Re: New Version Notification for draft-ietf-bfd-vxlan-11.txt

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Tue, 05 May 2020 02:53 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1225C3A137A; Mon, 4 May 2020 19:53:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.599
X-Spam-Level:
X-Spam-Status: No, score=-9.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=M2T8N9nJ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=oNlghnR7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M-cu26cssIin; Mon, 4 May 2020 19:52:57 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7AE823A1378; Mon, 4 May 2020 19:52:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28557; q=dns/txt; s=iport; t=1588647133; x=1589856733; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=VAcuROEFLr+RtN8hEi6z4+SYXLujbQtCuqsJ5tHHp88=; b=M2T8N9nJBNKMJDaUfhAj04a9UF+MWOI+1qp2mWOyiLzzOczlw6B8EaSY IQ05FdwIlaHVStv+qNB/xbU5yZUiQk9u8LsVMzYzshYOvxDvIyuVtlFzL 4Gm0cTOrQL/jgOxeGAngGBi+wV/OAjzX0SwQg9ZO30/VQecaVaaR+KcqC A=;
IronPort-PHdr: 9a23:LPqXcxIaKHxctF0iGNmcpTVXNCE6p7X5OBIU4ZM7irVIN76u5InmIFeGvK8/jVLVU8Pc8f0Xw+bVsqW1X2sG7N7BtX0Za5VDWlcDjtlehA0vBsOJSCiZZP7nZiA3BoJOAVli+XzoMEVJFoD5fVKB6nG35CQZTxP4Mwc9L+/pG4nU2sKw0e36+5DabwhSwjSnZrYnJxStpgKXvc4T0oY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AqAAB11LBe/4ENJK1mGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBgXYCAQEBAQsBgVMkLQVuWC8qCoQZg0YDjUeBAYh4jjyBQoEQA1QLAQEBDAEBIwoCBAEBhEQCF4IdJDcGDgIDAQELAQEFAQEBAgEFBG2FVgyFcQEBAQEDEhEdAQE1AgEPAgEGAhEDAQIrAgICHxEdCAIEDgUigwQBgX5NAy4BDpcukGcCgTmIYXaBMoMAAQEFgTYCDkFCgn0NC4IOCYE4AYJiiWEagUE/gREnHIIYNT6CHkkBAQIBARiBDxJIHoJUM4ItjkIigmWGGiSKSI88SgqCSIgYhS2DEoJ1hEodgluBDIdVkWSRb4d8gkaRAgIEAgQFAg4BAQWBaCOBVnAVGiEqAYI+CUcYDZBCDBeDT4UUhUJ0AjUCBgEHAQEDCXyPBgEmB4EGAYEPAQE
X-IronPort-AV: E=Sophos;i="5.73,354,1583193600"; d="scan'208,217";a="483393492"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 05 May 2020 02:52:03 +0000
Received: from XCH-RCD-004.cisco.com (xch-rcd-004.cisco.com [173.37.102.14]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 0452q35w025903 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 5 May 2020 02:52:03 GMT
Received: from xhs-aln-003.cisco.com (173.37.135.120) by XCH-RCD-004.cisco.com (173.37.102.14) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 4 May 2020 21:52:03 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 4 May 2020 21:52:02 -0500
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Mon, 4 May 2020 21:52:02 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LFvipT4jO5us0vyWR960vqp6FN4S9VRXGyJ1KvQZrZ3kDjXvfFnKyGYP0spH6qxJljhnqny7ITm94WLedy8kX9vPbDgETJYkbtbNkXIY2Ki7iD+Qfcw2/9T4TWwHO8yXSTMdDQRFjmdIW2zF+K5uChiq1nzXh9fPb+iEhlOfkHo5L4cazozYFT0OdkuUzKUwTYRLO8yJ9uMkvdOw+Bas9tGRsbsMmK+FgYn7dO1modWWcRWiUHFu3On8epS2Rge//W7DUa2MBTvXqEBe3ntRWaTknVUJUerbfLzQPvSiuUbA7V8k7cqvEeRHYJ54FrgD5HBHTO5EqLJYSDadi0j4Sw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VAcuROEFLr+RtN8hEi6z4+SYXLujbQtCuqsJ5tHHp88=; b=OEGpDpAxOaySJ/64MwCGVjl14V45gjIV7hyHwdFRuEQDu6kzVjYIkhFmOo3XTZ9PwN4vK70f205PQjW1GXOI+j1nPke41oxfYWZ9xxECG38XeT74trNwYj9k1s5RfCmhdzJoJoxieGAwBsWTSqZTGJggOOxM8FNDBkOvyQE/pwdctTR9Jx7K31a3r40cYqF+TvmHh8K2vO3ZBqdOuE6jh4ZmfUzlr4NsrKMU47Fr/ZVHHuLKYofROz1Uli8EanUeTd0UdjohxZquaohVW2uEWxTnjWm/4x1QP18wUH9rFIWnHmNwgzVsikbdhaFJHyg4tVXx2hzKJlnA9eU+asQdnw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VAcuROEFLr+RtN8hEi6z4+SYXLujbQtCuqsJ5tHHp88=; b=oNlghnR7moeIUUMgIL/fLshRFTJTI5+XZRx/C74O+M0CAFy+QDOJ8raiNwTJqPPtj7gbUclsAeH9g1y0Yd+HuNvnJacAWXLIJQm2g3DIrgMJalw2akuyxwJOQmiZRQCCTOnwCrqp9V9yqD+ewCgbUVTVUG/pANRjb3xMw9n/rrc=
