[RTG-DIR] RTG-DIR Telechat review of draft-ietf-bess-dci-evpn-overlay

Alexander Vainshtein <Alexander.Vainshtein@ecitele.com> Wed, 14 February 2018 09:02 UTC

Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA837126CD6; Wed, 14 Feb 2018 01:02:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.29
X-Spam-Level:
X-Spam-Status: No, score=-1.29 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, URI_NOVOWEL=0.5, WEIRD_PORT=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=eci365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q5Vj6rx3RD8K; Wed, 14 Feb 2018 01:02:44 -0800 (PST)
Received: from mail1.bemta5.messagelabs.com (mail1.bemta5.messagelabs.com [195.245.231.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 340E7126CC4; Wed, 14 Feb 2018 01:02:43 -0800 (PST)
Received: from [85.158.136.83] (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256 bits)) by server-6.bemta-5.messagelabs.com id 44/71-03876-13BF38A5; Wed, 14 Feb 2018 09:02:41 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA1WSa0gUURTHuzOzu5M4Ma6ap00rtwdquSk+2Ag rsqg+BH2wPthz1iZ3aHdWZtbaCMraWszeVKDr1mqpSNnLzHxElkQ+KgJTiCjLNHwkRAWl2Wtm r73mw+V3z/mfc/9zODSp79IaaN7l5CWRsxm1QVTy1BpXfMKYOzPhc/10c2VLEWn2ejeb23wjp Lmk6q1uCbWyrGyUWIMyNYJocbi2aKy9B+fnNBYSrobXfioPvThNFKAgmmI9JNR3ftGpFz17io Bad7OmAE1ULq8RHKvbqLKWTYPqSy+1KoexsXD8yHNKLSDZKwiKfd2BRCi7DI70D1NYtArO3Gs nMJvA3fM+oKHY2eBvuk+qzLAbYPjmZZ3KiJ0MX9qrAnqSjYDnff4AA8tC2e0nJOZwGOz9ocF6 C7x6W4pwPBoKu306zFHQ4T+MVHPA3iCgsvXCeHESFJy4rRTTCs+EmoGNOLwavnu8JNZ3IhhtL UZYEwuv+kWMApyvTMeSAgS1j2rH+/tJGMy/Mv5wJPyoKqcwn9NC0zcbnmIWtPo+jcd3Q15FEc LDMsDLzkPoBIrz/vPPmEXY73ms9QZmFAJtRX2UV/FBKpauNszHkmg4fbhHhzkGDvrO6v6NlyD dRRQj89IOXopPTDFZJCHb6rRzgi0+MSHFZOdlmcvmbZxFNmU57NVIWagJyleH8m6takZTaMIY zpA/92fqJ1kcW3dZOdm6Wcq18XIziqRpIzCFX92Z+hCJz+Zd2wSbspW/00AHG8OYpWqakXM4u yxk41Q7WkzXvBn0kPTdwPls4J1y1lQMe0g9JTpE3hDBXFPLWLXMmiv+afp72ztQlCGUQYpNfX AOL9kF5//5IRRBI2Moc0ftEiyIzj9vDym2CMVW/Nx9qi0n9zdlyENzB/Ob/A9GyuW6FeadY/O 07o49bOn2/ktH0xY1tunNNJE/rb5njE1I7y1OteSXa2auYw50xWSslRZsOtpYfSa6+2x1WpTj YdCMn8sHkio/zmn4YL34PWNWshz5VGpZ3zcSNi2FiE3feypkkubqlNQF1FAXmRS58PpJ8WHds EnwuI2UbOUS40hJ5n4BX+GhnegDAAA=
X-Env-Sender: Alexander.Vainshtein@ecitele.com
X-Msg-Ref: server-2.tower-36.messagelabs.com!1518598957!119839654!1
X-Originating-IP: [52.27.180.120]
X-StarScan-Received:
X-StarScan-Version: 9.4.45; banners=ecitele.com,-,-
X-VirusChecked: Checked
Received: (qmail 4335 invoked from network); 14 Feb 2018 09:02:39 -0000
Received: from us-west-2c.mta.dlp.protect.symantec.com (HELO EUR02-VE1-obe.outbound.protection.outlook.com) (52.27.180.120) by server-2.tower-36.messagelabs.com with AES256-SHA256 encrypted SMTP; 14 Feb 2018 09:02:39 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ECI365.onmicrosoft.com; s=selector1-ecitele-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=dAOUceg+gJktUPXHxrz34St/NESmma41BXs3Z2yCtVM=; b=clg5SVJnnc8n2JE6wch50737Slcfd/EECCucKm07kQGdOkvcJzfCml3jCbr70czOMa5krJBGuL8Qels27e6v5If+xN7gF9ucPrZJEwzdYnc1BXGU/yNIWXFccEleGZR4lMmBOHl13aP5aaqy0jWv/PaKiEx1aCqJWaGt1tYgX0s=
Received: from DB3PR03MB0969.eurprd03.prod.outlook.com (10.161.58.145) by DB3PR03MB235.eurprd03.prod.outlook.com (10.242.131.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.485.10; Wed, 14 Feb 2018 09:02:35 +0000
