Hey Jeff,

On Jul 27, 2015, at 3:12 PM, Jeffrey Haas 
<[email protected]<mailto:[email protected]>> wrote:

Acee,

On Mon, Jul 27, 2015 at 05:46:48PM +0000, Acee Lindem (acee) wrote:
On Sun, Jul 26, 2015 at 05:49:28PM +0000, Acee Lindem (acee) wrote:
What do you think the model should say about redistribution of tags that are
out of range of the protocol in question?

This is one reason why I believe the redistribution or import policies
should be within the protocol themselves rather than external to the
protocol. There is less to constrain if you have per protocol
redistribution. Now, dependent on where we end up with factoring the
common policy, there may still be stuff that needs to be checked.

That's really where we're heading with regard to this model.  While BGP is
obviously the first target, this is also the beginnings of a fundamental
policy algebra that multiple protocols may share.

I'm not saying that this isn't a "solved" issue in any number of
implementations.  I suspect results go from truncation all the way through
blocking the redistribution depending on the protocol.  Or perhaps even the
protocol does the wrong thing and crashes the Internet. :-)

But since we're effectively working on this as an IETF common component for
yang, I do believe we need to figure out what it does.

What do you think, if anything, the model should have in the way of
constraints on this scenario?  Note that this is a leading question since we
don't get constraints on operational state until yang 1.1, if I recall
correctly.

I’m not sure why we need constraints for operational data in this case.

By example:
For a static route, if tag is set and tag is 0 and 0 is illegal for RIP, the
operational state of the static route is tag=0.  It is possible for a
redistribution policy for static into RIP to detect an invalid operational
constraint and "do something".

Static is perhaps a weak example since one could model this against the
configuration state, but once you move the example into a learned protocol
such as OSPF, we're back to this problem.

I think we should have one full-range uint32 tag-type that is supported by all 
protocols, installed in the RIBs, and included in the RIB operational state. I 
like the current definition, only it would be good if we could limit the 
hex-string to the range 0x0 - 0xffffffff since, as you also pointed out, only 
32 bits tags have been implemented. Note that I noted this as well and did not 
include 64-bit tags in 
https://www.ietf.org/id/draft-acee-ospf-admin-tags-02.txt.


typedef tag-type {
       type union {
         type uint32;
         type yang:hex-string;
       }
       description "type for expressing route tags on a local system,
       including IS-IS and OSPF; may be expressed as either decimal or
       hexidecimal integer";
       reference
         "RFC 2178 OSPF Version 2
         RFC 5130 A Policy Control Mechanism in IS-IS Using
         Administrative Tags";
     }


There still is a consideration though - how many tags a particular vendor 
supports in a tag-set? Right now, I believe it is 1 or 2 ;^)

Thanks,
Acee




-- Jeff

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to