Impact of Shortest Path First (SPF) Trigger and Delay Strategies on IGP Micro-loops
draft-ietf-rtgwg-spf-uloop-pb-statement-10
Yes
(Martin Vigoureux)
No Objection
(Adam Roach)
(Alissa Cooper)
(Ignas Bagdonas)
(Mirja Kühlewind)
(Suresh Krishnan)
(Terry Manderson)
Note: This ballot was opened for revision 08 and is now closed.
Warren Kumari
Yes
Comment
(2019-01-09 for -09)
Sent
Thank you for writing this -- I found it a really interesting and useful read, and so I'm balloting Yes.
Benjamin Kaduk Former IESG member
Yes
Yes
(2019-01-09 for -09)
Sent
Thank you for this clear and thoughtful document! I only have nit-level editorial suggestions, which you should feel free to accept or ignore as you desire. Section 1 For non standardized timers, implementations are free to implement them in any way. For some standardized timers, we can also see that rather than using static configurable values for such timer, implementations may offer dynamically adjusted timers to help controlling the churn. nit: "help control" This document will present why it sounds important for service providers to have consistent implementations of Link State protocols across vendors. [...] nit: "why it sounds important" has a connotation that it's not actually important, which I don't think is the position of anyone here. So maybe "why it is important" or "will present reasons for service providers to". [RFC8405] defines a solution that satisfies this problem statement and this document captures the reasoning of the provided solution. nit: maybe this is just my personal background, but I am used to seeing "satisfy" used with requirements but "address" with problems. It was also unclear to me that 8405 is a complete solution; if I remember correctly it is only claiming to reduce the number of micro-loops and not to completely eliminate them. In that case, maybe "partially addresses" is better. Section 2 o the delay of failure notification: the more E is advised of the failure later than S, the more a micro-loop may have a chance to appear. nit: I'd suggest "the greater the time gap between E and S being advised of the failure" o the SPF computation time: mostly a matter of CPU power and optimizations like incremental SPF. If S computes its SPF faster than E, there is a chance for a micro-loop to appear. CPUs are today fast enough to consider SPF computation time as negligible (on the order of milliseconds in a large network). side note: this makes me realize my own ignorance -- about how long would a micro-loop typically be active for? Also milliseconds? o the SPF computation order: an SPF trigger can be common to multiple IGP areas or levels (e.g., IS-IS Level1/Level2) or for nit: My first time reading this I misread it to mean scaling or distance, as in "first-order"/"second-order"/etc. Perhaps it's clearer to use "ordering". plays a significant role. As the number of IGP events increase, the delta between SPF delay values used by routers becomes significant and the major part (especially when one router increases its timer nit: I offer "dominating factor" as a potential alternative for "major part". However, for micro-loops, what's matter is not the total time, but nit: "what matters" Section 3 may only run IP reachability computation instead) if the advertised nit: "an IP reachability computation" Section 4.2 Isn't the base of the exponent also a parameter that needs to be specified (or is 2 the universally chosen base)? Section 7 I suppose that things like "micro-loops can cause out-of-order delivery" are universally-enough known that we don't need to be tempted to abuse this document as a general dumping ground for security-relevant statements about micro-loops.
Deborah Brungard Former IESG member
Yes
Yes
(2019-01-09 for -09)
Sent
Thanks for doing!
Martin Vigoureux Former IESG member
Yes
Yes
(for -08)
Unknown
Adam Roach Former IESG member
No Objection
No Objection
(for -09)
Not sent
Alissa Cooper Former IESG member
No Objection
No Objection
(for -09)
Not sent
Alvaro Retana Former IESG member
No Objection
No Objection
(2019-01-08 for -09)
Not sent
[RFC8405] defines a solution that satisfies this problem statement and this document captures the reasoning of the provided solution. It's shame that this work wasn't published before rfc8405, or at least with it. It is also sad that, while this document claims that it "captures the reasoning of the provided solution", rfc8405 mentions it just in passing... I believe the analysis is valuable, and know that the WG has put significant effort on it, so I am not questioning its publication in the IETF Stream.
Ben Campbell Former IESG member
No Objection
No Objection
(2019-01-09 for -09)
Sent
Thanks for using the updated RFC 8174 boilerplate instead of that from 2119. However, IDNits claims that there are no normative keywords at all, so is the boilerplate needed in the first place?
Ignas Bagdonas Former IESG member
No Objection
No Objection
(for -09)
Not sent
Mirja Kühlewind Former IESG member
No Objection
No Objection
(for -09)
Not sent
Suresh Krishnan Former IESG member
No Objection
No Objection
(for -09)
Not sent
Terry Manderson Former IESG member
No Objection
No Objection
(for -09)
Not sent