RE: Mail regarding draft-hu-rtgwg-srv6-egress-protection

Alexander Vainshtein <Alexander.Vainshtein@ecitele.com> Tue, 25 February 2020 13:37 UTC

Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B5EA3A0CCA for <rtgwg@ietfa.amsl.com>; Tue, 25 Feb 2020 05:37:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.59
X-Spam-Level:
X-Spam-Status: No, score=-1.59 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FILL_THIS_FORM_SHORT=0.001, HTML_MESSAGE=0.001, PDS_BTC_ID=0.499, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ecitele.com header.b=jP0AMoR7; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=eci365.onmicrosoft.com header.b=bIoAbXUf
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V3Yd9FivuwVW for <rtgwg@ietfa.amsl.com>; Tue, 25 Feb 2020 05:37:27 -0800 (PST)
Received: from mail1.bemta26.messagelabs.com (mail1.bemta26.messagelabs.com [85.158.142.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE9633A0CCB for <rtgwg@ietf.org>; Tue, 25 Feb 2020 05:37:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ecitele.com; s=eciselector10072019; t=1582637845; i=@ecitele.com; bh=2X81jZCUEvlHOLdY7LS27KkiSor6j07el4hXhJNSng0=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=jP0AMoR70ycM6N/05RVv6CaU6Ni1Rwx0XgrHQxt98PwvvRtjNHKilxL+qfF22YqPg +IodX8Az/CJyCJtm1k/Evvqjwre1Ati6nz14QenOxmRVS8cu0f/5Flg5LspKNle+Sx ASF/J7Z6CFCqyqxvyQ7o1yClD8nkg7rvUMiMsJdc=
Received: from [100.113.6.64] (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256 bits)) by server-1.bemta.az-b.eu-central-1.aws.symcld.net id 6F/F4-62111-413255E5; Tue, 25 Feb 2020 13:37:24 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrPJsWRWlGSWpSXmKPExsUi9LZno66wcmi cQfMqM4sLq6cwW1x485vZYvvybywOzB6b17l5LFnyk8njetNV9gDmKNbMvKT8igTWjN9LmhgL Ht1jrmh/94mpgXHHDeYuRk4ORoGlzBKLF8R2MXIB2cdYJJomvmKFcDYzSpw4PokdpIpFYC2zR NckXZCEkMAkJok1x3axQDgPGSWmzHzNCFLFJmArsWn1XTYQW0RASeL+rt1gcWYBP4l5DxvA4s ICjhL9h96yQ9Q4SRz/fBjKdpPoWroOapuqxO0bPUwgNq9AosTvNVvYIJbNZpL4dHAS2OGcAvY S/Vt+MkE8ISbx/dQaJohl4hK3nswHsyUEBCSW7DnPDGGLSrx8/I8Voj5J4v7ThYwQcUWJGffm sEPYshKX5ncDxTmAbGWJLS9iIcK+El9XfIQq15G4Nn09lF0gMev4TKjxahJXPx1lgbBlJPra5 oHdLCGwnkXi5NynYEVCAskSJ+Z8hiqSk1jV+5BlAqPBLCRnQ9h5EpfadrDPAvtfUOLkzCcss4 BOYhbQlFi/Sx+iRFFiSvdDdghbQ6J1zlx2ZPEFjOyrGC2SijLTM0pyEzNzdA0NDHQNDY11TXT NzPQSq3ST9FJLdZNT80qKEoGSeonlxXrFlbnJOSl6eaklmxiB6SylkMVpB+PfNe/1DjFKcjAp ifKqfguJE+JLyk+pzEgszogvKs1JLT7EKMPBoSTBe0Q+NE5IsCg1PbUiLTMHmFph0hIcPEoiv Awgad7igsTc4sx0iNQpxkCOCS/nLmLmePdzMZD8uGoJkPwOJp+tBZFH5i4Fkv/v3l3ELMSSl5 +XKiXOK6cINEgAZFBGaR7cGli+uMQoKyXMy8jAwCDEU5BalJtZgir/ilGcg1FJmHeXAtAUnsy 8ErhrXgEdygR06Oo/wSCHliQipKQamGQaBHZdvP7mU4vc7Z3dDpffdTL6/hQ3uMm2ZztTZ8D3 H9piO83t35b07X0zTfDQv8UrnUL/LBRgW3jY1fCU8F1lwWeKQh9abDWFdrI4Rd9VX+TnNUXb0 oTH4ZHdQwHfihPnZVTkA/x+lJksYZrzNl39hdA/2aceHponCuL7F3iWqRks1OU2b7gYtWjx8w sZscL/XO/vfpKltWLGA12WbZ4b7Fe2/apb+voRW929xADmpdfWJpneWnyTeQWLvqJj5S/JhLn zjU8s3XDt988gVusdq5y+Hy2Rc54nXNV93X15SXrnCgWnBLO9umVtK9k/9ZeFLeX4wrRBKFx3 8TcLwzDWirn3DhTYFp+NvPRWVomlOCPRUIu5qDgRAFXxra2SBAAA
