RE: BFD WG adoption for draft-haas-bfd-large-packets

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Mon, 29 October 2018 16:39 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 161E7130FFA for <rtg-bfd@ietfa.amsl.com>; Mon, 29 Oct 2018 09:39:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.97
X-Spam-Level:
X-Spam-Status: No, score=-14.97 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.47, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 92rFDxAy6yqr for <rtg-bfd@ietfa.amsl.com>; Mon, 29 Oct 2018 09:39:06 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 170DB130FD3 for <rtg-bfd@ietf.org>; Mon, 29 Oct 2018 09:39:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2441; q=dns/txt; s=iport; t=1540831146; x=1542040746; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Jf/wF8lreAk/b0ZVKwMaDZWCmtAnF7bKZq2bytiUFNg=; b=W/BwVd6nAmmgqDZt+y6ty6tqWsDUNw3Ptj380MKzyU6BhsFsgLXQ53FH hUOpPGWPYlz8ae8xroeNbGEh2NC/NlTqPR/956uTN9NPPZ047nqcXe2k1 KQIXw+Yd7lUot06oCAC95jhGG5tf4p4BF8kZStrZkC9SV9weGCbm3TCug I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ADAAAAN9db/4MNJK1kGQEBAQEBAQEBAQEBAQcBAQEBAQGBUQQBAQEBAQsBggSBZSgKjAOMGYINlyCBegsBAYRsAoMtITQNDQEDAQECAQECbSiFOgEBAQEDOi0SDAQCAQgOAwQBAQEeEDIdCAIEAQ0FCIUbqhiKFItnF4FBP4QjhQWFVAKJJ5ViCQKQeiCQR5Z1AhEUgSYdOIFVcBWDJ5BXb4wGgR8BAQ
X-IronPort-AV: E=Sophos;i="5.54,441,1534809600"; d="scan'208";a="193565857"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Oct 2018 16:39:05 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by alln-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id w9TGd5uC029415 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 29 Oct 2018 16:39:05 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 29 Oct 2018 11:39:04 -0500
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1395.000; Mon, 29 Oct 2018 11:39:04 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Jeffrey Haas <jhaas@pfrc.org>, "Reshad Rahman (rrahman)" <rrahman@cisco.com>
CC: "Naiming Shen (naiming)" <naiming@cisco.com>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Subject: RE: BFD WG adoption for draft-haas-bfd-large-packets
Thread-Topic: BFD WG adoption for draft-haas-bfd-large-packets
Thread-Index: AQHUZn7F2obCS5tWFUCJRL2ls+mZdKUo1C+ggAHIywD//67wkIAAV7mA///Hi8CABg0XgIABf/0AgATIogD//70FAA==
Date: Mon, 29 Oct 2018 16:39:04 +0000
Message-ID: <97dc2816249742649218b7b49b475410@XCH-ALN-001.cisco.com>
References: <E052CA19-228D-4271-BF9E-7499255E7C53@cisco.com> <7332e35048d34d44a65ea70df409699c@XCH-ALN-001.cisco.com> <90B9205E-CBD8-4779-96D1-2D15BD1F7E24@cisco.com> <e08744fc4b264fd1bf9844dd0f29557e@XCH-ALN-001.cisco.com> <59DD4DA1-6C83-4D3D-92E7-B4271EB259E8@cisco.com> <2dc00a0d58db41958ad61d73d08ead17@XCH-ALN-001.cisco.com> <20181025153804.GD12336@pfrc.org> <B5988BA3-E039-47C5-9145-48747700E197@cisco.com> <20181029153534.GL12336@pfrc.org>
In-Reply-To: <20181029153534.GL12336@pfrc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.37.28]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.36.7.14, xch-aln-004.cisco.com
X-Outbound-Node: alln-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/QfU00HKt-WxW_gAyq07Zx8wk4zk>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Oct 2018 16:39:08 -0000

Jeff/Albert -

Given the MTU issue is associated with a link coming up - and the use of Echo would allow the problem to be detected and prevent the BFD session from coming up - 
and you are acknowledging that the protocol allows padded Echo packets today ...

is there really a need to do anything more?

   Les

> -----Original Message-----
> From: Jeffrey Haas <jhaas@pfrc.org>
> Sent: Monday, October 29, 2018 8:36 AM
> To: Reshad Rahman (rrahman) <rrahman@cisco.com>
> Cc: Les Ginsberg (ginsberg) <ginsberg@cisco.com>; Naiming Shen (naiming)
> <naiming@cisco.com>; rtg-bfd@ietf.org
> Subject: Re: BFD WG adoption for draft-haas-bfd-large-packets
> 
> Reshad,
> 
> On Fri, Oct 26, 2018 at 06:32:26PM +0000, Reshad Rahman (rrahman) wrote:
> >On 2018-10-25, 11:38 AM, "Jeffrey Haas" <jhaas@pfrc.org> wrote:
> > >     The draft I had previously worked on with Xiao Min discussing probing
> using
> > >     BFD Echo had the concept of probes that would happen wherein the
> session is
> > >     not torn down.  The example carries similarly with the "send
> occasional".
> >
> > <RR> We discussed use of echo at IETF102. The large-packets draft
> mentions
> > that echo can only be used for single-hop, hence the need for padding the
> > control packets. But isn't single-hop Albert's main use-case?
> 
> It's Albert's primary use case.  And, I think a common related one is
> protecting tunnels of various flavors; e.g. GRE or IPsec.
> 
> > I believe we
> > should add the echo option in the large-packets draft, it has the benefit
> > that you get the desired functionality even if only 1 side of the WAN link
> > supports echo. I realize not all implementations support echo so they
> > might have to do pad control packets instead.
> 
> While I don't think Albert or I would have any objections to adding Echo
> discussion in the existing document, we perhaps risk running into one of the
> issues Xiao and I had briefly discussed.  Echo is intentionally
> under-specified in RFC 5880 et seq.  While it's possible that we can simply
> put in a discussion section that says "if you use Echo mode with similar
> padding, you can get similar benefit", I think that may be as far as we want
> to go.
> 
> The related observation is that nothing stops an Echo implementation from
> doing this with no changes to the protocol. :-)
> 
> -- Jeff