Re: [spring] AD Review of draft-ietf-spring-segment-routing-central-epe-06

"Gaurav Dawra (gdawra)" <gdawra@cisco.com> Mon, 30 October 2017 05:53 UTC

Return-Path: <gdawra@cisco.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE1D013FDAD; Sun, 29 Oct 2017 22:53:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.519
X-Spam-Level:
X-Spam-Status: No, score=-14.519 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PIgaev7EcP4O; Sun, 29 Oct 2017 22:53:07 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A4EB1394F2; Sun, 29 Oct 2017 22:53:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=48152; q=dns/txt; s=iport; t=1509342787; x=1510552387; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=mkVpFxSi2wBGsavsn8cX/DTuuHO9Uzd1umyckB60aIc=; b=BSgAfaUX9KUG/6gApJz8N52CNeY3Rau6uTBjRVm4vJrnv9FbCPjAgvap wCl5fjLXg664UJPCnwCNtfAhcDVUAy5dkhn8cre+jld8+4QO5ze1AW4ZQ iKJ92iLbO1yNGm50PIJLE/rBdAEYJ+zMOB/wRodYmh+n3on0n6LIgUKMn E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CaAAADvfZZ/49dJa1bGQEBAQEBAQEBAQEBBwEBAQEBgm9wZG4nB4N1ih+PEoF8iE+NcxCCAQqFOwIahDE/GAECAQEBAQEBAWsohR0BAQEBAyMKTBACAQYCEQECAQIhAQkCAgIfERcGCAIEAQ0FFAeJJEwDFYp1nWeCJyaHCg2DQAEBAQEBAQEBAQEBAQEBAQEBAQEBAR2DLoIHgVOBaAEpgwGCaoFjDBEBNBIGEoJdL4IyBZkCiEU8ApABhHmCFYYAixiKLIJsiEsCERkBgTgBHziBaHoVdgGCNoJcHIFnd4h/ASaBDIERAQEB
X-IronPort-AV: E=Sophos; i="5.44,318,1505779200"; d="scan'208,217"; a="96027804"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 30 Oct 2017 05:53:05 +0000
Received: from XCH-RTP-012.cisco.com (xch-rtp-012.cisco.com [64.101.220.152]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id v9U5r5W7004863 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 30 Oct 2017 05:53:05 GMT
Received: from xch-rtp-012.cisco.com (64.101.220.152) by XCH-RTP-012.cisco.com (64.101.220.152) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Mon, 30 Oct 2017 01:53:04 -0400
Received: from xch-rtp-012.cisco.com ([64.101.220.152]) by XCH-RTP-012.cisco.com ([64.101.220.152]) with mapi id 15.00.1320.000; Mon, 30 Oct 2017 01:53:04 -0400
From: "Gaurav Dawra (gdawra)" <gdawra@cisco.com>
To: "draft-ietf-spring-segment-routing-central-epe@Ietf.org" <draft-ietf-spring-segment-routing-central-epe@Ietf.org>, "aretana.ietf@gmail.com" <aretana.ietf@gmail.com>
CC: "bruno.decraene@orange.com" <bruno.decraene@orange.com>, "spring@ietf.org" <spring@ietf.org>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>
Thread-Topic: [spring] AD Review of draft-ietf-spring-segment-routing-central-epe-06
Thread-Index: AQHTQ4FPG6nbfTr8mEmw4rwyUO5SEg==
Date: Mon, 30 Oct 2017 05:53:04 +0000
Message-ID: <A5D28916-75B0-4A6F-87D5-370E1C53D6A7@cisco.com>
References: <998FE834-F9C6-43F2-8D10-30EE14CCECB6@cisco.com> <114895D1-093E-4D91-873B-0F64E9EE9EA0@cisco.com>
In-Reply-To: <114895D1-093E-4D91-873B-0F64E9EE9EA0@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.27.0.171010
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.42.10]
Content-Type: multipart/alternative; boundary="_000_A5D2891675B04A6F87D5370E1C53D6A7ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/zx_pgw3l0YjhpRZvWOS0I6fkcrY>
Subject: Re: [spring] AD Review of draft-ietf-spring-segment-routing-central-epe-06
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Stacked Tunnels for Source Routing \(STATUS\)." <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Oct 2017 05:53:12 -0000

Hey Alvaro,

A new version of the draft has been published addressing your comments. Please see an update for rest of the comments inline…<Gaurav1>.

