Hey Jeff, On Jul 27, 2015, at 3:12 PM, Jeffrey Haas <[email protected]<mailto:[email protected]>> wrote:
Acee, On Mon, Jul 27, 2015 at 05:46:48PM +0000, Acee Lindem (acee) wrote: On Sun, Jul 26, 2015 at 05:49:28PM +0000, Acee Lindem (acee) wrote: What do you think the model should say about redistribution of tags that are out of range of the protocol in question? This is one reason why I believe the redistribution or import policies should be within the protocol themselves rather than external to the protocol. There is less to constrain if you have per protocol redistribution. Now, dependent on where we end up with factoring the common policy, there may still be stuff that needs to be checked. That's really where we're heading with regard to this model. While BGP is obviously the first target, this is also the beginnings of a fundamental policy algebra that multiple protocols may share. I'm not saying that this isn't a "solved" issue in any number of implementations. I suspect results go from truncation all the way through blocking the redistribution depending on the protocol. Or perhaps even the protocol does the wrong thing and crashes the Internet. :-) But since we're effectively working on this as an IETF common component for yang, I do believe we need to figure out what it does. What do you think, if anything, the model should have in the way of constraints on this scenario? Note that this is a leading question since we don't get constraints on operational state until yang 1.1, if I recall correctly. I’m not sure why we need constraints for operational data in this case. By example: For a static route, if tag is set and tag is 0 and 0 is illegal for RIP, the operational state of the static route is tag=0. It is possible for a redistribution policy for static into RIP to detect an invalid operational constraint and "do something". Static is perhaps a weak example since one could model this against the configuration state, but once you move the example into a learned protocol such as OSPF, we're back to this problem. I think we should have one full-range uint32 tag-type that is supported by all protocols, installed in the RIBs, and included in the RIB operational state. I like the current definition, only it would be good if we could limit the hex-string to the range 0x0 - 0xffffffff since, as you also pointed out, only 32 bits tags have been implemented. Note that I noted this as well and did not include 64-bit tags in https://www.ietf.org/id/draft-acee-ospf-admin-tags-02.txt. typedef tag-type { type union { type uint32; type yang:hex-string; } description "type for expressing route tags on a local system, including IS-IS and OSPF; may be expressed as either decimal or hexidecimal integer"; reference "RFC 2178 OSPF Version 2 RFC 5130 A Policy Control Mechanism in IS-IS Using Administrative Tags"; } There still is a consideration though - how many tags a particular vendor supports in a tag-set? Right now, I believe it is 1 or 2 ;^) Thanks, Acee -- Jeff
_______________________________________________ rtgwg mailing list [email protected] https://www.ietf.org/mailman/listinfo/rtgwg
