Re: [RTG-DIR] [spring] RTG-DIR review of draft-ietf-bess-srv6-services-05

Manomugdha Biswas <manomugdha.biswas@keysight.com> Wed, 10 March 2021 11:49 UTC

Return-Path: <manomugdha.biswas@keysight.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEBDE3A22AB; Wed, 10 Mar 2021 03:49:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.018
X-Spam-Level:
X-Spam-Status: No, score=-2.018 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=keysight.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B1WJv00F99ib; Wed, 10 Mar 2021 03:48:57 -0800 (PST)
Received: from mx0b-003cac01.pphosted.com (mx0b-003cac01.pphosted.com [205.220.173.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DDE6E3A22AE; Wed, 10 Mar 2021 03:48:56 -0800 (PST)
Received: from pps.filterd (m0187215.ppops.net [127.0.0.1]) by mx0b-003cac01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 12ABk5X0011764; Wed, 10 Mar 2021 03:48:52 -0800
Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2171.outbound.protection.outlook.com [104.47.58.171]) by mx0b-003cac01.pphosted.com with ESMTP id 3749wt5sb4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 10 Mar 2021 03:48:51 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TTHYuXHjqJwXGuQ0C4Tw2S30gFrZfINHR/IEV1xowu4lGoICQMHuWzj9R/bMZbIEU9uARixAJzG+W1GtJpmWw6UniuICd71TY0QQsHvn0kUIybAXVcgbSL4h6n50fbmS+kbyRNoQN5ez++OGjzwqKDKoBzTLOdv9MeuW/CGzJ6NfV629FXbFv3b0w9liEsxugI5eonj+zSxUzBe5rPkU/8bYc/Sc6+ABaw48GOO9gDvDNE9ppv7W2QOwzlA3qw0rhd9NNJSEAxBrlfjO1sMS+9kA2TdgYUewgImCTdWIyAjR+HQ629+ePd37OytnwwfAbVMLp/cCk3GC7nr8vBF39Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qhAq2wPonnjvNsjudke9kOsX/XNoIgvKWZiJ60ee2aw=; b=TEOXYN9dlv5EaCr1pvoUmOTnKPDzKTkBc8BwyHZYCMOJ+iZKcX/BZlgAe/a9HVGarwdk4KRrbXyQj4flCzl9mz7NlbtklPfOe2YKfQP35sDDvOXAlA8TaVQcRPGkwtqxSJ7qQQB4CWkLFsLKVUEqO0igrSsyoSJV947EawIyOzmKONUy4wAwo0kIpS/LPZrG/TKuy6br1+Ei2iJbIuXvWwzdUsee8y71C2UMw61b0m+dVWNB1ipKR50mcChRt2/lb8msC6rhqnKfLfNNycPngG4+W/qquQ6IluSVFGOJdCdsgAqhI2u6E/JjzgHKvVr5f65ZyM6IWeKIejon/tRqOg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=keysight.com; dmarc=pass action=none header.from=keysight.com; dkim=pass header.d=keysight.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=keysight.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qhAq2wPonnjvNsjudke9kOsX/XNoIgvKWZiJ60ee2aw=; b=Kb8ZUjCUX4LjqlhdzFpuT0xsi81/BuQ+wjPhTkgeuyW9o0/fZ9z+JVUvhIP/lD/98kmzXNCmcvk3iyR6boai91lczGQ7eFEl0JCmOpm+2d+tSHrAs6ftNUIv1sNTgaH6QjdDBKGyJcc8nvP8QRKe/KdJFaayCwqoRoLCFbYnbs0=
Received: from BYAPR17MB2071.namprd17.prod.outlook.com (2603:10b6:a02:b2::16) by SJ0PR17MB4679.namprd17.prod.outlook.com (2603:10b6:a03:374::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17; Wed, 10 Mar 2021 11:48:49 +0000
Received: from BYAPR17MB2071.namprd17.prod.outlook.com ([fe80::cd6c:1ff6:53fe:9c9c]) by BYAPR17MB2071.namprd17.prod.outlook.com ([fe80::cd6c:1ff6:53fe:9c9c%7]) with mapi id 15.20.3912.027; Wed, 10 Mar 2021 11:48:49 +0000
From: Manomugdha Biswas <manomugdha.biswas@keysight.com>
To: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>, Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>, "Ketan Talaulikar (ketant)" <ketant@cisco.com>
CC: "draft-ietf-bess-srv6-services.all@ietf.org" <draft-ietf-bess-srv6-services.all@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "spring@ietf.org" <spring@ietf.org>, "Swadesh Agrawal (swaagraw)" <swaagraw@cisco.com>, "Zafar Ali (zali)" <zali@cisco.com>, "rtg-dir@ietf.org" <rtg-dir@ietf.org>, "<rtg-ads@ietf.org>" <rtg-ads@ietf.org>