Thanks again so much for your review.

Regards,

Gaurav

From: Gaurav Dawra <gdawra@cisco.com>
Date: Thursday, October 12, 2017 at 5:57 PM
To: "draft-ietf-spring-segment-routing-central-epe@Ietf.org" <draft-ietf-spring-segment-routing-central-epe@Ietf.org>, "aretana.ietf@gmail.com" <aretana.ietf@gmail.com>
Cc: Bruno Decraene <bruno.decraene@orange.com>, "spring@ietf.org" <spring@ietf.org>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>, Gaurav Dawra <gdawra@cisco.com>
Subject: Re: [spring] AD Review of draft-ietf-spring-segment-routing-central-epe-06

Hey Alavaro,

Thank you so much for the review.

Pls see inline..<Gaurav>

From: spring <spring-bounces@ietf.org> on behalf of "Alvaro Retana (aretana)" <aretana@cisco.com>
Date: Wednesday, August 30, 2017 at 9:35 PM
To: "draft-ietf-spring-segment-routing-central-epe@Ietf.org" <draft-ietf-spring-segment-routing-central-epe@Ietf.org>
Cc: Bruno Decraene <bruno.decraene@orange.com>, "spring@ietf.org" <spring@ietf.org>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>
Subject: [spring] AD Review of draft-ietf-spring-segment-routing-central-epe-06

Dear authors:

I just finished reading this document.  I have a couple of Major concerns (see below) which I would like to see addressed before starting the IETF Last Call on this document.

Thanks!!

Alvaro.



Major:

M1. This document mentions in several places that the segment routing information can be programmed at hosts (or “content source”).  As we all know, significant concerns exist in the community about using source routing all the way at the host (even if, as in this case, we’re talking about a centralized programing).  The Architecture document doesn’t explicitly eliminate hosts from an SR domain (the definition is “nodes participating into the source routing model”), but it also doesn’t explicitly include them…but the text can be interpreted as excluding (for example: “the explicit routing information MUST NOT be leaked through the boundaries of the administered domain”, or “Filtering MUST be performed on the forwarding plane at the boundaries of the SR domain”, etc.).  There is nothing specific that tells me that this case (EPE) is different from any other SR application – if hosts are to be explicitly considered part of a domain then that should be explicitly described in the Architecture document.  In short, please take references to hosts out of this document (unless you decide to add a discussion about them in the Architecture document).
 <Gaurav> We are in the process of discussing this point with the authors of the draft, we will get back to you on this one.
<Gaurav1> We have clarified the “Host” in the Segment Routing Architecture document.


M2. The requirements in Section 1.1. (Problem Statement) make non-explicit use of normative language; most of the requirements are non-technical and aspirational in nature.  While I think that the normative language is not used as intended in rfc2119 (“MUST only be used where it is actually required for interoperation or to limit behavior which has potential for causing harm”), I think it is ok in this case to express some requirements.  I would, however, prefer if their use las limited.  Nevertheless, here are some suggestions/questions/comments:

M2.1. What does “MUST NOT make any assumption” mean?
OLD>
     The solution MUST NOT make any assumption on the currently
      deployed iBGP schemes (RRs, confederations or iBGP full meshes)
      and MUST be able to support all of them.

NEW>
      The solution MUST support any deployed iBGP schemes
      (RRs, confederations or iBGP full meshes).
<Gaurav> ACK. Will update in Next version.

M.2.2. Two MUSTs doesn’t make the text better.
OLD>
     The solution MUST be applicable to any type of EPE router.  While
      "Egress Peer Engineering" refers to "External" peering, the
      solution MUST also be applicable to a router having internal
      peers.

NEW>
      The solution MUST be applicable to both routers with external
      and internal peers.
<Gaurav> ACK. Will be addressed in the next update.

M2.3. “The solution SHOULD minimize the need for new BGP capabilities at the ingress PEs.”  What is the explicit requirement, that needs the “SHOULD”, from an interoperability point of view?
<Gaurav> At Ingress PE, this requirement covers that there is need for some minimal configuration or protocol extension for Egress Engineering.

