Re: BFD stability follow-up from IETF-91

Manav Bhatia <manavbhatia@gmail.com> Thu, 27 November 2014 15:42 UTC

Return-Path: <manavbhatia@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A779D1A0056 for <rtg-bfd@ietfa.amsl.com>; Thu, 27 Nov 2014 07:42:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j-_2um2I1TCK for <rtg-bfd@ietfa.amsl.com>; Thu, 27 Nov 2014 07:42:01 -0800 (PST)
Received: from mail-oi0-x22c.google.com (mail-oi0-x22c.google.com [IPv6:2607:f8b0:4003:c06::22c]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0ABB71A004B for <rtg-bfd@ietf.org>; Thu, 27 Nov 2014 07:42:01 -0800 (PST)
Received: by mail-oi0-f44.google.com with SMTP id e131so3595717oig.3 for <rtg-bfd@ietf.org>; Thu, 27 Nov 2014 07:42:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=01E3hVxY/FOv58YwbAyaVQugUn9VWosHjAYjNybrq7M=; b=kZB8IS9FDyIVoJSM3yijfPVVyFj9Wj7UZuBMDm2DI9XlpcqLeBRuAvMwbjiH+5tjFV G9+VaU1L1vLJ1iMRbWYnaDOwqENfCYDJUYhQbsqBSNhyNR4axZF114/QyHATsrKgx0yz Rekmby1ryOav6VWS5FeCJqOAuKAUsGt+m8NVZtRwtCWqcAjq0LDC/dZ3b5C/XC//Yitm ivBusmxpycgzu2TLhLrNbeN+31Kh51x8wanfjEU5eKlhIghM/waeIDcnojvuf/hXoWPW N5nu8CtVW/MhEaoy8zaUdQSwb0xUcLYO8p5B6uhUb5YPF2octFbHXLXBLFhLMkb+Iq0/ WaoQ==
MIME-Version: 1.0
X-Received: by 10.182.109.129 with SMTP id hs1mr23194581obb.74.1417102920261; Thu, 27 Nov 2014 07:42:00 -0800 (PST)
Received: by 10.76.178.199 with HTTP; Thu, 27 Nov 2014 07:42:00 -0800 (PST)
In-Reply-To: <05bc7896aad04c0797eb2759c857f949@CO2PR0501MB823.namprd05.prod.outlook.com>
References: <20141126001931.GJ20330@pfrc> <CAG1kdoghcA=xSaXmkr68qduH2t8oC=-ZazoQztj8JK12SazKsw@mail.gmail.com> <20141126005023981392.0c488535@sniff.de> <F73A3CB31E8BE34FA1BBE3C8F0CB2AE28B2D9A97@SZXEMA510-MBX.china.huawei.com> <20141126094242449051.c8abfe39@sniff.de> <F73A3CB31E8BE34FA1BBE3C8F0CB2AE28B2DB0BD@SZXEMA510-MBX.china.huawei.com> <315041E4211CB84E86EF7C25A2AB583D3476B1C0@xmb-rcd-x15.cisco.com> <CAG1kdojcmMj38t3wj24zy=6vn4Pa04khuJT4tN5tJF56g0kDPA@mail.gmail.com> <05bc7896aad04c0797eb2759c857f949@CO2PR0501MB823.namprd05.prod.outlook.com>
Date: Thu, 27 Nov 2014 21:12:00 +0530
Message-ID: <CAG1kdoi6skeQTmn0zW9ML7hfseXgVRh3=6ifF2kD+R8UK8BS8A@mail.gmail.com>
Subject: Re: BFD stability follow-up from IETF-91
From: Manav Bhatia <manavbhatia@gmail.com>
To: Santosh P K <santoshpk@juniper.net>
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/rtg-bfd/srkTD0tvZETqu2o_Zk-s6Tf2abg
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Nov 2014 15:42:03 -0000

Hi Santosh,

You could use the crypto sequence numbers carried in the meticulous
cryptographic auth for detecting packet losses. However, this breaks
when you use non-meticulous crypto authentication since the sequence
number is only incremented occasionally there. This i believe is a
deal breaker since i really envision non meticulous mode to be the one
being widely deployed. In fact we were supposed to write a draft on
that and i guess it just fell through the cracks (lemme ping my
co-author on that !)

One way to solve this problem is by attaching a debug trailer that
only carries the seq numbers at the *end* of the BFD packet. This
would not be covered in the Length field carried in the BFD header but
would be accounted for in the length carried in the IP header. The
concept of attaching a trailer is documented well and is used in the
IGPs. RFC 6506 describes one such trailer for OSPFv3. The catch
however is that this debug trailer will NOT be covered by the BFD
authentication. Is this acceptable to the WG?