Thread-Topic: [spring] RTG-DIR review of draft-ietf-bess-srv6-services-05
Thread-Index: AQHXFZqcfx9pGNwOJ0eWs82DrxvYLKp9CmeggAANWYCAAAJOsA==
Date: Wed, 10 Mar 2021 11:48:49 +0000
Message-ID: <BYAPR17MB20717B92EC352A157EF1E3C98F919@BYAPR17MB2071.namprd17.prod.outlook.com>
References: <BLAPR03MB54418140F00B1162700F4224F6B99@BLAPR03MB5441.namprd03.prod.outlook.com> <BLAPR03MB5441596354F5B55F11AE0309F6B99@BLAPR03MB5441.namprd03.prod.outlook.com> <SA0PR11MB45768B578E097AC93866D8D2C1929@SA0PR11MB4576.namprd11.prod.outlook.com> <A99323E1-48E0-4062-988B-1EF3D8E1A16B@cisco.com> <MW3PR11MB4570B6486A705F051CCA68A1C1919@MW3PR11MB4570.namprd11.prod.outlook.com> <MW3PR11MB4570ACF485C2BB9424EDEAB8C1919@MW3PR11MB4570.namprd11.prod.outlook.com> <MW3PR11MB45704D419EA18372DB818E97C1919@MW3PR11MB4570.namprd11.prod.outlook.com> <SJ0PR03MB59355D7750E679F01ACE7947F6919@SJ0PR03MB5935.namprd03.prod.outlook.com>, <BYAPR17MB20714D872F2890F4A1AEE8818F919@BYAPR17MB2071.namprd17.prod.outlook.com> <MWHPR08MB35204D5D361D787C056E0C5CF7919@MWHPR08MB3520.namprd08.prod.outlook.com>
In-Reply-To: <MWHPR08MB35204D5D361D787C056E0C5CF7919@MWHPR08MB3520.namprd08.prod.outlook.com>
Accept-Language: en-IN, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=keysight.com;
x-originating-ip: [121.244.60.106]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6808285d-842b-40a8-be98-08d8e3ba786d
x-ms-traffictypediagnostic: SJ0PR17MB4679:
x-microsoft-antispam-prvs: <SJ0PR17MB4679DFD045913065B3C41DF28F919@SJ0PR17MB4679.namprd17.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR17MB2071.namprd17.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(346002)(376002)(396003)(39860400002)(366004)(54906003)(44832011)(166002)(4326008)(6506007)(8936002)(71200400001)(7416002)(99936003)(83380400001)(53546011)(2906002)(7696005)(33656002)(55016002)(52536014)(86362001)(5660300002)(316002)(30864003)(478600001)(296002)(966005)(66576008)(8676002)(110136005)(66556008)(64756008)(9686003)(66446008)(26005)(66476007)(66946007)(186003)(76116006)(559001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/related; boundary="_005_BYAPR17MB20717B92EC352A157EF1E3C98F919BYAPR17MB2071namp_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: keysight.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR17MB2071.namprd17.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6808285d-842b-40a8-be98-08d8e3ba786d
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Mar 2021 11:48:49.1938 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 63545f27-3232-4d74-a44d-cdd457063402
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: riSkuOUJxjs844c8ZqrxLwUuqvgpe1Ib6a1MxgurTD+yFbnosQUSnMkD59vtb15tdDtgadUsXOBFSE3mrXs5Mq36lxRayGnoNXz4jfKnS9M=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR17MB4679
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-03-10_08:2021-03-10, 2021-03-10 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 adultscore=0 priorityscore=1501 mlxscore=0 clxscore=1011 lowpriorityscore=0 spamscore=0 mlxlogscore=999 suspectscore=0 bulkscore=0 impostorscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2103100056
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-dir/zTk-lmPjeqtmbiygVJvoJQoj_7c>
Subject: Re: [RTG-DIR] [spring] RTG-DIR review of draft-ietf-bess-srv6-services-05
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Mar 2021 11:49:03 -0000