M2.4. “The solution MUST accommodate an ingress BGP-EPE policy at an ingress PE or directly at a source host within the domain.”  “MUST accommodate”??  What are you looking for?  The ability to program at those points?  The ability to instantiate any policy?
<Gaurav> Solution MUST cover the ability to accommodate instantiation and programming of the BGP-EPE policy at Ingress.

The Introduction says that “The exhaustive definition of all the means to program an BGP-EPE input policy is outside the scope of this document.”, so mandating something that is out of scope seems like a contradiction.
<Gaurav> The method to signal or program is out of the scope of this document. However, this document does covers the need to accommodate and program BGP-EPE policy at the Ingress

M2.5. “The solution MUST support automated Fast Reroute (FRR) and fast convergence mechanisms.”  But then section 3.6. (Fast Reroute (FRR)) says that FRR is optional.
<Gaurav>  ACK. This will be updated in next version.

M3. The references to I-D.ietf-idr-bgpls-segment-routing-epe, I-D.ietf-spring-segment-routing and RFC7752 should be Normative.
<Gaurav> ACK. Will be addressed in the next update.

Minor:

P1. As in all the related documents, please take “service chain” out to avoid confusion.
<Gaurav> ACK. Will be addressed in the next update.

P2. The examples in Sections 3.x seem incomplete and inaccurate to me.  Also, the names used don’t match what is specified in draft-ietf-idr-bgpls-segment-routing-epe.  In general, please be consistent with the names!  For example:

Section 3.1. (PeerNode SID to D):
“
   Descriptors:

   o  Node Descriptors (BGP router-ID, ASN): 192.0.2.3, AS1

   o  Peer Descriptors (peer BGP router-ID, peer ASN): 192.0.2.4, AS2

   o  Link Descriptors (IP interface address, neighbor IP address):
      2001:db8:cd::c, 2001:db8:cd::d

   Attributes:

   o  PeerNode SID: 1012
“

Comments>
- Section 5.1 in draft-ietf-idr-bgpls-segment-routing-epe uses “Local Node Descriptor” instead of simply “Node Descriptor”, and the BGP-LS ID is missing above.
- s/Peer Descriptors/Remote Node Descriptor
- The Link Descriptor uses the terms “IPv6 Interface Address” and “IPv6 Neighbor Address”…
- s/Attributes/Link Attribute
 <Gaurav> ACK> Will compare and address in next update.

P3. Section 3.6. (Fast Reroute (FRR)): “A BGP-EPE enabled border router MAY allocate a FRR backup entry on a per BGP Peering SID basis (assuming inter-AS agreement on the FRR strategy/policy).”  Why is an “inter-AS agreement” needed?  FRR is a local decision, and, assuming that the border router is at the edge of the SR domain…why would the next AS need to agree?  Am I missing something?
<Gaurav> ACK. Will be addressed in the next update.


P4. References:
- Please add a reference for BMP and IPFIX.
- Put the reference to BGP-LS on first mention (and not just way down in Section 9).
- Replace the reference to RFC3107 with draft-ietf-mpls-rfc3107bis – and it can be made Informative.
- The reference to RFC6241 should be Informative.
<Gaurav> ACK. Will be addressed in the next update.

P5. From Section 9. (Manageability Considerations): “…the advertisement of EPE information MUST conform to standard BGP advertisement and propagation rules (iBGP, eBGP, Route-Reflectors, Confederations).”  What does this text mean?  As far as I can tell, there’s no change to BGP to be able to instantiate EPE…
 <Gaurav> ACK Will address in next update.

Nits:

N1. The second paragraph in the Abstract seems unnecessary.
<Gaurav> ACK

N2. Please avoid using “we”.
<Gaurav> ACK

N3. Section 5.2 seems to introduce this new notation: “IP route L/8 set next-hop T1”… please explain.  L/8 is “hidden” in Figure 1, and not obvious since it looks like an IPv4 prefix, but the examples are all IPv6.
<Gaurav> Similar to 5.3. In this case, NH instead is a tunnel T1, where T1 is configured with Labels as {64, 1042}. "64" being the SID of PE C.