On Mon, Dec 2, 2019 at 10:28 AM Andrew Alston <
andrew.als...@liquidtelecom.com> wrote:

Currently the biggest issue that I see with S-BFD based protection – which
> is something we use in production is as follows:
>
>
>
> Unless I’m mistaken – there is absolutely no way to tie S-BFD based
> protection with BGP injected SR-TE pathing
>


Well I am not sure what you call " BGP injected SR-TE pathing" but if you
are looking for validation of BGP paths that has been supported by some
vendors for a loooong time. Hint: you allocate different next hop for your
SR-TE endpoints and voila.

Btw - not an ietf topic, but an implementation request / vendor's feature.

Besides, since you are talking about headend what you are describing is
path protection ... this draft talks about node protection which is a
completely different thing.

Cheers,
r.



> Node validation as defined in the SR-TE drafts is limited to presence in
> the IGP
>
> Since SR-TE path injection may be done through reflectors – using target
> communities – the point of communication into the network is not
> necessarily the head end of the tunnel and the point of injection may be
> entirely unaware of the implications of the path that’s being inserted.
>
>
>
> By utilizing what is contained in this draft to build context tables at
> the head end of an inserted tunnel on an automated basis – this solves a
> problem that currently exists that S-BFD simply cannot solve without
> modification to the srte policy insertion drafts that would allow for
> automated building of S-BFD checks – which in and of itself could prove
> challenging considering the complexity of this.
>
>
>
> That is not to say in any way that both s-bfd and potentially other
> mechanisms do not have use cases – but as an operator – this draft would
> certainly provide a better mechanism for constant path validation than
> anything we currently have (which is based on steered packets that leave
> the controller and return to the controller through the use of SR packets
> and binding sids).
>
>
>
> Just my 2c
>
>
>
> Thanks
>
>
>
> Andrew
>
>
>
>
>
> *From:* spring <spring-boun...@ietf.org> *On Behalf Of *Shraddha Hegde
> *Sent:* Monday, 2 December 2019 10:24
> *To:* Alexander Vainshtein <alexander.vainsht...@ecitele.com>
> *Cc:* spr...@ietf.org; rtg-bfd@ietf.org; Robert Raszuk <rob...@raszuk.net>;
> rt...@ietf.org
> *Subject:* Re: [spring] Draft for Node protection of intermediate nodes
> in SR Paths
>
>
>
> Sasha,
>
>
>
> We are in agreement on separating the trigger from the protection
> mechanism.
>
>
>
> > In any case I think that it woyld make sense to separate the protection
> scheme proposed in the draft from specific triggers for its activation
> >similar to how this has been done in MPLS Egress Protection Framework
> draft.
>
>
>
> I’ll add text in the next revision for this.
>
>
>
> Rgds
>
> Shraddha
>
>
>
>
>
> *From:* Alexander Vainshtein <alexander.vainsht...@ecitele.com>
> *Sent:* Monday, December 2, 2019 12:24 PM
> *To:* Shraddha Hegde <shrad...@juniper.net>
> *Cc:* spr...@ietf.org; rt...@ietf.org; rtg-bfd@ietf.org; Robert Raszuk <
> rob...@raszuk.net>
> *Subject:* Re: [spring] Draft for Node protection of intermediate nodes
> in SR Paths
>
>
>
> Shraddha,
>
> Lots of thanks for athe tesponse.
>
>
>
> I probably did not express myself clearly enough. I will try to fix thst
> now, and I apologise in advance for a long email.
>
>
>
> I have not been speaking about end-yo-end protecyion, only about local
> protection against failure of an intermediate (a.k.a. pinned) node of an SR
> path and, specifically, triggers for such protection. This context has been
> actually defined by Robert in his original comment.
>
>
>
> To the best of my understanding, Robert's concern was that failure of the
> link beteeen the pinned node of a SR path and its adjacency (the
> penultimate node of the Segment represented by the Node SID of the pinned
> node) is not a good enough indication of the pinned node failure.
>
>
>
> I agree with this statement even if my understanding of a good indication
> differs from Robert's:
