RE: Seeking opinions on draft-akiya-bfd-seamless-alert-discrim

"Nobo Akiya (nobo)" <nobo@cisco.com> Fri, 21 November 2014 01:59 UTC

Return-Path: <nobo@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3475F1A8A62 for <rtg-bfd@ietfa.amsl.com>; Thu, 20 Nov 2014 17:59:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -115.095
X-Spam-Level:
X-Spam-Status: No, score=-115.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.594, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Dk29LjWva0Y for <rtg-bfd@ietfa.amsl.com>; Thu, 20 Nov 2014 17:59:00 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B0401A8A56 for <rtg-bfd@ietf.org>; Thu, 20 Nov 2014 17:59:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5988; q=dns/txt; s=iport; t=1416535140; x=1417744740; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=LbkFC6MzJFoObeFT1xlcjpLjp6sObzy6QBHT4tBqjQQ=; b=gB+Q2fXKm+AoXQ8LZFFCSJCJn1NsNA+NNal6CxDZYnw1YFcmLWuQOrWq eU/Xg8zDHpt9JNPMhVL9LE4IhButjqYQ+sXJHPuXjoOkcTg3gJNofTblj j6FmWIOuCAltL2uN5HGsCfVoA+gsBxHUnQ+ClkodkNZXU0V+9i5p1q+Kd 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AikFAEmbblStJA2E/2dsb2JhbABagmsjgS4E0ykCgQkWAQEBAQF9hAIBAQEDAToxCQUFBwQCAQgRBAEBAQoUCQcyFAkDBQEBBA4FCIgwCQHUXAEBAQEBAQEBAQEBAQEBAQEBAQEBAReQVzEHBoMngR4FkC2CKo09g1WNaoQJg3ttgUiBAwEBAQ
X-IronPort-AV: E=Sophos;i="5.07,427,1413244800"; d="scan'208";a="374065205"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-6.cisco.com with ESMTP; 21 Nov 2014 01:58:59 +0000
Received: from xhc-aln-x14.cisco.com (xhc-aln-x14.cisco.com [173.36.12.88]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id sAL1wx9s011667 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 21 Nov 2014 01:58:59 GMT
Received: from xmb-aln-x01.cisco.com ([fe80::747b:83e1:9755:d453]) by xhc-aln-x14.cisco.com ([173.36.12.88]) with mapi id 14.03.0195.001; Thu, 20 Nov 2014 19:58:59 -0600
From: "Nobo Akiya (nobo)" <nobo@cisco.com>
To: Marc Binderberger <marc@sniff.de>
Subject: RE: Seeking opinions on draft-akiya-bfd-seamless-alert-discrim
Thread-Topic: Seeking opinions on draft-akiya-bfd-seamless-alert-discrim
Thread-Index: Ac//wAdQ8oS8wTAIRaCZduflS+eKRACnnpkAALMORiA=
Date: Fri, 21 Nov 2014 01:58:59 +0000
Message-ID: <CECE764681BE964CBE1DFF78F3CDD3943F599138@xmb-aln-x01.cisco.com>
References: <CECE764681BE964CBE1DFF78F3CDD3943F5279D0@xmb-aln-x01.cisco.com> <20141116220332392193.5ed69d25@sniff.de>
In-Reply-To: <20141116220332392193.5ed69d25@sniff.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.21.123.39]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/rtg-bfd/un3eG5z2CryYRpAPzBWYK3XOo8g
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Nov 2014 01:59:04 -0000

Hi Marc,

Thanks for providing your view.

Please see in-line.

> -----Original Message-----
> From: Marc Binderberger [mailto:marc@sniff.de]
> Sent: Monday, November 17, 2014 1:04 AM
> To: Nobo Akiya (nobo)
> Cc: rtg-bfd@ietf.org
> Subject: Re: Seeking opinions on draft-akiya-bfd-seamless-alert-discrim
> 
> Hello Nobo and BFD experts,
> 
> giving this document a closer look for the first time (ahem ;-) I have a
> slightly different view.
> 
> Having S-BFD use cases for the general S-BFD in an extra document does
> improve the overall discussion and documentation, simply because the
> base S-BFD is already complex enough, as are the use cases.
> 
> But for such a relatively small document splitting off the reason why the
> document exists is not improving the reading/understanding of this draft.
> Unless you decide to integrate the alert-discriminator document into the
> base document, then obviously you use the use-case document.

