Hello, Greg,

Before you asked about RFC 5884, now RFC 5885, neither of which are references 
in draft-ietf-bfd-vxlan-07. Your new request is:

> I hope that you can help me to answer a question related to the scope of RFC 
> 5885.

Asking about RFC 5885, published 9 years ago, is another distraction from the 
question at hand. It seems like a third-order red-herring, hasty 
generalization, or a “you also” if you are citing RFCs I co-authored.

Once again, in my opinion, this does not get you closer to improving or 
furthering draft-ietf-bfd-vxlan-07, which should be the common goal on this 
thread.

As a refresher, this was my initial question:

> >>> > 4. Section 7 says that “ Support for echo BFD is outside the scope of 
> >>> > this document”. 
> >>> > 
> >>> > Assuming this means “BFD Echo mode”, why is this out of scope?


I am really interested in understanding what the reason(s) is (are) for 
out-scoping BFD Echo. Is it because of technical limitations? Lack of market 
demand? Lack of time to know the answer to this question?

I am not asking for any change, just a question of whether the authors and WG 
considering the ROI of adding BFD Echo.

Best,

Carlos.


> On Jun 26, 2019, at 9:22 PM, Greg Mirsky <gregimir...@gmail.com> wrote:
> 
> Hello Carlos,
> I hope that you can help me to answer a question related to the scope of RFC 
> 5885. In RFC 5885 is stated:
>    This specification describes procedures only for BFD asynchronous mode.
> Neither demand mode, nor Echo function of BFD is explicitly mentioned in RFC 
> 5885. Hence my question If BFD over VXLAN changes from explicitly excluding 
> the Echo function from the scope of the document to the definition of the 
> scope like used in RFC 5885, would that address your concern?
> 
> Regards,
> Greg
> 
> On Fri, Jun 21, 2019 at 5:19 PM Carlos Pignataro (cpignata) 
> <cpign...@cisco.com> wrote:
> Hello, Greg,
> 
> Thank you for having split this thread. I’ll note for ease of tracking that 
> this specific issue is issue #4 our of the six quick comments I sent.
> 
> Now, questions you ask like this one quoted from below:
> > Would you suggest that the scope of RFC 5884 must include the BFD Echo 
> > function?
> 
> 
> Are now second-order red herrings and, once again, not relevant to the issue 
> — instead they avoid responding and prevent convergence. In my comment, I’m 
> just asking for a technical explanation of why BFD Echo is out of scope.
> 
> 
> Please see inline, your response is incorrect in 3 technical areas that I 
> enumerate.
> 
> 
> > On Jun 20, 2019, at 1:30 AM, Greg Mirsky <gregimir...@gmail.com> wrote:
> > 
> > Hi Carlos,
> > thank you for clarifying your opinion on the applicability of the BFD Echo 
> > mode.
> 
> For correctness, I have not issued an "opinion on the applicability of the 
> BFD Echo mode.” (Again, please do not mischaracterize!) 
> 
> My initial question was “why is this out of scope?” I believe scoping should 
> be deliberate and intentional, and hence seeking to understand.
> 
> 
> > I've split this thread to help us and others to follow the discussion on 
> > this particular issue. I'll note that RFC 5880 does not prohibit the remote 
> > system to perform any kind of processing on the packet received in the BFD 
> > Echo mode.
> 
> This is technical mistake #1. 
> 
> RFC 5880 says:
> 
>    The Echo function has the advantage of truly testing only the
>    forwarding path on the remote system. 
> 
> 
> No other processing on the remote system — that is the benefit of Echo.
> 
> 
> > Even more, Section 6.8.8 explicitly points out that a received Echo packet 
> > is likely to be processed:
> >    A means of detecting missing Echo packets
> >    MUST be implemented, which most likely involves processing of the
> >    Echo packets that are received.  The processing of received Echo
> >    packets is otherwise outside the scope of this specification.
> 
> 
> This is technical mistake #2.
> 
> What you are quoting is referring to the reception of Echo packet by the Echo 
> packet *sender*. That is, the local system, not the remote system. The Echo 
> packet is received by the same system that sent it (by definition of Echo!), 
> and thus the node itself needs to demultiplex its own context...
> 
> 
> > Thus, interoperability is one of the underspecified issues for BFD Echo.
