Re: [spring] Discussion on [draft-lin-bfd-path-consistency-over-sr]

Greg Mirsky <gregimirsky@gmail.com> Mon, 31 July 2023 16:52 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5092EC151540; Mon, 31 Jul 2023 09:52:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.104
X-Spam-Level:
X-Spam-Status: No, score=-7.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o5G-VWtT3lIg; Mon, 31 Jul 2023 09:52:21 -0700 (PDT)
Received: from mail-yb1-xb31.google.com (mail-yb1-xb31.google.com [IPv6:2607:f8b0:4864:20::b31]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49730C15153D; Mon, 31 Jul 2023 09:52:21 -0700 (PDT)
Received: by mail-yb1-xb31.google.com with SMTP id 3f1490d57ef6-d0e009433c4so5086262276.2; Mon, 31 Jul 2023 09:52:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1690822340; x=1691427140; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=cHZI9YE1Q682lDPX730oUW2QpHfU7WSUgQBXGYZ5SD0=; b=NLREKkxoQzxb6sVpoe06jr8e2UOzUlXXrVWqPjDg8Kfh0NeYhhDWakAO1Wh0gGAsEv beEIHU16Tdqr2p3Xe6PLU8Xki5bKCBMXpqNOSQGRtwUBZnM42OF8GwO/riQtdT+AbkbY ELb+8w79En8N62Gt4vpkaieup6yII+NPFhgPzKxUZGCXTFh2j9FCihqKRw+nAl2Heuvh RZK0TydTPNfNrLPm4az2dYs6Fsb+028AD0agFOOhGeHhhLF3mCbAMoVcF+YgDx+sIuN/ eJE+09sC/PTHNiu/ENUcSwbpKZMMnK+7dX/hiIl2oCHfiDReYD3EcpRAZj4Ermv0pbY3 WJXA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1690822340; x=1691427140; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=cHZI9YE1Q682lDPX730oUW2QpHfU7WSUgQBXGYZ5SD0=; b=h6wPF4VZmfoHQBieg+YgyUPdb3rJNHckBFHvY2JFN5b9xzGzYYq6P+tAVp3V//qLZm 6lXg7056A7YiRQR9hhSbDtiKrpTw4J9Ibb8s4gimTrlB+CmjriVIZGfRA4rbuHM20236 TkU/ZCIYiGapV5vZDm056VBV46tQqY4gyGC5JQPkjcqk/f66aizd6BKR3NxkCA2iwkGW GPW9SSIRgW38fZqrIH+NTy+D4PdUG2A2vUKqIQs7LKJEZOf7/1QRB8vDJ6Bm0oXXOTza dnXkh3iKkYHOZQWj82s0nIiu5CAQINOJ29Mc23kgakRaAL2QhWhJv9rxO1fLCMlTEiXf Q3bg==
X-Gm-Message-State: ABy/qLafMmZZOWAnRNMz5lU3OT9/DFpdFTSWdKRR9TcjQffi6jOT+6UO qSJSj2LhZwP6G5vF3XaIQR5xPZ84EnwRLY/7Xk5R25u/bAY=
X-Google-Smtp-Source: APBJJlHWv3i078G14SD5eHLrnLOn7uLEvP9MY2pZ3W16kTjbUys7CFxpcmynZhAwyk7LyGxmAJLIJuqekdgkw/BTST0=
X-Received: by 2002:a25:cf56:0:b0:d0a:a66b:cfbb with SMTP id f83-20020a25cf56000000b00d0aa66bcfbbmr10192420ybg.15.1690822339599; Mon, 31 Jul 2023 09:52:19 -0700 (PDT)
MIME-Version: 1.0
References: <0e5fe8ea97c5430e9573ff6116da5d8e@h3c.com>
In-Reply-To: <0e5fe8ea97c5430e9573ff6116da5d8e@h3c.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Mon, 31 Jul 2023 09:52:07 -0700
Message-ID: <CA+RyBmXg3fj2c1DVau7ig++Miv_qchrK12GkE-MyoXPRKqtNvA@mail.gmail.com>
Subject: Re: [spring] Discussion on [draft-lin-bfd-path-consistency-over-sr]
To: linchangwang <linchangwang.04414@h3c.com>
Cc: SPRING WG <spring@ietf.org>, rtg-bfd WG <rtg-bfd@ietf.org>
Content-Type: multipart/related; boundary="000000000000eea7a40601cb40cc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/RH3h58rpcgZ-luKlQbaTOK-hIc8>
X-Mailman-Approved-At: Mon, 31 Jul 2023 10:09:15 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Jul 2023 16:52:25 -0000

Hi Changwang,
thank you for your prompt response to my comments at the IETF-117. I think
that this draft is also relevant for the work of the BFD WG and I have
invited its experts to the discussion. I agree with the base premise of the
draft that it is essential to control the reverse path of an x-BFD session.
But I also believe that such control is easier to realize for BFD sessions
in Asynchronous mode, as defined in RFC 5880. Please find my notes below
tagged GIM>>.

