Re: [spring] draft-ietf-spring-segment-protection-sr-te-paths

Shraddha Hegde <shraddha@juniper.net> Wed, 21 December 2022 17:54 UTC

Return-Path: <shraddha@juniper.net>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE78DC14F72F for <spring@ietfa.amsl.com>; Wed, 21 Dec 2022 09:54:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.995
X-Spam-Level:
X-Spam-Status: No, score=-1.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=NjRJ+cyn; dkim=pass (1024-bit key) header.d=juniper.net header.b=MUJ087ru
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d91H-5b6pu3Y for <spring@ietfa.amsl.com>; Wed, 21 Dec 2022 09:53:58 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70852C14F727 for <spring@ietf.org>; Wed, 21 Dec 2022 09:53:45 -0800 (PST)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2BL8xk91020731; Wed, 21 Dec 2022 09:53:45 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=HWRFJjQ5fkHwPLRVWK9CuREA7lYXVQBBLa5bnK5N2UI=; b=NjRJ+cynC3BJrlmOG3wsjRrnQA2PiHMVuBr6/HulPFOCJva8J6/YrINux/MNEjjRr11O t1v+IWY4AeEbmMI8emyZS84GKKbiWBfZyTeUULwfyaOOcivGoBi1+TxgP79ZGLe/8lqG 8jm76PWVcH5JVzUadm0E7oka8Aew/ylcrJqalDD0VtULYRGG6KbhwHfR9S1QRa/Adehh O33eSQwJ+Gdq9zOVeghxSHSpyR5VAiIvXrq5ylfGwt92PIftyMWcFjBKNktw3gv23nJ8 +Hvv4DR5b1UjdWRFaQYqz3GhjZhRVbgZb+Z2HFoQkvAXFFxxNvzQeAPC8+85VqpC4E15 JQ==
Received: from co1pr02cu002-vft-obe.outbound.protection.outlook.com (mail-westus2azlp17010003.outbound.protection.outlook.com [40.93.10.3]) by mx0a-00273201.pphosted.com (PPS) with ESMTPS id 3mky4f8ubs-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Dec 2022 09:53:44 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZJv3EO0nIEwIKHea/DWHOP/U2Tbhz6RIVY1pGWsPqiUEhLgk13EsvHnX9KCbGjeYxxOwpSYKq5kAOZh/CWPbs1aBONb4Qw+RPiMXv2ymIfK2MO4qHN4MPxFSCzPpQ0mIoAmsOCLKElVEkA1YH8dBlxYsxhSmYCHucQUHzXwlSsE5RbAYGFeIRZDT6ctJSwq69YARuZnkEXEqb568suQaSTrKcXhfEAa6mymSJaKbvGd/djbXtdt89aKNGhMAbNbY4FcpX8WJAOgE8t5i1SYgScthAlB+06Tsni8DK5OrSOF1SX8kku8DTAjOZzW4S8ksBXJunUYpmlefXKIjhTAQcQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HWRFJjQ5fkHwPLRVWK9CuREA7lYXVQBBLa5bnK5N2UI=; b=KsROncr+0mcDWTzj49pIh2Yu5UDby+idLBVa7JnUigA+2+r5oKUYOGntitmdNScBlEHWha3IZVxVNje+suhQumImRvMhdflelUSWIqdfG7Nm9hhgXIaJ8zrNb9fWNJZciIzauya7LC9KIjRKS0aSuqfJ1+2taGxFYlgLvch1pE61JfIqiFziRxVpNQEuwBat9x/POJ/lqYBKNz7AlyreRXYNk/vlhRdYxTh+rJvqXs7ZgPWdxDdz3sQUdGZslrXoq65QH2FL2slCk3ybyZ8zF0eF9c/T9LBZ/MVPleQxNKvgtaDe6E5mXXgsWL+TMMVNUeJY9PD8VGM6pvMNCwepRA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HWRFJjQ5fkHwPLRVWK9CuREA7lYXVQBBLa5bnK5N2UI=; b=MUJ087rusRR0sRFscNNJsJ9REItZg8MJKrPyCdhTSeFAPifHLsjL3MEgfuMliR1Pwj7M9o8RZ9BdXgOt/rRqm3ASQG5ylwsZJLNaIT2ZlJE8WlCyrYSe5Qg5Jj2n51pgrP+YbGx7AzQmSZNChV/W3igx6wpSWevrS4kLHryWWRw=
Received: from CO1PR05MB8314.namprd05.prod.outlook.com (2603:10b6:303:fd::13) by SN4PR0501MB3727.namprd05.prod.outlook.com (2603:10b6:803:48::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5924.16; Wed, 21 Dec 2022 17:53:39 +0000
Received: from CO1PR05MB8314.namprd05.prod.outlook.com ([fe80::9674:f89c:5149:a25f]) by CO1PR05MB8314.namprd05.prod.outlook.com ([fe80::9674:f89c:5149:a25f%8]) with mapi id 15.20.5924.016; Wed, 21 Dec 2022 17:53:39 +0000
