RFC5714 was written when we were focused on routing in base along normal Dijkstra shortest paths.

As policy and flexible algorithms become prevalent we need to specify that any RFC5714 action is compliant to the policies and intended algorithms along the entirety of its path.

We need to think this through carefully, but that may mean that in a network where any of these enhanced routing methods are deployed, ALL routers doing FRR need to validate the safety of the packet path. There may be more computationally efficient ways to do this, but worse case looks like needing to precompute the full path to all destinations reachable via the failure including applying the policy and algorithms installed on all of those routers. What I am unclear of is how we find that policy to do that.

Maybe I am being overly pessimistic here, but Sasha makes an interesting observation that we need to think through very carefully.

- Stewart


On 14/06/2018 11:56, [email protected] wrote:

Hi Sasha,

Could you elaborate on :” I strongly suspect that it is not so, and that these mechanisms are only compatible with the Strict-SPF. (Actually, I can provide an example that confirms this suspicion.)” ?

Thanks,

*From:*spring [mailto:[email protected]] *On Behalf Of *Alexander Vainshtein
*Sent:* Wednesday, June 13, 2018 17:00
*To:* [email protected]
*Cc:* Stewart Bryant; Michael Gorokhovsky; [email protected]; [email protected]; [email protected]
*Subject:* [spring] Is TI-LFA compatible with the default SR algorithm?

Hi all,

I have looked up Section 3.1.1 “*Prefix-SID Algorithm*” of the Segment Routing Architecture <https://tools.ietf.org/html/draft-ietf-spring-segment-routing-15> draft (already In the RFC Editor queue) and found there the following statement (the relevant part is highlighted):

This document defines two algorithms:

   o  "Shortest Path": this algorithm is the default behavior.  The

      packet is forwarded along the well-known ECMP-aware SPF algorithm

      employed by the IGPs.  However it is explicitly allowed for a

      midpoint to implement another forwarding based on local policy.

      The "Shortest Path" algorithm is in fact the default and current

      behavior of most of the networks where local policies may override

      the SPF decision.

   o  "Strict Shortest Path (Strict-SPF)": This algorithm mandates that

      the packet is forwarded according to ECMP-aware SPF algorithm and

      instructs any router in the path to ignore any possible local

      policy overriding the SPF decision.  The SID advertised with

      Strict-SPF algorithm ensures that the path the packet is going to

      take is the expected, and not altered, SPF path. Note that Fast

Reroute (FRR) [RFC5714 <https://tools.ietf.org/html/rfc5714>] mechanisms are still compliant with the

Strict Shortest Path.  In other words, a packet received with a

Strict-SPF SID may be rerouted through a FRR mechanism.

At the same time, the TI-LFA draft <https://tools.ietf..org/html/draft-bashandy-rtgwg-segment-routing-ti-lfa-04> discusses protection of active Prefix-SIDs (e.g., in Section 3 that discusses P-Space and Q-space) but, to the best of my understanding, does not mention algorithms that form the context of these SIDs.

My question to the authors of the TI-LFA draft is:

Are the mechanisms defined in the draft (and examples discussed in Section 4) applicable to Prefix-SIDs associated with the default forwarding algorithm as defined in the Segment Routing Architecture draft?

I strongly suspect that it is not so, and that these mechanisms are only compatible with the Strict-SPF. (Actually, I can provide an example that confirms this suspicion.)

Do I miss something substantial here?

Regards, and lots of thanks in advance,

Sasha

Office: +972-39266302

Cell:      +972-549266302

Email:   [email protected]


___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to