> 
> No. This is technical mistake #2b.
> 
> There is no interoperability spec considerations between a system and itself 
> (unless the sender of BFD Echo has split personality :-)
> 
> 
> 
> > Secondly, the Echo BFD mode has been excluded from the scope of RFC 5884:
> > Further, the use of the Echo function is outside the scope of this 
> > specification.
> 
> This is technical mistake #3.
> 
> It is really irrelevant to the question whether RFC 5884, which talks about 
> BFD for unidirectional MPLS LSPs, scopes out BFD Echo.
> 
> As I mentioned in my initial email, "If this is a single logical hop 
> underneath VXLAN, what’s preventing the use of Echo?” RFC 5884 is different 
> than (and not useful for or relevant to) the scenario in draft-ietf-bfd-vxlan.
> 
> 
> 
> > Would you suggest that the scope of RFC 5884 must include the BFD Echo 
> > function?
> 
> 
> I do not understand the context of this question. But as I mentioned, these 
> questions take the thread in a direction that diverges from resolution.
> 
> I have not suggested that any document includes anything. My comment is: what 
> is the reason why BFD Echo is out of scope? Technically, this is a single hop 
> at the VXLAN level for BFD.
> 
> 
> Best,
> 
> Carlos.
> 
> > 
> > Regards,
> > Greg
> > 
> > On Thu, Jun 20, 2019 at 2:08 PM Carlos Pignataro (cpignata) 
> > <cpign...@cisco.com> wrote:
> > Hello, Greg,
> > 
> > Yes, happy too answer your question.
> > 
> > First, however, let me make two quick observations on the exchange:
> >       • You seem to be picking very specific fragments or sub-topics from 
> > my comments, and following up on those only.
> >       • I’m happy to continue answering these questions, but they are 
> > orthogonal to (and consequently a distraction from) the initial comments I 
> > raised.
> > 
> > Now, your question: the BFD Echo packet format is generically spec’ed and 
> > defined in Section 5 of RFC 5880:
> > https://tools.ietf.org/html/rfc5880#section-5
> > 
> > The most relevant part is this:
> > 
> >    The payload of a BFD Echo packet is a local matter, since only the
> >    sending system ever processes the content.  The only requirement is
> >    that sufficient information is included to demultiplex the received
> >    packet to the correct BFD session after it is looped back to the
> >    sender. 
> > 
> > Since the remote system does not process the echo packet content, it is a 
> > local matter only. And given the fact that, as such, there is no 
> > interoperability implications, there is no need to over-specify the packet 
> > format. The only requirement is that the sending system needs to be able to 
> > map it to a session when it boomerangs back.
> > 
> > No, it is generally not (i.e., does not need to be, but there’s freedom to 
> > potentially be) a BFD control packet. 
> > Yes, it can be something else.
> > 
> > That said, the packet format for BFD Echo has, to my analysis and 
> > understanding, no relevancy on the questions below.
> > 
> > Best,
> > 
> > Carlos.
> > 
> >> On Jun 20, 2019, at 12:50 AM, Greg Mirsky <gregimir...@gmail.com> wrote:
> >> 
> >> Hello Carlos,
> >> could you please refer me to the specification of BFD that defines the 
> >> message format that is used in the Echo mode of BFD. Is it the BFD control 
> >> packet? Something else?
> >> 
> >> Regards,
> >> Greg
> >> 
> >> 
> >> On Thu, Jun 20, 2019 at 11:09 AM Carlos Pignataro (cpignata) 
> >> <cpign...@cisco.com> wrote:
> >> Hello, Greg,
> >> 
> >> Please see inline.
> >> 
> >>> On Jun 19, 2019, at 9:58 PM, Greg Mirsky <gregimir...@gmail.com> wrote:
> >>> 
> >>> Hello Carlos,
> >>> thank you for the expedient clarification.
> >>> To your questions on demultiplexing BFD control packets with the zero 
> >>> value of the Your Discriminator field:
> >>>     • only BFD control packets with the zero value of the Your 
> >>> Discriminator field are demultiplexed using the information of the inner 
> >>> IP header. I believe that the text is clear and requires that all fields 
> >>> of the inner IP header must be used to demultiplex a received BFD control 
> >>> packet with the zero value in the Your Discriminator field. Which of the 
> >>> fields an implementation uses to create multiple BFD sessions between the 
> >>> pair of VTEPs is implementation specific.