From: Shraddha Hegde <shraddha@juniper.net>
To: "bruno.decraene@orange.com" <bruno.decraene@orange.com>
CC: SPRING WG <spring@ietf.org>
Thread-Topic: draft-ietf-spring-segment-protection-sr-te-paths
Thread-Index: Adj7Mh2q6Ly0MX2SRXClokE4dRULuwIfhPogAH0R8sAD73fjkA==
Date: Wed, 21 Dec 2022 17:53:39 +0000
Message-ID: <CO1PR05MB8314D66290669AA8CAB71A8AD5EB9@CO1PR05MB8314.namprd05.prod.outlook.com>
References: <9182_1668780723_637792B3_9182_201_1_ae07b29ea09546928f3ca38a26884d33@orange.com> <CO1PR05MB83143439458BEFCE6E80572BD5129@CO1PR05MB8314.namprd05.prod.outlook.com> <27895_1669914268_6388DE9C_27895_31_1_2787734567e548c1a5a49fb90c7fcd23@orange.com>
In-Reply-To: <27895_1669914268_6388DE9C_27895_31_1_2787734567e548c1a5a49fb90c7fcd23@orange.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=true; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2022-12-21T17:53:36Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method=Standard; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=0633b888-ae0d-4341-a75f-06e04137d755; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=1d7fd51a-1da9-4cb5-a750-7d90d093d58b; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits=2
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR05MB8314:EE_|SN4PR0501MB3727:EE_
x-ms-office365-filtering-correlation-id: 925ca283-aafb-47f5-65f0-08dae37c4a8e
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR05MB8314.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(366004)(136003)(39860400002)(396003)(376002)(346002)(451199015)(38100700002)(122000001)(55016003)(33656002)(38070700005)(166002)(71200400001)(316002)(53546011)(86362001)(6916009)(478600001)(966005)(6506007)(83380400001)(66476007)(9686003)(26005)(186003)(66899015)(7696005)(30864003)(2906002)(66946007)(66574015)(8936002)(4326008)(64756008)(8676002)(66446008)(66556008)(76116006)(9326002)(41300700001)(52536014)(5660300002)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR05MB8314D66290669AA8CAB71A8AD5EB9CO1PR05MB8314namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR05MB8314.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 925ca283-aafb-47f5-65f0-08dae37c4a8e
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Dec 2022 17:53:39.2017 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vnzNZws00GQe5ep+qRrAtA99ImPpKYFq78P58Yq4tS7cwQsyjGWAKntqrdlQp9a7sLOBP8ghaZaqxmfaIeoeRQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR0501MB3727
X-Proofpoint-ORIG-GUID: iJpglW3jz7nPUkiqZVNDotR200pLBaRX
X-Proofpoint-GUID: iJpglW3jz7nPUkiqZVNDotR200pLBaRX
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-12-21_10,2022-12-21_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 clxscore=1015 impostorscore=0 suspectscore=0 bulkscore=0 malwarescore=0 mlxlogscore=999 priorityscore=1501 spamscore=0 lowpriorityscore=0 mlxscore=0 phishscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2212210150
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/QHmp1bJaH5PHmSPRsGMwg03k1Us>
Subject: Re: [spring] draft-ietf-spring-segment-protection-sr-te-paths
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Dec 2022 17:54:02 -0000

Hi Bruno,

Pls see inline [SH2]



Juniper Business Use Only
From: bruno.decraene@orange.com <bruno.decraene@orange.com>
Sent: Thursday, December 1, 2022 10:34 PM
To: Shraddha Hegde <shraddha@juniper.net>
Cc: SPRING WG <spring@ietf.org>
Subject: RE: draft-ietf-spring-segment-protection-sr-te-paths

[External Email. Be cautious of content]

Shraddha,

Thanks for the reply and the discussion.
Please see inline [Bruno2]



Orange Restricted
From: Shraddha Hegde <shraddha@juniper.net<mailto:shraddha@juniper.net>>
Sent: Tuesday, November 29, 2022 6:21 AM
To: DECRAENE Bruno INNOV/NET <bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>>; SPRING WG <spring@ietf.org<mailto:spring@ietf.org>>
Subject: RE: draft-ietf-spring-segment-protection-sr-te-paths

Bruno,

Thanks for the review and comments.
Pls see inline..



Juniper Business Use Only
From: bruno.decraene@orange.com<mailto:bruno.decraene@orange.com> <bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>>
Sent: Friday, November 18, 2022 7:42 PM
To: SPRING WG <spring@ietf.org<mailto:spring@ietf.org>>; Shraddha Hegde <shraddha@juniper.net<mailto:shraddha@juniper.net>>
Subject: draft-ietf-spring-segment-protection-sr-te-paths

[External Email. Be cautious of content]

[speaking as individual contributor]

Hi  Shraddha, all,

Please find below comments on section 5 (IGP hold timer for protecting traffic to failed node)

Following my previous comments on -02, thank you for the updated text in -03.

The current solution is based on a modification of the SPF computation (or FIB installation not being in sync with the regular SPF). As such, it relies on all compliant routers to have strictly the same behavior. Otherwise this would translate into micro-loops for the duration of the hold timer (easily in the range of 10s or higher IMHO).


1)     In order to achieve this consistent behavior on all nodes, I would welcome a more normative description of the behavior with 2119 key words.
Also since the current algo relies on the spf-back off delay in order for all nodes the compute their "hold time" SPF on the same LSDB (same set of events) I think that calls for the use of a standardize back-off delay hence a normative reference to RFC 8405.
<SH> Yes. I'll add it.


2)

"A small configurable
   delay called spf-delay can be enabled, which will schedule the SPF
   after the spf-delay time on receiving the first event.  In case of a
   node going down, the spf-delay time coupled with fast-flooding can
   help to accumulate link-down events reported by all neighbors in one
   single SPF.  This mechanism is on best effort basis and does not
   guarantee that all link-down events are accumulated before SPF is
   triggered.  If there are flooding delays, the SPF might get triggered
   before receiving all events related to node going down."

A few comments:
- Indeed, the  above relies/requires fast flooding. I would suggest adding an informative reference to an extension improving the current flooding speed (draft-ietf-lsr-isis-fast-flooding)
<SH> sure. I'll add

- I don't think that the proposed trick is good enough nor really works. Typically spf-delay are configured with a short initial timer to quickly react to link failure which are the most common. This would not allow to accumulate multiple events hence different nodes could use a different event/LSP before your proposed FIB hold-down and this would translate to loops for the duration of the "hold down".
- Even if the above would work, I agree that this would be only "best effort". I don't think that this is good enough given the modest gain in good cases (improved availability on the few SR-TE path using the node going down) and the cost in bad cases (micro-loops for a relative long duration (e.g. 10s) which can overload multiple links and reducing availability of all traffic, included the one prioritized by QoS)


