Rob,

> Given that we are really selecting candidates from within a set of paths that
> have already been selected by OSPF as valid, and usable - then I’m not sure
> that I can understand the logic behind this sentence from your review: "There
> appears to be more than enough enabled by this draft to wreak serious
> operational havoc”.

Perhaps, I'm not understanding something, but I thought I saw an unreachability
problem in the example in Section 4.5/Figure 3:

- The following example of an explicitly routed policy:

      - Traffic from A nodes to I nodes must not go through R and T
        nodes

    prevents the leftmost pair of A nodes from sending traffic to the
    I nodes.  Was this "black hole" intended as part of the example?

Was that a mistake, and at least one path from the leftmost pair of A nodes
to the I nodes will be selected despite that "explicitly routed policy"?

Thanks,
--David

> -----Original Message-----
> From: Rob Shakir [mailto:r...@rob.sh]
> Sent: Tuesday, October 06, 2015 11:23 AM
> To: a...@cisco.com; Black, David; bruno.decra...@orange.com; ops-...@ietf.org;
> shrad...@juniper.net; General Area Review Team (gen-art@ietf.org);
> lizhen...@huawei.com
> Cc: a...@cisco.com; Black, David; o...@ietf.org; i...@ietf.org
> Subject: Re: Gen-ART and OPS-Dir review of draft-ietf-ospf-node-admin-tag-06
> 
> Hi David,
> 
> On October 6, 2015 at 00:37:42, Black, David (david.bl...@emc.com) wrote:
> > > As an OPS-Dir member, I'm concerned by the above RFC 5706 answers,
> > and in particular treating all operational issues as vendor-
> > and/or
> > operator-specific. One possible alternative would be to scope
> > the
> > draft down to interoperably specify what's needed for LFA
> 
> I’ll quote this part of your mail, but respond to the general question around
> whether this draft should be tighter scoped (and the operational
> considerations of what one can do with the mechanism).
> 
> In general, this mechanism is meant to give ways for an operator to add their
> own logic on-top of the routing protocol selection of the OSPF protocol.
> Specifically, this is for the case where there are sets of paths that OSPF
> considers valid, but the operator has a particular preference for a particular
> subset to be included or excluded. To this end, the harm that one can do by
> preferring paths with a particular admin tag (or set of admin tags) on them is
> simply to select a subset of the paths that would have been used anwyay.
> 
> So, from the examples in the document, the admin tag lets one:
> 
>       * Prefer a specific LFA from a set of valid LFAs. The operator has a
> business reason to prefer specific ones (e.g., OSPF metric is set based on
> bandwidth, but we want to minimise latency, or we only want to capacity plan
> for FRR between P nodes never transiting a PE). There are many different
> reasons that one might have this preference, and they will be different by
> operator - so, removing the ability of an operator to specify arbitrary tags
> will make this mechanism ineffective. Whilst there could be unintended
> consequences of preferring specific LFAs, actually there are probably worse
> consequences of NOT preferring particular LFAs, such as traffic going via a PE
> in another country such that latency is increased over all other LFAs. Bruno
> and Stephane from FT have given many examples of this in the LFA manageability
> drafts presented in RTGWG. The admin tag will never result in a new LFA that
> would never have been selected via the standardised mechanisms being selected
> - so, in my view, has little potential to cause new ‘harm’.
> 
>       * Prefer a specific path from a set of paths. This is similar to the
> case above. No new candidate path is being added to the routes that could be
> used by the admin tag mechanism. It simply says that when a device that must
> select N ECMPs to install from M candiates (N < M), then the operator can
> influence which based on the admin tag. All are still valid ECMPs - so new
> risk is created. Again, selecting a particular subset of that M without any
> consideration may be more harmful than doing the operator-specific selection.
> Again, the logic of which are ‘OK’ PEs and which are not is something that is
> operator specific, and may only apply to a subset of applications using OSPF
> to select paths (an example of this is devices that do not scale well as MPLS-
> TE midpoints, but are OK for transit IP traffic - at this point, we may want
> to influence CSPF to stay away from them, but not IP - the fact that these
> devices are ‘not-OK-for-transit-MPLS-TE’ is not something that we can easily
> enumerate and standardise).
> 
> Given that we are really selecting candidates from within a set of paths that
> have already been selected by OSPF as valid, and usable - then I’m not sure
> that I can understand the logic behind this sentence from your review: "There
> appears to be more than enough enabled by this draft to wreak serious
> operational havoc”.
> 
> I strongly disagree with the idea that we should try and enumerate what the
> tags should be, rather than maintain the ability of an operator to add their
> own specific logic with these tags. This is what is done today with link
> affinity, or tags elsehwere in the IGP protocols.
> 
> Re-reading the draft, perhaps we need to clarify that this does not change the
> underlying SPF process that OSPF uses today - would this address your concern?
> 
> Regards,
> r.
> 
> 

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to