> >> This text is repeating was is in the draft, but does not answer any of my 
> >> questions.
> >> 
> >> For example:
> >> 1. "that all fields of the inner IP header must be used to demultiplex a 
> >> received BFD control packet”
> >>     -> The text does not say “all fields”, but regardless, do you mean the 
> >> DSCP and the Evil Bit? IPv6 Flow Label? How *exactly*?
> >> 2. How is the mapping of IP (not UDP?) fields to BFD session done?
> >> 3. How is this state created and maintained? 
> >> 4. Since this is a set of fields on which two systems need to agree (which 
> >> fields from the inner IP/UDP are mapped needs to be understood by both 
> >> systems), it cannot be “implementation specific”. Further, the text does 
> >> not say so.
> >> 
> >>> To your point on the level Echo mode of BFD is specified in RFC 5880 I'll 
> >>> quote the opinion of Jeffrey Haas from the discussion of comments from 
> >>> Shawn Emery on behalf of the SecDir. Shawn had commented:
> >>> Echo BFD is out of scope for the document, but does not describe the 
> >>> reason for this or why state
> >>> this at all?
> >>> I've responded:
> >>> GIM>> I think that the main reason is that the BFD Echo mode is 
> >>> underspecified. RFC 5880 defined some of the mechanisms related to the 
> >>> Echo mode, but more standardization work may be required.  
> >>> And Jeffrey Haas had added:
> >>> Speaking as a BFD chair, this is the relevant observation.  BFD Echo is
> >>> underspecified to the point where claiming compliance is difficult at 
> >>> best.
> >>> In general, it relies on single-hop and the ability to have the remote 
> >>> Echo
> >>> client loop the packets. 
> >> 
> >> BFD Echo cannot be specified in RFC 5880 base spec because it is 
> >> application specific.
> >> 
> >>> 
> >>> This packet loop may not be practical for several encapsulations and thus 
> >>> is
> >>> out of scope for such encapsulations.  Whether this is practical for vxlan
> >>> today, or in the presence of future extensions to vxlan is left out of 
> >>> scope
> >>> for the core proposal.  
> >> 
> >> The question remains: for VXLAN encapsulation, this is like a single hop 
> >> as far as BFD is concerned (single hop VXLAN tunnel).
> >> 
> >> Since RFC 5881 defines Echo for single hop, can you please elaborate (in 
> >> the document) why is out of scope or how it can work?
> >> 
> >> Best,
> >> 
> >> Carlos.
> >> 
> >>> 
> >>> Will respond to other questions in a separate mail.
> >>> 
> >>> Regards,
> >>> Greg
> >>> 
> >>> 
> >>> On Thu, Jun 20, 2019 at 10:31 AM Carlos Pignataro (cpignata) 
> >>> <cpign...@cisco.com> wrote:
> >>> Hello, Greg,
> >>> 
> >>> > On Jun 19, 2019, at 9:09 PM, Greg Mirsky <gregimir...@gmail.com> wrote:
> >>> > 
> >>> > Hi Carlos,
> >>> > thank you for reminding of our continued discussion with Joel. We are 
> >>> > seeking comments from VXLAN experts and much appreciate if you have 
> >>> > insights on VXLAN to share.
> >>> > I've got some clarifying questions before I can respond to you.
> >>> 
> >>> Sure.
> >>> 
> >>> > To which stage of the three-way handshake you refer as "initial 
> >>> > demultiplexing"? I couldn't find this term in RFC 5880.
> >>> 
> >>> “Initial demultiplexing" is a well-known term in BFD, referring to the 
> >>> "demultiplexing of the initial packets", BFD Control packet with YourDisc 
> >>> being zero.
> >>> 
> >>> In RFC 5880, see Section 6.3.
> >>> https://tools.ietf.org/html/rfc5880#section-6.3
> >>> 
> >>>    The method of demultiplexing the initial packets (in which Your
> >>>    Discriminator is zero) is application dependent, and is thus outside
> >>>    the scope of this specification.
