Re: Zaheduzzaman Sarker's Discuss on draft-ietf-bfd-unaffiliated-echo-12: (with DISCUSS and COMMENT)

xiao.min2@zte.com.cn Fri, 18 October 2024 03:39 UTC

Return-Path: <xiao.min2@zte.com.cn>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A67ECC1CAE69; Thu, 17 Oct 2024 20:39:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xNJFfOhjGN74; Thu, 17 Oct 2024 20:39:39 -0700 (PDT)
Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15657C1840C7; Thu, 17 Oct 2024 20:39:32 -0700 (PDT)
Received: from mse-fl2.zte.com.cn (unknown [10.5.228.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4XV9Rz63lhz5D3w3; Fri, 18 Oct 2024 11:39:27 +0800 (CST)
Received: from njy2app03.zte.com.cn ([10.40.13.14]) by mse-fl2.zte.com.cn with SMTP id 49I3dLih084461; Fri, 18 Oct 2024 11:39:21 +0800 (+08) (envelope-from xiao.min2@zte.com.cn)
Received: from mapi (njb2app06[null]) by mapi (Zmail) with MAPI id mid201; Fri, 18 Oct 2024 11:39:22 +0800 (CST)
Date: Fri, 18 Oct 2024 11:39:22 +0800
X-Zmail-TransId: 2afe6711d86a6ad-b9f72
X-Mailer: Zmail v1.0
Message-ID: <20241018113922555iC3Um7gK1W3dcrhB11856@zte.com.cn>
In-Reply-To: <172916955050.1346853.15954860630215626238@dt-datatracker-78dc5ccf94-w8wgc>
References: 172916955050.1346853.15954860630215626238@dt-datatracker-78dc5ccf94-w8wgc
Mime-Version: 1.0
From: xiao.min2@zte.com.cn
To: zahed.sarker.ietf@gmail.com
Subject: Re: Zaheduzzaman Sarker's Discuss on draft-ietf-bfd-unaffiliated-echo-12: (with DISCUSS and COMMENT)
Content-Type: multipart/mixed; boundary="=====_001_next====="
X-MAIL: mse-fl2.zte.com.cn 49I3dLih084461
X-Fangmail-Anti-Spam-Filtered: true
X-Fangmail-MID-QID: 6711D86F.002/4XV9Rz63lhz5D3w3
Message-ID-Hash: UEX7A4G2MWLRMUM3BIEKDF5CPWDHHZZD
X-Message-ID-Hash: UEX7A4G2MWLRMUM3BIEKDF5CPWDHHZZD
X-MailFrom: xiao.min2@zte.com.cn
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-rtg-bfd.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: iesg@ietf.org, draft-ietf-bfd-unaffiliated-echo@ietf.org, bfd-chairs@ietf.org, rtg-bfd@ietf.org, trammell@google.com
X-Mailman-Version: 3.3.9rc6
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection" <rtg-bfd.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/_d_KMpSWOEh4MjnL26N4153xijY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Owner: <mailto:rtg-bfd-owner@ietf.org>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Subscribe: <mailto:rtg-bfd-join@ietf.org>
List-Unsubscribe: <mailto:rtg-bfd-leave@ietf.org>

Hi Zahed,

Thanks for your review and comments.
Please see inline.

Original


From: ZaheduzzamanSarkerviaDatatracker <noreply@ietf.org>
To: The IESG <iesg@ietf.org>;
Cc: draft-ietf-bfd-unaffiliated-echo@ietf.org <draft-ietf-bfd-unaffiliated-echo@ietf.org>;bfd-chairs@ietf.org <bfd-chairs@ietf.org>;rtg-bfd@ietf.org <rtg-bfd@ietf.org>;trammell@google.com <trammell@google.com>;
Date: 2024年10月17日 20:53
Subject: Zaheduzzaman Sarker's Discuss on draft-ietf-bfd-unaffiliated-echo-12: (with DISCUSS and COMMENT)

Zaheduzzaman Sarker has entered the following ballot position for
draft-ietf-bfd-unaffiliated-echo-12: Discuss
 
When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)
 
 
Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/  
for more information about how to handle DISCUSS and COMMENT positions.
 
 
The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bfd-unaffiliated-echo/
 
 
 
----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------
 
Thanks for working on this specificaition. This is an interesting protocol to
enable system to loopback packets to itself.
 [XM]>>> Thank you! :-)


Also thanks for Brian Trammell for his good TSVART review. That email thread
had a very good conversation to understand this specification better. Thanks to
Erik, Jeffrey for reaching to resolutions.
 
I am holding a discuss on the relaxation of congestion control statements in
the operational considerations. I think it is very important that we explain
the reason better on why we are relaxing that requirement on BFD session ( but
not session) in this specification.
 
# RFC 5880 says -
 
     Note that "congestion" is not only a traffic phenomenon, but also a
   computational one.  It is possible for systems with a large number of
   BFD sessions and/or very short packet intervals to become CPU-bound.
   As such, a congestion control algorithm SHOULD be used even across
   single hops in order to avoid the possibility of catastrophic system
   collapse, as such failures have been seen repeatedly in other
   periodic Hello-based protocols.
 
  and this specification says
 
     All Operational Considerations from [RFC5880] apply, except that the
     Unaffiliated BFD Echo can only be used across one hop, which result in
     unnecessity of a congestion control mechanism.
 
  It seems like this specification is relaxing the congestion control
  requirements without really explaining why it is an exception from what is a
  SHOULD in RFC 5880, even for single hop. Note that RFC 8085 cprovides
  congestion control guidelines for protocol that uses UDP. I understand that
  there is a periodicity and configured value to send the BFD Echo packets,
  still that does not automatically result in unnecessity of a congestion
  control requirement for UDP traffic, especially when RFC 5880 also says the
  congestion is not only a traffic phenomenon. I was expecting more explanation
  of this exception ( this was also brought up by the TSVART review ) and
  potential operation impacts as RFC 5880 also indicates the effects can be
  catastrophic.
 [XM]>>> I understand that congestion control is still needed for even a single-hop BFD session as specified in RFC 5881, however I'm not sure it's still needed for a single-hop BFD Echo session (as many have indicated that may not be an actual session), because the adjacent system doesn't know it's a BFD Echo packet and the adjacent system doesn't process the payload of the BFD Echo packet (the payload is called BFD Control packet in RFC 5880) all through the process.
 
----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------
 
I have further comments below as I believe when addressed that will improve the
specification description -
 
# Section 1 : I don't quite get this statement
 
    This document updates [RFC5880] by defining a new method of BFD Echo-Only
    without requiring an implementation to support the full BFD protocol.
 
  Does this mean any IP packet forwarder can be Device B in figure 1? or the
  device B actually needs to implement RFC5880 partially. In the description of
  Figure 1 , it says Device B does not support BFD. So to me, Device B can be
  anything that understands IP forwarding, is it?
 
# Section 5 : it is not clear to me if Device B (loop-back device) in figure 1
does not support BFD then how it can provide the authentication as per RFC
8550. I think we should say that for authentication the loop-back device needs
to support RFC 5880.
 [XM]>>> For the above two comments, I believe Jeff and Erik have resolved them. If any text change needed, please let me know. :-)
 




Cheers,
Xiao Min