Thanks Jorge,
So answer to the question 1 below is that theoretically any device should accept the BGP update with TO 112, TL 8 even though locator length is 96, FUNC length is 20. Implementation may vary device to device.

Regards,
Mano
[cid:image002.png@01D715D1.2E6F1920]

From: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>
Sent: Wednesday, March 10, 2021 5:06 PM
To: Manomugdha Biswas <manomugdha.biswas@keysight.com>; Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>; Ketan Talaulikar (ketant) <ketant@cisco.com>
Cc: draft-ietf-bess-srv6-services.all@ietf.org; bess@ietf.org; spring@ietf.org; Swadesh Agrawal (swaagraw) <swaagraw@cisco.com>; Zafar Ali (zali) <zali@cisco.com>; rtg-dir@ietf.org; <rtg-ads@ietf.org> <rtg-ads@ietf.org>
Subject: Re: [spring] RTG-DIR review of draft-ietf-bess-srv6-services-05


CAUTION: This message originates from an external sender.
Hi Biswas,

“now say variable part starts at 112 (transposition offset), transposition length is 8 and locator length is 96 (FUNC+ARG length is 20). According to section 4 we should transpose 8 bits from offset 112 to label field in mp_reach_nlri.
But section 5.1 says that we should transpose FUNC part i.e. we should transpose from offset 96 with transposition length 20.”

As section 3.2.1 says, the limit of the transposition length (TL) is 20 bits for IPVPN and 24 bits for EVPN, but that does not mean that your TL is always 20 for IPVPN. In theory it may be any value between 0 and 20 (for IPVPN) and between 0 and 24 for EVPN.

Thanks.
Jorge


From: Manomugdha Biswas <manomugdha.biswas@keysight.com<mailto:manomugdha.biswas@keysight.com>>
Date: Wednesday, March 10, 2021 at 11:49 AM
To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>, Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Cc: draft-ietf-bess-srv6-services.all@ietf.org<mailto:draft-ietf-bess-srv6-services.all@ietf.org> <draft-ietf-bess-srv6-services.all@ietf.org<mailto:draft-ietf-bess-srv6-services.all@ietf.org>>, bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>, spring@ietf.org<mailto:spring@ietf.org> <spring@ietf.org<mailto:spring@ietf.org>>, Swadesh Agrawal (swaagraw) <swaagraw@cisco.com<mailto:swaagraw@cisco.com>>, Zafar Ali (zali) <zali@cisco.com<mailto:zali@cisco.com>>, rtg-dir@ietf.org<mailto:rtg-dir@ietf.org> <rtg-dir@ietf.org<mailto:rtg-dir@ietf.org>>, <rtg-ads@ietf.org<mailto:rtg-ads@ietf.org>>
Subject: RE: [spring] RTG-DIR review of draft-ietf-bess-srv6-services-05

Hi Ketan,
According to section “4.  Encoding SRv6 SID information" for efficient encoding, variable part of SRv6 SID is transposed to label field. This draft has given an example of variable part as FUNC+ARG.