> >>> 
> >>> Since initial demultiplexing is indeed application specific, different 
> >>> for one-hop versus multi-hop and dependent upon whether a single or 
> >>> multiple sessions are allowed between a pair of endpoints, I added below 
> >>> two other relevant citations, from application specific BFD specs:
> >>> 1. https://tools.ietf.org/html/rfc5883#section-4 
> >>> 2. https://tools.ietf.org/html/rfc5882#section-6
> >>> 
> >>> 
> >>> > Regarding the applicability of the Echo mode, thank you for pointing to 
> >>> > the need for stricter terminology, the Echo mode, as defined in RFC 
> >>> > 5880, is underspecified and it will require additional standardization.
> >>> 
> >>> No. BFD Echo is not underspecified in RFC 5880.
> >>> 
> >>> Please read S5: https://tools.ietf.org/html/rfc5880#section-5
> >>> 
> >>>    BFD Echo packets are sent in an encapsulation appropriate to the
> >>>    environment.  See the appropriate application documents for the
> >>>    specifics of particular environments.
> >>> 
> >>> 
> >>> BFD Echo is application dependent. 
> >>> 
> >>> Therefore, for example, single-hop BFD in RFC 5881 specifies BFD Echo for 
> >>> that application.
> >>> 
> >>> Hence, my question stands: why is this draft claiming BFD Echo is out of 
> >>> scope for this BFD application document?
> >>> 
> >>> 
> >>> > Future drafts may explore and define how the Echo mode of BFD is used 
> >>> > over VXLAN tunnels.
> >>> > 
> >>> 
> >>> See above.
> >>> 
> >>> > Will review and respond to the remaining questions soon.
> >>> 
> >>> Thank you. 
> >>> 
> >>> The "remaining questions" are still all the questions below :-)
> >>> 
> >>> Best,
> >>> 
> >>> Carlos.
> >>> 
> >>> > 
> >>> > Regards,
> >>> > Greg
> >>> > 
> >>> > 
> >>> > On Thu, Jun 20, 2019 at 9:14 AM Carlos Pignataro (cpignata) 
> >>> > <cpign...@cisco.com> wrote:
> >>> > Hi,
> >>> > 
> >>> > I have not reviewed this draft before, but triggered by this email, and 
> >>> > briefly scanning through a couple of sections, it is unclear to me how 
> >>> > some of the mechanics work.
> >>> > 
> >>> > There are some major issues with the Mac usage and association, as Joel 
> >>> > Halpern mentioned in his Rtg Dir review.
> >>> > 
> >>> > And, additionally, please consider the following comments and questions:
> >>> > 
> >>> > 
> >>> > 1. Underspecification for initialization and initial demultiplexing.
> >>> > 
> >>> > This document allows multiple BFD sessions between a single pair of 
> >>> > VTEPs:
> >>> > 
> >>> >    An
> >>> >    implementation that supports this specification MUST be able to
> >>> >    control the number of BFD sessions that can be created between the
> >>> >    same pair of VTEPs.
> >>> > 
> >>> > The implication of this is that BFD single-hop initialization 
> >>> > procedures will not work. Instead, there is a need to map the initial 
> >>> > demultiplexing.
> >>> > 
> >>> > This issue is explained in RFCs 5882 and 5883: 
> >>> > https://tools.ietf.org/html/rfc5883#section-4 and 
> >>> > https://tools.ietf.org/html/rfc5882#section-6
> >>> > 
> >>> > Section 5.1 says:
> >>> > 
> >>> >    For such packets, the BFD session MUST be identified
> >>> >    using the inner headers, i.e., the source IP, the destination IP, and
> >>> >    the source UDP port number present in the IP header carried by the
> >>> >    payload of the VXLAN encapsulated packet.  The VNI of the packet
> >>> >    SHOULD be used to derive interface-related information for
> >>> >    demultiplexing the packet.
> >>> > 
> >>> > But this does not really explain how to do the initial demultiplexing. 
> >>> > Does each BFD session need to have a separate inner source IP address? 
> >>> > Or source UDP port? And how ofter are they recycled or kept as state? 
> >>> > How are these mapped?
> >>> > Equally importantly, which side is Active?
> >>> > And what if there’s a race condition with both sides being Active and 
> >>> > setting up redundant sessions?
> >>> > 
> >>> > 1.b. By the way, based on this, using S-BFD [RFC 7880] might be easier 
> >>> > to demux.
