Thanks Jeffrey for the comments. For Vxlan EVPN BFD the below discovery mechanism should still be valid which is applicable for GENEVE BFD. Authors can confirm the same.
https://datatracker.ietf.org/doc/rfc9521/#:~:text=If%20the%20BFD%20packet%20is,MAC%2C%20and%20the%20destination%20IP If the BFD packet is received with the value of the Your Discriminator field set to 0, then the BFD session SHOULD be identified using the VNI number and the inner Ethernet/IP header. The inner Ethernet/IP header stands for the source MAC, the source IP, the destination MAC, and the destination IP Thanks, Gopi From: Alexander Vainshtein <[email protected]> Sent: Sunday, November 2, 2025 1:05 PM To: Jeffrey Haas <[email protected]> Cc: Vengada Prasad Govindan (venggovi) <[email protected]>; Greg Mirsky <[email protected]>; [email protected]; [email protected]; BFD WG <[email protected]>; Rao P, Gopinatha <[email protected]> Subject: RE: [EXTERNAL] Re: Mail regarding draft-ietf-bess-evpn-bfd Importance: High Jeffrey, Lots of thanks for your email. Can you please comment also on proposed usage of Destination UDP Port 3784 (reserved for single-hop IP BFD control packets in RFC 5881) in encapsulation of the EVPN-BFD Control packets? Regards, Sasha From: Jeffrey Haas <[email protected]<mailto:[email protected]>> Sent: Wednesday, October 29, 2025 7:59 PM To: Rao P, Gopinatha <[email protected]<mailto:[email protected]>> Cc: Vengada Prasad Govindan (venggovi) <[email protected]<mailto:[email protected]>>; Alexander Vainshtein <[email protected]<mailto:[email protected]>>; Greg Mirsky <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]>; BFD WG <[email protected]<mailto:[email protected]>> Subject: [EXTERNAL] Re: Mail regarding draft-ietf-bess-evpn-bfd Note that I'm behind in this thread, but wanted to make comment on the specifically raised point: On Oct 29, 2025, at 11:33 AM, Rao P, Gopinatha <[email protected]<mailto:[email protected]>> wrote: Hi Venkat, From RFC 5880: “If the Your Discriminator field is zero, the session MUST be selected based on some combination of other fields, possibly including source addressing information, the My Discriminator field, and the interface over which the packet was received. The exact method of selection is application specific and is thus outside the scope of this specification. If a matching session is not found, a new session MAY be created, or the packet MAY be discarded. This choice is outside the scope of this specification.” When the remote PE sends a DOWN packet to begin with, your_discriminator can be 0 and the incoming BFD packet can be demuxed based on the VNI(and other parameters) on which the packet is coming in on ? RFC 5880 doesn’t mandate the incoming DOWN packet should come in with your_discriminator set to non-zero value. It clearly says what needs to be done when your_discriminator field to set to 0. The followup on this is that if you're getting such a 0 discriminator, the idea is that you have other mechanisms to determine how to associate these packets with a BFD session. The typical simple example is for single-hop BFD you can see what interface and IP address things are coming in as. RFC 5882 for multihop both acknowledges use cases like demultiplexing based on IP, but also that sometimes you need to learn this out of band. The question for the draft authors and the BESS WG is whether there's alternative means that such a EVPN BFD session could use to associate incoming packets to its session? If no, then a "MUST" for discovered (by BGP) or provisioned is reasonable. Clarifying that this is required since there's no alternative discovery mechanism available might address the raised point. -- Jeff Disclaimer This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments.