>
> - I think that it is not sufficiently specific and therefore could result
> in flapping (local node protection activated and then released)
>
> -Robert's concern, to the best of my understanding, was that it could miss
> some failures (e.g. the Fabric failure).
>
>
>
> Therefore I have suggested two possibilities for more specific and more
> rrliabke detection of failure of the pinned node by its adjacency:
>
>
>
> 1. Run a multi-hop IP BFD session between the peniltimate node ans the
> pinned ones using prefixes acting as Node SIDs of this pair.  This wiuld
> ignore link failures but locally detect such node failurs as power-down or
> crash.
>
>
>
> 2.  Run S-BFD sessions to all other adjacencies of the pinned node using
> in each case a list of two SIDs: the protected Adj-SID to the pinned node
> followed by tge Node SID of the other adjacency, ans declare pinned node
> failure when all these sessions fail. This would again ignore failure of
> the link between the penultimate node and the pinned node but detect
> various real failures of the pinned node, e.g. failure of its Fabric.
>
>
>
> In any case I think that it woyld make sense to separate the protection
> scheme proposed in the draft from specific triggers for its activation
> similar to how this has been done in MPLS Egress Protection Framework draft.
>
>
>
> My 2c.
>
>
>
>
>
>
>
>
>
>
>
>
>
> Get Outlook for Android
> <https://urldefense.com/v3/__https:/aka.ms/ghei36__;!8WoA6RjC81c!QAhYaA0qhoUZ3yxQWl05Ap12CMR-J-RTL_O_d_wKElC5ktZrPekfTDhLH6GPZiIH$>
>
>
> ------------------------------
>
> *From:* Shraddha Hegde <shrad...@juniper.net>
> *Sent:* Monday, December 2, 2019, 06:10
> *To:* Alexander Vainshtein; Robert Raszuk
> *Cc:* spr...@ietf.org; rt...@ietf.org; rtg-bfd@ietf.org
> *Subject:* RE: [spring] Draft for Node protection of intermediate nodes
> in SR Paths
>
>
>
> Robert/Sasha,
>
>
>
>
>
> S-BFD based mechanism is  head-end triggered protection. It is not a local
> protection.
>
> S-BFD mechanism is orthogonal to the mechanism described in this draft and
> an operator can
>
> choose what kind of protection makes more sense to his/her network.
>
>
>
> In many cases, node-protecting backup path will be different from
> link-protecting/SRLG protecting backup path.
>
> If you really want to use link-protecting backup path when link fails and
> node protecting backup path when node fails,
>
> You will have to download both link protecting and node-protecting backup
> paths in FIB and detect which
>
> failure really happened and have the ability in hardware to use
> appropriate backup path. None of these
>
> is in the scope of this document.
>
>
>
> Rgds
>
> Shraddha
>
>
>
>
>
> *From:* Alexander Vainshtein <alexander.vainsht...@ecitele.com>
> *Sent:* Saturday, November 23, 2019 8:15 PM
> *To:* Robert Raszuk <rob...@raszuk.net>; Shraddha Hegde <
> shrad...@juniper.net>
> *Cc:* spr...@ietf.org; rt...@ietf.org; rtg-bfd@ietf.org
> *Subject:* Re: [spring] Draft for Node protection of intermediate nodes
> in SR Paths
>
>
>
> Robert,
>
> On the second thought, for the purpose of this draft (i.e. in the scope of
> SR) it is possible to implement your suggestion by running S-BFD sessions
> between R7 (as the initiator) and each other adjacency of R8  (acting as
> Reflectors) of a SR policy with list of two SIDs:
>
> - protected adjacency between R7 and R8
>
> - Node SID of the specific "other" adjacency  of R8.
>
>
>
> If all these sessions fail, R7 can reliably consider R8 as failed.
>
>
>
> I am not sure this would be much better than multi-hop IP BFD, and it
> looks much more complicated to me.
>
>
>
>
>
> What do you think?
>
>
>
>
>
>
>
>
>
> Get Outlook for Android
> <https://urldefense.com/v3/__https:/clicktime.symantec.com/3MR8y7CviGLkS3kzg1UybRv6H2?u=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Faka.ms*2Fghei36__*3B*218WoA6RjC81c*21Xo-D7e5MfUeTOyV17KUflgSI002KCmsw_EjxLc9pxA6sJ1EbrioDE0VmgnYBhAbc*24__;JSUlJSUlJSUlJSUl!8WoA6RjC81c!QAhYaA0qhoUZ3yxQWl05Ap12CMR-J-RTL_O_d_wKElC5ktZrPekfTDhLH1YVygZC$>
>
>
> ------------------------------
>