Section “5.1.  IPv4 VPN Over SRv6 Core" says that

        Label field of IPv4-VPN NLRI is encoded as specified in [RFC8277<https://urldefense.com/v3/__https:/tools.ietf.org/html/rfc8277__;!!I5pVk4LIGAfnvw!znWscutIzlofFviFfmiB0LJR882lRGjijGmUryf-w9UGAeLic2dGM2xSO-RiStGdYEzLPYfc$>]

   with the Label Value set to the Function part of the SRv6 SID when

   the Transposition Scheme of encoding (Section 4<https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-ietf-bess-srv6-services-06*section-4__;Iw!!I5pVk4LIGAfnvw!znWscutIzlofFviFfmiB0LJR882lRGjijGmUryf-w9UGAeLic2dGM2xSO-RiStGdYP1kT8LJ$>) is used and

   otherwise set to Implicit NULL.

now say variable part starts at 112 (transposition offset), transposition length is 8 and locator length is 96 (FUNC+ARG length is 20). According to section 4 we should transpose 8 bits from offset 112 to label field in mp_reach_nlri.
But section 5.1 says that we should transpose FUNC part i.e. we should transpose from offset 96 with transposition length 20.
Questions:

1.      In this scenario, if we transpose from offset 112 with transposition length 8 then is it error? Is it must to extend/match variable part to FUNC_ARG length starting from locator offset?

2.      If transposition offset and transposition length do not overlap with locator length and FUNC+ARG length then should we discard transposition?


Regards,
Mano
[cid:image003.png@01D715D1.2E6F1920]

From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>
Sent: Wednesday, March 10, 2021 4:15 PM
To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Cc: draft-ietf-bess-srv6-services.all@ietf.org<mailto:draft-ietf-bess-srv6-services.all@ietf.org>; bess@ietf.org<mailto:bess@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>; Swadesh Agrawal (swaagraw) <swaagraw@cisco.com<mailto:swaagraw@cisco.com>>; Zafar Ali (zali) <zali@cisco.com<mailto:zali@cisco.com>>; rtg-dir@ietf.org<mailto:rtg-dir@ietf.org>; <rtg-ads@ietf.org<mailto:rtg-ads@ietf.org>> <rtg-ads@ietf.org<mailto:rtg-ads@ietf.org>>
Subject: Re: [spring] RTG-DIR review of draft-ietf-bess-srv6-services-05

Ketan,
Lots of thanks for posting an updated version of the draft.

I have looked it up, and it seems that the majority of my review comments have been addressed.

I defer to the Routing ADs regarding my metadata comments.

One point that, IMHO, requires additional clarification, is restriction of EVPN to just ingress replication for delivery of BUM traffic.
As I see it, stating that “The setup of multicast trees for use as P-tunnels is outside the scope of this document”   does not fully address this issue because, to the best of my understanding, RFC 8986 does not define any endpoint behavior that could be used for delivery of EVPN BUM traffic via P2MP trees even if such were supported (seems pretty evident if aggregate multicast trees are used, but even non-aggregate multicast trees are not covered IMHO).

Please see also more comments to your responses inline below.

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>

From: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Sent: Wednesday, March 10, 2021 7:55 AM
To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>; <rtg-ads@ietf.org<mailto:rtg-ads@ietf.org>> <rtg-ads@ietf.org<mailto:rtg-ads@ietf.org>>
Cc: draft-ietf-bess-srv6-services.all@ietf.org<mailto:draft-ietf-bess-srv6-services.all@ietf.org>; bess@ietf.org<mailto:bess@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>; Swadesh Agrawal (swaagraw) <swaagraw@cisco.com<mailto:swaagraw@cisco.com>>; Zafar Ali (zali) <zali@cisco.com<mailto:zali@cisco.com>>; rtg-dir@ietf.org<mailto:rtg-dir@ietf.org>
Subject: RE: RTG-DIR review of draft-ietf-bess-srv6-services-05

NOTICE: This email was received from an EXTERNAL sender.

Hi Sasha,

Thanks a lot for your detailed review, your comments/feedback and for taking time for discussions with the co-authors for their resolution.

