RE: WGLC for BFD over Link Aggregate Group Interfaces - ends November 8

"Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com> Wed, 30 October 2013 04:11 UTC

Return-Path: <manav.bhatia@alcatel-lucent.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9248D11E831C for <rtg-bfd@ietfa.amsl.com>; Tue, 29 Oct 2013 21:11:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id USCNyQF5sGdt for <rtg-bfd@ietfa.amsl.com>; Tue, 29 Oct 2013 21:10:59 -0700 (PDT)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by ietfa.amsl.com (Postfix) with ESMTP id D4AFF11E8328 for <rtg-bfd@ietf.org>; Tue, 29 Oct 2013 21:10:57 -0700 (PDT)
Received: from us70uusmtp3.zam.alcatel-lucent.com (h135-5-2-65.lucent.com [135.5.2.65]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id r9U4At7U010111 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Tue, 29 Oct 2013 23:10:55 -0500 (CDT)
Received: from US70UWXCHHUB02.zam.alcatel-lucent.com (us70uwxchhub02.zam.alcatel-lucent.com [135.5.2.49]) by us70uusmtp3.zam.alcatel-lucent.com (GMO) with ESMTP id r9U4AtR2026919 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 30 Oct 2013 00:10:55 -0400
Received: from SG70YWXCHHUB04.zap.alcatel-lucent.com (135.253.2.38) by US70UWXCHHUB02.zam.alcatel-lucent.com (135.5.2.49) with Microsoft SMTP Server (TLS) id 14.2.247.3; Wed, 30 Oct 2013 00:10:54 -0400
Received: from SG70YWXCHMBA05.zap.alcatel-lucent.com ([169.254.5.83]) by SG70YWXCHHUB04.zap.alcatel-lucent.com ([135.253.2.38]) with mapi id 14.02.0247.003; Wed, 30 Oct 2013 12:10:51 +0800
From: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
To: Mahesh Jethanandani <mjethanandani@gmail.com>
Subject: RE: WGLC for BFD over Link Aggregate Group Interfaces - ends November 8
Thread-Topic: WGLC for BFD over Link Aggregate Group Interfaces - ends November 8
Thread-Index: AQHO1QKAul1Por/YwEednDQ+yn8RipoMnQrw
Date: Wed, 30 Oct 2013 04:10:51 +0000
Message-ID: <20211F91F544D247976D84C5D778A4C32E4F2A93@SG70YWXCHMBA05.zap.alcatel-lucent.com>
References: <20131024191431.GO17538@pfrc> <315041E4211CB84E86EF7C25A2AB583D337EBFB3@xmb-rcd-x15.cisco.com> <425296D4-F96F-49FF-86D2-40737B64E117@gmail.com> <20211F91F544D247976D84C5D778A4C32E4EEE0D@SG70YWXCHMBA05.zap.alcatel-lucent.com> <CAAchPMsYyDTiONE1v=vKsebF8JPnnHiOFWEE_b0uR6zh8W+E=g@mail.gmail.com>
In-Reply-To: <CAAchPMsYyDTiONE1v=vKsebF8JPnnHiOFWEE_b0uR6zh8W+E=g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.253.19.18]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-bfd>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Oct 2013 04:11:05 -0000

Mahesh,

> The fundamental issue is that the proposal requires BFD protocol to rely on 
> information that is not carried in the frame itself. Unless by interface check 

That's what happens with most protocols. How do you identify the ingress IP interface for an IP packet that came from a router multiple hops away. You will have to go beyond the IP payload to associate this packet to an ingress interface.

> you mean check against IP address. I do not know of many protocols that require 
> one to validate/use information that is not part of the frame itself. Protocols that

I don't understand why you say this. The uBFD packet carries the dest IP that's bound to you. You use this information (i.e. the information carried in the frame) + some hints from the data plane to determine whether you need to act on it or not.

> have stood the test of time, like TCP, do not look beyond their own layers in the frame 
> for validation of a frame. Even if we have breached the OSI layer, at least we have 
> restricted ourselves to looking at what is in the frame.

This happens all the time. Multicast often takes hints from the data plane before triggering events in the control plane (pruning the RPT, sending Register Stop messages, sending ASSERTs, etc).

> The second issue as I highlighted is that there is an assumption that systems carry interface 
> information up to the protocol itself for it to validate/use the information. Again, I assume you mean 
> the check will be against the physical interface and not the IP address. That as I mentioned is a 
> huge assumption. There is no precedence for this.

Isnt this an implementation specific issue? You can, as you suggest later in your email, use the dest MAC.

> There are couple of ways to solve the problem.
>
> One way would be to use the IP address on the individual member link to map a packet 
> to a BFD session running on a member link. When the initial BFD frame is received with 
> your discriminator as zero, you would use the destination IP address contained in the 
> packet to figure out which link the packet was received on. The same would be true of 
> validation of frame. This will not work for unnumbered interfaces.
>
> The other would be use the individual link MAC address as a way to co-relate a BFD packet to 
> a particular link both to set up a BFD session (when the discriminator is zero) and for future validation 

This is precisely what I had meant by this being an implementation specific issue. Your implementation can always look at the dest MAC to figure out the link that the packet arrived on. It doesn't make sense to explicitly state this in the draft since this is an implementation specific issue. There are several devices that may use a chassis MAC address and MAY not allocate a unique MAC per link.

> of the frame (to a particular link). This would mean that we cannot use the multicast address to send the BFD frame.
>
> How the IP/MAC address is collected and setup is beyond the scope of this document.

Cheers, Manav

On Sun, Oct 27, 2013 at 4:37 AM, Bhatia, Manav (Manav) <manav.bhatia@alcatel-lucent.com> wrote:
Hi Mahesh,

This draft only talks about BFD sessions between directly connected boxes.

> For initial DOWN BFD packet, where the Your Discriminator field is 0,
> the draft suggests that demultiplexing MUST be based on some
> combination of other fields which MUST include the interface
> information of the member link. That assumes that systems are aware of
> what interface the BFD packet came on. That is not always the case, and
> in a global label/IP space, systems do not have to know the physical
Can you explain the scenario where you think its not possible for a system to know the ifindex of the IP interface over which an incoming packet arrived?

> link traffic came on. I am struggling to suggest an alternative, but
> would like to see the issue addressed particularly since it is a MUST.
>
> Same is true for the procedure for the reception of BFD control packet
> and its verification of the interface that it came on.
I think youre missing something because we already have 3 interoperable implementations of this draft. Clearly, those implementations were able to identify the IP interface over which the uBFD packet arrived.

Cheers, Manav

>
> On Oct 24, 2013, at 10:00 PM, Vengada Prasad Govindan (venggovi) wrote:
>
> > Support
> >
> > -----Original Message-----
> > From: rtg-bfd-bounces@ietf.org [mailto:rtg-bfd-bounces@ietf.org] On
> Behalf Of Jeffrey Haas
> > Sent: Friday, October 25, 2013 12:45 AM
> > To: rtg-bfd@ietf.org
> > Subject: WGLC for BFD over Link Aggregate Group Interfaces - ends
> November 8
> >
> > This email is to initiate working group last call on the BFD on Link
> Aggregate Group Interfaces document:
> >
> > http://tools.ietf.org/html/draft-ietf-bfd-on-lags-01
> >
> > The last call will complete on November 8, the end of IETF week.
> Time will be available during the Vancouver IETF BFD session to discuss
> last call comments.
> >
> > Nobo Akiya will be serving as document shepherd (RFC 4858) for this
> WGLC.
> >
> > Due to the small nature of the BFD working group and the fact that
> both working group chairs have contributed to this document, we have
> gotten Carlos Pignataro (cpignata@cisco.com) to volunteer to serve as
> an independent party to gauge working group consensus.
> >
> > In order to facilitate the transparency of this WGLC, please remember
> to send all comments to the working group mailing list.
> >
> > IPR declarations have been filed against this draft and the document
> authors and contributors have been polled for any further IPR.  Current
> IPR declarations may be seen at the following link:
> >
> >
> http://datatracker.ietf.org/ipr/search/?option=document_search&id=draft
> -ietf-bfd-on-lags
> >
> > If you are aware of additional IPR against this document please
> declare so, per the IETF Note Well.
> >
> > Finally, the IEEE has expressed interest in the disposition of this
> draft.
> > They will likely provide additional commentary, if any, via the IETF
> liaison process.  This process will likely happen after WGLC concludes.
> Depending on their feedback, WGLC may re-open to address their
> concerns.
> >
> > -- Jeff (for the chairs)
>
> Mahesh Jethanandani
> mjethanandani@gmail.com
>
>




-- 
Mahesh Jethanandani
mjethanandani@gmail.com