Received: from BN8PR11MB3635.namprd11.prod.outlook.com (2603:10b6:408:86::20) by BN8PR11MB3778.namprd11.prod.outlook.com (2603:10b6:408:87::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2958.20; Tue, 5 May 2020 02:51:59 +0000
Received: from BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::9981:86d4:ca20:ff96]) by BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::9981:86d4:ca20:ff96%7]) with mapi id 15.20.2958.029; Tue, 5 May 2020 02:51:59 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: rtg-bfd WG <rtg-bfd@ietf.org>, "bfd-chairs@ietf.org" <bfd-chairs@ietf.org>
Subject: Re: New Version Notification for draft-ietf-bfd-vxlan-11.txt
Thread-Topic: New Version Notification for draft-ietf-bfd-vxlan-11.txt
Thread-Index: AQHWImeYzdFcka0XZUWIye+P4kIMEKiYqU+AgAAXzwCAAApdkQ==
Date: Tue, 05 May 2020 02:51:59 +0000
Message-ID: <2BB0F1AC-3F6F-45CA-BF7E-93335D7C5106@cisco.com>
References: <158863263846.21115.1621770081697874195@ietfa.amsl.com> <CA+RyBmWxv7E+LRejhnbW0CjRYb6VGpdEm5Hq92UYrKoz6qGaBA@mail.gmail.com> <039E96B8-40E5-46B4-A519-434C2AEEAE47@cisco.com>, <CA+RyBmXcRE1JmOSPcSq6ZFvpuaifssZOSqOPOvEppP7eW6QwXw@mail.gmail.com>
In-Reply-To: <CA+RyBmXcRE1JmOSPcSq6ZFvpuaifssZOSqOPOvEppP7eW6QwXw@mail.gmail.com>
Accept-Language: en-US
Content-Language: ja-JP
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [108.203.7.63]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f485d73b-9478-4c00-d022-08d7f09f47ec
x-ms-traffictypediagnostic: BN8PR11MB3778:
x-microsoft-antispam-prvs: <BN8PR11MB3778C0904141466299EAF4B7C7A70@BN8PR11MB3778.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0394259C80
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN8PR11MB3635.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(366004)(39860400002)(346002)(376002)(396003)(136003)(33430700001)(966005)(316002)(53546011)(6506007)(6916009)(33440700001)(4326008)(478600001)(2616005)(5660300002)(26005)(36756003)(8936002)(186003)(66574012)(2906002)(71200400001)(76116006)(91956017)(6512007)(8676002)(66446008)(15650500001)(64756008)(66556008)(54906003)(66946007)(6486002)(33656002)(66476007)(86362001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_2BB0F1AC3F6F45CABF7E93335D7C5106ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f485d73b-9478-4c00-d022-08d7f09f47ec
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 May 2020 02:51:59.2243 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gwacBfWrSKdTCj+rg2U2CXvG8LsUMClTCEECZ8eVlol+4PHd38hCza+XJUu3/4o9ZULPuMUMAbWhubfYXNpgAg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3778
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.14, xch-rcd-004.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/wMn35oY-Ho4uvq83p16wR2a_b7o>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 May 2020 02:53:00 -0000

