Hi Ali,

Thanks for your comments.
Please see some more comments and questions in-line with [JORGE].

Thx
Jorge

From: BESS <[email protected]> on behalf of "Ali Sajassi (sajassi)" 
<[email protected]>
Date: Thursday, August 29, 2019 at 9:02 PM
To: Siddhesh Dindorkar <[email protected]>
Cc: Stephane Litkowski <[email protected]>, "[email protected]" 
<[email protected]>
Subject: Re: [bess] WG adoption call and IPR poll for 
draft-rabadan-bess-vendor-evpn-route-07

Hi Siddhesh,  wrt point #3, my point is that there is no guarantee that a given 
RR vendor implement/support this opaque route. Even if they do, it will take an 
update to get this feature. For the update of RR, the provider (cloud, sp, 
Enterprise) has a process in place. This same process that is used for RR 
upgrade to support this opaque route, can be used to support new routes. I 
understand that with the opaque route, you upgrade once and the subsequent new 
routes can be supported transparently but how often do you we introduce new 
routes. Furthermore, it is better to have a new routes that has multi-vendor 
interop support than the one that doesn’t have. Do you know of any providers 
that says I am OK with vendor lock-in?

[JORGE] the use of vendor specific types or extensions is not new in IETF. For 
instance, see ORF vendor specific types, or LDP TLV types, etc. Also, as you 
mention, the benefit is a single upgrade on RRs to be able to propagate these 
routes. We can discuss the details of the route format itself, regardless, 
reserving type 255 is a good practice.

If you look at the history here, we have done pretty well with collaborating 
together and coming up with the new routes that has multiple vendor support 
from the beginning. All EVPN route types from RT-5 onward fall into this 
category.

[JORGE] Sure, and this is not against the process of standardizing new route 
types. New routes that are relevant to multiple vendors and for the industry in 
general should get a new type.

With SD-WAN related stuff, you can come with a single extensible route that is 
future proof (in terms of RR).

[JORGE] Can you please elaborate on this?

I am just concern that introduction of opaque route will open a Pandora’s box 
that cannot be closed.

[JORGE] Could you please elaborate on the issues you see? Please see more below 
along your first email.

Cheers,
Ali

From: Siddhesh Dindorkar <[email protected]>
Date: Wednesday, August 28, 2019 at 2:43 PM
To: Cisco Employee <[email protected]>
Cc: Stephane Litkowski <[email protected]>, "[email protected]" 
<[email protected]>
Subject: Re: [bess] WG adoption call and IPR poll for 
draft-rabadan-bess-vendor-evpn-route-07

Hi Ali, thanks for the detailed comments. We understand your view and those 
were the discussion points within us as well. However, in reference to your RR 
point #3, one of the reason for a vendor specific evpn route type is to be able 
to do prototyping within small scale deployements which use other vendor RRs. 
Even if we have RFCs for new route types, other vendors may not implement them 
if they dont need those usecases and/or is not a release priority. Hence again 
comes the restriction in using other vendor RR until the new route type is 
implemented by the RR vendor.

Best,
Siddhesh


On Tue, Aug 27, 2019 at 3:27 PM Ali Sajassi (sajassi) 
<[email protected]<mailto:[email protected]>> wrote:
Hi Jorge,

I will support this draft if it is modified to specify the routes for SD-WAN 
application specifically as opposed to have an opaque route. My concerns are 
the following:


1.      The main idea of standardization is interoperability among vendors and 
this draft doesn’t give us that.

2.      Also I don’t think having such a draft can facilitate prototyping. This 
draft has been around for several years and your prototyping should have been 
independent of this draft since I am not aware of any other major vendor 
implemented or deployed this draft.

[JORGE] As discussed, our view is that standardization is still relevant since 
there are BGP speakers that do not need to understand the content of the route, 
but do need to make basic checks before propagating the route.

3.      Even if this draft becomes an RFC, there is no guarantee that in a 
given network the RR will be compliant with it as we have experienced such 
things first hand in the field

[JORGE] Sure, however standardizing this will help.

4.      Making dependency of an IETF draft on IEEE process is not a good thing 
– i.e., an new vendor that wants to implement it now needs to apply for an IEEE 
OUI.  OUI gets allocated to the vendor with Ethernet PHY for MAC addresses and 
not as route distinguisher. I am not sure how IEEE will look at this. Have you 
discussed your application with them (e.g., OUI for non-related Ethernet 
PHY/MAC)

[JORGE] Requesting an OUI to IEEE is pretty straight forward and a lot of 
vendors have OUIs that can reuse here since this is NOT used in the data plane. 
The OUI is an easy way to avoid clashing among vendors, but as discussed with 
Jeff, we are open to add a generic or “wildcard OUI” or any other identifier 
here if the use of an OUI is not possible.

5.      RR can be used as store and forward mechanism for data that didn’t use 
BGP before. I have already seen that some people want to use BGP for passing 
configuration, stats, diagnostics info, etc. With now defining an opaque route, 
there will be no check on the contents of the route and anyone can put anything 
they want even if it is not best suited to do them in BGP.

[JORGE] Our view is that it is better to define a new route type with a minimum 
standardized format that BGP speakers can check, rather than having existing 
route types used with proprietary path attributes, which is what some vendors 
are doing. In any case, again, we are open to discuss the format. Yet I think 
reserving type 255 for this is a good thing that will help the evolution of 
EVPN.

So, frankly, I don’t see any positives here but just negatives. Can you replace 
the opaque route with the actual routes. At the end of the day, we have to do 
it for multi-vendor interop anyway. So, the sooner, the better. If 
single-vendor deployment is sufficient which is typically the case for 
Enterprises, then there is no need to standardize such draft.

Cheers,
Ali


From: BESS <[email protected]<mailto:[email protected]>> on behalf of 
Stephane Litkowski <[email protected]<mailto:[email protected]>>
Date: Tuesday, August 20, 2019 at 2:16 AM
To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>>
Subject: [bess] WG adoption call and IPR poll for 
draft-rabadan-bess-vendor-evpn-route-07

Hi,

This email begins a two-weeks WG adoption poll for 
draft-rabadan-bess-vendor-evpn-route-07 [1]
Please review the draft and post any comments to the BESS working group list.

We are also polling for knowledge of any undisclosed IPR that applies to this 
Document, to ensure that IPR has been disclosed in compliance with IETF IPR 
rules (see RFCs 3979, 4879, 3669 and 5378 for more details).

If you are listed as an author or a contributor of this document, please 
respond to this email and indicate whether or not you are aware of any relevant 
undisclosed IPR, copying the BESS mailing list. The document won't progress 
without answers from all the authors and contributors.
Currently, there are no IPR disclosures against this document.

If you are not listed as an author or a contributor, then please explicitly 
respond only if you are aware of any IPR that has not yet been disclosed in 
conformance with IETF rules.

This poll for adoption closes on 2nd September 2019.

Regards,
Stephane and Matthew

[1] https://datatracker.ietf.org/doc/draft-rabadan-bess-vendor-evpn-route/
_______________________________________________
BESS mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/bess
_______________________________________________
BESS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/bess

Reply via email to