> *From:* Alexander Vainshtein <alexander.vainsht...@ecitele.com>
> *Sent:* Saturday, November 23, 2019, 13:15
> *To:* Robert Raszuk; Shraddha Hegde
> *Cc:* spr...@ietf.org; rt...@ietf.org; rtg-bfd@ietf.org
> *Subject:* Re: [spring] Draft for Node protection of intermediate nodes
> in SR Paths
>
>
>
> Robert,
>
> Lots of thanks for a prompt response.
>
>
>
> I respectfully disagree with your statement that BFD implementation  is
> usually offloaded to the HW of the ingress line card.  I do not think this
> can wor for MH BFD sessions because the ingress and egress line cards are
> not known in advance and change with the routing changes
>
> A good  multi-hop BFD implementation should be ready to overcome this..
> There are many ways to achieve that. A naive implementation that runs in SW
> of the control card is also possible of course. And they would sensd and
> receive packets
>
>
>
> My 2c.
>
> Get Outlook for Android
> <https://urldefense.com/v3/__https:/clicktime.symantec.com/3MR8y7CviGLkS3kzg1UybRv6H2?u=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Faka.ms*2Fghei36__*3B*218WoA6RjC81c*21Xo-D7e5MfUeTOyV17KUflgSI002KCmsw_EjxLc9pxA6sJ1EbrioDE0VmgnYBhAbc*24__;JSUlJSUlJSUlJSUl!8WoA6RjC81c!QAhYaA0qhoUZ3yxQWl05Ap12CMR-J-RTL_O_d_wKElC5ktZrPekfTDhLH1YVygZC$>
>
>
> ------------------------------
>
> *From:* Robert Raszuk <rob...@raszuk.net>
> *Sent:* Saturday, November 23, 2019, 12:37
> *To:* Alexander Vainshtein; Shraddha Hegde
> *Cc:* spr...@ietf.org; rt...@ietf.org; rtg-bfd@ietf.org
> *Subject:* Re: [spring] Draft for Node protection of intermediate nodes
> in SR Paths
>
>
>
> Hi Sasha,
>
>
>
> On the surface your suggestion may look cool - but if you zoom in - I do
> not think it will work in practice.
>
>
>
> See - one of the biggest value of BFD is its offload to line card's
> hardware. And in most cases it is ingress line card to the box. So if you
> instruct such hardware to respond to SID address loopback you still did not
> gain much in terms of detection router's fabric failures, remote LC failure
> or control plane issues which could soon result in box failure. The
> catalogue of router failures is of course much more colorful.
>
>
>
> If you ask BFD to be responded by RP/RE it no longer has the BFD
> advantage.
>
>
>
> IMHO the best way to detect node failure is actually to send the probes
> *across* the node under test to its peers.
>
>
>
> The way I would think of establishing such m-hop sessions would be fully
> automated with one knob per IGP adj. ex: "bfd detect-node-failure [max N]"
> where local BFD subsystem would create N sessions to IGP peers of the node
> we are to protect. LSDB has those peers so no new protocol extension is
> needed, perhaps even no new IETF draft is required :). N would be the limit
> of such sessions in case the node under protection has say 10s of peers.
> Default could be perhaps even 1.
>
>
>
> Thx,
>
> Robert.
>
>
>
>
>
> On Sat, Nov 23, 2019 at 10:00 AM Alexander Vainshtein <
> alexander.vainsht...@ecitele.com> wrote:
>
> Shraddha, Robert and all,
>
> Regarding Robert's question:
>
> I wonder if multi-hop IP BFD session with addresses used as /32 (or /128)
> prefixes serving as Nose SIDs of R8 and R7 respectively could be used as
> such a trigger by R7? Such a session would not respond to link failures,
> and I find it problematic to imagine a scenario when it would be kept UP in
> the case of a real node failure.
>
>
>
> Of course such a session would have to be slow enough not to react to link
> failures. But it still couks be much faster than IGP conversion IMHO.
>
>
>
> My 2c,
>
> Sasha
>
>
>
> Such
>
>
>
>
>
> Get Outlook for Android
> <https://urldefense.com/v3/__https:/clicktime.symantec.com/3NbK72q2ca668aVyMaT7Esn6H2?u=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fclicktime..symantec.com*2F3CfVQPtBYBAPbHUSngEVNQD6H2*3Fu*3Dhttps*2A3A*2A2F*2A2Faka.ms*2A2Fghei36__*3BJSUlJQ*218WoA6RjC81c*21Xo-D7e5MfUeTOyV17KUflgSI002KCmsw_EjxLc9pxA6sJ1EbrioDE0Vmgujy50EN*24__;JSUlJSUlJSUlJSUlJSUlJSUl!8WoA6RjC81c!QAhYaA0qhoUZ3yxQWl05Ap12CMR-J-RTL_O_d_wKElC5ktZrPekfTDhLH7q73pAh$>
>
>
> ------------------------------
>