Received: from DB3PR03MB0969.eurprd03.prod.outlook.com ([fe80::58cc:f3b5:6467:14d8]) by DB3PR03MB0969.eurprd03.prod.outlook.com ([fe80::58cc:f3b5:6467:14d8%13]) with mapi id 15.20.0485.017; Wed, 14 Feb 2018 09:02:35 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: "rtg-ads@ietf.org" <rtg-ads@ietf.org>
CC: "rtg-dir@ietf.org" <rtg-dir@ietf.org>, "draft-ietf-bess-dci-evpn-overlay.all@ietf.org" <draft-ietf-bess-dci-evpn-overlay.all@ietf.org>, "bess@ietf.org" <bess@ietf.org>
Thread-Topic: RTG-DIR Telechat review of draft-ietf-bess-dci-evpn-overlay
Thread-Index: AdOkuGiEML+eLKrlQ5Ol4wTRIHoKtg==
Date: Wed, 14 Feb 2018 09:02:35 +0000
Message-ID: <DB3PR03MB096972D1DF55006E50BECCA39DF50@DB3PR03MB0969.eurprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.234.241.1]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DB3PR03MB235; 7:3rCNiE2FCqggXesPGhROJZHZGx4eVq+UVcRlgqBDDzLpD6dHMGp6jXSYTZvYdXMQt8orHbDCmkCiXsPCElAE0UM3QEroi2AHgEq+i8CmhS66cUGPM32erhPJdL8L1q//4w4c0/8dEi3y01Ky9fYIvz47xQvX5wV5xE6j0BoG7HjlmXZhni9P06XC589aJcvNiWfIALcr26n2m17P9svE0svn66HI545iKt0zVUmcXa6hCMsucba3zwB4i4GyMKaU
x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 30c653c5-9ce7-4951-23e1-08d57389b0b3
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(3008032)(2017052603307)(7153060)(7193020); SRVR:DB3PR03MB235;
x-ms-traffictypediagnostic: DB3PR03MB235:
x-microsoft-antispam-prvs: <DB3PR03MB2351201E9D71D936CFD2E409DF50@DB3PR03MB235.eurprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(192374486261705)(788757137089)(21748063052155)(279101305709854)(21532816269658);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3231101)(2400082)(944501161)(3002001)(6055026)(6041288)(20161123564045)(20161123558120)(20161123562045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:DB3PR03MB235; BCL:0; PCL:0; RULEID:; SRVR:DB3PR03MB235;
x-forefront-prvs: 0583A86C08
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39380400002)(366004)(39860400002)(396003)(346002)(376002)(31014005)(199004)(189003)(252514010)(7696005)(2501003)(102836004)(6506007)(59450400001)(26005)(66066001)(68736007)(74316002)(81166006)(7736002)(5660300001)(81156014)(6916009)(33656002)(8936002)(5890100001)(2900100001)(2351001)(8676002)(9326002)(105586002)(97736004)(99286004)(6436002)(2906002)(478600001)(186003)(53936002)(9686003)(5640700003)(236005)(5250100002)(6306002)(55016002)(3846002)(790700001)(6116002)(54896002)(3660700001)(72206003)(14454004)(316002)(450100002)(86362001)(25786009)(606006)(106356001)(54906003)(5630700001)(4326008)(3280700002); DIR:OUT; SFP:1102; SCL:1; SRVR:DB3PR03MB235; H:DB3PR03MB0969.eurprd03.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: ecitele.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: iaIZtdHN2mEnF15WRKQP8FftPeuZJnT8/JtTRUs9PRF71m6Bs9TYU8LsLpV6qbPRT0BAe1PG9kZpgfRV+nOdBA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DB3PR03MB096972D1DF55006E50BECCA39DF50DB3PR03MB0969eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 30c653c5-9ce7-4951-23e1-08d57389b0b3
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2018 09:02:35.3943 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2c514a61-08de-4519-b4c0-921fef62c42a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR03MB235
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-dir/a5KxnhKgz0TLwZRy6EsibQsRSqs>
Subject: [RTG-DIR] RTG-DIR Telechat review of draft-ietf-bess-dci-evpn-overlay
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Feb 2018 09:02:48 -0000

