review-ietf-rtgwg-segment-routing-ti-lfa-10-secdir-early-hardaker-2023-05-11-00

"Stephane Litkowski (slitkows)" <slitkows@cisco.com> Fri, 30 June 2023 14:24 UTC

Return-Path: <slitkows@cisco.com>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C42DC15106F; Fri, 30 Jun 2023 07:24:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.895
X-Spam-Level:
X-Spam-Status: No, score=-11.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="KVFFsIfg"; dkim=pass (1024-bit key) header.d=cisco.com header.b="ekdV4Es7"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0exjSaQlbwwD; Fri, 30 Jun 2023 07:24:36 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 497F9C14CF1D; Fri, 30 Jun 2023 07:24:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26982; q=dns/txt; s=iport; t=1688135076; x=1689344676; h=from:to:cc:subject:date:message-id:mime-version; bh=2kyLBR4LEukZF91Zrxv5PG0W2aGP5dU6JJHqpZitbKs=; b=KVFFsIfgE8scEPnZ+z2gODweDmo1p6Cw2dVrlDEQ5fkvMyXLsipUzCaY s6JSqLhG5c/aGZOVBAjxfqKVtwV3rxSCC2EEhZpTQrFZPH0I7ngMnbOYr iGYnZFRpqbkjuabdiJB7wgt0nLTk2fcu2zrp+VwZjPCyM4ONaQBOEleOP M=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:6Kvu+R9GN/dmwv9uWO3oyV9kXcBvk7zwOghQ7YIolPcUNK+i5J/le kfY4KYlgFzIWNDD4ulfw6rNsq/mUHAd+5vJrn0YcZJNWhNEwcUblgAtGoiEXGXwLeXhaGoxG 8ERHER98SSDOFNOUN37e0WUp3Sz6TAIHRCqLg50OufyBZX6hMWs3Of08JrWME1EgTOnauZqJ Q6t5UXJ49ALiJFrLLowzBaBrnpTLuJRw24pbV7GlBfn7cD295lmmxk=
IronPort-Data: A9a23:Qs57maviOLK7Yi1nZFdxiVztDufnVEReMUV32f8akzHdYApBsoF/q tZmKTiEbPeNMWamfIx/a46ypkgEv8LRy9UxTgM9r38xFCwXgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgvA1c9IMsdoUg7wbVh3NUw2YLR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0Vm5Hhg+XvM9Lk 8xUvp2XGQFuH7zrl7FIO/VYO3kW0axu4rTLJz20ttaeih2AeHr3yPIoB0YzVWEa0r8oWicVq rpJc3ZUMkzra+GemNpXTsF3gsU/L870J6sUu2prynfSCvNOrZXrE/2Wv4EFhG5YasZmRNTRP 9I6ZCtVYQ3caD1QCHU4Jpg/pbL97pX4W2QI9A3KzUYt2EDJ0ANu35DsPcbbPNuQSq19klyRq H6D/mnlDFQAKNOAxn+e/32pi+nT2Dn8RZ4TErL96v8vhFOa7m0eFBNQUkG0ycRVkWakUN5Zb kcT4Cdr/e459VegSZ/2WBjQTGO4UgA0ZPNAHtckyx63kbPN6Ae+Vm5Dby9mZ4lz3CMpfgAC2 liMltLvIDVgtryJVH6Qnot4SxvvZ0D5ykdfO0c5oRs5D8rL+95s00qeJjp3OOvk0Y2vQGCYL yWi9XBm390uYdg3O7JXFG0rbhq2rZTPCwUy/AiSDiSu7xhyY8iuYInABbnnARRocdnxorqp5 Shsdy2iAAYmUcjleMulHL9lIV1Rz6zZWAAweHY2d3Xbyxyj+mS4Yadb6yxkKUFiP64sIGG5M BeN4l8Nv8APZxNGiJObharvU6zGKoC+TbzYugz8NbKin7AoLlbcpXEyDaJu9zm3yBJEfV4D1 WezKJbwUily5VVPxzutTOBVyq4w2i073gvuqWPTkXyaPU6lTCfNE98taQLWBshgtf/siFuOq b53aZDVoyizpcWjOEE7B6ZJcwBTRZX6bLirw/Fqmhmrc1s3Qj96Uqa5LHFIU9UNopm5X9zgp xmVckRZ01H4w3bALG23hrpLMdsDgb4XQaoHABER
