Hi Ahmed
Trimming this to the issues we need to discuss.
======
This document provides a mechanism leveraging Segment Routing to
ensure loop-freeness during the IGP reconvergence process following
a link-state change event.
SB> Whilst technically that is a completely correct statement many
readers
SB> will interpret that statement as the provision of link protection
SB> when you provide this service for link and node failure and
SB> presumable for metric change.
#Ahmed
I do not understand what is the concern here?
Those that know the detail will understand that "link-state change event"
covers (multiple)link failure, node failure, and both increase and decrease
of link metrics. A lot of readers will not appreciate the range of events
that "link-state change event" encompasses, nor will they realize that
you can get looks when you get good news as well as bad news. My
suggestion is that you spell this out for the reader so the appreciate the
applicability of the RFC.
Stage 2: After C elapses, R installs the normal post-convergence FIB
entry for D, i.e. without any additional segments inserted that
ensure the loop-free property.
SB> The timers can usefully be advertised rather than configured
SB> (draft-bryant-rtgwg-param-sync)
#Ahmed
We will change the text to indicate that "C" can be determined in a
way that is out of scope of the draft
OK
==========
5. Security Considerations
The behavior described in this document is internal functionality
to a router that result in the ability to explicitly steer traffic
over the post convergence path after a remote topology change in a
manner that guarantees loop freeness. As such no additional
security risk is introduced by using the mechanisms proposed in
this document.
SB> I don't think that there are zero increased risks. For example
SB> the extended convergence delay and the presence
SB> of routers without this feature magnifies the impact
SB> of a link flap attack
#Ahmed
Actually I think the comment is not accurate. The mechanisms proposed
in this draft moves the traffic to the post convergence path faster,
or worst case, at the same speed without using these mechanisms. So
if the proposed mechanisms do not enhance security, they are not
adding any more risk
You may be correct, I need to think about the interactions between nodes
that do and do not support this mechanism which is where the problem
normally arises.
Something that I did not see was any comment on the need to abandon this
if the failure was worse than expected.
Best Regards
Stewart
_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg