Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Fri, 30 April 2021 13:07 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66DA93A1737; Fri, 30 Apr 2021 06:07:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.616
X-Spam-Level:
X-Spam-Status: No, score=-9.616 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=R4yIp2wY; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=KM5zC72f
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LClY3I0o06Iz; Fri, 30 Apr 2021 06:07:47 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DAAB3A1731; Fri, 30 Apr 2021 06:07:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=61476; q=dns/txt; s=iport; t=1619788067; x=1620997667; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Mo3KGQzhQBnIxw4hkR0LW96/fh+/0iWWk72xrfTi82g=; b=R4yIp2wYhUF6xVhK57DaAil5cQF3fKf6HgO29dwuZ9AtHzDmACT/Yx4l nVDEGRwMysKvcbLFPgRVtmJjpO+8Usd6jAz3bK4wCO3vFdzSOjHPZTj2f TDT9U9CXk4RQBOAYuykJw3kbm5UtyvvlWgkT1FlLFHG5/wbKKBgDW7IHn M=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:/ohjRBNmpJXLLqPGnTMl6nf3WUAX047cNxMJ6pchl7NFe7ii+JKnJ kHE+PFxlzfhUoDS6vYCgO3T4OjsWm0FtJCGtn1KMJlBTAQMhshemQs8SNWEBkv2IL+PDWQ6E c1OWUUj8yS9Nk5YS8n7blzW5Ha16G1aFhD2LwEgIOPzF8bbhNi20Obn/ZrVbk1IiTOxbKk0I g+xqFDat9Idhs1pLaNioiY=
IronPort-HdrOrdr: A9a23:V4w9SqMVjK9kXsBcT5Px55DYdL4zR+YMi2QD/3taDTRIb82VkN 2vlvwH1RnyzA0cQm0khMroAsi9aFvm39pQ7ZMKNbmvGDPntmyhMZ144eLZrQHIMxbVstRQ3a IIScdDIfX7B1RikILe6A63D94vzLC8gd+VrM31pk0dKj1CQadm8gt/F0K/Gkp5WAFJCfMCZe Shz+BAoCetfmlSU9SjChA+Lqb+jvDotLajWx4JABY79BKD5AnJ1JfWGwWVty1uKA9n7qwl9Q H+4mnEz4Wl98q20xrNk1LUhq4m5OfJ7vtmKIiyhtMOKjPq4zzYJbhJf7GZpjg6rKWOxT8R4a PxiiwtNchy9H/dF1vdyXCGtmWQs0dN11bYxVCVmnflq8DiLQhKdvZpv55TcRfS9iMbzbdB+Z 9LxG6Qut52Ch7NjU3GlqD1fixqjUa9rD4el/cShRVkIPIjQYJWxLZvmH99IdMlJmbX+YonGO 5hAIX3//BNa26XaHjfoy1G3MGsdm5bJGbHfmEy/uiulxRGlnFwyEUVgOYFmG0byZ47Q55Yo8 zZL6VTkq1URMN+V9M/OM4xBe+MTkDdSxPFN2yfZX79ErscBn7Lo5nrpJI4+f+tY55N6Jcpgp zOXBd5uAcJCgDTIPzL+KcO3gHGQW27Uzio4NpZ/YJFtrr1Q6euPjaETFwojsu8s/QSCsDWQJ +ISdZrKs6mCVGrNZdC3gX4VZUXA2IZStcpttEyXE/Los+jEPysisXrNNLoYJb9GzctXW3yRl EZWiLoGclG5ke3HnvxgB3bXWLxalXylKgAVpTyzqw28swgJ4dMug8ahRCS/ceQMwBPtaQwYQ 95O7PokqSyoGGs5mbW52B1Oh5QZ3wlpYnIYjdvn0snIkn0ebEMt5G0YmZJxkaKIRd5UofLCg JFvk92/qi2NpSUwignB7ucQzunpkpWgEjPY4YXm6WF68ugR4gxCYw+XrdtUS/REQZupApsoG BfSQMNS0PFDAnygaG9gJF8PpCGS/BMxCOQZe9dszb2qFiVr8BHfAprYxeeFeqsxTsIaxURrF tr6KMbiKeHgl+UWBsCqdV9FkZNZmSRCK9BFyKfauxv6+vWUTA1a3uWjjqHjBx2XWzm+ywp9z HcBBzRX+3XCVxAvX0d6ILWyRdfc2WQeF8YUAEhjaR0CXnGtnFv0eWCe6q01C+LZkEfx/wGWQ u1Egc6M0dgwcu62wWSnyvHHXI6xo82NuiYF7g7darPs0ndZbGghOUDH/VO+oxiO82ruugXUf iHcwv9FkKyN8o5nwiUrG0iIi96tT0tlu7pwgTs6Cy90GQkCfTfZFRgSLdzGaDX00H0A/KJ2o 5+l9Q7oK+5NXjwcMePzeXPdCFYQymj11KeXqUts9RZrKgyvLx8E93SVibJzmhO2FE7IN3vnE 0TTaxn6Nn6S8NSVt1Xfzgc8ksildyJIkduqADwD+MkdVwmjnPQPbqykvL1gKtqBlfEqBr7OF GZ/SEY4uzMWDGb06UGT603OmZbZSEHmTtf1fLHc5eVDgqkd+tOpgXndnC8daJQU6iDF/EbqA 1g79SBgu+QcG751WnrzE9GC7ML93ziR8W4RB+IE6pP9dexPFyXmKuk4MKpll7MOHKGQlVdgZ cAbFAaa8RIlyIrg4I22DWjU6CfmDNRr3JOpTV80kP30oeo4G3HDVhLPA3QjJJRRyRSOBGz/L P42Pnd0m/87jhD0YTCE0kVfsgmIaljcrTK