Your view is then:

Instead of:

(1) Move extended use-cases to draft-ietf-bfd-seamless-use-case and keep the alert discriminator mechanism in the draft-akiya-bfd-seamless-alert-discrim.

Do:

(2) Keep the extended use-cases and alert discriminator mechanism in the draft-akiya-bfd-seamless-alert-discrim.

Or

(3) Move the extended use-cases to draft-ietf-bfd-seamless-use-case and move the alert discriminator mechanism to draft-ietf-bfd-seamless-base.

My thought was that (1) makes sense, but your view that (1) makes all the S-BFD documents set more complex to understand is a valid concern (it's always good to get fresh eyes on documents!).

> 
> 
> For the integration of the technical aspect into the base document, I think
> this is an idea worth to discuss. At the end what you need is to add the rule
> for the zero discriminator to the reflector behaviour; we managed this for
> standard BFD, we should be able to do this for the reflector BFD as well :-)

Whether the S-BFD packets with alert discriminator are handled in HW or SW is an implementation choice. Similar to how IP router alert option & router alert label are handled, I do see handling of S-BFD packets with alert discriminator in the SW to be a reasonable approach, in which case the HW instruction for S-BFD packets with alert discriminator is to punt to SW for processing.

> For the diagnostic codes I'm not sure; it will complicate hardware
> implementations (probably not a no-go problem though) and seems
> otherwise not add a real value IMHO.

If one really wants to handle them in the HW, that's a possibility. Although as you stated, it does complicate HW implementations and this is another reason for SW based implementations.

> 
> So if there are already at this stage of S-BFD use case(s) for zero-
> discriminator to bring up (some) sessions then I would propose to consider
> the integration into the base document. This will also guarantee that the
> zero-discriminator handling is as fast as the "normal" reflection and is not
> on a slower exception path.

Personally, I tend to recommend that alert discriminators are handled in the SW. Let's assume that you agree on this (hypothetically). In that case, would you still recommend the alert discriminator mechanism to be moved to the draft-ietf-bfd-seamless-base or is it reasonable to keep it in the draft-akiya-bfd-seamless-alert-discrim?

> 
> 
> 
> I have a question: so far S-BFD packets would be received, not "picked out
> of the data stream". Receiving could be because the destination IP would
> match or would be 127/8, the TTL would be zero and so on. In the security
> section you say ...
> 
>    Conceptually the Alert Discriminator is similar to an IP Router Alert
>    Option or an MPLS Router Alert Label.
> 
> ... and I wonder if you expect a node to "pick" S-BFD traffic (to the
> reflector) with an alert-discriminator out of the data stream that otherwise
> would just pass this node?
> I guess you don't want but I want to make sure I understand it correctly.

Ah, great catch. Yes we do not want "intermediate nodes" to pick up S-BFD packets with alert discriminator. So the statement regarding "Conceptually the Alert Discriminator is similar to an IP Router Alert Option or an MPLS Router Alert Label" should be re-stated and clarified.

Thanks!

-Nobo

> 
> 
> Regards, Marc
> 
> 
> 
> 
> On Fri, 14 Nov 2014 04:04:08 +0000, Nobo Akiya (nobo) wrote:
> > [Speaking as an individual S-BFD contributor]
> >
> > Hi BFD WG,
> >
> > There were couple of questions I need your input on
> > draft-akiya-bfd-seamless-alert-discrim.
> >
> >
> > (1) Should the "extended" S-BFD use cases move to
> > draft-ietf-bfd-seamless-use-case?
> >
> > My opinion is yes. Once the "extended" S-BFD use cases have been
> > incorporated into draft-ietf-bfd-seamless-use-case, then we should try
> > to move draft-ietf-bfd-seamless-use-case forward.
> >
> > How does the WG feel about this?
> >
> >
> > (2) Should the alert discriminator proposal move to
> > draft-ietf-bfd-seamless-base?
> >
> > My opinion is no . Instead we should position this as an optional
> > feature of S-BFD (hence separate document than the base), especially
> > considering we likely need to think through additional security concerns
> raised by this.
> >
> > A question was raised by Greg on how does a node find out if the
> > target supports the optional alert discriminator or not. We can define
> > a mandatory diagnostic value that must be implemented when the alert
> > discriminator is implemented. One can send an S-BFD control packet
> > with the alert discriminator with this diagnostic value to check if
> > the target supports the alert discriminator mechanism.
> >
> > How does the WG feel about this?
> >
> >
> > Thanks!
> >
> > -Nobo
> >