RE: [Errata Held for Document Update] RFC5880 (5205)

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Thu, 15 March 2018 05:18 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E996124319; Wed, 14 Mar 2018 22:18:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.519
X-Spam-Level:
X-Spam-Status: No, score=-14.519 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KOqFdjk60l0A; Wed, 14 Mar 2018 22:18:29 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D0281200A0; Wed, 14 Mar 2018 22:18:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22788; q=dns/txt; s=iport; t=1521091109; x=1522300709; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=ZN8Kz+003DzRy1Ix5vzfG6+6z+WqMTG66YTNmQ5ZUPM=; b=LsUcfOtYf2xx/aw5Nq3Cs+FB4vFCUWwJaOFCtVxNPM0sMTA0HASP0jlo rvOZ7oULau/DsU/XBewxI3RzOd5MUdhPnC4SkOVsxSw2EjUBI2/uGXLaJ yA4P+7HiKrfnjS/Fz39grDmEisw1MWo+YnMxTiRMeKC96pguz08hhZvnd 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AdAQBgAapa/5FdJa1eGQEBAQEBAQEBAQEBAQcBAQEBAYJadmRwKAqDRooajXOCA4EWjmuFDRSBfgojhG0CGoMMITQYAQIBAQEBAQECayiFJQEBAQMBIwpMBQcEAgEIEQQBASgDAgICMBQJCAIEAQ0FCIQsXAgPrhCCJohpggqFLYIUgVSBVIMggUFWgjwBEgE2H4JSgkEgA4cwAQeGGYpPCQKPHIFXi12HPYhFAhETAYEpAR44YXFwFRmCZAmQY3SNJIEigRgBAQE
X-IronPort-AV: E=Sophos; i="5.48,308,1517875200"; d="scan'208,217"; a="83729705"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 15 Mar 2018 05:18:28 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id w2F5IRS2005780 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 15 Mar 2018 05:18:27 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Thu, 15 Mar 2018 00:18:26 -0500
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1320.000; Thu, 15 Mar 2018 00:18:26 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: RFC Errata System <rfc-editor@rfc-editor.org>, "dkatz@juniper.net" <dkatz@juniper.net>, "dkatz@juniper.net" <dkatz@juniper.net>, "dward@juniper.net" <dward@juniper.net>
CC: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Subject: RE: [Errata Held for Document Update] RFC5880 (5205)
Thread-Topic: [Errata Held for Document Update] RFC5880 (5205)
Thread-Index: AQHTu8qrZ/c0qBIVX0mQIO4tuCXkeKPQv7OA
Date: Thu, 15 Mar 2018 05:18:26 +0000
Message-ID: <1d83c141ad6a4bc18f546e8e18c6fb18@XCH-ALN-001.cisco.com>
References: <20180314192822.D731EB81A29@rfc-editor.org>
In-Reply-To: <20180314192822.D731EB81A29@rfc-editor.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.45.30]
Content-Type: multipart/alternative; boundary="_000_1d83c141ad6a4bc18f546e8e18c6fb18XCHALN001ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/NCCsX74qSms4qdAqCArI3WYB0K0>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Mar 2018 05:18:32 -0000

The motivations for this errata puzzle me.

In the Notes you say:



“This turns out to be problematic in the case where system "A" signals AdminDown, causing system "B" to respond with Down state.  If the link then fails, the existing verbiage implies that "B" will not report the detection timeout, even locally.”



[Les:] If A has signaled AdminDown then it is expected that A will (after a prudent number of retransmissions of the AdminDown state as specified in Section 6.8.16) stop transmission. So why is there a need to report what is expected to happen after receiving AdminDown? It also isn’t clear how you could determine that the link has failed given that it is expected that A will stop transmissions.



“If the link fails in a unidirectional manner (such that "B" is deaf), B will give no indication of a timeout in its outgoing Control packets back to A (which can in fact hear them).”



[Les:] If B is deaf, how would it have received AdminDown?


The suggested change would also seem to violate Section 4.1 (emphasis added):

Diagnostic (Diag)

      A diagnostic code specifying the local system's reason for the
      last change in session state.  Values are:
…

      This field allows remote systems to determine the reason that the
      previous session failed, for example.

???

   Les







> -----Original Message-----

> From: Rtg-bfd [mailto:rtg-bfd-bounces@ietf.org] On Behalf Of RFC Errata

> System

> Sent: Wednesday, March 14, 2018 12:28 PM

> To: dkatz@juniper.net; dkatz@juniper.net; dward@juniper.net

> Cc: rtg-bfd@ietf.org; rfc-editor@rfc-editor.org; iesg@ietf.org

> Subject: [Errata Held for Document Update] RFC5880 (5205)

>

> The following errata report has been held for document update for RFC5880,

> "Bidirectional Forwarding Detection (BFD)".

>

> --------------------------------------

> You may review the report below and at:

> http://www.rfc-editor.org/errata/eid5205

>

> --------------------------------------

> Status: Held for Document Update

> Type: Technical

>

> Reported by: Dave Katz <dkatz@juniper.net<mailto:dkatz@juniper.net>> Date Reported: 2017-12-14

> Held by: Alvaro Retana (IESG)

>

> Section: 6.8.4

>

> Original Text

> -------------

> If Demand mode is not active, and a period of time equal to the Detection

> Time passes without receiving a BFD Control packet from the remote system,

> and bfd.SessionState is Init or Up, the session has gone down -- the local

> system MUST set bfd.SessionState to Down and bfd.LocalDiag to 1 (Control

> Detection Time Expired).

>

> Corrected Text

> --------------

> If Demand mode is not active, and a period of time equal to the Detection

> Time passes without receiving a BFD Control packet from the remote system,

> the session has gone down -- the local system MUST set bfd.SessionState to

> Down and bfd.LocalDiag to 1 (Control Detection Time Expired).

>

> Notes

> -----

> This is based on an email I received from Anil Kumar of Nokia

> (anil.kumar_t_v@nokia.com<mailto:anil.kumar_t_v@nokia.com>).

>

> The language as originally written made a session timeout a no-op when in

> Down state.  This was a gratuitous attempt to avoid a null state transition, but

> had the side effect of not setting the diag code (and otherwise is no

> different).

>

> This turns out to be problematic in the case where system "A" signals

> AdminDown, causing system "B" to respond with Down state.  If the link then

> fails, the existing verbiage implies that "B" will not report the detection

> timeout, even locally.

>

> If the link fails in a unidirectional manner (such that "B" is deaf), B will give no

> indication of a timeout in its outgoing Control packets back to A (which can in

> fact hear them).

>

> Making the suggested change should ensure that the diagnostic code is

> always set to Detection Time Expired when Control packets stop arriving,

> even if the far end system was previously reporting AdminDown.

>

> --------------------------------------

> RFC5880 (draft-ietf-bfd-base-11)

> --------------------------------------

> Title               : Bidirectional Forwarding Detection (BFD)

> Publication Date    : June 2010

> Author(s)           : D. Katz, D. Ward

> Category            : PROPOSED STANDARD

> Source              : Bidirectional Forwarding Detection

> Area                : Routing

> Stream              : IETF

> Verifying Party     : IESG