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.82,262,1613433600"; d="scan'208,217";a="703940370"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Apr 2021 13:07:45 +0000
Received: from mail.cisco.com (xbe-rcd-003.cisco.com [173.37.102.18]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 13UD7jvI015695 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 30 Apr 2021 13:07:45 GMT
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xbe-rcd-003.cisco.com (173.37.102.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Fri, 30 Apr 2021 08:07:45 -0500
Received: from xfe-rcd-001.cisco.com (173.37.227.249) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Fri, 30 Apr 2021 08:07:45 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3 via Frontend Transport; Fri, 30 Apr 2021 08:07:45 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nQdTY4Vr6gUflXV13eONkzPPHEU1iSC30JN26I4D7zAhVBKN7/RMzJ1gJ9EIKzXzRUwcXzceifipUAS3S6e552pPk1cuTrMWMBQUgoeK72E2CENxnuZXL/USQKCGPQq68W6OHo263cgjrQASouZr9T4FfofwuIMfyqLy8TCwE+RahbIZ2TKi8Gv7ZQ8y0GePjB6KgIkjO0IP4kb/pCciTp0suhxXUN9YS0ah8/gZJx86sxtOAxFM0S+y2xJxd1CRs/kEiJbUywBYvJ0wBxzc5+6CGAVs53xMymofo92KTotDZux898rEMppDDTiVUcH0LmYWsasBuswI6MKZGJe2zg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Mo3KGQzhQBnIxw4hkR0LW96/fh+/0iWWk72xrfTi82g=; b=ODZa7sKu1zt23NkVAagiP29pmgDvLRAZJ+kkvzEmAk+vxLZ2uTSB0MOhYFjjyV2VR87d682zw2m53Qyh8fLXff7e3ow7+Ojy8BVnXV+g4FDws9I9ZtJBfYVtIKTZOwTETcCCjN+M3YMDOGuQUJ9WdvJPsrqG7MWRSmiiDdFOGGtMJF9KEf2J2XN96WOf5FN9XRayjXj/WZYI4a77jQ5l81JM/+LkS8PcCkIPps5R5TNRynWGyr0yxSFOH9gnKcqNrDuHmKpJ/PDEhUauB9iYWKpwHHppvtLRwYNxPiVZjR1APBkkpHabSN/vIojXJinFX6rrZ+czf13JpdSGj3/SZw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Mo3KGQzhQBnIxw4hkR0LW96/fh+/0iWWk72xrfTi82g=; b=KM5zC72fGp2/WLxcO7AQOrU8lzEDuvYH5JR3J+/hy/VRWa4Wh+th0AN/dyKAmymxj/R2qMop3h+3NTKx21yCF5REVMcGVRiYn6JN7C6b1CliK2Csqie9S/BbaWRVCidm70/oC3lXgJQ+d+URaVlHGp9vPhj2fgfACrXhmxhFGqE=
Received: from MW3PR11MB4570.namprd11.prod.outlook.com (2603:10b6:303:5f::22) by CO1PR11MB4851.namprd11.prod.outlook.com (2603:10b6:303:9b::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4065.21; Fri, 30 Apr 2021 13:07:44 +0000
Received: from MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::592f:2e19:cf5b:a0f5]) by MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::592f:2e19:cf5b:a0f5%5]) with mapi id 15.20.4065.027; Fri, 30 Apr 2021 13:07:43 +0000
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Dhruv Dhody <dhruv.ietf@gmail.com>
CC: James Guichard <james.n.guichard@futurewei.com>, "spring@ietf.org" <spring@ietf.org>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>
Thread-Topic: [spring] WGLC for draft-ietf-spring-segment-routing-policy
Thread-Index: AdcuvULnk99okXSERoCLmuuUCHnxwAOAoYgAAAFggFAABtYOAAAAN7TgACmS4oAAAd/PwAAMgT8Q
Date: Fri, 30 Apr 2021 13:07:43 +0000
Message-ID: <MW3PR11MB457091AB5BC5A7E441337770C15E9@MW3PR11MB4570.namprd11.prod.outlook.com>
References: <MN2PR13MB4206EF1F6E9B1C01BDDCDD76D24D9@MN2PR13MB4206.namprd13.prod.outlook.com> <CAB75xn6mV0b6AT_6DQEGNBvhMw1bLm7Hr-X71+afe+zPMBxaPg@mail.gmail.com> <MW3PR11MB4570B64CAD44377A56D5C0EDC15F9@MW3PR11MB4570.namprd11.prod.outlook.com> <CAB75xn6rcP7QbCZEgANgT15956M5GW0RkGN7FcT+-DTQnAPs0w@mail.gmail.com> <MW3PR11MB457062613B7F61B6D977BB39C15F9@MW3PR11MB4570.namprd11.prod.outlook.com> <CAB75xn5-4p5rbgSOEmNcu9=e3wAwb+7ENxxzAN=iBVik4GkORA@mail.gmail.com> <MW3PR11MB457004A6514A8E9194628554C15E9@MW3PR11MB4570.namprd11.prod.outlook.com>
In-Reply-To: <MW3PR11MB457004A6514A8E9194628554C15E9@MW3PR11MB4570.namprd11.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [72.163.220.12]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b29c4c99-1867-49ea-6038-08d90bd8f156
x-ms-traffictypediagnostic: CO1PR11MB4851:
x-microsoft-antispam-prvs: <CO1PR11MB48512BF46160FFE6C57BC51EC15E9@CO1PR11MB4851.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR11MB4570.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(346002)(39860400002)(136003)(376002)(366004)(66446008)(5660300002)(66574015)(122000001)(7696005)(53546011)(38100700002)(86362001)(26005)(76116006)(64756008)(6916009)(83380400001)(316002)(966005)(166002)(186003)(478600001)(66556008)(66946007)(33656002)(8676002)(2906002)(71200400001)(52536014)(9326002)(9686003)(6506007)(66476007)(8936002)(2940100002)(4326008)(55016002)(54906003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MW3PR11MB457091AB5BC5A7E441337770C15E9MW3PR11MB4570namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW3PR11MB4570.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b29c4c99-1867-49ea-6038-08d90bd8f156
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Apr 2021 13:07:43.6908 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: eMBQk8inUNPx76Ec76mlZuTX/AZg1bEsT2e5aSedcwNlwsPXQG8smujqQ5aQ0nKmRjSBV59W3z/twp/yCqnQfw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB4851
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.18, xbe-rcd-003.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/JOcS6DsC3WFourNdHmpRlWUMxvU>
Subject: Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Apr 2021 13:07:53 -0000