X-Env-Sender: Alexander.Vainshtein@ecitele.com
X-Msg-Ref: server-17.tower-238.messagelabs.com!1582637841!906779!1
X-Originating-IP: [18.237.140.177]
X-SYMC-ESS-Client-Auth: mailfrom-relay-check=pass
X-StarScan-Received:
X-StarScan-Version: 9.44.25; banners=ecitele.com,-,-
X-VirusChecked: Checked
Received: (qmail 497 invoked from network); 25 Feb 2020 13:37:23 -0000
Received: from p01b.mail.dlp.protect.symantec.com (HELO mail.ds.dlp.protect.symantec.com) (18.237.140.177) by server-17.tower-238.messagelabs.com with ECDHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 25 Feb 2020 13:37:23 -0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=htNvRfhG7IepWwbqOmuC2vnNSmJxSo83YKSKjE1HaKiY/G0lJI515/zTTwGn2gxqdftZWwdw8QwYDCm/Ok1fQxV0g4ssf49GPezyHCycKRUAtqR4zccdBFd0LCijH+qdYqge105jBIZ8DA3ZVm939NxTvTFgfCGF048pyB+KmBTUa+QMy7wffQShj/hOji2hQfNm/6TcCKaCid7bCGvy8znlDZeTLpL085S0HC6qMEfCAb+Up/cHttNOALywgabFyMD2PmlP5/E/b4lg5zbpcSZWBtCaUHZRCb7WkdTiN0AIoDwb3hpXQPAjQGewYJH9ukP9bbU8RQMw0fnPbhGT+g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/mG+V6o0S70HeQ6ukLl01hUZbDjt7geILRKUnEtpod4=; b=FCgEwXDOvor45EHqTy8QB27uwxaugA9Px+B0f+ikP6FbJLknJ50LUxvH5csd5kepzsOLEKvfozQYhc5r5aSt5FpSHEtSdOufbWY44QjV8d+m7avZTSjbWYnd+XYsUraBTcF4MqqQJWawYwgpY89qTIQavVO6AIIRslAtt8/lHSSF9FEmM9B3Gu/CcaJux0UYDR1klyr0gnkhUYmCvTB98oH4hk8/FYQXD41BDoY0QZfqAF79LTXBqLWdftsY0TWHN/UNItGAT5al1FPuP0XF9MXNekQKtO+r5Z9JxPB1i+S8htFrHYOOCGPSvk9XIfduqPjQJyvv8OItAgcZnhrKIQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ecitele.com; dmarc=pass action=none header.from=ecitele.com; dkim=pass header.d=ecitele.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ECI365.onmicrosoft.com; s=selector2-ECI365-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/mG+V6o0S70HeQ6ukLl01hUZbDjt7geILRKUnEtpod4=; b=bIoAbXUfbkTX3VcREJTaWs21eCC2XFyUnMt4dnSOdY31ZJ6iadzgN/IbfEOMEm7tZNsmQDbpttGYsChL1uCQHEf7NhdrpSZcY2XH++EY9KzjNxA62zvgwy3Te7uvz0/8KdxlHBZW/Wu9r7GDtZ5jWgSrw8gEGTio05icRtK76CU=
Received: from AM0PR0302MB3217.eurprd03.prod.outlook.com (52.133.33.12) by AM0PR0302MB3236.eurprd03.prod.outlook.com (52.133.36.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.21; Tue, 25 Feb 2020 13:37:18 +0000
Received: from AM0PR0302MB3217.eurprd03.prod.outlook.com ([fe80::aca8:db6e:97b:c780]) by AM0PR0302MB3217.eurprd03.prod.outlook.com ([fe80::aca8:db6e:97b:c780%7]) with mapi id 15.20.2750.021; Tue, 25 Feb 2020 13:37:18 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: Yimin Shen <yshen@juniper.net>
CC: "rtgwg@ietf.org" <rtgwg@ietf.org>, Huaimo Chen <huaimo.chen@futurewei.com>
Subject: RE: Mail regarding draft-hu-rtgwg-srv6-egress-protection
Thread-Topic: Mail regarding draft-hu-rtgwg-srv6-egress-protection
Thread-Index: AQHV6Tj/QTh4u6ex9kyPrxr+4lY6AKgnDNKAgAGQgwCAAZY4gIABuAhg
Date: Tue, 25 Feb 2020 13:37:18 +0000