I think the problem of diagnosing a BFD flap becomes all the more
important with BFD authentication turned on since then we have more
points where a delay can be inserted.

Cheers, Manav


On Thu, Nov 27, 2014 at 8:32 PM, Santosh P K <santoshpk@juniper.net> wrote:
> Manav,
>     This is good question.
>
>> Can the authors add some text on how this debugging mechanism would
>> work if somebody employs BFD authentication?
>
> Right now we have considered without authentication (we are setting A bit). We should add some text on how we can use both Auth and de bug TLV. Is there any suggestion you have? I will get back to you on this.
>
>
> Thanks
> Santosh P K
>
>> > -----Original Message-----
>> > From: Rtg-bfd [mailto:rtg-bfd-bounces@ietf.org] On Behalf Of Mach Chen
>> > Sent: Thursday, November 27, 2014 2:13 PM
>> > To: Marc Binderberger
>> > Cc: rtg-bfd@ietf.org
>> > Subject: RE: BFD stability follow-up from IETF-91
>> >
>> > Hi Marc,
>> >
>> >> -----Original Message-----
>> >> From: Marc Binderberger [mailto:marc@sniff.de]
>> >> Sent: Thursday, November 27, 2014 1:43 AM
>> >> To: Mach Chen
>> >> Cc: Manav Bhatia; rtg-bfd@ietf.org
>> >> Subject: RE: BFD stability follow-up from IETF-91
>> >>
>> >> Hello Mach,
>> >>
>> >> > This triggers me think out there should be another solution for
>> >> > getting the Tx and Rx timestamps without encoding the timestamps in
>> >> > the BFD
>> >> packets.
>> >> > For example, the Tx and Rx systems could just save timestamps
>> >> > locally or send them to a centralized entity and then use the
>> >> > sequence numbers to correlate them for further analyzing.
>> >>
>> >> I remember some discussion on NVO3 about how many bits it takes ;-) -
>> >> could you send the links/draft names you are working on to this list?
>> >> May be useful for further discussions.
>> >
>> > Sure, here is the link(http://tools.ietf.org/html/draft-chen-ippm-coloring-
>> based-ipfpm-framework-02) for the reference.
>> >
>> > But here I want to say is that since we have sequence number, we may not
>> need the marking based solution. Suppose that someone want to monitor
>> the delay of a BFD packet , just record and save the timestamp at the Tx side,
>> which indexed by the sequence number. Similarly, do the same at the Rx
>> side. Then based on the timestamps from both Tx and Rx, and using the
>> sequence number to correlate the timestamps, it can also provide a way to
>> monitor the delay of the BFD packet.
>> >
>> > That means, only if there is sequence number, even if without carrying the
>> timestamp in the BFD packet, BFD packet delay can be measured.
>> >
>> > Best regards,
>> > Mach
>> >
>> >>
>> >>
>> >> Thanks & Regards,
>> >> Marc
>> >>
>> >>
>> >>
>> >> On Wed, 26 Nov 2014 09:17:32 +0000, Mach Chen wrote:
>> >> > Hi Marc and Manav,
>> >> >
>> >> >> -----Original Message-----
>> >> >> From: Rtg-bfd [mailto:rtg-bfd-bounces@ietf.org] On Behalf Of Marc
>> >> >> Binderberger
>> >> >> Sent: Wednesday, November 26, 2014 4:50 PM
>> >> >> To: Manav Bhatia
>> >> >> Cc: rtg-bfd@ietf.org
>> >> >> Subject: Re: BFD stability follow-up from IETF-91
>> >> >>
>> >> >> Hello Manav,
>> >> >>
>> >> >>> I believe the work is important and addresses something thats
>> >> >>> really required (spent too much time debugging why BFD flapped!).
>> >> >>
>> >> >> agree :-) we should keep the discussion alive.
>> >> >>
>> >> >>
>> >> >>> side Time stamping would have helped in debugging whether the
>> BFD
>> >> >>> packet was sent late, or whether the packet was sent on time and
>> >> >>> also arrived on time but was delayed when passing it up the BFD
>> >> >>> stack/processor (lay in the RX buffer for tad too long)
>> >> >>
>> >> >> well, I can see a point in having the Tx timestamps in the packet
>> >> >> mainly for the purpose of knowing "this" packet was okay/not okay
>> >> >> on the Tx side and to correlate it with your local Rx measurement.
>> >> >
>> >> > Yes, this is one solution if people think BFD delay is needed. If
>> >> > allow to have Tx timestamps to be carried in the packets, seems it
