Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

Rob Shakir <robjs@google.com> Tue, 16 May 2017 15:36 UTC

Return-Path: <robjs@google.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D56E12E957 for <spring@ietfa.amsl.com>; Tue, 16 May 2017 08:36:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pMkjMoYuWcGB for <spring@ietfa.amsl.com>; Tue, 16 May 2017 08:36:49 -0700 (PDT)
Received: from mail-io0-x234.google.com (mail-io0-x234.google.com [IPv6:2607:f8b0:4001:c06::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5872D1293D9 for <spring@ietf.org>; Tue, 16 May 2017 08:32:41 -0700 (PDT)
Received: by mail-io0-x234.google.com with SMTP id f102so95716521ioi.2 for <spring@ietf.org>; Tue, 16 May 2017 08:32:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=xpP2+ZFG6fuP4K8QFSDoNQhLVF5lRtlQuaY31Ruu4IE=; b=uof1C9PFEOjgTilsEiQC23flIe08lkLOnGYuUcKqt7hODfYdqHQPyI/pZJyFCc4OdA VMgd3jI6FltoCsHT97kFOxIIZx6MBprv5SpVFZCxTxg+U6Oo/SY1c/rUTntDGYiETWIr egV3QCn6ror1quGS3Afc8v+XUlTCm1FyCAJpQasJRkk18/FPeoLZmAxL1jo/xxwzYhF/ LNXt1eguZE1aBrcAMemTHDBejU0C5QlD1VLuDEm8otr4YsdiJiRpBdIWdH+aESoMCEW9 b+mkHcO3JRl+C2kAxQrkmMfc+pBxx3PSxJGSLpMAeznVarWdQ8D/Ipek9uNCUK8ewhM9 2Zsg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=xpP2+ZFG6fuP4K8QFSDoNQhLVF5lRtlQuaY31Ruu4IE=; b=NQ5f4istmJ24Jl7NTuHnNwUoe/DNr6IpDNOOtGpzE5FxKgLKNHz6FP3i74zkj4tbmo N+5NYdByUsrfaw7w+OQ5EgX8IVzfPAKAqkAnvkWDm1iF8yze7tuagvT/P3dM60ycxxr/ p3uBKM7E0WGUpwnWL3WY8ka8Vxt5KV+3549kVNGPXI/5H8I9T6l4hT8HkK6IMXRBDlgU mw5x8TBfUh1HBI5SpqPeYMb1h9WPSNbyx24qN7LCJ6vcUh3zVUu1H3XOaiXpc7+SxK+r sIGA8Z3Yrv0JEyz31SwJu+6j/DlDhljn1Y/ULFtTtB9GJ3R7v1wFKjRlc4EwlL8wYyUL Xi7g==
X-Gm-Message-State: AODbwcC8MtA4x65r9NcFfjV0dPz8NwAhTWyLASsei4qpG+CHwsKTLaBZ tOuHo4bGrjPBFG445dx8oOHMClomM4zd
X-Received: by 10.107.142.86 with SMTP id q83mr12026495iod.195.1494948760501; Tue, 16 May 2017 08:32:40 -0700 (PDT)
MIME-Version: 1.0
References: <AM4PR03MB1713393C262301279EAF29039DED0@AM4PR03MB1713.eurprd03.prod.outlook.com> <4CE8B71E-1CB7-43AF-9DA3-D936E030A2CA@cisco.com> <AM4PR03MB1713F46B5662731126099CFE9DE60@AM4PR03MB1713.eurprd03.prod.outlook.com> <30960_1494926964_591AC674_30960_1681_1_9E32478DFA9976438E7A22F69B08FF921DDBA294@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <C4B31809-4E4B-4CB9-A7C1-54FF3050B76B@cisco.com> <AM4PR03MB1713385B533F6914915BBBB19DE60@AM4PR03MB1713.eurprd03.prod.outlook.com>
In-Reply-To: <AM4PR03MB1713385B533F6914915BBBB19DE60@AM4PR03MB1713.eurprd03.prod.outlook.com>
From: Rob Shakir <robjs@google.com>
Date: Tue, 16 May 2017 15:32:28 +0000
Message-ID: <CAHd-QWtR0Y820snnDYngUMos8i=rH6v-MzkLFr5=3Jkz-c=x8A@mail.gmail.com>
To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>, "Stefano Previdi (sprevidi)" <sprevidi@cisco.com>
Cc: "spring@ietf.org" <spring@ietf.org>, Shell Nakash <Shell.Nakash@ecitele.com>, Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com>, "draft-ietf-spring-resiliency-use-cases@ietf.org" <draft-ietf-spring-resiliency-use-cases@ietf.org>, Sidd Aanand <Sidd.Aanand@ecitele.com>, Ron Sdayoor <Ron.Sdayoor@ecitele.com>, Rotem Cohen <Rotem.Cohen@ecitele.com>, Stephane Litkowski <stephane.litkowski@orange.com>
Content-Type: multipart/alternative; boundary="94eb2c05e11ed42004054fa5e17f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/mFHDSFmtN3ZtsR2CSBMcVj-vFc4>
X-Mailman-Approved-At: Tue, 16 May 2017 08:44:00 -0700
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Stacked Tunnels for Source Routing \(STATUS\)." <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 May 2017 15:36:51 -0000

>
> As long as "mixed" use cases are not strictly prohibited in the draft (and
> this was at least one possible interpretation of the text), I do not have
> any issues with restricting it to just two "pure" use cases:
> - End-to-end path protection with disabled local protection
> - Local protection (of some kind) without end-to-end path protection.
>

Use cases drafts should never attempt to be exhaustive in terms of what
they try and cover, but provide sufficient motivation for the features that
are/were required in the technology that is developed as a response to
them. In this case, the use case of path protection - especially with
disjointness requirements - provides motivation for wanting to have a SID
in the network that is explicitly not protected by local protection
mechanisms.

In RSVP-TE, we have the ability to set the "local protection requested" bit
described in RFC4090 - which gives the head-end the ability to control the
re-route behaviour of the LSP. This use case presents the operational case
for the B-flag in the IGP extensions.

Operators can, and will continue to, deploy things that (shockingly!) are
not described in IETF use case documents. At this point, if we consider
that this document provides some explanation of the features that are
required in the protocol - let's go ahead and publish it. Due to the
different technical and business requirements of different operators,
almost certainly, someone will deploy some combination of these features,
but I do not feel that we need to describe such unknown cases within this
document.

Kind regards,
r.