RE: [EXTERNAL] Can a BFD session change its source port to facilitate auto recovery
Alexander Vainshtein <Alexander.Vainshtein@rbbn.com> Mon, 27 March 2023 00:55 UTC
Return-Path: <Alexander.Vainshtein@rbbn.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50680C14F74E for <rtg-bfd@ietfa.amsl.com>; Sun, 26 Mar 2023 17:55:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rbbn.com header.b="Ml7mvSNX"; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=sonusnetworks.onmicrosoft.com header.b="c3gi4MXq"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pHVYfJG1ASiM for <rtg-bfd@ietfa.amsl.com>; Sun, 26 Mar 2023 17:55:05 -0700 (PDT)
Received: from mail1.bemta34.messagelabs.com (mail1.bemta34.messagelabs.com [195.245.231.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8920FC14F73E for <rtg-bfd@ietf.org>; Sun, 26 Mar 2023 17:55:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rbbn.com; s=rbbnselector03122020; t=1679878502; i=@rbbn.com; bh=fDFdpNc7uyhocpRzReZqIykFv8qcH/Aad9NBU8gWr2s=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=Ml7mvSNXBgdfnHdLSWMgoZP1zrI2NETgOg1Hfb4md/3vRlTzwPa9KZ3bTgYyqE6AV NmiIgBxYBM7yz1m4wXgyTDcLdzYeCTXGZawhhahgX+aep1EgOTP2YWbQNzY3JYlhkC zc9Ws45SN2ZEq2jl4WcwiXzu8lu6tmWfOK59TrBLD2OvcByhe6/wIbjl9ApbT4qv9S sJ26W8Z65Sh3Gze7F0ZD0rSPIXSnlLA30KqENGs67jXk4ZkrZV/fsq/pZd8Xq7QKXt 9bZu1h2/DHX+n3xT4iqqnf2NUyBznSnKxls9FLQ0mUQW+DB1Itn/XAd0G00+Ohmdgt mRrSA3ouOiILg==
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrBJsWRWlGSWpSXmKPExsWSoW++UTflpUK KwZblxhY/9k9ht3jV8ZPJ4vOfbYwWnesWszmweOycdZfdY8mSn0wea/b9YAlgjmLNzEvKr0hg zTjTNputYH8nc8WLZS2sDYxLWpi7GLk4GAWWMkssb+xi72LkBHIWsUpMXSwPkVjFKNE5/w8ji MMisJtZYtnNX0wgjpDAPCaJ63f/MkI49xklHm6byQbSzyZgJfH7/RkWEFtEwEfiyf0nYHFmgW CJdf/6mEBsYYFYidUds9ggauIkFp6ZCVVvJNF55TLYHSwCqhJ3ZnwBinNw8ALVP7gVAhIWEtj CKLH9qj6IzSlgK9Gx/AArxNliEt9PrWGCWCUucevJfDBbQkBAYsme88wQtqjEy8f/oOqLJC4/ XMMIEZeVuDS/G8q2l1h6+weU7SvR9vcDO4QtJ7Gq9yELhC0vMW3Re6i4jMSDG9vZQOEgITCBV eLG4b3MEM5GFon9Ty9CVRlIzPt2BKpqq6jE61UfmCFOzZPY33mBcQKj9iwkl89CkgKxeQUEJU 7OfMIyCxgYzAKaEut36UOUKEpM6X7IDmFrSLTOmcuOLL6AkX0Vo2lxalFZapGuiV5SUWZ6Rkl uYmaOXmKVbqJeaqlueWpxia6RXmJ5sV5qcbFecWVuck6KXl5qySZGYGJLKVY8toPxX+9fvUOM khxMSqK80W7yKUJ8SfkplRmJxRnxRaU5qcWHGGU4OJQkeE8/VUgREixKTU+tSMvMASZZmLQEB 4+SCG/cE6A0b3FBYm5xZjpE6hSjK8eVbXv3MnOsPHwFSO4Gk5v2dR1g5vj4cupBZiGWvPy8VC lx3ozbQM0CIM0ZpXlwo2EZ4hKjrJQwLyMDA4MQT0FqUW5mCar8K0ZxDkYlYd6zz4Cm8GTmlcB d8AroOCag474VgB1XkoiQkmpgSmlNLbhSsJJt1j7ug431Kdv2GhVb/1OY8ieT58ZSnnOx9xvm 23PZzUjcfGD+2/Udzh05la8zDTSdX7LZ5Zcvvy4g3qSluEykN6d9n5WwWa2N0dc30g4KJs8jA u7PmaI0r3tndKR6yL6PMXqBhtdLzzhf6Hm7Q019k8jJTUtNXCQz298dreEvlJ2k8sDT1kQiwm PPw5jr89+o1d2oPMvSWqG3ysC1gU39kcWf/mesgl2CwYnvXB6JXTxZKV5Vdf3j8wXsUu9TXiQ czfqxV/a1ymu3X0yXRFw8UrrvrKr7LJJZe2vfRK9VDB7LeZYbVXhsWWklyt9etWrx6ef7S4// vugR2/jttIbx9Cunr/UqsRRnJBpqMRcVJwIANfpikosEAAA=
X-Env-Sender: Alexander.Vainshtein@rbbn.com
X-Msg-Ref: server-14.tower-548.messagelabs.com!1679878499!130001!1
X-Originating-IP: [104.47.55.177]
X-SYMC-ESS-Client-Auth: mailfrom-relay-check=pass
X-StarScan-Received:
X-StarScan-Version: 9.104.1; banners=rbbn.com,-,-
X-VirusChecked: Checked
Received: (qmail 24310 invoked from network); 27 Mar 2023 00:55:00 -0000