3)     Given the two above points, I would rather propose to use a different solution: instead of using a hold-timer, push a new node SID toward a neighbor of the failed node, typically the closest one (à la near side tunneling).
Cf draft-hegde-rtgwg-microloop-avoidance-using-spring which you wrote and which says in the abstract "Micro-looping is generally more harmful than simply dropping traffic on failed links, because it can cause control traffic to be dropped on an otherwise healthy link involved in micro-loop. This can lead to cascading adjacency failures or network meltdown."
I think that this text is also relevant in the context of draft-ietf-spring-segment-protection-sr-te-paths.
<SH> Nearside tunnelling indeed looks a better solution as the path to the nearside node is expected to be on the same path that was used before failure also the path to nearside node is not subjected to micro-loop.
I'll update the draft. Would be good to keep just one procedure instead of multiple so I would prefer removing the hold down procedure.
[Bruno2] Excellent. I fully agree with keeping a single procedure: I meant as a replacement of the hold down procedure.


Note that instead of using the closest neighbor, one could also use the neighbor advertising the mirror SID for the failed node (as defined in RFC 8667 and 8402). The use of tunneling/pushing a SID allows for this choice to be local and hence implementation dependent.
<SH> What you are proposing here is same as the mechanisms described in draft-hu-spring-segment-routing-proxy-forwarding. I have below concerns with this approach.


1.       The node advertising mirror SID may not be in the same path towards destination and is subjected to micro-loops
[Bruno2] You are correct that if all neighbors of the failed node do not support the mirror sid, the one selected may not be on the same (pre-convergence path). However micro-loops for this cases seems a problem already solved with draft-bashandy-rtgwg-segment-routing-uloop and widely implemented IINM.
[SH2] I agree.


2.       The protection path varies to a large extent compared to original TE Path which may not be desirable.
[Bruno2] yes, depending on the proportion of neighbor which support the mirror SID. On the other hand, with hold-down/near side tunneling, if one pick a node which does not support the extension (context table in section 3) the traffic will be dropped on the near-side egress. So the trade-off seems between less protection versus bigger variation of the path.
[SH] All the protection mechanisms such as LFA/R-LFA/TI-LFA provide protection for all failures when all nodes are upgraded to support the mechanism otherwise only the PLRs that are upgraded would provide protection.
Node protection for SR-TE paths is similar with a difference that the nodes lying in the SR-TE Path will also have to be upgraded (along with PLR) to get full benefit of any failure.


3.       Traffic may be subjected to double/triple bandwidth booking in some topologies and some scenarios. This was extensively discussed in mail threads sometime ago.
[Bruno2] agreed. Also very much dependent on the number of neighbor supporting the mirror sid.
[SH2] If the mechanism is to select just the nearside node for tunnelling (The one that lies in the path pre-failure)then the solution is straight forward.
           If mirror sid and hence any of the neighbors is to be allowed to be chosen for tunneling then there are more questions to answer. If there are more than one mirror-sid then which one
           Needs to be selected? Some may prefer closer to source, some other may prefer closer to destination and the list grows.



4.       When all nodes in the network are upgraded to provide node-protection there would be maximum benefit and when all nodes are not upgraded, the nearside tunneling solution provides

Best possible solution, I don't really see the need for overengineering the solution for partial upgrade cases.

[Bruno2] thanks for the clarification. I agree that with partial deployment there is always trade off (cf above). I'm not sure to understand why the mirror sid would be over engineering as advertising a sub-TLV seems enough and it may also helps the computation as it advertise the "lost" SID in the current LSDB (so this looks easy to compute) while the current approach/near-side tunneling seems the "lost" SID in not anymore in the current LSDB so a priori needs to be looked in the previous LSDB.

[SH2] The mirror-sid in itself is not a problem but if all neighbors advertise mirror-sid and a transit node is expected to choose one among them is problematic. Since the chosen protection path may lead to issues like bandwidth double-booking you would want to have some control over what gets chosen etc.

 draft-ietf-spring-segment-protection-sr-te-paths never intended to solve the issue of partial upgrade. The draft has been around for the longest time. Would be good to get this one through instead of introducing new requirements to this draft IMO.



