RE: WG adoption poll for draft-nitish-vrrp-bfd-p2p

"Nitish Gupta (nitisgup)" <nitisgup@cisco.com> Thu, 25 January 2018 07:20 UTC

Return-Path: <nitisgup@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF78112E042; Wed, 24 Jan 2018 23:20:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.519
X-Spam-Level:
X-Spam-Status: No, score=-14.519 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dAR1W6O_S65E; Wed, 24 Jan 2018 23:20:37 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 792D412D95F; Wed, 24 Jan 2018 23:20:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=60047; q=dns/txt; s=iport; t=1516864837; x=1518074437; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=8X/S7QKa9PQnMq0lEMkj5JyNURmlBC/OypmY4WZyO7I=; b=SpszcEZoAY6ZAc3NnEbb0dgg1Qmzm7Vy2FYaazCGlpg+TKzj34fY6LTJ 5EkDdIoz0YWF4qxy/VPsFTdSzlPAZYdbZ/wamtJdeNG3hUc6V4XU6rW0j azJVq4NCCDWU/2YfQdp64gChNTn7aG/Yr92sTh080KwS5BeAncAh/AoO0 Q=;
X-Files: image001.jpg : 824
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ATAQB7hGla/40NJK1eGQEBAQEBAQEBA?= =?us-ascii?q?QEBAQcBAQEBAYJKeGZ0JweDVookjmiBWyeCaIMdgw2KeYM4FYICBwEChTcCAgI?= =?us-ascii?q?ahGhUGAEBAQEBAQEBAmsdC4UjAQEBBAUeAgIGAUYFDgICAQgRAwEBAQYBAQEKA?= =?us-ascii?q?wsBBgMCAgIFDwEBCQMCDBMBCQgCBA4EAQYIC4oEAxW1IIFtOiaHIg2DCwEBAQE?= =?us-ascii?q?BAQEBAQEBAQEBAQEBAQEBAQ4PBYRMghWBV4FoKQyCeYJrRASBKgERAQsHAQcBE?= =?us-ascii?q?Q0HCQkWAgeCWDGCNAWIawyCBo8QhWwDg1A9AocOAYE+Z4cmBoUAghuGHxKLWYp?= =?us-ascii?q?6gyaJCwIRGQGBOwEfOWBwcBVnAYF/glQcgWYBeAEBi34PGIENgRcBAQE?=
X-IronPort-AV: E=Sophos;i="5.46,409,1511827200"; d="jpg'145?scan'145,208,217,145";a="129588396"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Jan 2018 07:20:35 +0000
Received: from XCH-RTP-016.cisco.com (xch-rtp-016.cisco.com [64.101.220.156]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id w0P7KYtT013453 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 25 Jan 2018 07:20:34 GMT
Received: from xch-rtp-003.cisco.com (64.101.220.143) by XCH-RTP-016.cisco.com (64.101.220.156) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Thu, 25 Jan 2018 02:20:33 -0500
Received: from xch-rtp-003.cisco.com ([64.101.220.143]) by XCH-RTP-003.cisco.com ([64.101.220.143]) with mapi id 15.00.1320.000; Thu, 25 Jan 2018 02:20:33 -0500
From: "Nitish Gupta (nitisgup)" <nitisgup@cisco.com>
To: "Alexander.Vainshtein@ecitele.com" <Alexander.Vainshtein@ecitele.com>
CC: "chrisbowers.ietf@gmail.com" <chrisbowers.ietf@gmail.com>, "rtgwg@ietf.org" <rtgwg@ietf.org>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, "Aditya Dogra (addogra)" <addogra@cisco.com>, "draft-nitish-vrrp-bfd-p2p@ietf.org" <draft-nitish-vrrp-bfd-p2p@ietf.org>, "vinesasha@yahoo.com" <vinesasha@yahoo.com>
Subject: RE: WG adoption poll for draft-nitish-vrrp-bfd-p2p
Thread-Topic: WG adoption poll for draft-nitish-vrrp-bfd-p2p
Thread-Index: AQHTillGRgYOMWhx50ijX00CC9/ouaNvOn4AgAUSz4CAAkEwgIAACmSAgAAIxoCADXFegA==
Date: Thu, 25 Jan 2018 07:20:33 +0000
Message-ID: <B9BA6B8B-4E34-4814-9F84-857F79CDF4FC@cisco.com>
References: <CAHzoHbvEUAqRL-dBxMQ2KxcVVMkJCpxPQ1bA84U0KT2YiW9mNw@mail.gmail.com> <AM4PR03MB1713EAEFE31431C1B4BA45EF9D160@AM4PR03MB1713.eurprd03.prod.outlook.com> <4B4949C5-91F8-4D85-A078-554216EAF24D@cisco.com> <1664030238.1629235.1516092897556@mail.yahoo.com> <a9d7d660-8aa4-5341-8401-719f89f57aef@doch.org.uk> <AM4PR03MB1713FCAE4BCA834F339A62499DEA0@AM4PR03MB1713.eurprd03.prod.outlook.com>
In-Reply-To: <AM4PR03MB1713FCAE4BCA834F339A62499DEA0@AM4PR03MB1713.eurprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.1a.0.160910
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.120.240]
Content-Type: multipart/related; boundary="_004_B9BA6B8B4E3448149F84857F79CDF4FCciscocom_"; type="multipart/alternative"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/huktwaPZb-6ymfeXylrKS_kiYzY>
X-Mailman-Approved-At: Thu, 25 Jan 2018 06:06:22 -0800
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2018 07:20:41 -0000

