On 15/10/2021 20:18, Jeffrey Haas wrote:
Working Group,

Now that the BFD YANG work is getting ready to pop out of the RFC Editor's
queue, it's an appropriate time to finish the last minor details for the
BFD Unsolicited draft.

Previously, the draft had exited Working Group Last Call with minor things
to be resolved, and a process question about where this draft should be with
regards to the standard process.  Our conversation with our Area Director at
that time and other associated IESG members suggested that Proposed Standard
status was appropriate.

Greg Mirsky had made a number of comments, several which have been at least
partially addressed in the current version of the draft.  Note that the top
of the thread corresponds to the Working Group feedback during WGLC.

https://mailarchive.ietf.org/arch/msg/rtg-bfd/naYc-qtNmf8ZH2sRF8S76DqzgYc/

I encourage the Working Group to review the draft and the comments to date.
After resolving them, I believe we're ready to have a shepherd writeup and
send this to the IESG.

Jeff

My comments from 28oct21 and thereabouts, some of which were first made in August 2020, have not been addressed (or are being ignored:-(

The IANA Considerations registers a different prefix to that in the YANG module; this is a showstopper.

The Security Considerations for YANG modules are out-of-date. See the pointer in YANG Guidelines, RFC8407. Fixing this will cause updates to the I-D References.

The reference to bfd-yang is out of date - it is an RFC now.

YANG import MUST be Normative Reference (eg RFC8349)

Tom Petch

-----

Addressing points Greg has raised:
- "Does this document update RFC 5881?"

   In my opinion, we're introducing no procedural changes vs. RFC 5880/5881.
   The passive mode documented in RFC 5880 is being leveraged.  We're simply
   not explicitly provisioning the session.  Others in the WGLC thread
   support not marking this as an update.

- "node-wise configuration"

   I believe that has been addressed in the current version of the draft.

- Greg writes: "The fourth paragraph in Section 2 explains the handling of
   the first BFD control packet with Your Discriminator == 0, i.e., "it does
   not find an existing session with the same source address". What happens
   if the matching BFD session has been found?"

   This case could use a small amount of normative text.  For reference, here
   is the text from RFC 5880, §6.8.6:

   :   If the Your Discriminator field is zero, the session MUST be
   :   selected based on some combination of other fields, possibly
   :   including source addressing information, the My Discriminator
   :   field, and the interface over which the packet was received.  The
   :   exact method of selection is application specific and is thus
   :   outside the scope of this specification.  If a matching session is
   :   not found, a new session MAY be created, or the packet MAY be
   :   discarded.  This choice is outside the scope of this
   :   specification.

   One easy possibility is that there is an existing session, or one that may
   be failing shortly.  Discarding the received packets in this circumstance
   until there is no existing session might be an appropriate response.

- Greg write: "Does that mean that there will be only one session
   with the same source address despite different destination addresses
   listed?"

   One point of comparison is that the single-hop BFD YANG module is indexed
   on interface and destination address and not source address.

- Greg writes: "the local BFD system assigns My Discriminator to the
   session. Though it is standard (RFC 5880) step, it might be useful to
   mention it."

   Since I don't think it brings clarity and distracts from "see the base
   RFC", I would suggest not mentioning it.

- Greg asks about what happens to session state for a session that was
   passive and went down.

   Much like Greg, I believe this is an implementation detail but it's one
   that has impact to things like YANG modules.  Since single-hop sessions
   are indexed based on interface and destination address, permitting them to
   linger for some period of time might be useful with low danger of being a
   denial of service vs. the operational state.  This would permit a YANG
   notification sent for a session that went down to be able to query
   information from the operational state portion of the module.

   If the authors agree, it might be worth a sentence or two mentioning that
   session state may linger for an implementation-defined period of time for
   management purposes.

- Session changing from passive to active.

   This isn't a normative MAY.

- TTL=255 only RECOMMENDED?

   RFC 5881 provides for circumstances where the send-side will always use
   TTL 255 but validation on reception is optional.

   I would support Greg's point by suggesting that the text in the current
   draft simply be updated to say "follow RFC 5881's GTSM procedures".

-----

Other notes:
- The BFD YANG module references will be able to be filled out shortly as
   RFC 9127.

- Update dates appropriately throuhgout the YANG module.  Copyright,
   revision, etc.

- The YANG module defines a role.  I suggest that the draft should define a
   State Variable covering this.  See RFC 5880, §6.8.1.

-----

Minor comments on the draft from my most current review. (Line numbers from
IETF nits tool.)

140        On the passive side, the "unsolicited BFD" SHOULD be explicitely

s/explicitely/explicitly/

391           interfaces the above check should be alinged with routing protocol

s/alinged/aligned/


-- Jeff

.


Reply via email to