Received: from mail-bn8nam12lp2177.outbound.protection.outlook.com (HELO NAM12-BN8-obe.outbound.protection.outlook.com) (104.47.55.177) by server-14.tower-548.messagelabs.com with ECDHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 27 Mar 2023 00:55:00 -0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=J823K7zC8iAAEEvyxVRuJOBWUUJnAcTo5la7ViPPk/eMiZDcS6AjLbSiNBeCWx7rWFljjzXZs7+OLyA0p5HsYhEjFBuEtjrJgEaKyo7Lzp50j2Ymnxw0DlbqNdRaJfQDyGYicVQIGtjraLDmeG6Z0+Jcrgi9ihoCIJaxkcFBkyeMqXAiRIQA2oIKF3x73Nnt8WkPH1akhaHX7GJanOw3cug/faSS2+zdkmy4Fv+1jlrEnb5s8SVt2LZ8Tqs1i+d1H65BaNW8ftBrMQvBU+qGUbWDKikd9bp5Hyekc3cNV/nGluSPWA0SbOvK4nbBpSFz12tar4O6mmgAuycKOhY3ew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MiK+Va6OwCKSC3h+dlZphFwAoznaGG7Rzy9lBs+4IQw=; b=Mj8sr65jfZBGztyMcIN/WjipgbFc6cZUhryzwoZ1Jn1MCemG8HBMr54+dq1d/HSw8obLkrcyQCvwFxbyMGo7MbYC7JkYPuajQ9ngX3/RJrJqWDMPg7grqUGN/nfbP7r0xriK6+gLXxVZq4qbNvlnb8t9VQsFReTmAxCcT170bvOtqQrd3CrLNE8e98jJT2jYQMWoyAnevMYmcrZ7utC5ZYOqORrkt7Hl6B9QmOIpEM3A6TToa2zckcRTO2DcN16NKAzbyG5bgxlLNj/PCvL+obMeSo+nomte/4WezGgYhIPZ5JVqTLWW4DJ8HipEkwB0sxCzTW4DLodekX1RtOgnTQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=rbbn.com; dmarc=pass action=none header.from=rbbn.com; dkim=pass header.d=rbbn.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=SonusNetworks.onmicrosoft.com; s=selector2-SonusNetworks-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MiK+Va6OwCKSC3h+dlZphFwAoznaGG7Rzy9lBs+4IQw=; b=c3gi4MXqeCu5+ABx9GJ+aPWI2j+A9YdT1YE2WrIkSvqYlaRWkirugr9gauc+hy3fOtk0wdinvWSCY9uFlSHxFLPXZFCjjIno9txxqUPr+nUq6rwk/Jb3IfqCoMcZaysT+7wE8yau9IsaX6F/yelV/j/AEiiumUh9Ev+C9wtMmAE=
Received: from PH0PR03MB6300.namprd03.prod.outlook.com (2603:10b6:510:e2::5) by CO3PR03MB6744.namprd03.prod.outlook.com (2603:10b6:303:171::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.38; Mon, 27 Mar 2023 00:54:54 +0000
Received: from PH0PR03MB6300.namprd03.prod.outlook.com ([fe80::b921:5c83:457b:8ae7]) by PH0PR03MB6300.namprd03.prod.outlook.com ([fe80::b921:5c83:457b:8ae7%4]) with mapi id 15.20.6178.041; Mon, 27 Mar 2023 00:54:54 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
To: Jeff Tantsura <jefftant.ietf@gmail.com>, Xiao Min <xiao.min2@zte.com.cn>
CC: Abhinav Srivastava <absrivas@gmail.com>, "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
Subject: RE: [EXTERNAL] Can a BFD session change its source port to facilitate auto recovery
Thread-Topic: [EXTERNAL] Can a BFD session change its source port to facilitate auto recovery
Thread-Index: AQHZYAAPsrHSuPvJP0+wM8LoK8LtWK8NyyrA
Date: Mon, 27 Mar 2023 00:54:54 +0000
Message-ID: <PH0PR03MB6300F52FA809D4AB18B1286FF68B9@PH0PR03MB6300.namprd03.prod.outlook.com>
References: <202303241426070747451@zte.com.cn, 35A7640A-D0B9-4CBF-98EF-18256EBEE3EC@gmail.com> <202303250843265569167@zte.com.cn> <D885E2C5-8BF7-4FCA-8E8A-1EE6FAA5ECF3@gmail.com>
In-Reply-To: <D885E2C5-8BF7-4FCA-8E8A-1EE6FAA5ECF3@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR03MB6300:EE_|CO3PR03MB6744:EE_
x-ms-office365-filtering-correlation-id: bc38a199-16a4-4b64-41d1-08db2e5de0c2
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR03MB6300.namprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(346002)(376002)(396003)(136003)(39860400002)(366004)(451199021)(9686003)(6506007)(166002)(33656002)(41300700001)(55016003)(5660300002)(8936002)(316002)(38100700002)(53546011)(122000001)(7696005)(186003)(66946007)(66476007)(64756008)(2906002)(86362001)(52536014)(54906003)(66556008)(4326008)(76116006)(66446008)(110136005)(478600001)(8676002)(38070700005)(71200400001)(83380400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_PH0PR03MB6300F52FA809D4AB18B1286FF68B9PH0PR03MB6300namp_"
MIME-Version: 1.0
X-OriginatorOrg: rbbn.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6300.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bc38a199-16a4-4b64-41d1-08db2e5de0c2