Message-ID: <AM0PR0302MB321795956B312C4D0D5C0FD39DED0@AM0PR0302MB3217.eurprd03.prod.outlook.com>
References: <BY5PR13MB3651E27C33405CA8D1BC4FF4F2EE0@BY5PR13MB3651.namprd13.prod.outlook.com> <15DAD938-D0E1-4BB0-BE20-40602495474A@juniper.net> <AM0PR0302MB3217801FFC00FB8D8B177E2A9DEF0@AM0PR0302MB3217.eurprd03.prod.outlook.com> <117E28AC-1F96-4C69-B861-70881E1A5E1F@juniper.net>
In-Reply-To: <117E28AC-1F96-4C69-B861-70881E1A5E1F@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.234.241.1]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 8d0e9958-dfa9-4869-a4a8-08d7b9f7d598
x-ms-traffictypediagnostic: AM0PR0302MB3236:
x-microsoft-antispam-prvs: <AM0PR0302MB3236DE079644F6965B910BB19DED0@AM0PR0302MB3236.eurprd03.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 0324C2C0E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(346002)(366004)(136003)(39860400002)(396003)(189003)(199004)(9686003)(966005)(55016002)(66574012)(6506007)(64756008)(7696005)(76116006)(66446008)(66556008)(66476007)(66946007)(478600001)(26005)(86362001)(6916009)(53546011)(52536014)(4326008)(186003)(71200400001)(8676002)(316002)(81166006)(81156014)(8936002)(33656002)(30864003)(5660300002)(54906003)(2906002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM0PR0302MB3236; H:AM0PR0302MB3217.eurprd03.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: ecitele.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: YZvVGyNdoH9sEU4G/9QpzCi1s2yU9CeGWTOjUxVL0bWxRXygPpBJB2mK4zSGZAJn5oxaXBXsC2PfMgmH8/J/XjXlGG6thQfRktdnOayYabx/AXf6/MSBRoG1JcMtlUrra7XUFGwZBzc2JjMMJLGMYExFMJVAMIDGJHJbEzOPQOFZ1zip/IhGeoXsMGkewAXoedg8st6McIMwY5+KKvrQiANZKF4iXnrDczHYj584eDX1YsYDZiTL+dW18VbdSm0EKDH7B2iOAXOneh6oVOr0k6OLKLaj3IVkcNHsDKwRIMowjlENRem6KH4xlrouckQBPVjbrjcBsmDpaMfiTeJ4rpcY/Ihbw/N8uXeZNUTjfyeYao+2SkqhxQvxG70uxJuFfVL9Qvm0qr1WQZdYpIzYHmGDcPR6pP3TSXKV7ZRufPN8JYl4SZT7hYwWUCqiNh4eCyCkP7WSj5BCltwUtQ77Ubv3/4WR0w5/eVgO2yx5XoQpnxjWXCx4wdqEuKsmP/m1ScEdM8GMOJHqPcH5xPNgMQ==
x-ms-exchange-antispam-messagedata: TNREwt8JeoQZS8tNsZmdqrju2yemYUr11k0doWKSJlFCv7zXl/QXYfGqwm+C3p60f5c6BKJNy+mfdTfQR/ZjfrpbOxYEq5635dljuX16YtlnZW0EGuBmlmCzGwKsPEJ442JJlcEe8r4MhMfrop4YUg==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM0PR0302MB321795956B312C4D0D5C0FD39DED0AM0PR0302MB3217_"
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8d0e9958-dfa9-4869-a4a8-08d7b9f7d598
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2020 13:37:18.7166 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2c514a61-08de-4519-b4c0-921fef62c42a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: js6UixcW04s0Dn+yoDWUyLc3a15bN3N2d3VsPjs0IHbkZxdsdHfEtsrfMCDescS0Rtl4wpz7Xi90yIVKpi3gUg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0302MB3236
X-CFilter-Loop: Reflected
X-DetectorID-Processed: d8d3a2b3-1594-4c39-92fb-b8312fe65a8a
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtgwg/iLRAAtSI3Mxs7quh2kya5zizWmA>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 13:37:31 -0000

Ymin,
Lots of thanks for a prompt and very detailed response to my comments.

I think that the scheme you have shared in your mail provides a very reasonable description of the PLR behavior. I fully agree that the definitions you’ve provided extend and clarify the definitions of the Headend behavior in the SRv6 Network Programming draft<https://tools.ietf.org/html/draft-ietf-spring-srv6-network-programming-10>.

I also think that your our description of the Protector behavior  (“When P receives a re-routed packet, it should get the mirror SID (i.e. context ID) from the outer IPv6 header, remove this outer IPv6 header, and continue to process the inner IPv6. When processing the inner IPv6 header, P should process E’s VPN SID by using the mapping indicated by the mirror SID (i.e. context ID)” ) should be explicitly mapped to one of the SRv6 Endpoint behaviors described in the SRv6 Network Programming draft<https://tools.ietf.org/html/draft-ietf-spring-srv6-network-programming-10> with  clarifications and extensions if necessary (End.DT6 looks like a reasonable candidate to me).

Without these clarifications it is difficult for me to say whether the draft is a good start – one of the two basic requirements for adopting the draft as a WG document.

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@ecitele.com

From: Yimin Shen <yshen@juniper.net>
Sent: Monday, February 24, 2020 6:10 PM
To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>; Huaimo Chen <huaimo.chen@futurewei.com>
Cc: rtgwg@ietf.org; Yimin Shen <yshen@juniper.net>
Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection


I believe Sasha has raised a good point regarding the usage of mirror SIDs in this document.



According RFC 8402 section 5.1, a mirror SID



---

“is to provide support for an IGP node to advertise its ability to process traffic originally destined to another IGP node, called the "mirrored node" and identified by an IP address or a Node-SID, provided that a Mirroring Context segment is inserted in the segment list prior to any service segment local to the mirrored node.



When a given node B wants to provide egress node A protection, it advertises a segment identifying node's A context.  Such a segment is called "Mirroring Context segment" and is identified by the Mirror SID.”

---



RFC 8667 specifies the advertisement of a mirror SID (for ISIS) via the SID/Label Binding TLV. The TLV contains a prefix, M-flag =1, and a SID/Label sub-TLV. So, there are two cases. If the SID/Label sub-TLV contains an index (to the SRGB), the mirror SID is routable. If it contains a label, the mirror SID is not routable. The draft assumes the mirror SID to be routable, but both cases should be considered.



If we put RFC 8402, 8667 and 8679 together, we can basically get a high level solution for SRv6 egress protection, shared below:



[1] A protector (P) advertises a mirror SID for each egress node (E) which P protects. It identifies the primary-and-protector relationship between E and P. It indicates P's capability of processing E's SID (or E's SID list) contained in re-routed packets which are originally destined for E. The granularity of mirror SIDs is per ordered pair of <E, P>, not per VPN locator.



[2] The prefix contained in this mirror SID is the IPv6 context ID of <E, P>.



[3] When E advertises each VPN SID, E should attach the mirror SID (i.e. context ID) to the VPN SID, to indicate P’s identity to PLR(s). This is needed regardless of whether the locator in the VPN SID is routable or non-routable.



[4] Each PLR performs bypass path computation for the context ID. (Per previous comments, the draft needs to provide the details of this calculation.)



[5] PLR should set up a backup forwarding state as below (some is similar to what Sasha suggested):

[5.1] Keep packet’s original IPv6 header and SRH header unchanged.

[5.2] Push a new IPv6 header to the packet. This new IPv6 header may be constructed in two ways, depending on whether the mirror SID (i.e. the context ID) is routable or non-routable.

[5.2.1] If the mirror SID (i.e. context ID) is routable, Set DA = context ID, no SRH is needed.

[5.2.2] If the mirror SID (i.e. context ID) is non-routable, there are two sub-cases:

[a] If the bypass path coincides with the shortest path from the PLR to P, set DA = P's node SID, SRH = <P’s node SID, mirror SID>, SL = 1.

[b] If the bypass path is an explicit path corresponding to a SID list <S1, S2,…, Sn>, set DA = S1, and SRH = <S1, S2, …, Sn, mirror SID>, SL = n.



Note that only [4.2.1] is similar to H.Encap defined in draft-ietf-spring-srv6-network-programming. The other behaviors need be defined.



[5] When P receives a re-routed packet, it should get the mirror SID (i.e. context ID) from the outer IPv6 header, remove this outer IPv6 header, and continue to process the inner IPv6. When processing the inner IPv6 header, P should process E’s VPN SID by using the mapping indicated by the mirror SID (i.e. context ID).


Finally, a few general comments on this draft:

-          The draft currently uses an example (IMO, simplistic) to describe the mechanism. Please consider having a section of generic theory of operation, and then use an example to illustrate.
-          Do not put the above comments directly in the draft. By no means I’m writing the text for this draft.

Thanks,
-- Yimin


From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>>
Date: Sunday, February 23, 2020 at 7:01 AM
To: Yimin Shen <yshen@juniper.net<mailto:yshen@juniper.net>>, Huaimo Chen <huaimo.chen@futurewei.com<mailto:huaimo.chen@futurewei.com>>
Cc: "rtgwg@ietf.org<mailto:rtgwg@ietf.org>" <rtgwg@ietf.org<mailto:rtgwg@ietf.org>>
Subject: RE: Mail regarding draft-hu-rtgwg-srv6-egress-protection


Dear all,

I concur with Yimin's comments in his last email.



I have also an additional concern regarding support of a Mirror SID in SRv6. This concern is based on the following observations:

  1.  As per RFC 8402, a Mirror SID is a special case of the Binding SID
  2.  In SR-MPLS, a Mirror SID is defined as a generalization of the Context label  as defined RFC 5331. If it is not the last label in the label stack, then, to the best of my understanding, it is just the Context label identifying the context label space in which the next label (representing the next SID in the list) is looked up. in other words, ability of SR-MPLS to support Mirror SID is based on support of context labels and context label spaces in the MPLS DP. IMHO and FWIW it would not work with the MPLS DP as defined in RFC 3031 and 3032.
  3.  As mentioned in the email by Zhibo Hu<https://clicktime.symantec.com/397J25GUxhisvSuUz3BV2M46H2?u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Frtgwg%2FJ2fJ3PF-bIYIeRzeWG83QpqpAR4%2F__%3B%21%21NEt6yMaO-gk%21V-obNn_H2GxE-5f1nt8OkBTJoJf0qTAdCWwntY6AQ4cWAHhLMUjV4C237QgDmVE%24>, “The behavior of PLR encapsulating Mirror Sid is the same as that of SRv6 Ti-LFA。draft-ietf-spring-srv6-network-programming section 5.1 has been mentioned that H.Encap is used to encapsulate the TiLFA Repair List”.  I assume that this what the draft in question intends to do, i.e.,:
     *   Push a new IPv6 header and a new SRH on the original packet.

                                                               i.      The new SRH would include the Node SID of the Protector node and the Mirror SID

                                                             ii.      The destination IPv6 address would be the address of the Protector node

                                                           iii.      The Next Header value in the SRH would be IPv6

     *   Decrement the TTL in the inner IPv6 header
     *   Forward the packet towards the Protector node.
  1.  This technique would work just fine in the case when the inserted SID refers to a topological instruction (as in the case of Ti-LFA or in the case when a binding SID represented an SR policy.  But I do not understand how it could be used with SIDs that are not topological instructions without any updates to IPv6 data plane.



My 2c,

Sasha



Office: +972-39266302

Cell:      +972-549266302

Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>



-----Original Message-----
From: rtgwg <rtgwg-bounces@ietf.org<mailto:rtgwg-bounces@ietf.org>> On Behalf Of Yimin Shen
Sent: Sunday, February 23, 2020 4:10 AM
To: Huaimo Chen <huaimo.chen@futurewei.com<mailto:huaimo.chen@futurewei.com>>; rtgwg@ietf.org<mailto:rtgwg@ietf.org>
Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection



Hi Huaimo, Authors,



>> Step 1:  Find the P-Space P(Z, X) and the Q-Space Q(Y, X), which are similar to those in [RFC7490];



Unfortunately this is not a right solution. As I mentioned before, in egress protection, bypass path computation should not rely on LFA, because it is not finding a path to merge back to the protected/primary router. I have already suggested in a previous email to remove the link between PE3 and PE4, to make your discussion more generic. Similarly, the draft should not assume there is a multi-hop path from PE4 to PE3 which does not traverse P1. Your  mechanism must be able to return a bypass path in these cases. My suggestion is to take the guidelines in RFC 8679, and use context-IDs as locators.



>>    Step 5:  Try to find a shortest path from Z to Y without going through X;



As a transit router, Z is supposed to perform generic bypass calculation for X (like other IPv6 addresses), based on a general FRR logic. So, how would Z even know to "Try" in this step ? What is it trying ? Isn't this "shortest path from Z to Y without going through X" the bypass path you are looking for in Step 1 - 3 ?



>>    For a (primary) locator associated with the (primary) egress node of a SR path/tunnel, most often the locator is routable.  This is the case we assumed,



Non-routable locator should be supported, and it can be supported. In this case, bypass path calculation should be based on BGP nexthop. Again, please refer to RFC 8679 regarding how to use context-ID as BGP nexthop for a solution.





Thanks,

-- Yimin





From: Huaimo Chen <huaimo.chen@futurewei.com<mailto:huaimo.chen@futurewei.com>>

Date: Friday, February 21, 2020 at 11:45 PM

To: Yimin Shen <yshen@juniper.net<mailto:yshen@juniper.net>>, "rtgwg@ietf.org<mailto:rtgwg@ietf.org>" <rtgwg@ietf.org<mailto:rtgwg@ietf.org>>

Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection



Hi Yimin,

    Thanks much for your comments.

    The procedure with details that a PLR uses to compute a backup path has been added into the draft, which has been uploaded.

Best Regards,

Huaimo

Hi Huaimo, authors,



>>> Node P1's pre-computed backup path for PE3 is from P1 to PE4 via P2.



I’m still concerned that there is no details in this draft about the procedures how a PLR computes a backup path to the protector, in both of the two cases below.



[1] the primary locator is routable.

[2] the primary locator is not routable.



Thanks,

-- Yimin







_______________________________________________

rtgwg mailing list

rtgwg@ietf.org<mailto:rtgwg@ietf.org>

https://clicktime.symantec.com/3F1LB8RvcSLpHAYLrEmGjgH6H2?u=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Frtgwg<https://clicktime.symantec.com/3TrsjdFhRRm4aE9TBxouLoc6H2?u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fclicktime.symantec.com%2F3F1LB8RvcSLpHAYLrEmGjgH6H2%3Fu%3Dhttps%2A3A%2A2F%2A2Fwww.ietf.org%2A2Fmailman%2A2Flistinfo%2A2Frtgwg__%3BJSUlJSUl%21%21NEt6yMaO-gk%21V-obNn_H2GxE-5f1nt8OkBTJoJf0qTAdCWwntY6AQ4cWAHhLMUjV4C23Pywcm-4%24>

___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________

___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is 
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this 
transmission in error, please inform us by e-mail, phone or fax, and then delete the original 
and all copies thereof.
___________________________________________________________________________