Hi Sasha,

Thanks again for your comments and suggestions.

As requested we have added a section indicating that the workings of this draft can be extended to VRRPv2 as well. We have updated a new version of the draft as well.

Also for the below point:
“I also think that lack of clarity regarding re-evaluation of the Critical Path BFD session is both problematic and pretty trivial to resolve before adoption (at least, we seem to agree that such clarification is necessary).”
[nitisgup] I believe that we have already pointed this out earlier and I would like to reiterate my point, we have already explained the VRRP state machine and the changes required in the state machine for VRRP to interface with BFD. For instance, what you are asking us to put is already there:
   (1015) - If a BACKUP ADVERTISEMENT is received, then:

      (1020) + If the Priority in the BACKUP ADVERTISEMENT is
               zero, then:

         (1025) * Remove the Peer from peer table.

      (1030) + else: // priority non-zero

         (1035) * Update the Peer info in peer table.

         (1040) * Recompute the Backup_Down_Interval

         (1045) * Reset the Backup_Down_Timer to
                  Backup_Down_Interval

      (1050) + endif // priority in backup advert zero

      (1055) + Calculate the Critical_Backup

Thanks,
Nitish

From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>;
Date: Tuesday, January 16, 2018 at 2:03 AM
To: "colin@doch.org.uk"; <colin@doch.org.uk>;
Cc: "chrisbowers.ietf@gmail.com"; <chrisbowers.ietf@gmail.com>;, "rtgwg@ietf.org"; <rtgwg@ietf.org>;, "rtg-bfd@ietf.org"; <rtg-bfd@ietf.org>;, "Aditya Dogra (addogra)" <addogra@cisco.com>;, "draft-nitish-vrrp-bfd-p2p@ietf.org"; <draft-nitish-vrrp-bfd-p2p@ietf.org>;, "Nitish Gupta (nitisgup)" <nitisgup@cisco.com>;, "vinesasha@yahoo.com"; <vinesasha@yahoo.com>;
Subject: RE: WG adoption poll for draft-nitish-vrrp-bfd-p2p

Colin,
I do not see that VRRPv2 is really abandoned in IPv4 deployments that I see (of course, my exposure is limited).
I also do not see that VRRPv3 has really added much to VRRPv2 for IPv4.
I also have not seen any vendors announcing end of life/end of support of VRRPv2 in their implementations. Or did I miss something?

The bottom line: We can “agree to disagree” about this point, and see what other WG members have to say on this issue.

I also think that lack of clarity regarding re-evaluation of the Critical Path BFD session is both problematic and pretty trivial to resolve before adoption (at least, we seem to agree that such clarification is necessary).

My 2c,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@ecitele.com

From: Colin Docherty [mailto:colin.doch.org.uk@gmail.com] On Behalf Of Colin Docherty
Sent: Tuesday, January 16, 2018 11:32 AM
To: Alexander Vainshtein <sasha@axerra.com>;; Nitish Gupta (nitisgup) <nitisgup@cisco.com>;
Cc: chrisbowers.ietf@gmail.com; rtgwg@ietf.org; rtg-bfd@ietf.org; Aditya Dogra (addogra) <addogra@cisco.com>;; Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>;; draft-nitish-vrrp-bfd-p2p@ietf.org
Subject: Re: WG adoption poll for draft-nitish-vrrp-bfd-p2p


Hi Alexander/Group,

Some replies,
On 16/01/18 08:54, Alexander Vainshtein wrote:
Nitish and all,
Lots of thanks for a prompt and detailed response.

Based on your response I think that some changes to the draft should be made prior to its adoption by the WG. Some other changes can be safely handled once the draft becomes a WG document. The details can be found in my comments to your responses.

I would also like to discuss one more issue that I did not mention in my original set of comments.
The last statement in Section 5 says:
<quote>

   This Draft does not preclude the possibility of the peer table being

   populated by means of manual configuration, instead of using the

   BACKUP ADVERTISEMENT as defined by the Draft.
<end quote>

I wonder if this statement is sufficient of and by itself for the implementers of such an option.

If the peer table is populated by  manual configuration, and if, say, object tracking is used to modify priorities of different members of the VRRP group, priority-based selection of the CRITICAL PATH member becomes more or less meaningless (because priorities become dynamic). As a consequence, all BACKUP members of the group would have to monitor their BFD sessions with teh Master and would treat failure of these sessions as the Master Down event. Once this happens, they would all sent VRRP Advertisement messages and resolve the mastership in teh usual VRRP way. I do not see any serious issues with this approach but it is different from the approach defined in the draft. I wonder if clarification of this behavior should not be added to the draft. In any case, this is not a stopper for adopting the draft as a WG document.

If we leave the statement as is then it is open to further expansion in the future, however I think it would be good to just to focus on the core functionality, and I don't think its a stopper at this stage.




Hopefully my comments will help.

Here begin my comments to your responses:
-----

1.       The draft seems to deal just with VRRPv3 (RFC 5798) while completely ignoring VRRPv2 (RFC 3768). I wonder if this omission is due to some technical issue; if not, do the authors plan to extend the draft to cover also VRRPv2 in future? (The context for this question is that, AFAIK, VRRPv2 is more widely deployed for IPv4)
[nitisgup] Since VRRPv3 covers First Hop redundancy for both ipv4 and ipv6, We have taken VRRPv3 as the base for this RFC and the same can be extended to VRRPv2. We can cover that in future version of the draft.
[Sasha] Taking into account that VRRPv2 is much more widely used with IPv4 than VRRPv3, I think that at least a declaration of intention to include also VRRPv2 should be done before the draft is adopted.

I strongly disagree with this. Around 2013 when I was developing the initial BFD/VRRPv3 design, VRRPv2 was been actively deprecated with our team for our new VRRPv3 implementation. VRRPv2 at that point had already been deprecated since 2010. I really think it is time to move forward, there is nothing in the VRRPv2 specification that isn't improved on in VRRPv3. If anything this draft should serve as an incentive for widespread adoption of VRRPv3 over its deprecated predecessor. Most implementations have relatively straightforward upgrade paths for the VRRPv2->VRRPv3 transition.



2.       Neither RFC 3768 nor RFC 5798 do not mention a “Master Down event”; rather they speak about “expiration of the Master_Down_Timer”. However, the draft uses the term “Master Down event” several times. Can I safely assume that it is the same as “expiration of the Master_Down_Timer”?
[nitisgup] We have already covered in the Draft, that Master down event is triggered by either “expiration of the Master_Down_Timer” or “Critical_BFD_Session going down”. But We will also define it in the section 3.6 of the Draft.
[Sasha] OK with me, can be done after adoption.

Agreed.



3.       While neither RFC 3768 nor RFC 5798 mention it, most VRRP implementations support tracking mechanisms that result in dynamic change of priorities of VRRP group members. The draft does not discuss what happens when priority of one of the group members changes. E.g.:
a.       Do the backup member that experiences such a change immediately send a new Backup Advertisement?
                        [nitisgup] When the VRRP Router Enters the Backup State it will send a BACKUP ADVERTISEMENT.
b.       Is the “Critical Path” re-estimated each time this happens etc.
[nitisgup] Ciritical Path is determined every time an Advert(MASTER/BACKUP) is received from the PEER, as it will be updated in the PEER table.
[Sasha] From my POV this should be explicitly stated in teh draft before adoption.
I don't think this needs to be explicitly stated before adoption.



4.       Both VRRPv2 and VRRPv3 support no-preemption mode. Please explain what happens if this mode is set in a VRRP group member whose priority becomes (due to dynamic changes) higher than that of the current Master?
[nitisgup] We have not changed the Behavior of VRRPv3 with this Draft the, We have already captured the updated State machine in section 3.6.3, which takes care of Preempt_Mode of the VRRP router.
[Sasha] My point was that, with preemption mode enabled, some of the BACKUP members could have higher priority of the current Master. Clarifying that this does not affect determination of the CRITICAL BFD session would be useful  - could be done after teh draft is adopted.
5.       Suppose that the draft is used with VRRPv3 for IPv6. Is the Source IPv6 address of the Backup Advertisement packet a link-local address of the interface via which this message is transmitted? (This is explicitly specified in RFC 5798 for the VRRP Advertisement message, but not specified in the draft)
[nitisgup] We can take care of this in next version of the Draft. [Sasha] OK - could be done after adoption

Agreed.



6.       In the scenario above, will the 1-hop IPv6 BFD session use link-local IPv6 addresses of the VRRP Master and its primary Backup? (I assume that the answer is positive, but it would be nice to see this in the draft and not to leave it for the implementers to guess).
[nitisgup] Same as above we will explicitly mention it. [Sasha] Sams as above for me too[mage removed by sender. *:) happy]

Agreed.




Regards,
Colin.

___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________