Re: [RTG-DIR] Rtgdir last call review of draft-ietf-bfd-vxlan-07

Greg Mirsky <> Wed, 05 June 2019 21:21 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id A866F12004C; Wed, 5 Jun 2019 14:21:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id d1utVarKOTIz; Wed, 5 Jun 2019 14:21:17 -0700 (PDT)
Received: from ( [IPv6:2a00:1450:4864:20::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id B75CE120159; Wed, 5 Jun 2019 14:21:11 -0700 (PDT)
Received: by with SMTP id v18so3359699ljh.6; Wed, 05 Jun 2019 14:21:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GDFhfx2GqmeQsn9DWlq0Y7KHs3tfmJPIfcJHJ1d3APc=; b=KsmIDSFyhhkFQ8cBIUSDi5zCjdTkG12EBUwHeA+TGXHN+7SzBch6jQNuqER9bvDxd6 5GwwLxM3Ac35+ifk+jHhRj6vIdrtBJDn4Ly5sx4Je2Pqw6aUlpiiW5VNjxMgNK26BCxi aurwOQmU9/7qJFVYEzsniZjtK+XdixLeOYsGB8i6amG2teK+lZOa5HFBx9cP60Qb3WXz 8T8tKM8bIh3Yp/PGFuMogsnMKkvdmI88t3/x5XO5cbqMPUdXqSWBj0IfRjZSsvklnfGe AZdfKsQ+kG5M9d09VMuVTZviEPfrP4nIaZlVd5gX5XSECbNZ7ZVtyj7OQpVbgoyjzE6b S5Fg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GDFhfx2GqmeQsn9DWlq0Y7KHs3tfmJPIfcJHJ1d3APc=; b=GZgvhF40h8+Ep3U1U0PhOvyyx6d5V1gpvEYOpEIh9m/5nFSuI6SymyLKWwGFlEXcEh MOLNG7S9o6JaMdxT8C30bPghFXqLgFWF47mP5T20QAL82hQc0lDvidAgdb2KWLdXVLmg QVsVDIk6k1j0nSAXMiX8XK400LfZozRxK7zHkYPgvwk679Y0dzBQW9GqyvZFudTRHl4g YvFqCZ8MBgXSDRPwGIWjzdUydBYCro+KMbMjlB67lMEax7Loc8B7hn4XOQy681IuvvNb 1bhV8N8cpXXhouTldho04S6wHUkahYA++iND4wkrgWCoe9eqTfbR0ksKIdtJiSvlRJsZ VolA==
X-Gm-Message-State: APjAAAXsNjbgrSv3//prg8iq0rDhn04r4ziaBgTrqBOZB8+54kulE8m4 3NGRu9JU6+cpgpCONt7VtmOduCxp0tUJQJQ/AtA4Y1Xu7DD1uw==
X-Google-Smtp-Source: APXvYqzfIfWbrg1Y2BFt5jBjuFJ0x46qfyWi27WN1v7esEF2uHcWhRySirUDvb0IH8C3mi6TwbdLcvkOLHMASsK7v1c=
X-Received: by 2002:a2e:56dd:: with SMTP id k90mr9773800lje.204.1559769669918; Wed, 05 Jun 2019 14:21:09 -0700 (PDT)
MIME-Version: 1.0
References: <>
In-Reply-To: <>
From: Greg Mirsky <>
Date: Wed, 05 Jun 2019 14:20:57 -0700
Message-ID: <>
To: Joel Halpern <>
Cc:, rtg-bfd WG <>,, IETF list <>
Content-Type: multipart/alternative; boundary="0000000000001b6635058a9a2d4d"
Archived-At: <>
Subject: Re: [RTG-DIR] Rtgdir last call review of draft-ietf-bfd-vxlan-07
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 05 Jun 2019 21:21:20 -0000

Hi Joel,
thank you for your review and the pointed questions. Please find my
answers, comments in-line and tagged GIM>>.


On Thu, May 23, 2019 at 3:06 PM Joel Halpern via Datatracker <> wrote:

> Reviewer: Joel Halpern
> Review result: Has Issues
> Hello,
> I have been selected as the Routing Directorate reviewer for this draft.
> The
> Routing Directorate seeks to review all routing or routing-related drafts
> as
> they pass through IETF last call and IESG review, and sometimes on special
> request. The purpose of the review is to provide assistance to the Routing
> ADs.
> For more information about the Routing Directorate, please see
> Although these comments are primarily for the use of the Routing ADs, it
> would
> be helpful if you could consider them along with any other IETF Last Call
> comments that you receive, and strive to resolve them through discussion
> or by
> updating the draft.
> Document: ddraft-ietf-bfd-vxlan-07
> Reviewer: your-name
> Review Date: date
> IETF LC End Date: date-if-known
> Intended Status: copy-from-I-D
> Summary: This document does not appear to be ready for publication as a
> Proposed Standard RFC.
> Major issues:
>     The scoping of the BFD usage is unclear.  In places, this looks like
> it is
>     intended to be used by the underlay service provider,  who will
> monitor the
>     connectivity between VTEPs.

GIM>> I think that the DCI provider would not be able to instantiate a BFD
session using VXLAN encapsulation and, possibly, monitor that VXLAN part of
forwarding operates properly. Such BFD session may monitor the path between
the two VTEP but, if there exists ECMP environment in the transport,
ensuring that that BFD session follows the same path as VXLAN data may be

> In other places it seems to be aimed at
>     monitoring individual VNIs.

GIM>> The BFD session between VTEPs is not actually used to monitor the
particular VNI but MAY be used to communicate, as concatenated path state
signaling, the change of VNI state using the method described in Section
6.8.17 RFC 5880 <>.

> This is made worse when the packet format is
>     laid out.  The inner packet is an Ethernet Packet with an IP packet
> (with
>     UDP, with BFD).  This means that it is a tenant packet.

GIM>> Could you please point to the text which suggests that the BFD
control packet is a tenant packet? Meant to be delivered to a tenant?

> The IP address is
>     a tenant IP.

GIM>> The explanation of the format states in regard to the inner IP header:
       IP header:

         Source IP: IP address of the originating VTEP.

         Destination IP: IP address of the terminating VTEP.

But the diagram shows this as being the IP address of the
>     VTEP.  Which is not a tenant entity.

>    There is further confusion as to whether the processing is driven by
> the VNI
>    the packet arrived with, or the VNI is ignored.
GIM>> The use of VNI is implementation specific. Section 6 states:
 6.  Use of the Specific VNI

   In most cases, a single BFD session is sufficient for the given VTEP
   to monitor the reachability of a remote VTEP, regardless of the
   number of VNIs in common.  When the single BFD session is used to
   monitor the reachability of the remote VTEP, an implementation SHOULD
   choose any of the VNIs but MAY choose VNI = 0.
> Minor Issues:
>    N/A
> Nits: N/A