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Mar 2023 00:54:54.0564 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 29a671dc-ed7e-4a54-b1e5-8da1eb495dc3
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wl0ifwSAEMyY9G8cJK2QpnNidKJelaQiM7M5/iKQXNTLfvOQ+eCjAJ6B2A/WHcoPvc9A0K+PLXy6nFXzbkxaSA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO3PR03MB6744
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/mRs3T2BzdXUMcDxWS5pzr1U20-U>
X-Mailman-Approved-At: Sun, 26 Mar 2023 18:48:14 -0700
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Mar 2023 00:55:09 -0000
Jeff, Xiao and all, FWIW I concur with Jeff. It is not clear to me what exactly the reference to BFD for SR Policies means. E.g., if Seamless BFD (RFC 7880<https://datatracker.ietf.org/doc/html/rfc7880> and RFC 7881<https://datatracker.ietf.org/doc/html/rfc7881>) is used, the reflected packets are sent as native IPv4 or IPv6 packets and can encounter problems that are not related to the state of the monitored candidate path of the SR Policy. My 2c, Sasha From: Jeff Tantsura <jefftant.ietf@gmail.com> Sent: Monday, March 27, 2023 1:29 AM To: Xiao Min <xiao.min2@zte.com.cn> Cc: Abhinav Srivastava <absrivas@gmail.com>; Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>; rtg-bfd@ietf.org Subject: Re: [EXTERNAL] Can a BFD session change its source port to facilitate auto recovery Hi Xiao, please see inline On Mar 24, 2023, at 5:43 PM, <xiao.min2@zte.com.cn<mailto:xiao.min2@zte.com.cn>> <xiao.min2@zte.com.cn<mailto:xiao.min2@zte.com.cn>> wrote: Jeff, Please see inline... Original From: JeffTantsura <jefftant.ietf@gmail.com<mailto:jefftant.ietf@gmail.com>> To: 肖敏10093570; Cc: absrivas@gmail.com<mailto:absrivas@gmail.com> <absrivas@gmail.com<mailto:absrivas@gmail.com>>;Alexander.Vainshtein@rbbn.com <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>;rtg-bfd@ietf.org <rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>>; Date: 2023年03月24日 16:48 Subject: Re: [EXTERNAL] Re: Can a BFD session change its source port to facilitate auto recovery That’s not going to fly, number of ECMP paths in today’s networks could be anywhere between 2 and 500+, how many of these would you exercise, how would you know that you have covered all of them? [XM]>>> The number of links/LAGs seems much higher than the number of ECMP paths. If otherwise I have to run SH BFD on each link/LAG, why not try to run MH BFD on each ECMP path? :-) As to the coverage, BFD+IOAM may help, because IOAM can tell you the path BFD packet really takes. [jeff] the number of p2p connections between 2 directly attached IP end-points is rarely larger than 32 (either LAG or ECMP), SH BFD sessions are distributed across the path traversed and coherency between IP connectivity matrix and BFD sessions between any given pair of directly connected IP end-points can easily be guaranteed, end2end (MH BFD) is between non directly attached end-points and is subject to network topology and routing, and has to be re-evaluated on any change. INT doesn’t really help here, hashing decisions are local, any changes (local or global) might change the hashing results, unless you build a full mesh of source routed paths… but then, why BFD at all, you could use INT only instead, take a look at HPCC draft The role of MH BFD is to verify reachability between 2 non directly connected IP end-points, not to monitor every path available. [XM]>>> IMHO BFD for SR Policy does care about the path, and some SP's networks require bidirectional path consistency while employing BFD. [jeff] how did we get to SR here? If you have got a strict source routed path, you