Hi Jeff & Greg,

I have just submitted -04 version. I believe together with co-authors we
have addressed all the comments received so far.

https://datatracker.ietf.org/doc/draft-ietf-bfd-unsolicited/

Hope that we can move forward with this work.

Kind regards,
Robert



On Fri, Oct 15, 2021 at 9:18 PM Jeffrey Haas <jh...@pfrc.org> wrote:

> Working Group,
>
> Now that the BFD YANG work is getting ready to pop out of the RFC Editor's
> queue, it's an appropriate time to finish the last minor details for the
> BFD Unsolicited draft.
>
> Previously, the draft had exited Working Group Last Call with minor things
> to be resolved, and a process question about where this draft should be
> with
> regards to the standard process.  Our conversation with our Area Director
> at
> that time and other associated IESG members suggested that Proposed
> Standard
> status was appropriate.
>
> Greg Mirsky had made a number of comments, several which have been at least
> partially addressed in the current version of the draft.  Note that the top
> of the thread corresponds to the Working Group feedback during WGLC.
>
> https://mailarchive.ietf.org/arch/msg/rtg-bfd/naYc-qtNmf8ZH2sRF8S76DqzgYc/
>
> I encourage the Working Group to review the draft and the comments to date.
> After resolving them, I believe we're ready to have a shepherd writeup and
> send this to the IESG.
>
> -----
>
> Addressing points Greg has raised:
> - "Does this document update RFC 5881?"
>
>   In my opinion, we're introducing no procedural changes vs. RFC 5880/5881.
>   The passive mode documented in RFC 5880 is being leveraged.  We're simply
>   not explicitly provisioning the session.  Others in the WGLC thread
>   support not marking this as an update.
>
> - "node-wise configuration"
>
>   I believe that has been addressed in the current version of the draft.
>
> - Greg writes: "The fourth paragraph in Section 2 explains the handling of
>   the first BFD control packet with Your Discriminator == 0, i.e., "it does
>   not find an existing session with the same source address". What happens
>   if the matching BFD session has been found?"
>
>   This case could use a small amount of normative text.  For reference,
> here
>   is the text from RFC 5880, §6.8.6:
>
>   :   If the Your Discriminator field is zero, the session MUST be
>   :   selected based on some combination of other fields, possibly
>   :   including source addressing information, the My Discriminator
>   :   field, and the interface over which the packet was received.  The
>   :   exact method of selection is application specific and is thus
>   :   outside the scope of this specification.  If a matching session is
>   :   not found, a new session MAY be created, or the packet MAY be
>   :   discarded.  This choice is outside the scope of this
>   :   specification.
>
>   One easy possibility is that there is an existing session, or one that
> may
>   be failing shortly.  Discarding the received packets in this circumstance
>   until there is no existing session might be an appropriate response.
>
> - Greg write: "Does that mean that there will be only one session
>   with the same source address despite different destination addresses
>   listed?"
>
>   One point of comparison is that the single-hop BFD YANG module is indexed
>   on interface and destination address and not source address.
>
> - Greg writes: "the local BFD system assigns My Discriminator to the
>   session. Though it is standard (RFC 5880) step, it might be useful to
>   mention it."
>
>   Since I don't think it brings clarity and distracts from "see the base
>   RFC", I would suggest not mentioning it.
>
> - Greg asks about what happens to session state for a session that was
>   passive and went down.
>
>   Much like Greg, I believe this is an implementation detail but it's one
>   that has impact to things like YANG modules.  Since single-hop sessions
>   are indexed based on interface and destination address, permitting them
> to
>   linger for some period of time might be useful with low danger of being a
>   denial of service vs. the operational state.  This would permit a YANG
>   notification sent for a session that went down to be able to query
>   information from the operational state portion of the module.
>
>   If the authors agree, it might be worth a sentence or two mentioning that
>   session state may linger for an implementation-defined period of time for
>   management purposes.
>
> - Session changing from passive to active.
>
>   This isn't a normative MAY.
>
> - TTL=255 only RECOMMENDED?
>
>   RFC 5881 provides for circumstances where the send-side will always use
>   TTL 255 but validation on reception is optional.
>
>   I would support Greg's point by suggesting that the text in the current
>   draft simply be updated to say "follow RFC 5881's GTSM procedures".
>
> -----
>
> Other notes:
> - The BFD YANG module references will be able to be filled out shortly as
>   RFC 9127.
>
> - Update dates appropriately throuhgout the YANG module.  Copyright,
>   revision, etc.
>
> - The YANG module defines a role.  I suggest that the draft should define a
>   State Variable covering this.  See RFC 5880, §6.8.1.
>
> -----
>
> Minor comments on the draft from my most current review. (Line numbers from
> IETF nits tool.)
>
> 140        On the passive side, the "unsolicited BFD" SHOULD be explicitely
>
> s/explicitely/explicitly/
>
> 391           interfaces the above check should be alinged with routing
> protocol
>
> s/alinged/aligned/
>
>
> -- Jeff
>

Reply via email to