Re: [Bgp-autoconf] Minutes and action points of the conference call

" 徐小虎(义先) " <xiaohu.xxh@alibaba-inc.com> Fri, 28 February 2020 01:10 UTC

Return-Path: <xiaohu.xxh@alibaba-inc.com>
X-Original-To: bgp-autoconf@ietfa.amsl.com
Delivered-To: bgp-autoconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08EE23A0B01; Thu, 27 Feb 2020 17:10:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, WEIRD_PORT=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=alibaba-inc.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ocH4gYyR0xwW; Thu, 27 Feb 2020 17:10:37 -0800 (PST)
Received: from out0-140.mail.aliyun.com (out0-140.mail.aliyun.com [140.205.0.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EAE403A0B00; Thu, 27 Feb 2020 17:10:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alibaba-inc.com; s=default; t=1582852231; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type; bh=+lbIgZZruYMXhj5M9LBYGBqOqcRc/sJWMkDDuWonEd0=; b=aOqy9zBJTzpPjYu0lDfQcHEMKqn2pjW+Cm3MROTY+ttWpDVMCb0MNq0uCmtdKkFE5uGMdu90QYn2NRYJjMNfbYogcjeHTAYOCr65fYzydgn3ofavcoCkunrY58vMPTvQ8F5VVdjCsFUeE9qIlOz8qHO1WrEYiOoJ8Cu8h5aN6DQ=
X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R491e4; CH=green; DM=||false|; DS=||; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03296; MF=xiaohu.xxh@alibaba-inc.com; NM=1; PH=DW; RN=2; SR=0; TI=W4_5790132_v5ForWebDing_0A9326CB_1582852160990_o7001c261r;
Received: from WS-web (xiaohu.xxh@alibaba-inc.com[W4_5790132_v5ForWebDing_0A9326CB_1582852160990_o7001c261r]) by e01l07440.eu6 at Fri, 28 Feb 2020 09:10:30 +0800
Date: Fri, 28 Feb 2020 09:10:30 +0800
From: "=?UTF-8?B?5b6Q5bCP6JmOKOS5ieWFiCk=?=" <xiaohu.xxh@alibaba-inc.com>
To: "Bgp-autoconf" <bgp-autoconf-bounces@ietf.org>, "bgp-autoconf@ietf.org" <bgp-autoconf@ietf.org>
Reply-To: "=?UTF-8?B?5b6Q5bCP6JmOKOS5ieWFiCk=?=" <xiaohu.xxh@alibaba-inc.com>
Message-ID: <fd087e05-861f-4d49-9086-88b7009196cd.xiaohu.xxh@alibaba-inc.com>
X-Mailer: [Alimail-Mailagent revision 59873560][W4_5790132][v5ForWebDing][Safari]
MIME-Version: 1.0
References: <37b4733413184637b822528e7939f677@huawei.com>
x-aliyun-mail-creator: W4_5790132_v5ForWebDing_NjATW96aWxsYS81LjAgKE1hY2ludG9zaDsgSW50ZWwgTWFjIE9TIFggMTBfMTJfNikgQXBwbGVXZWJLaXQvNjA1LjEuMTUgKEtIVE1MLCBsaWtlIEdlY2tvKSBWZXJzaW9uLzEyLjAuMyBTYWZhcmkvNjA1LjEuMTU=XQ
In-Reply-To: <37b4733413184637b822528e7939f677@huawei.com>
Content-Type: multipart/alternative; boundary="----=ALIBOUNDARY_20994_4dc33940_5e586886_85623"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bgp-autoconf/0pyvgWbZRYX6y0HxNDZ3k0lPEcE>
Subject: Re: [Bgp-autoconf] =?utf-8?q?Minutes_and_action_points_of_the_confer?= =?utf-8?q?ence_call?=
X-BeenThere: bgp-autoconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP autoconfiguration design team discussion list <bgp-autoconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bgp-autoconf>, <mailto:bgp-autoconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bgp-autoconf/>
List-Post: <mailto:bgp-autoconf@ietf.org>
List-Help: <mailto:bgp-autoconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bgp-autoconf>, <mailto:bgp-autoconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2020 01:10:41 -0000

Hi all,

The following requirements are quoted from https://tools.ietf.org/html/draft-xu-idr-neighbor-autodiscovery-12#page-4

4.  Requirements

   This section describe the requirements for the BGP hop-by-hop routing
   deployments that were considered for the definition of the BGP
   Neighbor Discovery extensions proposed in this document.


