Skip to main content

OSPF Bidirectional Forwarding Detection (BFD) Strict-Mode
draft-ietf-lsr-ospf-bfd-strict-mode-10

Yes

(Alvaro Retana)
(John Scudder)

No Objection

Erik Kline
Paul Wouters

Note: This ballot was opened for revision 08 and is now closed.

Éric Vyncke
Yes
Comment (2022-10-04 for -09) Sent
# Éric Vyncke, INT AD, comments for draft-ietf-lsr-ospf-bfd-strict-mode-09
CC @evyncke

Thank you for the work put into this document. It is short, clear, and useful (hence my YES).

Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education).

Special thanks to Acee Lindem for the shepherd's detailed write-up including the WG consensus and the justification of the intended status. 

I hope that this review helps to improve the document,

Regards,

-éric

## COMMENTS

### Section 3 

Suggest to move section 3 (Local Interface IPv4 Address TLV) as a subsection of section 4.1 (OSPFv3 IPv4 Address-Family Specifics) as, at least for me, the reader cannot understand the use of section 3 before reading section 4.1

As I am not an OSPFv3 expert, the following question is possibly irrelevant, but can the IPv4 address be a link-local (i.e., 169.254/16)?

### Section 4.1

```
   ... In most deployments of
   OSPFv3 IPv4 AF, it is required that BFD is used to monitor and verify
   IPv4 data plane connectivity between the routers on the link and,
   hence, the BFD session is setup using IPv4 neighbor addresses. 
```

The text is a little unclear whether an IPv6 BFD session is also required.

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. 

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
Erik Kline
No Objection
Paul Wouters
No Objection
Roman Danyliw
No Objection
Comment (2022-10-03 for -08) Sent
Thank you to Wes Hardaker for the SECDIR review.

** Section 1.  Typo. s/adjaceny/adjacency/ 

** Section 1.  Typo. s/establishement/establishment/

** Section 8.  
   If
   authentication is being used in the OSPF routing domain
   [RFC5709][RFC7474], then the Cryptographic Authentication TLV
   [RFC5613] SHOULD also be used to protect the contents of the LLS
   block.

Since strict-mode BFD functionality is not going to be present in legacy implementations, could it be mandatory to protect the LLS block (i.e., use of the Cryptographic Authentication TLV is a MUST)?
Alvaro Retana Former IESG member
Yes
Yes (for -09) Not sent

                            
John Scudder Former IESG member
Yes
Yes (for -08) Unknown

                            
Robert Wilton Former IESG member
Yes
Yes (2022-10-06 for -09) Sent
Thanks for this document.  I think that what is being proposed here is useful.

A few minor/nit comments that may improve this document.

Minor level comments:

(1) p 6, sec 5.  Operations & Management Considerations

Not for this document, and ss per my other OSPF ballots, I assume that the LSR WG will update the OSPF YANG model will be updated to accommodate this feature.


(2) p 6, sec 5.  Operations & Management Considerations

   In network deployments with noisy or degraded links with intermittent
   packet loss, BFD sessions may flap resulting in OSPF adjacency flaps.
   This in turn may cause routing churn.  The use of OSPF BFD strict-
   mode along with mechanisms such as hold-down (a delay in the initial
   OSPF adjacency bringup following BFD session establishment) and/or
   dampening (a delay in the OSPF adjacency bringup following failure
   detected by BFD) may help reduce the frequency of adjacency flaps and
   therefore reduce the associated routing churn.  The details of these
   mechanisms are outside the scope of this document.

For my understanding, is the expectation that if a device supports this feature then it would (or is that SHOULD) be enabled automatically?



Nit level comments:

(3) p 6, sec 6.  Backward Compatibility

   established successfully.  Implementations MAY provide a local
   configuration option to enable BFD without the strict-mode which
   results in the router not advertising the B-bit and BFD operation
   being performed in the same way as prior to this specification.

I find the text about enable BFD without the strict-mode to be slightly unclear, since presumably it is the OSPF interactions with BFD that the configuration is referred to, rather than BFD itself.  Perhaps changing "strict-mode" to "OSPF BFD strict-mode" might be clearer.
Warren Kumari Former IESG member
Yes
Yes (2022-10-05 for -09) Sent
Thank you for this document.

When I started reading this document / read the Abstract, I must admit I thought "This is a silly idea, and smacks of creeping featuritis and premature optimization. This is an already solved problem - you bring up OSPF and *then* use that to signal that you want BFD...."
and then I actually read the Introduction section and the use-case / utility became clear...

My only question (and I'm suspecting it has already been discussed) if is there should actually be some (small) delay after the BFD session establishment to allow the interface to "settle" / give BFD a second or two to figure out if the link is actually "stable" - having BFD come up and then immediately bringing up the adjacency, only to have BFD pull it down 10ms later doesn't seem to solve the issue really... unless it is expected that the OSPF exchange is sufficiently slow that BFD would detect it before OSPF is actually working?
Lars Eggert Former IESG member
No Objection
No Objection (2022-09-30 for -08) Sent
# GEN AD review of draft-ietf-lsr-ospf-bfd-strict-mode-08

CC @larseggert

Thanks to Russ Housley for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/xOoiX0uoXF7M46B5LDSy2kfnPlM).

## Nits

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

### Typos

#### Section 1, paragraph 2
```
-    enable fast routing convergence.  OSPF adjaceny flaps may occur over
+    enable fast routing convergence.  OSPF adjacency flaps may occur over
+                                                  +
```

#### Section 1, paragraph 3
```
-    establishement as described in section 4.1 of [RFC5882].
-             -
```

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT].

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
[IRT]: https://github.com/larseggert/ietf-reviewtool
Zaheduzzaman Sarker Former IESG member
No Objection
No Objection (2022-10-05 for -09) Not sent
I would just note that IANA review is not ready yet.