Hi Dhruv,

Just a follow-up as I was addressing Gyan’s comments. The additional considerations and details that you were looking for – was it for implementation and deployment aspects (rather than specifically security & manageability)?

We have a separate draft that carries some details which contains text that was part of this document in an earlier version : https://datatracker.ietf.org/doc/html/draft-filsfils-spring-sr-policy-considerations-07

It has been removed as it was purely informational and in some cases getting into implementation specifics.

Thanks,
Ketan

From: Ketan Talaulikar (ketant)
Sent: 30 April 2021 12:55
To: Dhruv Dhody <dhruv.ietf@gmail.com>
Cc: James Guichard <james.n.guichard@futurewei.com>; spring@ietf.org; spring-chairs@ietf.org
Subject: RE: [spring] WGLC for draft-ietf-spring-segment-routing-policy

Hi Dhruv,

Please check inline below.

From: Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>
Sent: 30 April 2021 11:43
To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Cc: James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>>; spring@ietf.org<mailto:spring@ietf.org>; spring-chairs@ietf.org<mailto:spring-chairs@ietf.org>
Subject: Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy

Hi Ketan

Thanks for handling the comments. Just a final comment on the security/manageability considerations that explains my reasoning. I would let you/shepherd take a call!

This draft describes the SR Policy with a common informational model which has proven to be quite useful.
[KT] Agree.

I would like to see this approach extended to also capture the security and manageability aspects in a protocol-agnostic way.
[KT] Most of the considerations are covered by the base RFC8402. The security of the mechanism used between a controller and router is protocol specific. Same goes for the manageability aspect outside of the common YANG model. Perhaps it would help if there is some text proposal for us to evaluate or at least please point specific points that we should try to cover.

The configuration of SR policy, the verification rules, SR-DB handling, various policies that control active path selection, are all common and should be listed in this I-D.
[KT] Those aspects are covered by the draft already. Please do let know if any specific points that need inclusion.

You could also give clear requirements for the protocols to build on.
[KT] When it comes to the model and general things, yes. But there will be differences in protocols themselves.

There have been cases where the protocols have differed leading to issues. Having a section in this I-D that lays out clearly for protocols would be useful.
[KT] I want to make sure here that we are still talking about security and manageability? Or is there any other specific aspect?

As the work is distributed across WG, IMHO having a SPRING WG consensus on such a text would be nice.
[KT] Another aspect is a lot of the key protocol work is in fairly advance stages. We already have some PCEP specs published while others are quite mature with implementations and deployments. The BGP SRTE is also implemented and deployed – hopefully it gets into WGLC right after this. So we need to also look at the timing aspects for the specific points that we would like to see added.

Thanks,
Ketan

Just my 2 paisa :)
Stay Safe!

Thanks!
Dhruv


On Thu, Apr 29, 2021 at 7:40 PM Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>> wrote:
Hi Dhruv,

Please check inline below.

From: Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>
Sent: 29 April 2021 15:46
To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Cc: James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>>; spring@ietf.org<mailto:spring@ietf.org>; spring-chairs@ietf.org<mailto:spring-chairs@ietf.org>
Subject: Re: [spring] WGLC for draft-ietf-spring-segment-routing-policy

Hi Ketan,

Thanks for the discussion. Sniping to -


If a node is identified by multiple addresses, from the point of view of the SR policy they would be considered as different nodes, correct?
[KT] This relates to the computation of SR Policy which is outside the scope of this document. There was some text around computation aspects in an earlier version of the draft that has been moved into draft-filsfils-spring-sr-policy-considerations around the WG adoption time. To answer your question, the endpoint address can be mapped to a node which becomes the tail-end and then path is computed to that node. In that case, multiple addresses may all map to a single node. This would be an implementation aspect.

[Dhruv]: I was thinking from the SR policy identification point of view, i.e. <H1-IP1, color, endpoint> and <H1-IP2, color, endpoint> will be considered as different SR policies even though H1-IP1 and H1-IP2 belong to the same headend H1.
[KT] Yes, they would be different SR Policies.