Regarding partial upgrades, I would really like to hear if people are really interested in solving this problem. And if so would they be interested in a solution that partially solves the partial upgrade problem.



In all cases, thanks for the useful discussion.



Regards,

--BRuno



Thank you,
Best regards,
--Bruno

> Bruno,
>
> Snipped...
>
>   1.  draft-ietf-spring-node-protection-for-sr-te-paths
>
> "If the Node-SID or Prefix-SID becomes
   > unreachable, the event and resulting forwarding changes should not
   > communicated to the forwarding planes on all configured routers
   > (including PLRs for the failed node) until the hold-timer expires."
>
>
>   *   It's not crystal clear to me how it would work in reality, so I would welcome more prescriptive text. In particular:
     > *   "node failure" is not an IGP message. IGP nodes sees multiple "adjacency loss" messages which are not atomic and could be handled in multiple SPFs. Hence different nodes will freeze their FIB based on a different topology (link1 for some, link2 for others) leading to inconsistent routing and forwarding loops.
> <SH> I will add text to capture this point and also add detailed text on possible solutions.
>
>
     > *   How is the FIB modified in cases of consecutives IGP events? (freezed on hold topology may lead to drops, updating entries would need to be specified.
> <SH> Agreed.
>
>   *   On a side node, this text requires a global behavior of all IGP nodes. That seem a bit out of scope of a non-normative sentence, in an informational document, describing a local behavior on the PLR.
> <SH> I don't think we need any protocol extension for solutions described in this document but if  WG thinks it should be a standard rather than informational
> we should upgrade this document status IMO.
>
> Rgds
> Shraddha
>
>
>
> Juniper Business Use Only
> From: spring spring-bounces@ietf.org<mailto:spring-bounces@ietf.org> On Behalf Of bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>
> Sent: Wednesday, February 2, 2022 6:56 PM
> To: slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com>; 'SPRING WG' spring@ietf.org<mailto:spring@ietf.org>; Huzhibo huzhibo@huawei.com<mailto:huzhibo@huawei.com>
> Subject: Re: [spring] WG adoption call - draft-hu-spring-segment-routing-proxy-forwarding
>
> [External Email. Be cautious of content]
>
> Hi authors of both documents, WG,
>
> [Speaking as individual contributor.]
>
> It's good to see technical discussions on the restoration of failed SIDs used by SR policy.
>
>
>   1.  From a functional point of view, can we summarize the benefit to signal the node proxy capability?
> e.g.
> - drop the traffic earlier if the PLR does not support proxy capability. (helps with congestion)
> - use another proxy off the shortest path (increase congestion but reduce loss)
> - possibly help identifying the proxy (nominal is not in the reachable topology anymore)
> ...
> Or agree on the absence of significant benefits?
>
>
>   1.  draft-ietf-spring-node-protection-for-sr-te-paths
>
> "If the Node-SID or Prefix-SID becomes
   > unreachable, the event and resulting forwarding changes should not
   > communicated to the forwarding planes on all configured routers
   > (including PLRs for the failed node) until the hold-timer expires."
>
>
>   *   It's not crystal clear to me how it would work in reality, so I would welcome more prescriptive text. In particular:
>
     > *   "node failure" is not an IGP message. IGP nodes sees multiple "adjacency loss" messages which are not atomic and could be handled in multiple SPFs. Hence different nodes will freeze their FIB based on a different topology (link1 for some, link2 for others) leading to inconsistent routing and forwarding loops.
     > *   How is the FIB modified in cases of consecutives IGP events? (freezed on hold topology may lead to drops, updating entries would need to be specified.
>
>   *   On a side node, this text requires a global behavior of all IGP nodes. That seem a bit out of scope of a non-normative sentence, in an informational document, describing a local behavior on the PLR.
>
>
>
>
>   1.  draft-hu-spring-segment-routing-proxy-forwarding
> Rather than defining a new "Proxy Forwarding" capability in IGP why don't you use the existing Mirroring Segment (from RFC https://datatracker.ietf.org/doc/html/rfc8402#section-5.1<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8402*section-5.1__;Iw!!NEt6yMaO-gk!TiIGZ1oWfUzj6AIX35pvSwyD9BhU_1E0xwkRheX14PjuGLhIolaoExk2oKxHlihC$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8402*section-5.1*3Chttps:/*urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8402*section-5.1__;Iw!!NEt6yMaO-gk!TiIGZ1oWfUzj6AIX35pvSwyD9BhU_1E0xwkRheX14PjuGLhIolaoExk2oKxHlihC$__;IyUvKg!!NEt6yMaO-gk!Gp81jDYZ3hp9oK7AEli0aYgzF_rpD4qh844i3QpRQpiXqFnQ8gFASrQYxdoEmenRE1xqVEzcPGN9TrPR0BwQxqZ_VQ$>>) whose signaling is already standardized? https://datatracker.ietf.org/doc/html/rfc8667#section-2.4.1<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8667*section-2.4.1__;Iw!!NEt6yMaO-gk!TiIGZ1oWfUzj6AIX35pvSwyD9BhU_1E0xwkRheX14PjuGLhIolaoExk2oLCHtOYr$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8667*section-2.4.1*3Chttps:/*urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8667*section-2.4.1__;Iw!!NEt6yMaO-gk!TiIGZ1oWfUzj6AIX35pvSwyD9BhU_1E0xwkRheX14PjuGLhIolaoExk2oLCHtOYr$__;IyUvKg!!NEt6yMaO-gk!Gp81jDYZ3hp9oK7AEli0aYgzF_rpD4qh844i3QpRQpiXqFnQ8gFASrQYxdoEmenRE1xqVEzcPGN9TrPR0ByaVdWa4w$>>
>
>
>   1.  What about the following solution:
>
>   *   Use mirror SID
  > *   Tunnel to the "proxy-forwarding" advertising mirror SID
>
> I would see the following benefits:
>
>   *   No new protocol extensions (cf "3)"
  > *   Consistent routing in case of multiple SPFs (cf "2)")
  > *   Benefit from the signaling of the proxy (cf "1)")
>
> Thanks,
> Regards,
> --Bruno
>
>
>
> Orange Restricted
> From: slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com%3cmailto:slitkows.ietf@gmail.com>> slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com%3cmailto:slitkows.ietf@gmail.com>>
> Sent: Tuesday, January 25, 2022 6:13 PM
> To: DECRAENE Bruno INNOV/NET bruno.decraene@orange.com<mailto:bruno.decraene@orange.com<mailto:bruno.decraene@orange.com%3cmailto:bruno.decraene@orange.com>>; 'SPRING WG' spring@ietf.org<mailto:spring@ietf.org<mailto:spring@ietf.org%3cmailto:spring@ietf.org>>
> Subject: RE: [spring] WG adoption call - draft-hu-spring-segment-routing-proxy-forwarding
>
> Hi,
>
> I'm NOT supporting this draft for the following reasons:
>
>
>   1.  The WG already have a WG document which is dealing with this problem, I don't think that WG should come with multiple documents/solutions for the same solution space as it may just confuse the industry and create deployment issues as different vendors may pick different solutions.
>
>
>
>   1.  Adding protocols extensions adds complexity in the solution without adding a strong value.
>
>
>
> The document claims that "[I-D.ietf-spring-segment-protection-sr-te-paths] ... may not work for some cases such as some of nodes in the network not supporting this solution.". While this is true, the proposed solution in draft-hu-spring-segment-routing-proxy-forwarding has exactly the same caveat and requires all nodes in the network to support the solution.
>
>
>
> Considering the following straight line network: A -B -C -D - E - F - G -H and an SR policy from A to H using SID_G, routers A to F have to support the extension to make the solution working, if one of the router doesn't support the extension, traffic will be dropped.
>
>
>
> Then, there is no value compared to the timer-based solution of [I-D.ietf-spring-segment-protection-sr-te-paths]
>
>
>