Regards,
Greg

On Mon, Jul 31, 2023 at 7:30 AM linchangwang <linchangwang.04414@h3c.com>
wrote:

>
>
> Hello Greg,
>
>
>
> From minutes-117-spring/:
>
> 10:15 S-BFD Path Consistency over SRv6 (10 mins)
>
> Presenter: Changwang Lin
> draft-lin-sbfd-path-consistency-over-srv6
> <https://datatracker.ietf.org/doc/draft-lin-sbfd-path-consistency-over-srv6/>
>
> Greg Mirsky: Current version of the WG draft about the U-BFD, U-BFD is
> only applicable to single hop.
>
>         Not sure it is applicable to your scenario which has more than
> single link.
>
> How this mapping between Segment List1 and Segment List2 occurs on a
> system (reflector or echo-reflector) that receives a BFD packet?
>
> All the processing is in the forwarding plane, so in fact the BFD is not
> involved.
>
> Joel: More details, complicated, so we need to take it to the mailing list.
>
>
>
> Thank you for your comments ,here is my response:
>
> 1.      Regarding question 1: It is true that the current version of the
> [ietf-bfd-unaffiliated-echo] draft only specifies the single hop scenario.
>
> However, it is worth noting that U-BFD can support multiple hops, for
> example, by setting the TTL to 64. Therefore, U-BFD can also be used to
> detect the seglist path in an SR policy.
>
GIM>> Let me quote from Section 2 of draft-ietf-bfd-unaffiliated-echo
<https://datatracker.ietf.org/doc/draft-ietf-bfd-unaffiliated-echo/>:
   All
   Unaffiliated BFD Echo packets for the session MUST be sent with a
   Time to Live (TTL) or Hop Limit value of 255, and received with a TTL
   or Hop Limit value of 254, otherwise the received packets MUST be
   dropped [RFC5082].
I don't see how, as you suggest, a conformant U-BFD implementation can set
TTL/Hop Limit to any value other than 255 or not drop the received packet
if the value of its TTL/Hop Limit field is anything but 254. Or, perhaps
you are planning to update the current U-BFD specification?

>
>
> 2.      Regarding question 2:
>
>  [draft-ietf-idr-sr-policy-path-segment] extends BGP SR Policy to
> distribute SR policies with carrying Path Segment and bidirectional path
>
> information. Through this extension, when distributing SR policy to the
> headend, reverse path information and path segment of segment list could be
> carried
>
> together.
>
>         For example:
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Using path segment and reverse path segment to establish a mapping table.
>
> Using the mapping table to get segment list by reverse Path segment.
>
>
>
> 1) Regarding SBFD, at the reflection end, the reverse seglist can be
> obtained through the path-segment mechanism.
>
GIM>> As I understand RFC 7880, its goal is not to create any state related
to SBFDReflector. On the other hand, mapping between a particular Path
Segment SID and the Reverse Path Segment List does create such state and,
as a result, defeats the idea of RFC 7880. At the same time, binding the
reverse path of a BFD session in the Asynchronous mode in SR-MPLS can be
easily achieved using, for example, MPLS LSP Ping extensions defined in
draft-ietf-mpls-bfd-directed
<https://datatracker.ietf.org/doc/draft-ietf-mpls-bfd-directed/> and
draft-ietf-spring-bfd
<https://datatracker.ietf.org/doc/draft-ietf-spring-bfd/>.

> 2) For U-BFD, the complete reverse segment list can be distributed to the
> head node along with the segment list.
>
> This reverse segment list can be used to specify the return path for
> U-BFD. Consequently, the return path can be encapsulated at the head end.
>
GIM>> As I've noted earlier, I believe that U-BFD, as it is defined at this
time, cannot be used in SRv6 as suggested
in draft-lin-sbfd-path-consistency-over-srv6.

>
>
>
>
> 3.      Regarding question 3:
>
> By utilizing the extension for SR Policy defined in 【
> draft-ietf-idr-sr-policy-path-segment】:
>
> 1)  By using Path Segment and Segment-Based Forwarding (SBFD) to
> encapsulate and forward packets along a forward path, the path-segment is
> included in the encapsulation.At the reflector node, this path-segment
> information is used to lookup the reverse path-segment, which helps to
> ensure the bidirectional consistency of the seglist . This provides a means
> to implement SBFD detection with bidirectional path consistency
> requirements.
>
> 2)     As for U-BFD, since the complete return information has already
> been encapsulated at the head end, there is no need for additional BFD
> processing at the reflection system. The packet can simply be forwarded
> back along the return path.
>
> In Summary, when encapsulating SBFD packets with the path-segment, BFD
> processing is required at the reflection end.
>
> On the other hand, U-BFD packets are encapsulated with the complete
> reverse seglist and do not require the path-segment.
>
> Therefore, U-BFD does not need any processing at the reflection end.
>
GIM>> I cannot agree with your suggestion that the remote end can be simply
traversed by a U-BFD Control message. If that is the case, then I don't see
how your implementation of U-BFD conforms to the specification (quoted
above):
   All
   Unaffiliated BFD Echo packets for the session MUST be sent with a
   Time to Live (TTL) or Hop Limit value of 255, and received with a TTL
   or Hop Limit value of 254, otherwise the received packets MUST be
   dropped [RFC5082].

>
>
> For more detailed encapsulation formats, please refer to
> https://datatracker.ietf.org/meeting/117/materials/slides-117-spring-bfd-path-consistency-over-sr-00.pdf
> .
>
> Thanks again!
>
>
>
>
>
> Thanks,
>
> Changwang
>
>
>
> -------------------------------------------------------------------------------------------------------------------------------------
> 本邮件及其附件含有新华三集团的保密信息,仅限于发送给上面地址中列出
> 的个人或群组。禁止任何其他人以任何形式使用(包括但不限于全部或部分地泄露、复制、
> 或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话或邮件通知发件人并删除本
> 邮件!
> This e-mail and its attachments contain confidential information from New
> H3C, which is
> intended only for the person or entity whose address is listed above. Any
> use of the
> information contained herein in any way (including, but not limited to,
> total or partial
> disclosure, reproduction, or dissemination) by persons other than the
> intended
> recipient(s) is prohibited. If you receive this e-mail in error, please
> notify the sender
> by phone or email immediately and delete it!
>