- Section 2.3, What are the 8-bit values for the Protocol-Origin, is there an existing registry that is used here? Is it - https://datatracker.ietf.org/doc/html/draft-ietf-idr-te-lsp-distribution-14#section-9.4 , should it be listed in this document perhaps?
[KT] These are not code points but suggested default values for the Priority assigned to each protocol. An implementation may use a completely different scheme and/or make theme configurable. I see that https://datatracker.ietf.org/doc/html/draft-ietf-pce-segment-routing-policy-cp-04#section-5.2.2 does not clearly indicate this and perhaps the authors should clarify that the Protocol Origin in that PCEP TLV is used to tweak/signal the Priority value to be used for that particular CP in the tiebreaker.


[Dhruv]: I am referring to this text -

   Protocol-Origin of a candidate path is an 8-bit value which
   identifies the component or protocol that originates or signals the
   candidate path.

Which says that an "8-bit value" identifies the protocol as PCEP, BGP, etc. What you are describing is the priority associated with the protocol. I feel the term "Protocol-Origin" and "Protocol-Origin Priority" is used interchangeably, leading to this misunderstanding.

To confirm, in the example - Candidate-path CP1 <protocol-origin = 20, originator = 100:1.1.1.1, discriminator = 1>. The value 20 identify BGP or the Priority value associated with BGP? I am assuming it is the priority!

In which case some cleanup of text is needed to make things clear.
[KT] I see your point. The use of “priority” and that too inconsistently might be the cause for the confusion. Will clean-up the text around this.


- Section 10, It might be a good idea to acknowledge security considerations from the SR policy architecture point of view: how various SR policy parameters and attributes could be exploited to make a headend to forward the traffic incorrectly. It is better to add details that clearly show that the authors/WG have given it a thought and analyzed the implications.
[KT] As a reminder the SR Policy has been introduced in RFC8402 which covers these aspects of incorrect routing and other challenges associated with source routing. This document is only providing the details of the implementation construct/framework for the SR Policy.


[Dhruv]: In my reading, RFC 8402 security considerations are focused on the data plane and not much on the interaction between the controller and SR nodes where the SR policy architecture comes in.
[KT] This document does not cover the actual protocols used for interactions between controller and routers – that is covered via PCEP and BGP documents.


- Section 11, What is the range of the value for Segment Types? A-Z only? It would be good to be clear about this. With A-K already allocated, worth thinking if this is too restrictive and not future-proof. Perhaps we could think of the value as a string that is currently populated with a single alphabetic character.
[KT] String can become freeform. How about A-Z, then AA-AZ … ZA-ZZ – that should be a large enough space?

[Dhruv]: That works. Maybe you could add this to the table to clearly indicate the range:
L-Z: Unassigned
AA-ZZ: Unassigned
[KT] I’ll try to describe this in the text since the AA-ZZ might not be very clear.


Related question: is there a value in putting aside a few of these for Experimental Use?
[KT] I don’t think so because these are not signaled in any protocol.


- Since the I-D talks about policy configuration, explicit candidate paths, verification, SR-DB, etc. I don't want to add work for the authors but I do feel in this case a dedicated manageability consideration section would be useful :)
[KT] Good catch. I will add it. It is not much work really since we need to point to RFC8402 which introduced the SR Policy and an informative reference to draft-ietf-spring-sr-policy-yang that the WG is already working on.


[Dhruv]: That helps, but also think in lines of documenting some key considerations as per https://datatracker.ietf.org/doc/html/rfc5706#section-2
[KT] This is not really a new protocol per-se and I am not sure if this is necessary. However, if there are any text proposals, we can discuss within the WG.

Thanks,
Ketan

Hope the authors and WG find these suggestions useful.
[KT] Yes, definitely.

Thanks!
Dhruv



Thanks,
Ketan

Thanks!
Dhruv
On Fri, Apr 16, 2021 at 12:27 AM James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>> wrote:
Dear WG:

This email starts a 2 week Working Group Last Call for draft-ietf-spring-segment-routing-policy [1].

Please read this document if you haven’t read the most recent version and send your comments to the SPRING WG list no later than April 29th 2021.

If you are raising a point which you expect will be specifically debated on the mailing list, consider using a specific email/thread for this point.

Lastly, if you are an author or contributors for this document please response to the IPR call in the previous email thread.

Thanks!

Jim, Joel & Bruno


[1] https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing-policy/




_______________________________________________
spring mailing list
spring@ietf.org<mailto:spring@ietf.org>
https://www.ietf.org/mailman/listinfo/spring