We’ve just posted an update of the draft to address your comments based on our discussions :


https://datatracker.ietf.org/doc/html/draft-ietf-bess-srv6-services-06<https://urldefense.com/v3/__https:/clicktime.symantec.com/3UsxW3phCpdUtwJLUsoiuXP6H2?u=https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Fdraft-ietf-bess-srv6-services-06__;JSUlJSUl!!I5pVk4LIGAfnvw!yf6kwu6swzxgSJHNyqUX2VUUrapcjyNhqIVtDhujD-1XQpAAN6anI9dVjdLIGCNFMhVNtB9x$>

Please see inline below for individual responses.

From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>
Sent: 29 January 2021 16:20
To: rtg-ads@ietf.org<mailto:rtg-ads@ietf.org>
Cc: draft-ietf-bess-srv6-services.all@ietf.org<mailto:draft-ietf-bess-srv6-services.all@ietf.org>; bess@ietf.org<mailto:bess@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>; Swadesh Agrawal (swaagraw) <swaagraw@cisco.com<mailto:swaagraw@cisco.com>>; Zafar Ali (zali) <zali@cisco.com<mailto:zali@cisco.com>>; rtg-dir@ietf.org<mailto:rtg-dir@ietf.org>
Subject: RE: RTG-DIR review of draft-ietf-bess-srv6-services-05

Adding RTG-DIR – my apologies

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>

From: Alexander Vainshtein
Sent: Friday, January 29, 2021 12:46 PM
To: rtg-ads@ietf.org<mailto:rtg-ads@ietf.org>
Cc: draft-ietf-bess-srv6-services.all@ietf.org<mailto:draft-ietf-bess-srv6-services.all@ietf.org>; bess@ietf.org<mailto:bess@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>; Swadesh Agrawal (swaagraw) <swaagraw@cisco.com<mailto:swaagraw@cisco.com>>; Zafar Ali (zali) <zali@cisco.com<mailto:zali@cisco.com>>
Subject: RTG-DIR review of draft-ietf-bess-srv6-services-05

Hello,

I have been selected as the Routing Directorate reviewer for this draft. The Routing Directorate seeks to review all routing or routing-related drafts as they pass through IETF last call and IESG review, and sometimes on special request. The purpose of the review is to provide assistance to the Routing ADs. For more information about the Routing Directorate, please see ​http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir<https://urldefense.com/v3/__https:/clicktime.symantec.com/3DNHqu2P3uB4FTvdUETxnRQ6H2?u=http*3A*2F*2Ftrac.tools.ietf.org*2Farea*2Frtg*2Ftrac*2Fwiki*2FRtgDir__;JSUlJSUlJSU!!I5pVk4LIGAfnvw!yf6kwu6swzxgSJHNyqUX2VUUrapcjyNhqIVtDhujD-1XQpAAN6anI9dVjdLIGCNFMsQ6ru0d$>

Although these comments are primarily for the use of the Routing ADs, it would be helpful if you could consider them along with any other IETF Last Call comments that you receive, and strive to resolve them through discussion or by updating the draft.

Document: draft-ietf-bess-srv6-services-05
Reviewer: Alexander (“Sasha”) Vainshtein
Review Date: 29-Jan-21
IETF LC End Date:  Not known
Intended Status: Standards Track

Summary:
I have some minor concerns about this document that I think should be resolved before publication.

Comments:
The draft is well written and it was relatively easy to grasp the main idea behind it. However, the draft has to be read in parallel with the SRv6 Network Programming draft<https://urldefense.com/v3/__https:/clicktime.symantec.com/3Muuyg43iWUsicfqWidGKhk6H2?u=https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Fdraft-ietf-spring-srv6-network-programming-28__;JSUlJSUl!!I5pVk4LIGAfnvw!yf6kwu6swzxgSJHNyqUX2VUUrapcjyNhqIVtDhujD-1XQpAAN6anI9dVjdLIGCNFMqUgrMGX$> due to a lot of references to specific SRv6 endpoint behaviors defined in this draft.

From my POV the draft introduces a new approach to providing BGP-based services over an IPv6-capable core that is quite different from the way such services have been provided over IP/MPLS cores .  It would be nice  if the authors could  present these differences in a more explicit way and clarify their impact on such issues as inter-AS/inter-domain services, scalability etc. However this is just a wish, not a concern.

I have presented my early comments to the authors and contributors to the draft, and we have hold a series of productive  discussions that, from my POV, resulted in reaching rough consensus regarding resolution of all the issues I have raised.

I have included my understanding of the authors’ responses in the body of the review (marked by italics), and will be waiting for the next revision of the draft for addressing these comments along the agreed upon lines.

I would like express my gratitude to Gaurav, Swadesh and Zafar  for their responsiveness and cooperation.

Major Issues: None found

Minor Issues:
1.      It is quite common to say that the SRv6 dataplane is defined by RFC 8754m and this common statement is repeated in the first line of the SRv6 Services draft. However. I am not sure whether  RFC 8754, by and of itself,  is a sufficient reference for the SRv6 dataplane  for the purpose of this  document. My doubts are based on the following:
a.      RFC 8754 defines the Segment Routing header (SRH) and its handling
b.      The draft explicitly states that best-effort BGP-based services over an SRv6 domain can be provided without SRH – but they definitely would use the SRv6 dataplane
[KT] RFC8754 does indeed define the SRH and hence specifies the SRv6 data plane in conjunction with RFC8402. Even when SRH is not used (refer RFC 8754 Sec 4.1.1 and RFC 8986 Sec 5.1 & 5.2), the processing follows RFC 8754 and RFC 8986 since the IPv6 DA in the packet is set to the specific SRv6 SID. Hence, the references to these two specifications in addition to RFC8402.

My guess is that the  primary reference for the SRv6 dataplane for this draft is provided by the SRv6 Network Programming draft and augmented by RFC 8754. This guess is aligned with the frequent references to the SRv6 Network Programming draft in the SRv6 Services draft.
[KT] Your understanding is correct here as clarified in the previous response and we have updated the text to better reflect the use of SRv6 Service SID alone for best effort and then the use of SRH as well.
[[Sasha]] The new version refers to RFC 8402 for the definition of SRv6, which is OK with me.

I defer to the ADs and the leaders of the SPRING WG to decide how this issue should be resolved
2.      The draft explicitly states in Section 2 that it “extends the BGP Prefix-SID attribute [RFC8669] to carry  SRv6 SIDs and associated information”. However, the draft:
a.      Does not explicitly states that that  it also extends RFC 8669 by allowing BGP Prefix SID to be used with new AFI/SAFI (VPN-v4, VPN-v6 and EVPN) anywhere in the text (RFC 8669 is explicitly limited to IPv4/IPv6 Labeled Unicast leaving usage of the BGP Prefix SID attribute with other AFI/SAFI out of scope)
[KT] Agree – we have clarified this in the text.[[Sasha]] Yes, lots of thanks.

b.      Is not marked as updating RFC 8669 in the metadata
[KT] I am not sure this is necessary since it does not really “update” the processing or handling of the feature specified in RFC8669 – this draft just re-uses the attribute introduced there.[[Sasha]] I defer to the ADs to decide whether such marking is or is not required.

c.       To the. best of my understanding the authors do not object to  explicitly clarifying that this draft extends RFC 8669 also by applying it to new AFI/SAFI. I believe that it would be up to the Routing ADs to decide whether draft should be marked as updating RFC 8669 in the metadata
d.      I also wonder whether this draft should not be considered as updating RFC 4364 and RFC 4659 because it suggests carrying, in the Label field of the NLRI of the routes defined in these documents, values that do not represent MPLS labels (or represent special purpose values that are used in these fields). The same applies to RFC 7432  - but to a lesser extent since this document allows carrying VNI values as well as MPLS labels. I defer to the Routing ADs to decide how this should be handled
[KT] Let us take an example, RFC8365 introduced new dataplane support for EVPN (RFC7432) using VXLAN (and others) but allowing VNI to be carried in the MPLS label fields of RFC7432. However, RFC8365 does not update RFC7432. We have a similar case, where a new dataplane (feature) is being specified for use with existing BGP services.[[Sasha]] Same as above.