Dear Greg,

As I said, I did not review the updated version (or the changes) thoroughly (or superficially for that matter)

Please do not count this as a review of the new revision, and instead consider the context that I laid for my reply.

I only checked the changes for one comment I had made.

Please see inline.

Thumb typed by Carlos Pignataro.
Excuze typofraphicak errows

2020/05/04 午後10:15、Greg Mirsky <gregimirsky@gmail.com>のメール:

Dear Carlos,
thank you for your thorough review of the updated version,

I didn’t. This is what I had said:
I have not checked the diff and the new text regarding the Eth MAC and mgmt VNI.
Assuming that was clear...

helpful and
constructive suggestions.

Thanks. That was the intent, but only for the TTL/HL change.

Please find my answers in-line tagged GIM>>.

Regards,
Greg

On Mon, May 4, 2020 at 5:49 PM Carlos Pignataro (cpignata)
<cpignata@cisco.com> wrote:

Dear Greg,

I have not checked the diff and the new text regarding the Eth MAC and mgmt VNI.

However, these diffs also include a change that you did not mention: TTL / Hop Limit handling, which is one of the comments I had made.

In that context, thank you very much! since this update partially (although largely) addresses my comment.

Still missing:

        TTL or Hop Limit: MUST be set to 255 in accordance with the
        Generalized TTL Security Mechanism [RFC5881].

CMP: this is an incorrect citation. The GTSM is RFC 5082, not RFC 5881. I recommend adding a Reference to RFC 5082 (as I’d suggested before).
GIM>> Agreed, will change the reference to RFC 5082

Thanks.


  Validation of TTL or Hop Limit of the inner IP packet is performed as
  described in Section 5 [RFC5881].

CMP: This is an oversimplification. S5 of RFC 5881 explains not only how to validate TTL/HL, but also about demultiplexing tulles in presence of auth and various header fields.
GIM>> I've compared Section 3 of RFC 5082 and Section 5 of RFC 5881
and still believe that for this document the reference to Section 5 of
RFC 5881 is more helpful to a reader and an implementor.

Yes, I agree with this. I did not say “change this reference to 5082” — that was the previous comment on a different passage.

Section 5
provides an explicit specification on handling TTL/HC != 255 by a
receiving BFD system. I think that it is important to reference
Section 5, as the handling of TTL/HC != 255 is different depending on
whether the BFD session is in unauthenticated or authenticated mode.
Would you agree?

Yes, but that’s orthogonal to my comment.

My point is that the relevant text from section 5 does more than simply “ Validation of TTL or Hop Limit ”


9.  Security Considerations

CMP: A discussion on the positive impact of using GTSM would help here.
GIM>> The Security Consideration section in RFC 5881 provides the
excellent text on the benefit of using GTSM in both, unauthenticated
and authenticated, modes. the last para in the Security Consideration
section of this document mentioned the discussion in several RFCs,
including in RFC 5881. Do you think that an additional text about the
use of GTSM in single-hop BFD should be added in this document?

Yes, that’s why I made the comment!

Currently the security considerations does not say “security considerations of 5881 apply here”, nor does it say “the ttl/hl protection isn’t useful in foobar “

I think it should say both.

Could
you suggest some text?

11.  Acknowledgments

CMP: Both professional courtesy as well as proper record and provenance tracking suggest keeping an updated Acknowledgements section.
GIM>> My apologies, I've updated the working version accordingly.

To be clear, I’m not talking about me but about others who invested more time helping with this doc, like Joel and others. It would be useful to go through the list archive (to also ensure all comments are captured, since they were made SO long ago)

Best,

Carlos.


Best,

—
Carlos Pignataro, carlos@cisco.com

“Sometimes I use big words that I do not fully understand, to make myself sound more photosynthesis."

2020/05/04 午後6:58、Greg Mirsky <gregimirsky@gmail.com>のメール:

Dear All,
my apologies for holding off this upload. The update is to address a
set of comments related to the use of destination Ethernet MAC in the
inner Ethernet frame that encapsulates a BFD control message. A new
section on the use of the Management VNI has been added and the
document now considers only the case of using the Management VNI to
transmitted receive BFD control messages.
Always welcome your questions and comments.

Regards,
Greg

---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Mon, May 4, 2020 at 3:50 PM
Subject: New Version Notification for draft-ietf-bfd-vxlan-11.txt
To: Mallik Mudigonda <mmudigon@cisco.com>, Sudarsan Paragiri
<sudarsan.225@gmail.com>, Greg Mirsky <gregimirsky@gmail.com>, Santosh
Pallagatti <santosh.pallagatti@gmail.com>, Vengada Prasad Govindan
<venggovi@cisco.com>



A new version of I-D, draft-ietf-bfd-vxlan-11.txt
has been successfully submitted by Greg Mirsky and posted to the
IETF repository.

Name:           draft-ietf-bfd-vxlan
Revision:       11
Title:          BFD for VXLAN
Document date:  2020-05-04
Group:          bfd
Pages:          11
URL:            https://www.ietf.org/internet-drafts/draft-ietf-bfd-vxlan-11.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-bfd-vxlan/
Htmlized:       https://tools.ietf.org/html/draft-ietf-bfd-vxlan-11
Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-bfd-vxlan
Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-bfd-vxlan-11

Abstract:
 This document describes the use of the Bidirectional Forwarding
 Detection (BFD) protocol in point-to-point Virtual eXtensible Local
 Area Network (VXLAN) tunnels used to form an overlay network.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat