Re: Protecting SR policy midpoints (draft-bashandy-rtgwg-segment-routing-ti-lfa)

"Ahmed Bashandy (bashandy)" <bashandy@cisco.com> Tue, 28 November 2017 17:01 UTC

Return-Path: <bashandy@cisco.com>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0819128959 for <rtgwg@ietfa.amsl.com>; Tue, 28 Nov 2017 09:01:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.521
X-Spam-Level:
X-Spam-Status: No, score=-14.521 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8USBZW1TzHRV for <rtgwg@ietfa.amsl.com>; Tue, 28 Nov 2017 09:01:54 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 902BF126DED for <rtgwg@ietf.org>; Tue, 28 Nov 2017 09:01:54 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1035; q=dns/txt; s=iport; t=1511888514; x=1513098114; h=message-id:date:from:mime-version:to:cc:subject: references:in-reply-to:content-transfer-encoding; bh=amN9ndKKMNeGQPPNqnJ9hipMr52ugW2/bY6JxGt1Bvw=; b=m1ryA8hIosEiLCWOSKXal6oe65Nf0DTo53Ea68/7PO8qBD7a0MZbRoYO YaR2qofbwBULc6671+2ovhONP0nkACSix0cJs8RB9hixczNNlsHk0A1cz 5fzypSE+jAUnDjYjTyaHXRC+KutCZclPwWiw519H5KspCHZ+RWWeUcFC2 k=;
X-IronPort-AV: E=Sophos;i="5.44,468,1505779200"; d="scan'208";a="324166089"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 28 Nov 2017 17:01:53 +0000
Received: from [10.24.73.105] ([10.24.73.105]) by alln-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id vASH1pgV026172; Tue, 28 Nov 2017 17:01:52 GMT
Message-ID: <5A1D967F.4020905@cisco.com>
Date: Tue, 28 Nov 2017 09:01:51 -0800
From: "Ahmed Bashandy (bashandy)" <bashandy@cisco.com>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: Stewart Bryant <stewart.bryant@gmail.com>, Muthu Arul Mozhi Perumal <muthu.arul@gmail.com>, "sasha@axerra.com" <sasha@axerra.com>
CC: "rtgwg@ietf.org" <rtgwg@ietf.org>
Subject: Re: Protecting SR policy midpoints (draft-bashandy-rtgwg-segment-routing-ti-lfa)
References: <CAKz0y8wLYjkSO486w5WpSuDYV3Cjvgkv6887o9-Ky9o_ViWMrQ@mail.gmail.com> <210606893.1211556.1511362363266@mail.yahoo.com> <CAKz0y8xeYnqOjLxADVwndtOp8QQaPeQBiAO2TtnCi6pYfebONA@mail.gmail.com> <5A1D50E5.7030302@cisco.com> <8948158b-6fbe-4458-476a-ea1f8f34ee6c@gmail.com>
In-Reply-To: <8948158b-6fbe-4458-476a-ea1f8f34ee6c@gmail.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtgwg/NueiNWpWkqvN9s6fy9ChEIuLrzs>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Nov 2017 17:01:57 -0000

Stewart,

I am sure you are aware that ISIS and OSPF adj-SID advertisements 
indicate whether an adj-SID is protected or not. If the ingress router 
decided to use a protected adj-SID for a policy, then the protection of 
such adj-SID is within the policy.

Ahmed

On 11/28/2017 7:15 AM, Stewart Bryant wrote:
>
>
> On 28/11/2017 12:04, Ahmed Bashandy (bashandy) wrote:
>>
>> - The top label of incoming packet to node "S" is either a prefix SID 
>> owned by node "F" or an adjacency SID for (S,F)
>
> If it is an adjacency SID for (S,F) then you are violating the 
> original intent of the ingress PE which was to send the packet along 
> the path S->F. I really don't think you can blindly repair such a 
> packet since to do so violates the policy applied to the packet. You 
> have to do a policy check, and you have to make sure that the packet 
> is not subject to ECMP along the repair path since ECMP avoidance 
> might have been the intent of using the SR Adjacency in the first place.
>
> - Stewart