3.      Section 3 states: “Implementations supporting this specification SHOULD provide a mechanism to control advertisement of SRv6-based BGP service routes on a per neighbor and per service basis”.
a.      The purpose of this recommendation is prevention of misinterpretation by the BGP speakers that do not support the draft, of the label fields of the service routes as referring to MPLS labels while in fact these fields carry transposed parts of the SRv6 Service SIDs
b.      I would like to understand how advertisement of SRv6 Service routes to non-compliant PEs by BGP Route Reflectors can be prevented if

                                                                          i.    The  clients of these Route Reflectors include both compliant and non-compliant PEs

                                                                        ii.    The Route Reflectors also do not recognize BGP Prefix SID
c.       The authors have agreed to clarify that the mechanisms for prevention are implementation- and/or deployment-specific and  will provide an example of a suitable BGP policy. From my POV this would be most useful
[KT] As discussed, there are different approaches and mechanisms possible for BGP policy that are deployment design specific and better covered in a separate document. We have clarified this in the text.
[[Sasha]] The new text simply leaves the solution out of scope. If a non-normative example could be added, it would be nice IMHO.

4.      I have not found any references to multicast in MPLS/BGP IP VPNs (RFC 6513) in the draft. Neither is the SR Replication Segment for Multi-point Service Delivery draft<https://urldefense.com/v3/__https:/clicktime.symantec.com/32TG19gUV4Lj31a5gjgAQYu6H2?u=https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Fdraft-ietf-spring-sr-replication-segment-03__;JSUlJSUl!!I5pVk4LIGAfnvw!yf6kwu6swzxgSJHNyqUX2VUUrapcjyNhqIVtDhujD-1XQpAAN6anI9dVjdLIGCNFMixdZefu$> mentioned anywhere. It is not clear to me whether such services cannot be supported over SRv6, or are left for future study. Clarifying this point would be quite helpful IMHO. In our discussion the authors have stated that MVPN is out of scope of the draft and would be covered by a different document
[KT] You are correct; MVPN and P2MP SRv6 are going to be covered in separate documents. We have clarified this in the text.[[Sasha]] The new text is OK.

5.      It is my impression that delivery of BUM traffic over EVPN services as defined in the draft is limited to ingress replication as the provider tunneling technology:
a.      This impression is based on the following observations:

                                                                          i.    According to Section 8.3.1.2  of RFC 7432, in the case of provider tunneling technologies that are different from ingress replication,  the ESI label is upstream-assigned by the advertising PE and has to be interpreted by the egress PEs in the context of the ingress PE that, in its turn, has to be inferred from the identification of the P2MP tunnel over which the packet containing the EVPN-encapsulated BUM frame has been received by the egress PE

                                                                        ii.    The definition of the End.DT2M behavior in the SRv6 Network Programming draft requires association of specific outgoing interfaces in the L2 outgoing interfaces of the corresponding table in the egress PE with specific Arg.FE2 values and encoding these values in the SRv6 SIDs associated with this behavior. Such association presumably does not depend on specific ingress PEs

                                                                       iii.    Neither the SRv6 Network Programming draft for the SRv6 Services one provide any details about inferring the context for the upstream-assigned ESI labels from the received SRv6 SIDs.
b.      If my understanding is correct, such a limitation should be explicitly stated in the draft. In our discussion the authors have stated that P2MP SRv6 trees is out of scope of the draft and would be covered by a different document. It is my understanding that the authors would not object to such a clarification
[KT] The draft does have the following text at the end of Sec 6.3 – “The setup of multicast trees for use as P-tunnels is outside the scope of this document.”
[[Sasha]] I still think that an explicit statement that the draft is limited to ingress replication for EVPN is required because, to the best of my understanding, RFC 8986<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8986__;!!I5pVk4LIGAfnvw!yf6kwu6swzxgSJHNyqUX2VUUrapcjyNhqIVtDhujD-1XQpAAN6anI9dVjdLIGCNFMpyHVQZq$> does not define a suitable endpoint behavior. Did I miss something here?