Hello,

I have been selected as the Routing Directorate reviewer for this draft. The Routing Directorate seeks to review all routing or routing-related drafts as they pass through IETF last call and IESG review, and sometimes on special request. The purpose of the review is to provide assistance to the Routing ADs. For more information about the Routing Directorate, please see ​http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir

Although these comments are primarily for the use of the Routing ADs, it would be helpful if you could consider them along with any other IETF Last Call comments that you receive, and strive to resolve them through discussion or by updating the draft.
Document: draft-ietf-bess-dci-evpn-overlay-08
Reviewer: Alexander (“Sasha”) Vainshtein
Review Date: 14-Feb-18
IETF LC End Date: 09-Feb-18
Intended Status: Standards Track

Summary:

I have some minor concerns about this document that I think should be resolved before publication.

Comments:
The document is well written, but understanding of both the EVPN technology (RFC 7432) and network virtualization basics are mandatory prerequisites for the readers. My personal expertise in both these areas is limited, and this may affect the quality of the review.

From my POV this draft complements the EVPN Overlay<https://tools.ietf.org/html/draft-ietf-bess-evpn-overlay-11> draft (already approved by the IESG for publication as an RFC): it  discusses interaction between the EVPN Overlay within the DC with some options that implement L2 connectivity in the WAN that provides the infrastructure for the DC interconnect.

I have identified two groups of specifications in the draft:

-          Specifications in the first group explain how the mechanisms already defined in other specifications (mainly in RFCF 7432) should be used to provide DCI Interconnect that uses EVPN as the overlay within the DC. One example can be found in Section 3.5.2 that recommends usage of ARP/ND Proxy cache in the DC Gateways to prevent flooding of ARP/ND messages within the DC, many other examples can be added

-          Specifications in the second group define new behavior. One example is the proposed (in Section 3.5.1) usage of the Unknown MAC Route (UMR) to prevent overwhelming the NVEs with the need to learn zillions of MAC addresses in the remote DCs.


As part of preparation of this review I have discussed my comments with the authors who have been most responsive and cooperative -  so much so that they have addressed some of my earlier comments in the latest (-08) version of the draft. As a consequence, I had to remove the already addressed comments from the final version of my review, and to ask the authors not to post a new version before posting of the review.  I would like to express my gratitude to the authors and, especially, to Jorge for excellent cooperation.

Major Issues: None found.