>> >> > should be no problem to leave a seat for the Rx timestamps as well
>> >> > :-). After all, with both Tx and Rx timestamp, it may simplify the
>> >> implementation.
>> >> >
>> >> >>
>> >> >> And even this point is less relevant with sequence numbers as this
>> >> >> number allows the identification of packets and thus the
>> >> >> correlation of information from the Tx and Rx system.
>> >> >
>> >> > Indeed, the sequence number helps a lot for the correlation between
>> >> > the Tx and Rx system.
>> >> >
>> >> > This triggers me think out there should be another solution for
>> >> > getting the Tx and Rx timestamps without encoding the timestamps in
>> >> > the BFD
>> >> packets.
>> >> > For example, the Tx and Rx systems could just save timestamps
>> >> > locally or send them to a centralized entity and then use the
>> >> > sequence numbers to correlate them for further analyzing.
>> >> >
>> >> > Best regards,
>> >> > Mach
>> >> >
>> >> >>
>> >> >>
>> >> >> Regards, Marc
>> >> >>
>> >> >>
>> >> >>
>> >> >>
>> >> >>
>> >> >>
>> >> >> On Wed, 26 Nov 2014 12:26:41 +0530, Manav Bhatia wrote:
>> >> >>> Hi Jeff,
>> >> >>>
>> >> >>> I vividly remember the original intent of the stability draft was
>> >> >>> to help debug BFD failures -- to isolate the issue at the RX or
>> >> >>> the TX side Time stamping would have helped in debugging whether
>> >> >>> the BFD packet was sent late, or whether the packet was sent on
>> >> >>> time and also arrived on time but was delayed when passing it up
>> >> >>> the BFD stack/processor (lay in the RX buffer for tad too long),
>> >> >>> etc. But then time stamping came with its own set of issues, and
>> >> >>> was hence dropped from the original draft.
>> >> >>>
>> >> >>> Can the authors send a summary on the list on why time stamping
>> >> >>> was dropped so that we're all clear on that one.
>> >> >>>
>> >> >>> The current proposal does help but is not complete.
>> >> >>>
>> >> >>> Assume that the RX end loses a BFD session and learns later that
>> >> >>> it did eventually receive the missing BFD packets (based on the seq
>> #).
>> >> >>> How would it know which end was misbehaving? Was it a delay at
>> >> >>> the TX side, or was it the RX that delayed passing the packets to
>> >> >>> the BFD process(or). This is usually what we want to debug and i
>> >> >>> want to understand how this draft with sequence numbers can
>> >> >>> unequivocally tell me that.
>> >> >>>
>> >> >>> I believe the work is important and addresses something thats
>> >> >>> really required (spent too much time debugging why BFD flapped!).
>> >> >>> Clearly what would help is putting a small section that describes
>> >> >>> how we can use the sequence numbers to debug what and where
>> things went wrong.
>> >> >>>
>> >> >>> Cheers, Manav
>> >> >>>
>> >> >>>
>> >> >>> On Wed, Nov 26, 2014 at 5:49 AM, Jeffrey Haas <jhaas@pfrc.org>
>> wrote:
>> >> >>>> draft-ashesh-bfd-stability-01 was presented again during IETF-91
>> >> >>>> in Honolulu.  The slides can be viewed here:
>> >> >>>>
>> >> >>>> http://www.ietf.org/proceedings/91/slides/slides-91-bfd-4.pptx
>> >> >>>>
>> >> >>>> To attempt to simplify the presentation, the contentious portion
>> >> >>>> of the timers were removed from the proposal, leaving only the
>> >> >>>> sequence numbering for detecting loss of BFD async packets.
>> >> >>>>
>> >> >>>> When the room was polled to see whether the draft should be
>> >> >>>> adopted as a WG item, the sense of the room was very quiet.  As
>> >> >>>> promised, this is to inquire for support for this draft on the
>> >> >>>> WG mailing list to make sure the whole group has a voice.
>> >> >>>>
>> >> >>>> It should be noted that post-meeting discussion on the fate of
>> >> >>>> this draft noted that BFD authentication code points are
>> >> >>>> plentiful and are available with expert review.  Should the
>> >> >>>> draft authors wish to continue this work as Experimental, that is an
>> option.
>> >> >>>>
>> >> >>>> -- Jeff
>> >> >>>>
>> >> >>>
>> >> >
>> >
>