Hi Jeff,
I'd like to hear from others who are familiar with implementations of BFD
that supports per protocol single-hop BFD multi-sessions between the same
pair of BFD systems. RFC 5881 does allow per protocol single-hop sessions
on the same interface, logical or physical, between the same pair of
systems. But it is not clear, in my opinion, how BFD does demultiplexing if
Your Discriminator == 0 per protocol (RFC 5881, section 3, last sentence)
if systems use the same IP addresses. And hence the question, Even though
it is allowed to have BFD single-hop sessions per application/protocol on
the same interface between the same pair of systems, is this real,
practical requirement?
Or am I missing the point completely?

Regards,
Greg

On Mon, Jun 19, 2017 at 1:57 PM, Jeffrey Haas <jh...@pfrc.org> wrote:

> [Long delayed response.]
>
> Reshad picked up the key points: Some things may make sense in the
> per-client (protocol) users of BFD, some things perhaps do not.  And some
> come down to questions for timer granularity.
>
> The OSPF and ISIS models both make use of BFD simply by providing a boolean
> that says "I'm using BFD or not".
>
> Where we run into some issues are the cases highlighted: when the sessions
> don't share common properties, how should the protocol pick what BFD
> session
> to use?
>
> The current BFD yang model only permits a single IP single-hop session
> to be configured.  (Key is interface/dst-ip)  This means that if different
> parameters *were* desired, the BFD model won't permit it today.  However,
> BFD sessions for many protocols tend not to be configured, but may spring
> forth from protocol state, such as IGP adjacencies.  Thus, it's not
> "configured" - it's solely operational state.  However, the BFD yang model
> doesn't really make good provision for that as an "on".
>
> Where all endpoint state is known a priori, config state makes better
> sense.
>
> To pick the example of Juniper's configuration, if OSPF and eBGP were using
> BFD, both can choose differing timers.  This represents two pieces of
> configuration state for the same endpoints.  Additionally, only one BFD
> session is formed using the most aggressive timers.
>
> I partially point out the situation of multiple timers since there have
> been
> prior list discussions on the situation where clients have different timing
> requirements.  I don't think we handle this operationally in the BFD
> protocol in the cleanest fashion right now - the session will go to Down
> when the aggressive timers fail and there's no clean way to renegotiate to
> the less aggressive timers.
>
> -- Jeff
>
>
>
>
>
>
> On Fri, May 19, 2017 at 02:31:38AM +0000, Reshad Rahman (rrahman) wrote:
> > We started off with the intent of having BFD parameters in the
> applications/protocols which make use of BFD. For timer/multiplier this is
> pretty straight-forward, although the discussion of what to do when not all
> applications have the same BFD parameters for the same session (e.g. Go
> with most aggressive etc). Then we started looking at authentication
> parameters and having BFD authentication parms in OSPF/ISIS etc is not
> intuitive. And what do we do if applications have different BFD
> authentication parms. We concluded that the BFD authentication parms were
> better off in BFD. And once we did that, the timer/multiplier followed....
> >
> > I may not recall all the details/discussons, but I do recall that we
> went back and forth on this and it took some time to make the decision.
> >
> > Regards,
> > Reshad (as individual contributor).
> >
> > From: Mahesh Jethanandani <mjethanand...@gmail.com<mailto:
> mjethanand...@gmail.com>>
> > Date: Thursday, May 18, 2017 at 5:34 PM
> > To: "Acee Lindem (acee)" <a...@cisco.com<mailto:a...@cisco.com>>
> > Cc: Jeffrey Haas <jh...@juniper.net<mailto:jh...@juniper.net>>, OSPF WG
> List <ospf@ietf.org<mailto:ospf@ietf.org>>, "draft-ietf-bfd-y...@ietf.org<
> mailto:draft-ietf-bfd-y...@ietf.org>" <draft-ietf-bfd-y...@ietf.org<
> mailto:draft-ietf-bfd-y...@ietf.org>>, "draft-ietf-ospf-y...@ietf.org
> <mailto:draft-ietf-ospf-y...@ietf.org>" <draft-ietf-ospf-y...@ietf.org
> <mailto:draft-ietf-ospf-y...@ietf.org>>, "rtg-...@ietf.org<mailto:rtg-
> b...@ietf.org>" <rtg-...@ietf.org<mailto:rtg-...@ietf.org>>
> > Subject: Re: IETF OSPF YANG and BFD Configuration
> > Resent-From: <alias-boun...@ietf.org<mailto:alias-boun...@ietf.org>>
> > Resent-To: <vero.zh...@huawei.com<mailto:vero.zh...@huawei.com>>,
> Reshad <rrah...@cisco.com<mailto:rrah...@cisco.com>>, <
> mjethanand...@gmail.com<mailto:mjethanand...@gmail.com>>, <
> santosh.pallaga...@gmail.com<mailto:santosh.pallaga...@gmail.com>>, <
> gregimir...@gmail.com<mailto:gregimir...@gmail.com>>
> > Resent-Date: Thursday, May 18, 2017 at 5:40 PM
> >
> > Resending with correct BFD WG address.
> >
> > On May 18, 2017, at 2:33 PM, Mahesh Jethanandani <
> mjethanand...@gmail.com<mailto:mjethanand...@gmail.com>> wrote:
> >
> > Agree with Acee's assessment. After much debate, we decided that we
> should leave BFD parameter configuration in the BFD model itself, and have
> any IGP protocol reference the BFD instance in BFD itself. This makes sense
> specially if multiple protocols fate-share the BFD session.
> >
> > Cheers.
> >
> > On May 18, 2017, at 12:27 PM, Acee Lindem (acee) <a...@cisco.com<mailto:
> a...@cisco.com>> wrote:
> >
> > Hi Jeff,
> >
> > At the OSPF WG Meeting in Chicago, you suggested that we may want to
> provide configuration of BFD parameters within the OSPF model
> (ietf-ospf.yang). We originally did have this configuration. However, after
> much discussion and coordination with the BFD YANG design team, we agreed
> to leave the BFD session parameters in BFD and only enable BFD within the
> OSPF and IS-IS models.
> >
> > We did discuss the fact that vendors (notably Cisco IOS-XR and Juniper
> JUNOS) do allow configuration within the IGPs. However, the consensus was
> to leave the BFD configuration in the BFD model. The heuristics to
> determine what parameters to use when the same BFD endpoint was configured
> with different parameters in different protocols were proprietary and
> somewhat of a hack.
> >
> > I may have not remembered all the details so I'd encourage others to
> chime in.
> >
> > Thanks,
> > Acee
> >
> > Mahesh Jethanandani
> > mjethanand...@gmail.com<mailto:mjethanand...@gmail.com>
> >
> >
> >
> >
> > Mahesh Jethanandani
> > mjethanand...@gmail.com<mailto:mjethanand...@gmail.com>
> >
> >
> >
>
_______________________________________________
OSPF mailing list
OSPF@ietf.org
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to