IronPort-HdrOrdr: A9a23:dXVlDa58IaB1OF2o+QPXwU6BI+orL9Y04lQ7vn2ZFiY1TiXIra 6TdaoguiMc0AxhJU3I+errBEGBKUmskqKdkrNhQYtKPTOW81dASbsD0WKM+UyaJ8STzJ856U 4CSdk1NDSTNykBsS+S2mDReLpQo6jkzEnCv5a5854Zd3ATV0gW1XYBNu/0KDwTeOBBP/cEPa vZwvACiyureHwRYMj+LGICRfL/q9rCk4+jSQIaBjY8gTP+wQ+A2frfKVy1zx0eWzRAzfMJ6m 7eiTH04a2lrrWS1gLc7WnO9J5b8eGRheerRfb8xPT9GA+cyjpAV74RGIFqewpF4t1H3Wxa0e UkZS1QevibpUmhOl1d6iGdpDUImAxelUMKj2XozEcKZafCNXQH4w0rv/MfTjLJr0Unp91yy6 RNwiaQsIdWFwrJmGDn68HPTAwCrDvDnZMOq59ms5Vka/poVJZB6YgEuE9FGpYJGyz3rIghDe l1FcnZoPJba0mTYXzVtnRmhIXEZAV6Ij6WBkwZ/sCF2Tlfm350i0Me2cwEh38FsJYwUYNN6e jIOrlh0LtOUsgVZ6RgA/ppe7r/NkXdBRbXdG6CK1XuE68Kf3rLtp7s+b0woPqnfZQZpaFC7a gpkGkox1LaV3ieevFmhqc7gywlaF/NLQjQ9g==
X-Talos-CUID: 9a23:hwnIS298VQQ4WfULkUWVv3E9Cs0fbF7C9izJOkS5LjZvD5yEblDFrQ==
X-Talos-MUID: 9a23:sa+RTA2KtCjFxXEALgwV06FARTUjuoahUFgunIQ8ttCYPgxvCRWyoj62e9py
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Jun 2023 14:24:35 +0000
Received: from alln-opgw-2.cisco.com (alln-opgw-2.cisco.com [173.37.147.250]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 35UEOYap028208 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 30 Jun 2023 14:24:35 GMT
Authentication-Results: alln-opgw-2.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=slitkows@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,171,1684800000"; d="scan'208,217";a="3685676"
Received: from mail-bn7nam10lp2105.outbound.protection.outlook.com (HELO NAM10-BN7-obe.outbound.protection.outlook.com) ([104.47.70.105]) by alln-opgw-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Jun 2023 14:24:34 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PMPFyN2iWVGVwRC3n+QN8wMCgCEKWJcGjrA/5U/1I1rbmU4BJ361XjHtNvdLl6e/0wNvUEvhDS6UAZiGN+y40qQh9v7zqUtFZs4ldCLnOt7qhwwhqi8kwhvV2F9morEHOqePkETc8XTLYrAf36Bies1Xg8PuCYmPVogtWFQUgdkcleCxeynfNqTHfsFBym5RFpUWFjX/78FZl2JwYaNOFQe6AkMQIuW/z1/GPhhhA+Ol3J2bjCr8e9Pd1mNQretRP4R+Ufv/AyKflZnwVh9mT8wuCt6pwIsMOartwQ/GqRisMRHwkHr0FqbtmU04haYgy0WDhL6kwSMh+oC+Fx1bgw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9bUH84X/EiSiSPiIviO67o9LDOjOXeWazpsRSv8KOHc=; b=K+c7B7skzfrsBilKZQb9xyDquJ0vFTU1DjDSldZj4M5h0+vNNajfTMw5nggX6RrT9tYDmVk8yrTzatLPDPCovtZSS+vM/xKunY6+SLQLIvmQ2xKJYiAitzAVUYc9ikdBJsPTDP02pxEuwgOEdzcWdjEL7qlbEP5itxBiCj6Dw8JxSoMDqd8D53aFTH0gOTdK+iCf2T3ItFFugXTX4paN+7UZjptVz+XOhHi2Nk5RrSgoh5nulWiHc3He8sDJan4n7ocRlgK1J9G7912lDwrmgF5d9eImQf21QAjK9UqHxV9slBET1SbLnmwmJSQfzfrQuQHZTahm5Xi58oonFdyY2g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9bUH84X/EiSiSPiIviO67o9LDOjOXeWazpsRSv8KOHc=; b=ekdV4Es70ak2U2Rarw1fgXVprjMV+qgicbZw7TvjVK2xSxuqAauCtmGaqJedUbrRI4M2LwevwMTGMARkB3qnWmFOoFx/917OUuAD7cS3nvhmhbRlL0a7e1QCLJzrW4RvqjsmqzGGsa3XMUaiQm/rqkjRf9X4L5cXAbJ5fDZQs+Q=