c.       When it comes to usage of ingress replication in EVPN, my guess (FIIW) is that EVPN over SRv6 that uses ingress replication would be fully compatible with the Assisted Ingress Replication scheme as described in the Optimized Ingress Replication for EVPN<https://urldefense.com/v3/__https:/clicktime.symantec.com/3SvJDuvNrUXrGUuf6hsEZn16H2?u=https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Fdraft-ietf-bess-evpn-optimized-ir-07__;JSUlJSUl!!I5pVk4LIGAfnvw!yf6kwu6swzxgSJHNyqUX2VUUrapcjyNhqIVtDhujD-1XQpAAN6anI9dVjdLIGCNFMgxBNOgh$> draft. If this is indeed so, it would be useful if this fact were explicitly mentioned in the draft (with an Informative reference to the Optimized Ingress Replication draft). In our discussion the authors stated that the draft is fully compatible with the Assisted replication scheme  just as any other IP-based encapsulation
[KT] You are correct about the applicability of that draft to SRv6 based BGP services. There are other EVPN extensions/procedures which also apply and it may be misleading to include and discuss one of them and not cover the others.[[Sasha]] Well, I can live with that.

6.      The draft defines two schemes for encoding the actual service SID in the labeled service routes:
a.      The entire SRv6 SID encoded in the BGP Prefix SID attribute combined with Implicit NULL as the label in the NLRI of the route
b.      The Transposition Scheme: Only the locator part of the SRv6 SID encoded in the BGP Prefix SID attribute while the function and arguments (if any) are encoded as the label field of the NLRI.
c.       Neither of these schemes is defined as MANDATORY, but the Transposition Scheme is RECOMMENDED as providing more efficient packing
d.      To the best of my understanding, the egress PE can use any of these schemes at its discretion when it advertises the service routes. Is this correct? If yes, does this mean that the ingress PE MUST support both schemes? In our discussion the authors have confirmed that
[KT] This is correct.

e.      I have to admit that I do not fully understand why the Transposition Scheme is more effective since eventually the same set of Service SIDs has to be allocated and advertised by the egress PEs; but this is probably my personal problem.
[KT] The efficiency is not in the context of Service SID allocation, but in the packing efficiency of the BGP updates.[[Sasha]] Got it now, thanks a lot!

7.      The last para of Section 4 the draft (that discusses per Ethernet Segment EVPN Auto-Discovery route), says that the “argument part of the SRv6 SID MAY be transposed in the ESI Label field of the ESI Label Extended Community and the SID value in the SRv6 Services TLV is set to 0 with the SRv6 SID Structure Sub-Sub-TLV”. From my POV:
a.      There is no other place where this argument can be transposed – because, as per RFC 7432, the Label filed of this route MUST be set to 0
[KT] Correct.
b.      In the general situation (when the Egress PE is attached to multiple multi-homed Ethernet Segments and contains multiple MAC-VRFs attached to these segments) the Arg.FE2 value (that is assigned per ES and carried with the per-ES Ethernet A-D route) MUST be combined with the Function part of the SRv6 Service SID (that is allocated per Bridge Table and advertised in the Inclusive Multicast Ethernet Tag EVPN route) using the Transposition scheme.
c.       I also think that consistent usage of the Transposition Scheme (i.e., same offset and length) across multiple EVPN routes is required. It is my understanding that the authors agree that consistent usage of the Transposition Scheme across multiple ES and multiple EVI is expected
[KT] This is also correct. The procedure is explained in Sec 6.3.
8.      Both the SRv6 Network Programming draft and the SRv6 Services draft use notation Arg.FE2, but I have not found any definition of this notation. According to the authors, these two drafts define this notation and no additional definition is required, and agreed to state that explicitly in the draft.
[KT] The definition of this notation is indeed in RFC8986 Sec 4.12 and this draft specifies how it is advertised via BGP. We have clarified this in the text.[[Sasha]]  Yes, OK with me.


Nits:
1.      I did not run the nits check on the draft
2.      In the 3rd para of Section 1: s/one of the service specific behavior/ one of the service specific behaviors/
[KT] Ack for both.

Thanks,
Ketan (on behalf of co-authors)


Hopefully these notes will be useful.


Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>


Notice: This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments.

Notice: This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments.