Re: [Gen-art] Genart last call review of draft-ietf-idr-bgp-open-policy-18

Alexander Azimov <a.e.azimov@gmail.com> Wed, 05 January 2022 21:29 UTC

Return-Path: <a.e.azimov@gmail.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFE163A0CD0; Wed, 5 Jan 2022 13:29:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1oV5r7gRK0C8; Wed, 5 Jan 2022 13:29:24 -0800 (PST)
Received: from mail-pl1-x636.google.com (mail-pl1-x636.google.com [IPv6:2607:f8b0:4864:20::636]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6260A3A0CCF; Wed, 5 Jan 2022 13:29:24 -0800 (PST)
Received: by mail-pl1-x636.google.com with SMTP id w7so513224plp.13; Wed, 05 Jan 2022 13:29:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ZWG9zPevrbg7SgMm1W554kxW8o9RA0KSb2ZNCo76RU8=; b=Ne3GMsQ3QcMbdpPBBMF/rBrenCfV0EbTIFf48C+MG1Z+8ckKzneMmQTocnf/FjLsIk JQE+DEtbuapJZYo76ZOtyDGwME91TILErNdx0IU5PeLKqc6yG5A7eqNOn22euKbaBaDz Vu7qf41LwWbUoFbeZLcwAIUt//qcgZq1yoOTW75/lagxEFLWykjEfN7MDGKbLKJrrcJc KNFz45QjZl//QwDgWA5Muds7Q5f/xt/kMUPxwTRVXwgMjgy+EYSZsKkVvwyYqNCKcdy5 eAii7vZ2PoHmL/1H0lBFmUpoInyDmZaLQCxjTi+jGoBIugdc058AuQuq7h0kTkkkyXUQ yAtw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ZWG9zPevrbg7SgMm1W554kxW8o9RA0KSb2ZNCo76RU8=; b=InXTDy9XR1v+dfJQ+2xZ+6itMa4kOS2WNGmDffu0zNgwYSLYvm28HYoZXlOeP385jf T32HFpnyV27DcC5WGOm1lrXYTwqFIANVhpMtM6Xxn/RD7woBJbZ/1nZUduYhpfRS5ig/ 65+UBX0aWsWryFBKcdqUaH9mxg1UxD6Bha80C/1qO0IQNMM1uNMfgxtD2IMHGcR08Ezb OZNrFwKpu+pH+tWNmRPrnruiJ3repjzZgdrzoijjq/GJ8NErzzV0XhJjShD0YUT0Akq0 o8xpqFv4mVh2kUEIGwBu7tcGGvaryMX/POC8ZAl1oQLv5psxwOrAMDLp2u7LvZ3+xHq3 xLHA==
X-Gm-Message-State: AOAM5321t80EKT3R/ue6nojNk5TCHIjRXzjwWVz0oszDNs6RdJclPNsT BEZB78Xoz1vr9ajZ/mGDg3a6GSasTn0JbXrNhpo=
X-Google-Smtp-Source: ABdhPJz/6fNSAf2k2bvK11uck1ze9C2jpxMde8gYYi3WufQPdq0eKHiXu0406DnuQVHpGadsaAJGQgpAQ4RrW3KL7g8=
X-Received: by 2002:a17:902:aa0c:b0:149:aa24:3e3d with SMTP id be12-20020a170902aa0c00b00149aa243e3dmr26061219plb.8.1641418162531; Wed, 05 Jan 2022 13:29:22 -0800 (PST)
MIME-Version: 1.0
References: <164013488006.27197.13873644386825552452@ietfa.amsl.com> <CAMMESsx35+gC7CP9ox+U-QsT8Dxkv3=Du8VRq_cprMsEc5PCyQ@mail.gmail.com> <CABNhwV30nrqJ-mOpniso6c=rJpFi0zQX93BWaQKJvKNVcrMNAw@mail.gmail.com> <SA1PR09MB8142D79278F793814694AD40844A9@SA1PR09MB8142.namprd09.prod.outlook.com> <CABNhwV0cGhp1pW24mzJvtOoaGDYM2ypBtTn_--L-0dNRmFhSUA@mail.gmail.com> <SA1PR09MB8142DBB76926B62226E7BB6D844B9@SA1PR09MB8142.namprd09.prod.outlook.com>
In-Reply-To: <SA1PR09MB8142DBB76926B62226E7BB6D844B9@SA1PR09MB8142.namprd09.prod.outlook.com>
From: Alexander Azimov <a.e.azimov@gmail.com>
Date: Thu, 06 Jan 2022 00:29:12 +0300
Message-ID: <CAEGSd=BD9Ho0eE00q2waz2QQY332LqEcYa0aQXtjXYs9R=mnVw@mail.gmail.com>
To: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
Cc: Gyan Mishra <hayabusagsm@gmail.com>, Alvaro Retana <aretana.ietf@gmail.com>, "draft-ietf-idr-bgp-open-policy.all@ietf.org" <draft-ietf-idr-bgp-open-policy.all@ietf.org>, "gen-art@ietf.org" <gen-art@ietf.org>, "idr@ietf.org" <idr@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000081726805d4dc72ec"
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/5FbAFfoimvA9DLK4rPF7vHnO7lY>
Subject: Re: [Gen-art] Genart last call review of draft-ietf-idr-bgp-open-policy-18
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2022 21:29:29 -0000