Received: from SJ0PR11MB5136.namprd11.prod.outlook.com (2603:10b6:a03:2d1::18) by PH7PR11MB6977.namprd11.prod.outlook.com (2603:10b6:510:205::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6544.19; Fri, 30 Jun 2023 14:24:32 +0000
Received: from SJ0PR11MB5136.namprd11.prod.outlook.com ([fe80::2856:8e87:a168:4740]) by SJ0PR11MB5136.namprd11.prod.outlook.com ([fe80::2856:8e87:a168:4740%5]) with mapi id 15.20.6544.019; Fri, 30 Jun 2023 14:24:32 +0000
From: "Stephane Litkowski (slitkows)" <slitkows@cisco.com>
To: "hardaker@isi.edu" <hardaker@isi.edu>
CC: "draft-ietf-rtgwg-segment-routing-ti-lfa@ietf.org" <draft-ietf-rtgwg-segment-routing-ti-lfa@ietf.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>
Subject: review-ietf-rtgwg-segment-routing-ti-lfa-10-secdir-early-hardaker-2023-05-11-00
Thread-Topic: review-ietf-rtgwg-segment-routing-ti-lfa-10-secdir-early-hardaker-2023-05-11-00
Thread-Index: AdmrXoeb0Cj41N3fSzSRvv3Yx13MKg==
Date: Fri, 30 Jun 2023 14:24:32 +0000
Message-ID: <SJ0PR11MB51362743E156B683A47918BCC22AA@SJ0PR11MB5136.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SJ0PR11MB5136:EE_|PH7PR11MB6977:EE_
x-ms-office365-filtering-correlation-id: b73530bc-9aab-4589-b565-08db7975b922
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB5136.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(39860400002)(136003)(366004)(346002)(376002)(396003)(451199021)(66574015)(83380400001)(38070700005)(2906002)(122000001)(38100700002)(55016003)(9326002)(8936002)(8676002)(5660300002)(52536014)(86362001)(71200400001)(54906003)(41300700001)(66946007)(66556008)(66476007)(66446008)(64756008)(6916009)(4326008)(76116006)(316002)(7696005)(33656002)(478600001)(186003)(9686003)(6506007)(26005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_SJ0PR11MB51362743E156B683A47918BCC22AASJ0PR11MB5136namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5136.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b73530bc-9aab-4589-b565-08db7975b922
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jun 2023 14:24:32.6746 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: n+I9xLjmRXJNFi5E9D4+bbs7rgt/HpsjMN6whFi+Ni02qcJ1KYzYEfCzXn2qxyY5xLwpezDg79Zi7+/q/iNzoA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB6977
X-Outbound-SMTP-Client: 173.37.147.250, alln-opgw-2.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtgwg/YxQIMTryOu4-hFJt0BsNhCMnl5Q>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Jun 2023 14:24:43 -0000