> Authors of draft-hu-spring-segment-routing-proxy-forwarding argued that G may have multiple upstream neighbors let's say F and F' and the solution allows for F' to support the extension while F may not support, so the solution will send the traffic to F'. Well yes, but this still requires all routers upstream to F' to support this extension and maybe F is on the path to F'. So, I don't think the argument is valid as it may possibly work tactically depending on the network topology when we look at a small portion of the network, but when we look at the whole network, operator will have to upgrade all their nodes to support the extension to ensure the benefit is there.
>
>
>
> In addition, in term of traffic, forwarding traffic to a neighbor of the failed node which wasn't initially on the path, could lead to traffic congestion or high traffic peaks on links that were not sized to carry this traffic. We could easily expect some traffic tromboning, where traffic goes to this non-natural neighbor of the failed node and then goes back over some part of the same path before reaching the destination.
>
>
>
> So these protocol extensions are bringing complexity for no value here.
>
>
>
>
>   1.  Regarding BSID, I'm not fan of advertising BSIDs in IGP as there may be hundreds or thousands of BSID on a node which again will create a lot of burden in IGP. The proposed way will have to be discussed in LSR, not in SPRING (see next comment).
>
>
> Note that [I-D.ietf-spring-segment-protection-sr-te-paths] could also work with BSIDs as long as BSID information of failed node is available in the control-plane of PLRs by whatever mechanism. I think this BSID handling is orthogonal to the proxy-forwarding controlplane behavior. The forwarding operations for BSID will have to be discussed more in details, we could not expect all HW to be able to do 3 or 4 lookups without any perf degradation.
>
>
>
>   1.  The document is currently a bit borderline between SPRING and LSR as it talks in good details about IGP protocol extensions. If it's a SPRING doc, it should detail reqs for protocols but nothing beyond.
>
>
>
> Brgds,
>
> Stephane
>
>
> From: spring spring-bounces@ietf.org<mailto:spring-bounces@ietf.org<mailto:spring-bounces@ietf.org%3cmailto:spring-bounces@ietf.org>> On Behalf Of bruno.decraene@orange.com<mailto:bruno.decraene@orange.com<mailto:bruno.decraene@orange.com%3cmailto:bruno.decraene@orange.com>>
> Sent: jeudi 13 janvier 2022 11:19
> To: SPRING WG spring@ietf.org<mailto:spring@ietf.org<mailto:spring@ietf.org%3cmailto:spring@ietf.org>>
> Subject: [spring] WG adoption call - draft-hu-spring-segment-routing-proxy-forwarding
>
> Dear WG,
>
> This message starts a 2 week WG adoption call, ending 27/01/2022, for draft-hu-spring-segment-routing-proxy-forwarding
> https://datatracker.ietf.org/doc/draft-hu-spring-segment-routing-proxy-forwarding/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-hu-spring-segment-routing-proxy-forwarding/__;!!NEt6yMaO-gk!TiIGZ1oWfUzj6AIX35pvSwyD9BhU_1E0xwkRheX14PjuGLhIolaoExk2oKTgLzsj$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-hu-spring-segment-routing-proxy-forwarding/*3chttps:/urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-hu-spring-segment-routing-proxy-forwarding/__;!!NEt6yMaO-gk!TiIGZ1oWfUzj6AIX35pvSwyD9BhU_1E0xwkRheX14PjuGLhIolaoExk2oKTgLzsj$__;JQ!!NEt6yMaO-gk!Gp81jDYZ3hp9oK7AEli0aYgzF_rpD4qh844i3QpRQpiXqFnQ8gFASrQYxdoEmenRE1xqVEzcPGN9TrPR0BxCq7Yd1w$>>
>
> After review of the document please indicate support (or not) for WG adoption of the document to the mailing list.
>
> Please also provide comments/reasons for your support (or lack thereof) as this is a stronger way to indicate your (non) support as this is not a vote.
>
> If you are willing to work on or review the document, please state this explicitly. This gives the chairs an indication of the energy level of people in the working group willing to work on the document.
>
> Thanks!
Bruno, Jim, Joel

_________________________________________________________________________________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.

_________________________________________________________________________________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.