> >>> > 
> >>> > 
> >>> > 2. Security
> >>> > 
> >>> > This document says that the TTL in the inner packet carrying BFD is set 
> >>> > to 1. However, RFC 5880 says to use GTSM [RFC 5082], i.e., a value of 
> >>> > 255..
> >>> > 
> >>> > Why is GTSM not used here?
> >>> > 
> >>> > 
> >>> > 3. ECMP and fate-sharing under-specification:
> >>> > 
> >>> > Section 4.1. says:
> >>> > 
> >>> >    The Outer IP/UDP
> >>> >    and VXLAN headers MUST be encoded by the sender as defined in
> >>> >    [RFC7348].
> >>> > 
> >>> > 
> >>> > And RFC 7348 says:
> >>> > 
> >>> >       -  Source Port:  It is recommended that the UDP source port number
> >>> >          be calculated using a hash of fields from the inner packet --
> >>> >          one example being a hash of the inner Ethernet frame's headers.
> >>> >          This is to enable a level of entropy for the ECMP/load-
> >>> >          balancing of the VM-to-VM traffic across the VXLAN overlay.
> >>> >          When calculating the UDP source port number in this manner, it
> >>> >          is RECOMMENDED that the value be in the dynamic/private port
> >>> >          range 49152-65535 [RFC6335].
> >>> > 
> >>> > 
> >>> > Based on this, depending on the hashing calculation, the outer source 
> >>> > UDP port can be different leading to different ECMP treatment. Does 
> >>> > something else need to be specified here in regards to the outer UDP 
> >>> > source port?
> >>> > 
> >>> > 
> >>> > 4. Section 7 says that “ Support for echo BFD is outside the scope of 
> >>> > this document”. 
> >>> > 
> >>> > Assuming this means “BFD Echo mode”, why is this out of scope? If this 
> >>> > is a single logical hop underneath VXLAN, what’s preventing the use of 
> >>> > Echo? Echo’s benefits are huge.
> >>> > 
> >>> > 
> >>> > 5. Terminology
> >>> > 
> >>> >    Implementations SHOULD ensure that the BFD
> >>> >    packets follow the same lookup path as VXLAN data packets within the
> >>> >    sender system.
> >>> > 
> >>> > What is a “look up path within a sender system”?
> >>> > 
> >>> > 
> >>> > 6. Deployment scenarios
> >>> > 
> >>> > S3 says:
> >>> >    Figure 1 illustrates the scenario with two servers, each of them
> >>> >    hosting two VMs.  The servers host VTEPs that terminate two VXLAN
> >>> > […]
> >>> >                      Figure 1: Reference VXLAN Domain
> >>> > 
> >>> > 
> >>> > However, RFC 7348 Figure 3 lists that as one deployment scenario, not 
> >>> > as “the scenario” and “The Reference VXLAN Domain”.
> >>> > 
> >>> > Best,
> >>> > 
> >>> > Carlos.
> >>> > 
> >>> >> On Jun 17, 2019, at 12:58 AM, Greg Mirsky <gregimir...@gmail.com> 
> >>> >> wrote:
> >>> >> 
> >>> >> Hi Oliver,
> >>> >> thank you for your thorough review, clear and detailed questions. My 
> >>> >> apologies for the delay to respond. Please find my answers below 
> >>> >> in-line tagged GIM>>.
> >>> >> 
> >>> >> Regards,
> >>> >> Greg
> >>> >> 
> >>> >> On Fri, May 31, 2019 at 12:38 PM Olivier Bonaventure via Datatracker 
> >>> >> <nore...@ietf.org> wrote:
> >>> >> Reviewer: Olivier Bonaventure
> >>> >> Review result: Ready with Issues
> >>> >> 
> >>> >> This document has been reviewed as part of the transport area review 
> >>> >> team's
> >>> >> ongoing effort to review key IETF documents. These comments were 
> >>> >> written
> >>> >> primarily for the transport area directors, but are copied to the 
> >>> >> document's
> >>> >> authors and WG to allow them to address any issues raised and also to 
> >>> >> the IETF
> >>> >> discussion list for information.
> >>> >> 
> >>> >> When done at the time of IETF Last Call, the authors should consider 
> >>> >> this
> >>> >> review as part of the last-call comments they receive. Please always CC
> >>> >> tsv-...@ietf.org if you reply to or forward this review.