Hi Wes,

Thanks for your review and comments.

Please find some replies inline below







>These are generally fairly high level comments as a reviewer, as I

>know this is an early review so I did not flag any grammatical or

>other needed changes (aside from the one in the abstract: s/connected

>network/connected networks/).



[SLI] fixed in new version (V11)





General comment: I found the document rather hard to read in general.

I think the reasons for this were two fold:



1. I am not extensively familiar with segment routing (even though I

have a decent about of more generalized routing background).  Thus,

much of the document is targeted toward someone that has read all of

the background material which I had not.  If I get asked to do the

final secdir review (which is likely), I'll fist read all the base

RFCs to get a better handle on what the draft is trying to accomplish.



2. To some extent, I found the document written somewhat backwards.

The beginning starts with rather dense text that provides no examples

or more detailed clarifications, while the ending of the document is

easier to read as spends more time spelling out the details.  In

particular, I think the example usage in section 10 with the diagram

and the example would be far better served if placed earlier in the

document so it could be used to set an example for discussions and

referred to by the remainder of the document.



[SLI] I tried to simplify the intro and move some text in later sections in new version





Other comments:



- TLDP is referenced before definition or expansion

[SLI] fixed in new version



- The introduction is very very long.  This in itself is not a bad

  thing, but I'd recommend breaking it up into subsections to help the

  reader get a better handle on the break down of sub-topics.



[SLI] I have reworked it and move some items in different section later in the document.



- In section 1, the paragraph that starts with "From a network

  capacity planning... if link L fails on [node X], the bandwidth

  consumed on L will be spread over some of the remaining links of X".

  I do not think this is necessarily always true.  When a link fails,

  some routing may entirely route around X if other paths are shorter

  because the link that failed was critical in a shortest-path

  calculation.



[SLI] You are right, this is why the sentence has "it is often assumed that".

The fact is events on rerouting on nodes after an event will happen in a non-ordered fashion. And there is a chance (potentially high) that the node that sees the failure will reroute first, in this case, traffic received on the node and that was flowing over the same link will be spread (potentially until upstream nodes will reroute on a completely different path).





- The section introductions at the bottom of section 1 skip

  introducing section 4, which considering is the "base principle" is

  worth including (even though short).



[SLI] Added.



- The second paragraph of section 6 is an example of text that could

  use a longer description and additional references to an example.



[SLI] I have added an example.



- Although section 11 is interesting and brings real facts, these

  types of real-world datasets would be better listed in an appendix

  rather than part of the main document.  IMHO.



- With section 11 and more generally I don't see a cost measurement.

  What sort of resources does this algorithm take to execute?  How

  often would it need to be done?  From a security point of view, can

  I trigger a router (frequently) to do recalculations so I can cause

  it to waste resources?  Again, without being an expert in segment

  routing I'm not positive about this.  But I'd think an upstream

  would be able to trigger calculation events.  If any of this is

  possible, it would be worth mentioning in the security

  considerations section.



[SLI] Cost depend on exact implementation (two implementations may have different completely different costs), so IMO, there is no point of talking about that.

IGP topology events will trigger new TILFA backup path computation (in addition to the regular SPF computation). So, either you have direct access to IGP (unlikely), or you have access to a node which participates to the IGP and trigger topo changes (by playing with interfaces...).

But I'm not really sure if this has anything to do with TILFA, it's just about protecting IGP, so IGP protection mechanisms. Do you see anything special that TILFA adds and that may require additional protection for the IGP ?







Thanks




Brgds,

Stephane