1418027245; x=1419236845; h=from:to:cc:subject:date:message-id:in-reply-to: mime-version; bh=g/wPQwI5TcZ5+AjFwzx+EjVgel5wfJLisO5t2FKE3a8=; b=SSBfUzL7fm/jpoCTsZmhfc5DRkRf+VrqPkGTYYxuW3s1dyAWbTEo9C6m vXl10pOti+4XVR6OFxxqteEmy3OYfxicAxsPaZuDrySJ5Af5PLJ/qiD1O 1j0X8VXe/D5sGVPo68LLZ9iwvf2L6nt/2lHqujqaISeSlVICOWLDzM8uS E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AkIFACxghVStJA2I/2dsb2JhbABagkNDgSoEw2+IOQKBIxYBAQEBAX2EAgECBG4LEgEIEQMBAigmAhEUCQgCBA4FiCYDEs5eDYV1AQEBAQEBAQEBAQEBAQEBAQEBAQEBF44ighwRB4Q2BYYYiS4FiCuBaYEii1A8gi+DYoNvb4FFfgEBAQ
X-IronPort-AV: E=Sophos;i="5.07,537,1413244800"; d="scan'208,217";a="103582094"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by alln-iport-6.cisco.com with ESMTP; 08 Dec 2014 08:27:24 +0000
Received: from xhc-rcd-x10.cisco.com (xhc-rcd-x10.cisco.com [173.37.183.84]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id sB88ROTj031825 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 8 Dec 2014 08:27:24 GMT
Received: from xmb-rcd-x05.cisco.com ([169.254.15.81]) by xhc-rcd-x10.cisco.com ([173.37.183.84]) with mapi id 14.03.0195.001; Mon, 8 Dec 2014 02:27:24 -0600
From: "MALLIK MUDIGONDA (mmudigon)" <mmudigon@cisco.com>
To: Marc Binderberger <marc@sniff.de>
Subject: Re: BFD stability follow-up from IETF-91
Thread-Topic: BFD stability follow-up from IETF-91
Thread-Index: AQHQCQ6sKG4KnHULdkO3SoZYWD6QxJxy3ruAgAAfxICAAAeWAIAAjSQAgAD7mQCAAEe3gIAABKUAgAAdjoCAAAsZAIAF49GAgANn8YCAAHj2gIAAlzWAgAAFmYCAAFQ6AIAACIMAgABdKQD//6S3gIAAI96AgAAOuYCAAAYBAIAAAhWAgAWECQCAAAeGgIAAFccAgAAGFICAACOJAIAAZqQA
Date: Mon, 08 Dec 2014 08:27:24 +0000
Message-ID: <D0AB5E82.28B3B%mmudigon@cisco.com>
In-Reply-To: <20141207234958554921.33ce21f7@sniff.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.143.25.106]
Content-Type: multipart/alternative; boundary="_000_D0AB5E8228B3Bmmudigonciscocom_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/rtg-bfd/MDi-UTbPMhEYZMB8m7dAcEAgdaM
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Dec 2014 08:27:27 -0000

Hi Marc,

Nothing has been dismissed yet :-). Trying to see what can be done.

Thanks

Regards
Mallik

From: Marc Binderberger <marc@sniff.de<mailto:marc@sniff.de>>
Date: Monday, 8 December 2014 1:19 pm
To: Manav Bhatia <manavbhatia@gmail.com<mailto:manavbhatia@gmail.com>>
Cc: "rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>" <rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>>
Subject: Re: BFD stability follow-up from IETF-91

Hello Manav,

For the echo mechanism to work, do you agree that you would have to
continuously send Echos so that you can detect the issue?
that's what I had in mind, yes
.. and i dont like this. Are you saying that for each BFD session now you
will run a parallel BFD echo session that would carry the debug data? Your
scaling just went for a toss !!

Just by a factor of 2 ;-)

But seriously: if you run echo at hight speed you would usually avoid running
the control packets at high speed too. Just what RFC5880 describes.

This would help if the flap is deterministic-ally reproducible. If its not,

Correct. Good for some problems, not good for others. As I said, interesting
option but not what I had in mind in first place.

then how long do you run the Echo BFD? And what happens to the original BFD
session? You run the two parallel-ly?

The "original" session?  I'm talking here about an echo session that is
controlled by the corresponding control packet exchange. As described in
RFC5880. Echo not defined for 5884 or 7130? Ah well, one probably could.

Echo seems at least an option to me, in the context of debugging, that can be
discussed. The freedom of defining the packet is interesting, some parameters
like RTT are measured easily. Other aspects, like Multihop, are a problem, no
doubt. I was simply surprised how quickly this idea was dismissed ... .


Regards, Marc





Or are you suggesting that once BFD flaps we will start sending Echoes
overloaded with debug information to detect the issue?
interesting idea - that would be an alternative use, collecting forensic
data. Maybe we should support that too!
This would help if the flap is deterministic-ally reproducible. If its not,
then how long do you run the Echo BFD? And what happens to the original BFD
session? You run the two parallel-ly?
Cheers, Manav
My biggest problem with the echo idea is so far BFD-over-LAG. But maybe it
is
not a real problem, any echo stamping/updating in the forwarding path would
require an hardware update (or reprogramming, if your hardware allows) and
in
this case one could boldly state that the echo packet must leave via the
ingress port :-)
Regards, Marc
On Mon, 8 Dec 2014 09:33:05 +0530, Manav Bhatia wrote:
Hi Marc,



* Greg's echo idea is of course do-able - when you think timestamping in
hardware can be done then it can be done in the forwarding path for
echos
as
well. Depends on your hardware :-) and on an agreed (minimal) format for
echo. As mentioned BFD echo is not defined/used for multiple BFD
features,
which limits it's use though.


For the echo mechanism to work, do you agree that you would have to
continuously send Echos so that you can detect the issue?

Or are you suggesting that once BFD flaps we will start sending Echoes
overloaded with debug information to detect the issue?

I'd like to understand this before the mailing list sees a barrage of
emails. Alternatively, we can also take it offline and only report the
summary of our discussion to the list.

Cheers, Manav