   Following are the key requirements related for the BGP neighbor
   discovery process:

   1.  It should perform discovery of directly connected BGP routers.
       Mechanism should support either IPv4 or IPv6 or a dual stack
       design and it should be generic for any link-layer.

   2.  It should include exchange of BGP peering addresses (IPv4 or IPv6
       or both) that routers can use to automatically setup BGP TCP
       peering between themselves.  The mechanism should leverage the
       existing capability negotiation process performed as part of the
       BGP TCP session establishment.

   3.  When BGP peering is desired to be performed over loopback
       addresses of the routers, then the mechanism should automatically
       setup reachability to the loopback over one or more underlying
       directly connected links between them.  In this scenario, the
       mechanism should also provide resolution for the BGP next-hop
       address (i.e. the loopback address) for the BGP routes exchanged
       over these sessions between the loopback addresses.

   4.  Mechanism should enable exchange of link-level information such
       as IP addresses and link attributes between the directly
       connected BGP routers.  It should be extensible to include other
       information in the future.

   5.  Mechanism should be limited to link scope for security and use
       link-local addressing only.  Cryptographic mechanisms should be
       also provided for additional security.

   6.  Mechanism should support capabilities for performing optional
       validation of parameters to detect misconfiguration (e.g. link
       address subnet mismatch, peering between incorrect AS, etc.) in
       an extensible manner before going on to use the link and the
       setup of the BGP TCP peering session over it.

   7.  The mechanism should not affect or change the BGP TCP session
       establishment procedures and the BGP routing exchange over the
       TCP session other than the interactions for triggering the setup/
       removal of peer session that is based on discovery mechanism.

   8.  The mechanism should leverage existing fast-detection techniques
       for failures that are used currently for EBGP sessions over
       directly connected links like fast-external-failover and BFD.

   9.  The mechanism should focus on the discovery process and exchange
       of status as a control plane procedure and be sufficiently
       loosely coupled with the base BGP operations to enable

       implementations to ensure scalability of BGP operations when
       using the discovery procedures.

Best regards,
Xiaohu
------------------------------------------------------------------
From:Dongjie (Jimmy) <jie.dong@huawei.com>
Send Time:2020年2月25日(星期二) 23:28
To:bgp-autoconf@ietf.org <bgp-autoconf@ietf.org>
Subject:[Bgp-autoconf] Minutes and action points of the conference call

Hi all, 

First of all, thank you for attending the conference call, we had good discussion on several items, and many thanks to Sue and others who helped with the minutes. 

The minutes is on  https://etherpad.ietf.org:9009/p/bgp-autoconf-feb-25, please check if you want to make any change to it.

I also summarized our discussion and action points as below:

- We agreed to work on DC first, while keep an eye on what makes the other cases different.

- For DC case, will focus on intra-data center which uses BGP as underlay, either interface addresses or loopbacks can be used for peering. Inter-DC and VPNs are out of scope.

- We had some discussion about whether we should cover the misconnectivity or misconfiguration detection, there is still no clear result. 

- The team agrees that discovering the role of a device could be useful, something similar has been used in RIFT.

- We discussed the security requirements, the authentication has two properties, transport or object security, and authenticating the peer. 

- In order to reduce the number of parallel peers between two nodes, need to use loopbacks to setup only one session, then need to consider how to automatically generate the configuration of routes to peer’s loopback.

- Enablement of BFD based on auto-discovery is considered as one optional function, while the complexity needs to be considered.

- Some considerations on Zero touch provisioning (ZTP). It is assumed some level of provisioning/pre-configuration is still required. 

The team agrees to look at the list of solution drafts, summarize the requirements from each draft, and find a minimal common set. 

Action points: 
1. The author of each draft to summarize the list of requirement from his draft, and share it on design team list. (by end of this Friday)
2. Other people can provide additional comments to the summarized requirements. (in next week)
3. The team to provide a minimal common set. 

Best regards,
Jie