Colleagues,

I would like to unveil what took us so long to reply.
We have an ongoing discussion about adding a formal description of
Complex/Sibling relations.
With the import and export policy definitions, it can be done rather easy,
it follows the Peer definition that Sriram has already shown:

   Sibling:  May propagate any available route to a Sibling.  May accept
      any available route received from a Sibling.

Sriram's concern was that Sibling has a notation for ASNs belonging to the
same administrative entity (701, 702, 703 belonging to Verizon as an
example), while I believe that the term Sibling isn't bound only for this
kind of peering relation and can safely replace Complex, though improving
the readability of the document.


ср, 5 янв. 2022 г. в 20:12, Sriram, Kotikalapudi (Fed) <
kotikalapudi.sriram@nist.gov>:

> Hi Gyan,
>
>
>
> Thank you. Please see the responses inline.
>
>
>
> Gyan> Agreed that is acceptable.  In the description as well maybe listing
> a
>
> pecking order similar to what is described in Gao-Rexford model style
>
> route preference in the import and export policy verbiage for each role.
>
>
>
> [KS/AA]: That is interesting. We did already enhance the Role descriptions
> as follows to add the import policy verbiage (to the already existing
> export policy) in Sec. 2 of v-19 to be uploaded:
>
>
>
> Old text:
>
>
>
>    The following is a list of BGP Roles for eBGP peering and the
>
>    corresponding rules for route propagation:
>
>
>
>    Provider:  MAY propagate any available route to a Customer.
>
>
>
>    Customer:  MAY propagate any route learned from a Customer, or
>
>       locally originated, to a Provider.  All other routes MUST NOT be
>
>       propagated.
>
>
>
>    Route Server (RS):  MAY propagate any available route to a Route
>
>       Server Client (RS-Client).
>
>
>
>    RS-Client:  MAY propagate any route learned from a Customer, or
>
>       locally originated, to an RS.  All other routes MUST NOT be
>
>       propagated.
>
>
>
>    Peer:  MAY propagate any route learned from a Customer, or locally
>
>       originated, to a Peer.  All other routes MUST NOT be propagated.
>
>
>
> New text:
>
>
>
>    The following is a list of BGP Roles for eBGP peering and the
>
>    corresponding rules for route propagation and acceptance:
>
>
>
>    Provider:  May propagate any available route to a Customer.  May
>
>       accept routes originated by the Customer or its Customers; all
>
>       other routes from the Customer must not be accepted.
>
>
>
>    Customer:  May propagate any route learned from a Customer, or
>
>       locally originated, to a Provider; all other routes must not be
>
>       propagated.  May accept any route from the Provider.
>
>
>
>    Route Server (RS):  May propagate any available route to a Route
>
>       Server Client (RS-Client).  May accept routes originated by the
>
>       RS-Client or its Customers; all other routes from the RS-Client
>
>       must not be accepted.
>
>
>
>    RS-Client:  May propagate any route learned from a Customer, or
>
>       locally originated, to an RS; all other routes must not be
>
>       propagated.  May accept any route received from the RS.
>
>
>
>    Peer:  May propagate any route learned from a Customer, or locally
>
>       originated, to a Peer; all other routes must not be propagated.
>
>       May accept routes originated by the Peer or its Customers; all
>
>       other routes from the Peer must not be accepted.
>
>
>
> --- end of new text ---
>
> >Also could mention that a good reasons for role capabilities usage by
>
> operators  is to prevent routing policy disputes between peering points
>
> that can result in sub optimal routing instability and feedback loops along
>
> with route leaks mentioned.
>
>
>
> [KS/AA]: Maybe adding the following paragraph at the end of Section 3.2
> (Role Correctness) would do it?
>
>
>
> Besides facilitating a route leak solution, the Role Capability usage by
> network operators also helps prevent routing policy disputes between
> peering ASes. This can in turn prevent sub-optimal routing and routing
> instability.
>
>
>
> Not sure if the feedback loop needs to be mentioned. Do you mean a loop in
> the AS path (normally prevented by checking the presence of the speaker’s
> own AS in the path)?
>
>
>
> Sriram / Alexander
>


-- 
Best regards,
Alexander Azimov