Minor Issues:

1.       From my POV this draft should be marked as updating RFC 7432 in its metadata. The update should refer to several aspects including at least the following:

a.       Use of Ethernet PWs (see Figure 1 in the draft) as an Ethernet Segment. RFC 7432 defines Ethernet Segment as a set of Ethernet links that connect a customer sit to one or more PEs.

b.       Use of the Unknown MAC Route (UMR). RFC 7432 only says that a PE may flood unicast frames with unknown destination MAC to all other PEs but does not have to do that, with the decision being a matter of local policy;  it neither defines any mechanisms that advertise a specific PE and a specific Ethernet Segment attached to this PE as the “default next Hop” for all unknown destination MAC addresses, nor prevents usage of such mechanisms.

2.       Definitions of VLAN-based and VLAN bundle-based Ethernet Segments in RFC 7432 do not cover the case of PW hand-off between the WAN and DC GW in the Decoupled model. While this looks like a straightforward extension, it should be clarified in the draft IMO.

3.       The UMR and its encoding (defined in Section 3.5 of this draft) already have been defined in RFC 7543<https://ilptlppjir01:8443/secure/Dashboard.jspa>. I suggest to remove the UMR definition from the text and to replace it with a Normative reference to RFC 7543. At the same time RFC 7543 and this draft seem to use the UMR differently, and these differences should also be clarified in the draft.

4.       The draft presents two DC Interconnect models (shown in Figure 1 and Figure 2 respectively): Decoupled Interconnect and Integrated Interconnect. These diagrams create an impression that the same model must be used in all the interconnected DCs – but this impression is wrong. Actually (clarified that with the authors) the model is a local issue between a specific DC GW and WAN, so that the same interconnect can use the Decoupled model in the GWs of some DCs and Integrated model in the GWs of other DCs.

5.       The EVPN Overlay draft defines two modes for implementing DC Interconnect: using DC GWs and using ASBRs. Both models (Decoupled and Integrated Interconnect) discussed in this draft are actually sub-models of the model of DC Interconnect that uses GWs. The draft actually mentions that, but quite late - in the Security Considerations section where I, for one, would not be looking for this kind of information at all. I would suggest moving this clarification to the Introduction section and only keeping the text that deals with the security benefits of the GW-based model in Section 5. (Aside: The draft has successfully passed the SecDir review, so I hope that such a change would not cause any issues.)

6.       In Section 4.2 the draft discusses Integrated DC interconnect that uses VPLS in WAN. It refers to RFC 4761, RFC 4762 and RFC 6074 for the definition of VPLS and says (in section 4.2.1) that “different route-targets for the DC and for the WAN are usually required.” Since BGP in general and RTs specifically are not relevant for VPLS based on RFC 4762, the corresponding exception should be added to the text.

7.       In section 4.2.1 the draft also says that “the GWs will be provisioned with I-ESI” where I-ESI stands for the Interconnect Ethernet Segment Identifier. But this is all about the Integrated Interconnect – so what represents  the Interconnect Ethernet Segment (to be identified by I-ESI) in this model?

8.       Both Section 4.2.1 and Section 4.4.6 mention a local Attachment Circuit (AC) on the DC GW (in the latter case – as one of the advantages of the DC Interconnect solution that uses EVPN-MPLS in the WAN). But such ACs are not shown in the diagram depicting the Integrated model. Some clarifying text would be helpful. In particular, it would be nice to explain why local ACs are considered as benefits of the Integrated DC Interconnect solution that uses EVPN-MPLS in the WAN if they are also possible in the Integrated DC Interconnect solution that uses VPLS (at least as implied by them being mentioned in section 4.2.1).

9.       Section 4.6 discussed the Integrated DC Interconnect solution that uses EVPN-VXLAN in the WAN. Other encapsulations (e.g., MPLS in GRE) are not discussed. It would be nice if the authors could clarify the reasons for including one encapsulation and excluding all others.



Nits:

I did not check the draft for typos. I would only like to mention that the draft mentions (in several places) “existing Technical Specifications” as if they were Royalty - looks a bit exaggerated to me.

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@ecitele.com


___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is 
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this 
transmission in error, please inform us by e-mail, phone or fax, and then delete the original 
and all copies thereof.
___________________________________________________________________________