I feel it is better to keep the standard simple and not add timer delay as part 
of BFD strict draft, as different customers may have different requirements, 
and there may also be vendor/platform dependency.

For example, in the core where there are a lot of link redundancy/diversity, we 
could afford to have longer time delay since we can tolerate multiple link 
failures. For majority of the edge connectivity, there are typically only 2 
links - in this situation, we would want a lower time delay.

I found the current BFD Strict holddown/dampening mechanism as implemented by 
the two vendors sufficient for our need. If there is an issue causing BFD to 
fail during this time, OSPF will take longer time to come up. And the delay 
only needs to be configured on one side. 

So, in current implementation, there's some sanity "check" that BFD is stable 
for a period of time before OSPF can come up. 

In discussion with the BFD working group on my other MTU draft, there's a keen 
interest among the WG to keep the BFD simple.


From: [email protected] At: 01/29/22 15:20:06 UTC-5:00To:  [email protected]
Cc:  Albert Fu (BLOOMBERG/ 120 PARK ) ,  [email protected],  
[email protected],  [email protected],  
[email protected]
Subject: Re: [Lsr] Working Group Last Call for "OSPF Strict-Mode for BFD" - 
draft-ietf-lsr-ospf-bfd-strict-mode-04

Hi Les,

> Discussion of how to make BFD failure detection more robust belongs in the 
> BFD WG
> If you do not want the BFD session to come back up too quickly after a failure

Nothing I suggested is related to any of the above. 

Let me perhaps provide a very simple example. 

BFD being used is *AS*IS*.  

All the operator wants is to run it for say X sec without ever going down 
before bringing OSPF adj up. 

That timer and its consistency on both ends clearly belongs to OSPF not to BFD. 

Now what happens within those 30 sec, what BFD packets are formed and how they 
are exchanged is all BFD business - but I am not suggesting to include any of 
those in this draft. 

Do we have a common understanding so far ? 

Hint: Albert already stated that he needs that timer and that both vendors 
provided it via cfg. All that confirms is that timer is needed. All I am 
suggesting (even before being aware of the manual cfg for it) was to 
synchronize the value or pick lower configured between two peers. 

Kind regards,
R.


On Sat, Jan 29, 2022 at 9:08 PM Les Ginsberg (ginsberg) <[email protected]> 
wrote:

     

Robert – 
  
It is good that you take an active interest in this technology – but I think 
the suggestions you are making should not be targeted at IGP use of BFD. 
  
Discussion of how to make BFD failure detection more robust belongs in the BFD 
WG – and – as you know – that WG has taken an interest in such problems e.g., 
MTU. 
  
In regards to “dampening” = which I think is the relevant term for the timer 
related suggestions you are making - this also does not belong in the IGP. If 
you do not want the BFD session to come back up too quickly after a failure, 
the  proper place to put timers is either at the interface layer or in the BFD 
implementation. 
I am familiar with implementations which apply this timer at the protocol level 
(AKA BFD client in this context) and this is done precisely because the 
protocol does NOT have the functionality being defined in this draft. Once you 
have  implemented “wait-for-BFD” logic as defined in this draft you do not need 
additional delay timers in the protocol. 
  
I don’t think the suggestions you are making belong in this document. 
  
    Les 
  
  

From: Lsr <[email protected]> On Behalf Of  Robert Raszuk
Sent: Saturday, January 29, 2022 11:25 AM
To: Acee Lindem (acee) <[email protected]>
Cc: Ketan Talaulikar <[email protected]>; 
[email protected]; Albert Fu <[email protected]>; 
lsr <[email protected]>
Subject: Re: [Lsr] Working Group Last Call for "OSPF Strict-Mode for BFD" - 
draft-ietf-lsr-ospf-bfd-strict-mode-04 
  

Hi Acee, 

  


Can you suggest text which with you’d be happy? I’m sure the authors would add 
you to the acknowledgements.
 

  

Actually instead of suggesting any new text I would suggest to delete the two 
below sentences and it will be fine:  

  

"In certain other scenarios, a degraded or poor quality link will allow OSPF 
adjacency formation to succeed 

but the BFD session establishment will fail or the BFD session will flap.  In 
this case, traffic that gets  

forwarded over such a link may experience packet drops while the failure of the 
BFD session establishment  

would not enable fast routing convergence if the link were to go down or flap." 

  

This could be described but I don’t think it should be normative. This begs the 
question as to why a hold down timer is not a part of the BFD protocol itself.
 

  

There is one - BFD calls it multiplier.  

  

But the timer I am suggesting is not related to BFD operation, but to OSPF 
(and/or ISIS). It is not about BFD sessions being UP or DOWN. It is about 
allowing BFD for more testing (with various parameters (for example increasing 
test packet  size in some discrete steps) before OSPF is happy to bring the 
adj. up.  

  

Thx, 

R. 


_______________________________________________
Lsr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lsr

Reply via email to