> >>> >> 
> >>> >> I have only limited knowledge of VXLAN and do not know all subtleties 
> >>> >> of BFD.
> >>> >> This review is thus more from a generalist than a specialist in this 
> >>> >> topic.
> >>> >> 
> >>> >> Major issues
> >>> >> 
> >>> >> Section 4 requires that " Implementations SHOULD ensure that the BFD
> >>> >>    packets follow the same lookup path as VXLAN data packets within the
> >>> >>    sender system."
> >>> >> 
> >>> >> Why is this requirement only relevant for the lookup path on the 
> >>> >> sender system
> >>> >> ? What does this sentence really implies ?
> >>> >> GIM>> RFC 5880 set the scope of the fault detection of BFD protocol as 
> >>> >>    ... the bidirectional path between two forwarding engines, including
> >>> >>    interfaces, data link(s), and to the extent possible the forwarding
> >>> >>    engines themselves ...
> >>> >> The requirement aimed to the forwarding engine of a BFD system that 
> >>> >> transmits BFD control packets over VXLAN tunnel.
> >>> >> 
> >>> >> Is it a requirement that the BFD packets follow the same path as the 
> >>> >> data
> >>> >> packet for a given VXLAN ? I guess so. In this case, the document 
> >>> >> should
> >>> >> discuss how Equal Cost Multipath could affect this.
> >>> >> GIM>> I think that ECMP environment is more likely to be experienced 
> >>> >> by a transit node in the underlay. If the BFD session is used to 
> >>> >> monitor the specific underlay path, then, I agree, we should explain 
> >>> >> that using the VXLAN payload information to draw path entropy may 
> >>> >> cause data and BFD packets following different underlay routes. But, 
> >>> >> on the other hand, that is the case for OAM and fault detection in all 
> >>> >> overlay networks in general.
> >>> >> 
> >>> >> Minor issues
> >>> >> 
> >>> >> Section 1
> >>> >> 
> >>> >> You write "The asynchronous mode of BFD, as defined in [RFC5880],
> >>> >>  can be used to monitor a p2p VXLAN tunnel."
> >>> >> 
> >>> >> Why do you use the word can ? It is a possibility or a requirement ?
> >>> >> GIM>> In principle, BFD Demand mode may be used to monitor p2p paths 
> >>> >> as well, I agree, will re-word to more assertive:
> >>> >>  The asynchronous mode of BFD, as defined in [RFC5880],
> >>> >>  is used to monitor a p2p VXLAN tunnel.
> >>> >> 
> >>> >> NVE has not been defined before and is not in the terminology.
> >>> >> GIM>> Will add to the Terminology and expand as:
> >>> >> NVE        Network Virtualization Endpoint 
> >>> >> 
> >>> >> This entire section is not easy to read for an outsider.
> >>> >> 
> >>> >> Section 3
> >>> >> 
> >>> >> VNI has not been defined
> >>> >> GIM>> Will add to the Terminology section:
> >>> >> VNI    VXLAN Network Identifier (or VXLAN Segment ID)
> >>> >> 
> >>> >> Figure 1 could take less space
> >>> >> GIM>> Yes, can make it bit denser. Would the following be an 
> >>> >> improvement?
> >>> >>  
> >>> >>       +------------+-------------+
> >>> >>       |        Server 1          |
> >>> >>       | +----+----+  +----+----+ |
> >>> >>       | |VM1-1    |  |VM1-2    | |
> >>> >>       | |VNI 100  |  |VNI 200  | |
> >>> >>       | |         |  |         | |
> >>> >>       | +---------+  +---------+ |
> >>> >>       | Hypervisor VTEP (IP1)    |
> >>> >>       +--------------------------+
> >>> >>                             |
> >>> >>                             |   +-------------+
> >>> >>                             |   |   Layer 3   |
> >>> >>                             +---|   Network   |
> >>> >>                                 +-------------+
> >>> >>                                     |
> >>> >>                                     +-----------+
> >>> >>                                                 |
> >>> >>                                          +------------+-------------+
> >>> >>                                          |    Hypervisor VTEP (IP2) |
> >>> >>                                          | +----+----+  +----+----+ |
> >>> >>                                          | |VM2-1    |  |VM2-2    | |
> >>> >>                                          | |VNI 100  |  |VNI 200  | |
> >>> >>                                          | |         |  |         | |
> >>> >>                                          | +---------+  +---------+ |
> >>> >>                                          |      Server 2            |
> >>> >>                                          +--------------------------+
> >>> >> 
> >>> >> 
> >>> >> Section 4
> >>> >> 
> >>> >> I do not see the benefits of having one paragraph in Section 4 
> >>> >> followed by only
> >>> >> Section 4.1
> >>> >> GIM>> Will merge Section 4.1 into 4 with minor required re-wording:
> >>> >> 4.  BFD Packet Transmission over VXLAN Tunnel
> >>> >> 
> >>> >>    BFD packet MUST be encapsulated and sent to a remote VTEP as
> >>> >>    explained in this section.  Implementations SHOULD ensure that the
> >>> >>    BFD packets follow the same lookup path as VXLAN data packets within
> >>> >>    the sender system.
> >>> >> 
> >>> >>    BFD packets are encapsulated in VXLAN as described below.  The VXLAN
> >>> >>    packet format is defined in Section 5 of [RFC7348].  The Outer 
> >>> >> IP/UDP
> >>> >>    and VXLAN headers MUST be encoded by the sender as defined in
> >>> >>    [RFC7348].
> >>> >> 
> >>> >> Section 4.1
> >>> >> 
> >>> >> The document does not specify when a dedicated MAC address or the MAC 
> >>> >> address
> >>> >> of the destination VTEP must be used. This could affect the 
> >>> >> interoperability of
> >>> >> implementations. Should all implementations support both the dedicated 
> >>> >> MAC
> >>> >> address and the destination MAC address ?
> >>> >> GIM>> After further discussion, authors decided to remove the request 
> >>> >> for the dedicated MAC address allocation. Only the MAC address of the 
> >>> >> remote VTEP must be used as the destination MAC address in the inner 
> >>> >> Ethernet frame. Please check the attached diff between the -07 and the 
> >>> >> working versions or the working version of the draft.
> >>> >> 
> >>> >> It is unclear from this section whether IPv4 inside IPv6 and the 
> >>> >> opposite
> >>> >> should be supported or not.
> >>> >> GIM>> Any combination of outer IPvX and inner IPvX is possible.
> >>> >> 
> >>> >> Section 5.
> >>> >> 
> >>> >> If the received packet does not match the dedicated MAC address nor 
> >>> >> the MAC
> >>> >> address of the VTEP, should the packet be silently discarded or treated
> >>> >> differently ?
> >>> >> GIM>> As I've mentioned earlier, authors have decided to remove the 
> >>> >> use of the dedicated MAC address for BFD over VXLAN.
> >>> >> 
> >>> >> Section 5.1
> >>> >> 
> >>> >> Is this a modification to section 6.3 of RFC5880 ? This is not clear
> >>> >> GIM>> I think that this section is not modification but the definition 
> >>> >> of the application-specific procedure that is outside the scope of RFC 
> >>> >> 5880:
> >>> >>    The method of demultiplexing the initial packets (in which Your
> >>> >>    Discriminator is zero) is application dependent, and is thus outside
> >>> >>    the scope of this specification.
> >>> >> 
> >>> >> Section 9
> >>> >> 
> >>> >> The sentence " Throttling MAY be relaxed for BFD packets
> >>> >>    based on port number." is unclear.
> >>> >> GIM>> Yes, thank you for pointing to this. The updated text, in the 
> >>> >> whole paragraph, is as follows:
> >>> >> NEW TEXT:
> >>> >>    The document requires setting the inner IP TTL to 1, which could be
> >>> >>    used as a DDoS attack vector.  Thus the implementation MUST have
> >>> >>    throttling in place to control the rate of BFD control packets sent
> >>> >>    to the control plane.  On the other hand, over aggressive throttling
> >>> >>    of BFD control packets may become the cause of the inability to form
> >>> >>    and maintain BFD session at scale.  Hence, throttling of BFD control
> >>> >>    packets SHOULD be adjusted to permit BFD to work according to its
> >>> >>    procedures.
> >>> >> <draft-ietf-bfd-vxlan-08.txt><Diff_ draft-ietf-bfd-vxlan-07.txt - 
> >>> >> draft-ietf-bfd-vxlan-08.txt.html>
> >>> > 
> >>> 
> >> 
> > 
> 

Reply via email to