only need to validate that path, if it is loose however, same issues Best Regards, Xiao Min As a viable solution, run SH BFD on each link/LAG, MH BFD end2end and make sure your timers are aligned and not interact with each other in funny ways. Cheers, Jeff On Mar 24, 2023, at 09:26, xiao.min2@zte.com.cn<mailto:xiao.min2@zte.com.cn> wrote: Hi Abhinav, When I come across your problem, the first idea coming into my mind is not trying to change the source port for a BFD session, but to run multiple BFD sessions between the two peers, using each BFD session to monitor a respective ECMP path, and then the application would not be declared in failure unless all the BFD sessions go down. Best Regards, Xiao Min From: AbhinavSrivastava <absrivas@gmail.com<mailto:absrivas@gmail.com>> To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>; Cc: rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org> <rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org>>; Date: 2023年03月23日 22:27 Subject: Re: [EXTERNAL] Re: Can a BFD session change its source port to facilitate auto recovery Agree that deletion and recreation (possibly automatically) by associated protocol is a good alternative, instead of inbuilt BFD recovery. Thanks Abhinav On Thu, 23 Mar, 2023, 3:08 am Alexander Vainshtein, <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>> wrote: Abhinav, Jeff and all, FWIW I concur with Jeff. In my experience, MH IP BFD sessions are typically used to monitor peering between iBGP neighbors, and when the MH IP BFD session goes down, BGP treats this as if its session has gone – and deletes the MH IP BFD session in question. I.e., fast recovery of such a session will not happen until BGP would not re-create it. Regards, Sasha From: Rtg-bfd <rtg-bfd-bounces@ietf.org<mailto:rtg-bfd-bounces@ietf.org>> On Behalf Of Jeff Tantsura Sent: Thursday, March 23, 2023 8:27 AM To: Abhinav Srivastava <absrivas@gmail.com<mailto:absrivas@gmail.com>> Cc: rtg-bfd@ietf.org<mailto:rtg-bfd@ietf.org> Subject: [EXTERNAL] Re: Can a BFD session change its source port to facilitate auto recovery Abhinav, Let’s clarify a couple of points. What you are trying to do is to change entropy to change local hashing outcome, however for hashing to even be relevant there has to he either ECMP or LAG in the path to the destination otherwise shortest path will be he used regardless, so statistically, some of the flows between a given pair of end points (5 tuple) will be traversing the (partially)broken link, would you really like BFD to “pretend“ that everything is just fine? Moreover, by far, in case of congestion - most applications won’t change their ports but have their TX rate reduced. There’s work done by Tom Herbert for IPv6/TCP (kernel patch upstreamed a few years ago) - had beeb presented in RTGWG pre-Covid, that on RTO changes flow label value (that some might or might not include in hashing), which is strongly not recommended to be used outside of a tightly controlled homogenous environment (think within DC). Outside of what BFD spec tells us (don’t), the above should provide enough motivation not to do this. Cheers, Jeff On Mar 23, 2023, at 05:44, Abhinav Srivastava <absrivas@gmail.com<mailto:absrivas@gmail.com>> wrote: Multi-hop BFD would be the mechanism that detects the failure on the path it happens to be using for the session. I wasn't thinking of another mechanism. Detection timer expiry would be the trigger for recovery which could be augmented with few other possible criteria like how long session hasn't been