> *From:* spring <spring-boun...@ietf.org> on behalf of Robert Raszuk <
> rob...@raszuk.net>
> *Sent:* Friday, November 22, 2019, 11:22
> *To:* Shraddha Hegde
> *Cc:* spr...@ietf.org; rt...@ietf.org
> *Subject:* Re: [spring] Draft for Node protection of intermediate nodes
> in SR Paths
>
>
>
> Hi Shraddha,
>
>
>
> I have one question to the document.
>
>
>
> As you know the critical element for the effective protection of any
> scheme is the failure detection. On that your draft seems to have just one
> little paragraph:
>
>
>
>    Note that R7 activates the node-protecting backup path when it
>
>    detects that the link to R8 has failed.  R7 does not know that node
>
>    R8 has actually failed.  However, the node-protecting backup path is
>
>    computed assuming that the failure of the link to R8 implies that R8
>
>    has failed.
>
>
>
> Well IMO this is not enough. Specifically there can be a lot of types of
> node failure when link is still up. Moreover there can be even running BFD
> across the link just fine when say fabric failure occurs at R8.
>
>
>
> While this is not solely issue with this draft, it is our common IETF
> failure to provide correct means of detecting end to end path or fragments
> of path failures (I am specifically not calling them segment here :).
>
>
>
> For example I propose that to effectively detect R8 failure as node
> failure which is the topic of your proposal a mechanism is clearly defined
> and includes bi-dir data plane probes send between R7-R9, R3-R7, R4-R7,
> R4-R9, R3-R9
>
>
>
> Many thx,
>
> Robert.
>
>
>
>
>
> On Fri, Nov 22, 2019 at 4:38 AM Shraddha Hegde <shraddha=
> 40juniper....@dmarc.ietf..org <40juniper....@dmarc.ietf.org>> wrote:
>
> WG,
>
>
>
> This is the draft I pointed out that talks about solutions for providing
> node-protection.
>
> It covers Anycast case as well as keeping forwarding plane longer.
>
>
> https://tools.ietf.org/html/draft-hegde-spring-node-protection-for-sr-te-paths-05
> <https://urldefense.com/v3/__https:/clicktime.symantec.com/3HvrzHXwAou2JruETj6jcyF6H2?u=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fclicktime..symantec.com*2F375SW6TBGPi2mN7V9YeVWGg6H2*3Fu*3Dhttps*2A3A*2A2F*2A2Ftools.ietf.org*2A2Fhtml*2A2Fdraft-hegde-spring-node-protection-for-sr-te-paths-05__*3BJSUlJSU*218WoA6RjC81c*21Xo-D7e5MfUeTOyV17KUflgSI002KCmsw_EjxLc9pxA6sJ1EbrioDE0Vmgg0xmj_C*24__;JSUlJSUlJSUlJSUlJSUlJSUlJQ!8WoA6RjC81c!QAhYaA0qhoUZ3yxQWl05Ap12CMR-J-RTL_O_d_wKElC5ktZrPekfTDhLH9RfbOqT$>
>
>
>
> Review and comments solicited.
>
>
>
> Rgds
>
> Shraddha
>
>
>
> _______________________________________________
> rtgwg mailing list
> rt...@ietf.org
> https://www.ietf.org/mailman/listinfo/rtgwg
> <https://urldefense.com/v3/__https:/clicktime.symantec.com/37ZvNSMSAddpxDGDQPm7oVA6H2?u=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fclicktime..symantec.com*2F35M9j5zHTaSYRwVh5RP6xcB6H2*3Fu*3Dhttps*2A3A*2A2F*2A2Fwww.ietf.org*2A2Fmailman*2A2Flistinfo*2A2Frtgwg__*3BJSUlJSUl*218WoA6RjC81c*21Xo-D7e5MfUeTOyV17KUflgSI002KCmsw_EjxLc9pxA6sJ1EbrioDE0VmgvV9Y4sM*24__;JSUlJSUlJSUlJSUlJSUlJSUlJSU!8WoA6RjC81c!QAhYaA0qhoUZ3yxQWl05Ap12CMR-J-RTL_O_d_wKElC5ktZrPekfTDhLH_pG5Prx$>
>
>
>
>
>
>
> ___________________________________________________________________________
>
> This e-mail message is intended for the recipient only and contains
> information which is
> CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have
> received this
> transmission in error, please inform us by e-mail, phone or fax, and then
> delete the original
> and all copies thereof.
> ___________________________________________________________________________
>
>
>
>
> ___________________________________________________________________________
>
> This e-mail message is intended for the recipient only and contains
> information which is
> CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have
> received this
> transmission in error, please inform us by e-mail, phone or fax, and then
> delete the original
> and all copies thereof.
> ___________________________________________________________________________
>

Reply via email to