Internet DRAFT - draft-decraene-lsr-lag-indication

draft-decraene-lsr-lag-indication







Network Working Group                                        B. Decraene
Internet-Draft                                                    Orange
Intended status: Standards Track                                S. Hegde
Expires: 2 February 2023                           Juniper Networks Inc.
                                                              J. Halpern
                                                                Ericsson
                                                           1 August 2022


                             LAG indication
                  draft-decraene-lsr-lag-indication-03

Abstract

   This document defines a new link flag to advertise that a layer-three
   link is composed of multiple layer-two sub-links, such as when this
   link is a Link Aggregation Group (LAG).  This allows a large single
   flow (an elephant flow) to be aware that the link capacity will be
   lower than expected as this single flow is not load-balanced across
   the multiple layer-two sub-links.  A path computation logic may use
   that information to route that elephant flow along a different path.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 2 February 2023.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights



Decraene, et al.         Expires 2 February 2023                [Page 1]

Internet-Draft               LAG indication                  August 2022


   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   3
   2.  Protocol extensions . . . . . . . . . . . . . . . . . . . . .   3
     2.1.  IS-IS extension . . . . . . . . . . . . . . . . . . . . .   3
     2.2.  OSPF extension  . . . . . . . . . . . . . . . . . . . . .   3
   3.  Operational considerations  . . . . . . . . . . . . . . . . .   3
     3.1.  Usage . . . . . . . . . . . . . . . . . . . . . . . . . .   3
   4.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
     4.1.  IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . .   4
     4.2.  OSPF  . . . . . . . . . . . . . . . . . . . . . . . . . .   4
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   5
   6.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .   5
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   5
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .   5
     7.2.  Informative References  . . . . . . . . . . . . . . . . .   6
   Appendix A.  Changes / Author Notes . . . . . . . . . . . . . . .   6
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   7

1.  Introduction

   An IP link may be composed a multiple layer two sub-links not visible
   to the IGP routing topology.  When traffic crossing that IP link is
   load-balanced on a per flow basis, a large elephant flow will only
   benefit from the capacity of a single sub-link.  This is an issue for
   the routing logic which only see the aggregated bandwidth of the IP
   link, and hence may incorrectly route a large flow over a link which
   is incapable of transporting that flow.

   This document defines a new link flag to signal that an IP link is a
   Link Aggregate Group composed of multiple layer two sub-links.  This
   flag may be automatically be set by routing nodes connected to such
   links, without requiring manual tagging by the network operator.  A
   path computation logic such as a PCE or a CSPF computation on the
   ingress, may use that information to avoid such links for elephant
   flows.









Decraene, et al.         Expires 2 February 2023                [Page 2]

Internet-Draft               LAG indication                  August 2022


1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 RFC 2119 [RFC2119] RFC 8174 [RFC8174] when, and only when, they
   appear in all capitals, as shown here.

2.  Protocol extensions

2.1.  IS-IS extension

   To advertise that a layer-three link is composed of multiple layer-
   two sub-components this document defines a new bit in the IS-IS link-
   attribute sub-TLV RFC 5029 [RFC5029] .

   L2 LAG (Link Aggregation Group) TBD1.  When set, this layer-three
   link is composed of multiple layer-two sub-components performing per
   flow load balancing.

2.2.  OSPF extension

   To advertise that a layer-three link is composed of multiple layer-
   two sub-components this document defines a new bit in the OSPF Link
   Attributes Bits TLV [I-D.ietf-lsr-dynamic-flooding] .

   L2 LAG (Link Aggregation Group) TBD2.  When set, this layer-three
   link is composed of multiple layer-two sub-components performing per
   flow load balancing.

3.  Operational considerations

   A node supporting this extension SHOULD automatically advertise the
   L2 LAG flag for IP links composed of multiple layer-two sub-
   components.  Configuration knob MAY be provided to override this
   default.

   In order to handle nodes not supporting this extension, network
   operator may need to use an admin group (color) [RFC5305] [RFC7308]
   in order to flag those links on legacy nodes.

3.1.  Usage

   The information provided by this flag can be used in several
   different ways, depending upon the technology choices and needs of
   the operator.





Decraene, et al.         Expires 2 February 2023                [Page 3]

Internet-Draft               LAG indication                  August 2022


   If the operator's usage of LAGs is fairly consistent, one could have
   a variation on a bandwidth limited flex-algo that specifies minimum
   bandwidth and the LAG flag not being set.  This could then be
   selected by encapsulating head ends for streams which are judged to
   need to avoid the LAGs.  Likely this would be coupled with a
   configured value representing the likely limit of LAG components for
   selecting when to use this flex-algo instance.  Note that extending
   flex-algo requires every node to upgrade.

   Another option is if the operator is using traffic engineering
   (either with a PCE or the head end doing the path selection).  The
   path selector can select points in e.g. a segment routed path so as
   to avoid links marked as being LAGs for elephant flows.  This can be
   coupled with a more flexible heuristic for limits than the above.
   The path selector can look at the advertised link bandwidth, and the
   presence of the LAG flag, and frequently reliably infer the LAG
   component size.  Thus, it would only need to avoid LAGs where the
   component is expected to be too small for the large flow being
   placed.

   [Editor's note: This does suggest a possible extension if the working
   group is interested.  We could add a new sub-TLV indicating the
   lowest bandwidth of the LAG components of a given LAG.  This is
   additional complexity and the question is whether the use cases where
   this would give noticeably more accurate path estimates and better
   elephant flow placement are likely.]

4.  IANA Considerations

4.1.  IS-IS

   IANA is requested to allocate one bit value from the registry: link-
   attribute bit values for sub-TLV 19 of TLV 22 (Extended IS
   reachability TLV).


                   Value Name
                   ---- --------------------------------
                    TBD1 L2 LAG (Link Aggregation Group)

                     Figure 1: IS-IS IANA registration

4.2.  OSPF

   IANA is requested to allocate one bit number from the registry: OSPF
   Link Attributes Sub-TLV Bit Values.





Decraene, et al.         Expires 2 February 2023                [Page 4]

Internet-Draft               LAG indication                  August 2022


                Bit Number Description
                ---------- --------------------------------
                TBD2       L2 LAG (Link Aggregation Group)

                      Figure 2: OSPF IANA registration

5.  Security Considerations

   This extension advertises additional information and capabilities
   about a link.

   An attacker having access to this information would gain knowledge
   that this link has sub components and that sending a large amount of
   traffic via a single flow (hence not a DOS) is more likely to
   overload that sub-component.  On the other hand, this overloading
   would be limited to this specific sub-component and hence not affect
   other sub-component.

   An attacker been capable of adding this information may gain ability
   to change the routing of some flow crossing the links, typically
   large elephant flows specifically configured to avoid such link.

   An attacker been capable of removing this information may gain the
   ability to change the routing and direct a large elephant flow on
   this link, which would overload a sub component of this link and
   likely create packet drop for this specific flow.

   However, in those two cases, the attacker would equally have the
   capability to change other routing information such as the link
   metric, link usability and any link characteristics.  Hence this new
   information does not add new security considerations.  Besides, as
   with others TLV advertisements, the use of a cryptographic
   authentication as defined in [RFC5304] or [RFC5310] allows the
   authentication of the peer and the integrity of the message and
   remove the ability for an attacker to modify such information.

   .

6.  Acknowledgments

   TBD.

7.  References

7.1.  Normative References






Decraene, et al.         Expires 2 February 2023                [Page 5]

Internet-Draft               LAG indication                  August 2022


   [I-D.ietf-lsr-dynamic-flooding]
              Li, T., Przygienda, T., Psenak, P., Ginsberg, L., Chen,
              H., Cooper, D., Jalil, L., Dontula, S., and G. S. Mishra,
              "Dynamic Flooding on Dense Graphs", Work in Progress,
              Internet-Draft, draft-ietf-lsr-dynamic-flooding-11, June
              2022, <https://www.ietf.org/archive/id/draft-ietf-lsr-
              dynamic-flooding-11.txt>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", DOI 10.17487/RFC2119, BCP 14,
              RFC 2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC5029]  Vasseur, JP. and S. Previdi, "Definition of an IS-IS Link
              Attribute Sub-TLV", RFC 5029, DOI 10.17487/RFC5029,
              September 2007, <https://www.rfc-editor.org/info/rfc5029>.

   [RFC5304]  Li, T. and R. Atkinson, "IS-IS Cryptographic
              Authentication", RFC 5304, DOI 10.17487/RFC5304, October
              2008, <https://www.rfc-editor.org/info/rfc5304>.

   [RFC5310]  Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R.,
              and M. Fanto, "IS-IS Generic Cryptographic
              Authentication", RFC 5310, DOI 10.17487/RFC5310, February
              2009, <https://www.rfc-editor.org/info/rfc5310>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", DOI 10.17487/RFC8174, RFC 8174, BCP 14,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

7.2.  Informative References

   [RFC5305]  Li, T. and H. Smit, "IS-IS Extensions for Traffic
              Engineering", DOI 10.17487/RFC5305, RFC 5305, October
              2008, <https://www.rfc-editor.org/info/rfc5305>.

   [RFC7308]  Osborne, E., "Extended Administrative Groups in MPLS
              Traffic Engineering (MPLS-TE)", RFC 7308,
              DOI 10.17487/RFC7308, July 2014,
              <https://www.rfc-editor.org/info/rfc7308>.

Appendix A.  Changes / Author Notes

   [RFC Editor: Please remove this section before publication]

   00: Initial version.

   01: Refresh.



Decraene, et al.         Expires 2 February 2023                [Page 6]

Internet-Draft               LAG indication                  August 2022


   02: New section "Usage".

   03: Refresh.

Authors' Addresses

   Bruno Decraene
   Orange
   Email: bruno.decraene@orange.com


   Shraddha Hegde
   Juniper Networks Inc.
   Exora Business Park
   Bangalore 560103
   KA
   India
   Email: shraddha@juniper.net


   Joel Halpern
   Ericsson
   Email: joel.halpern@ericsson.com




























Decraene, et al.         Expires 2 February 2023                [Page 7]