able to come back up or prolonged flapping. Thanks Abhinav On Wed, 22 Mar, 2023, 3:05 pm Greg Mirsky, <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote: Hi Abhinav, thank you for presenting an interesting scenario for a discussion. I have several questions to better understand it: • How the network failure that triggers the recovery process is detected? • If the failure detection mechanism is not multi-hop BFD, what is the relationship between the detection intervals of heat mechanism and the multi-hop BFD session? Regards, Greg On Wed, Mar 22, 2023 at 4:36 PM Abhinav Srivastava <absrivas@gmail.com<mailto:absrivas@gmail.com>> wrote: Hi all, I needed clarification around whether source port can be changed for a BFD session in case of multi hop BFD. The ability to change BFD source port when BFD session goes down helps BFD session to recover if its stuck on a network path where there is some intermittent but significant packet loss. In such cases, normally without BFD, end to end application traffic would eventually settle down on a good path as applications typically change source port after experiencing disconnection or failures. But if BFD is being used to monitor some part of a path which is experiencing significant but not 100% packet loss, it will start causing next hop list of associated static route or the associated BGP sessions to start flapping forever, as BFD packets would be stuck to that partial lossy path forever (until BFD session is deleted and recreated by admin action). This may also hinder the typical application recovery strategy of changing source port on failure. Ability to dynamically change BFD source port can help BFD recover in such cases. Is this something that is allowed as per RFC? The RFC5881, section 4 (for single hop) case states that – “The source port MUST be in the range 49152 through 65535. The same UDP source port number MUST be used for all BFD Control packets associated with a particular session” Thanks Abhinav Notice: This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments. Notice: This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments.
- Can a BFD session change its source port to facil… Abhinav Srivastava
- Re: Can a BFD session change its source port to f… Alan DeKok
- Re: Can a BFD session change its source port to f… Greg Mirsky
- Re: Can a BFD session change its source port to f… Abhinav Srivastava
- Re: Can a BFD session change its source port to f… Jeff Tantsura
- RE: [EXTERNAL] Re: Can a BFD session change its s… Alexander Vainshtein
- Re: Can a BFD session change its source port to f… Abhinav Srivastava
- Re: [EXTERNAL] Re: Can a BFD session change its s… Abhinav Srivastava
- Re: Can a BFD session change its source port to f… Reshad Rahman
- Re: Can a BFD session change its source port to f… Jeffrey Haas
- Re: Can a BFD session change its source port to f… Reshad Rahman
- Re: Can a BFD session change its source port to f… Reshad Rahman
- Re: Can a BFD session change its source port to f… Jeffrey Haas
- Re: Can a BFD session change its source port to f… Greg Mirsky
- Re: [EXTERNAL] Re: Can a BFD session change its s… xiao.min2
- Re: [EXTERNAL] Re: Can a BFD session change its s… Jeff Tantsura
- Re: [EXTERNAL] Re: Can a BFD session change its s… xiao.min2
- Re: [EXTERNAL] Can a BFD session change its sourc… Jeff Tantsura
- RE: [EXTERNAL] Can a BFD session change its sourc… Alexander Vainshtein
- Re: [EXTERNAL] Can a BFD session change its sourc… xiao.min2
- Re: [EXTERNAL] Can a BFD session change its sourc… xiao.min2