Re: [GROW] I-D Action: draft-ietf-grow-as-path-prepending-06.txt

Jeffrey Haas <jhaas@pfrc.org> Fri, 18 February 2022 16:13 UTC

Return-Path: <jhaas@pfrc.org>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA1EF3A0826 for <grow@ietfa.amsl.com>; Fri, 18 Feb 2022 08:13:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sE5UsvMA2AwB for <grow@ietfa.amsl.com>; Fri, 18 Feb 2022 08:13:26 -0800 (PST)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id 0C9693A07F5 for <grow@ietf.org>; Fri, 18 Feb 2022 08:13:25 -0800 (PST)
Received: from smtpclient.apple (99-59-193-67.lightspeed.livnmi.sbcglobal.net [99.59.193.67]) by slice.pfrc.org (Postfix) with ESMTPSA id 1F6541E341; Fri, 18 Feb 2022 11:13:25 -0500 (EST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
From: Jeffrey Haas <jhaas@pfrc.org>
In-Reply-To: <20220218.132810.556310822663266439.he@uninett.no>
Date: Fri, 18 Feb 2022 11:13:24 -0500
Cc: michael.mcbride@futurewei.com, grow@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <584C13F2-3D4F-4C42-B04C-7C15B087601F@pfrc.org>
References: <164514894189.6906.4983367570049951418@ietfa.amsl.com> <BYAPR13MB258299D3DCB364AC1CCE5DE1F4379@BYAPR13MB2582.namprd13.prod.outlook.com> <20220218.132810.556310822663266439.he@uninett.no>
To: Havard Eidnes <he=40uninett.no@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/grow/XdDA44MyC-SRbyWtvOtdGd9ESFg>
Subject: Re: [GROW] I-D Action: draft-ietf-grow-as-path-prepending-06.txt
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Feb 2022 16:13:29 -0000

I support Hávard's observations. 

I'd also like to comment that the notation of "prepends 5" meaning "5 + 1" is a bit confusing for all of the examples.  Consider instead just saying what the announced as-path length is.  Operators prepend 5 because their intent is "announce 6". :-)

Rather than try to cast the (very contrived) scenario as a form of route leaking, I'd suggest the authors focus on the impact of downstream consumers of the prepending.  In particular, the example here simply notes that the receiving AS had a desire to use one path, but the upstream providers in executing their own motivations caused them to not have such a preferable path by default.

Sadly, too bad for this downstream operator.  The more hops away you are from a given bit of reachability, the less your opinion tends to matter over what the announcements look like.  It's likely time for them to form a business relationship with the announcing AS or one of their immediate service provider ASes.  (And thus, reinforcing business motivations that push the AS diameter of the Internet to remain small...)

-- Jeff


> On Feb 18, 2022, at 7:28 AM, Havard Eidnes <he=40uninett.no@dmarc.ietf.org> wrote:
> 
> Hi,
> 
> here are a few comments about section 3.1 in the draft:
> 
> Other than the missing comma in the list of routers/ASes, near
> the end there is talk about a route leak.  However, I don't think
> what's stated here as a route leak is what's commonly understood
> to be a route leak.
> 
> I think a route leak is commonly understood to be when a route is
> announced to a neighbor in violation of the (intended) routing
> policy, i.e. a route leak can be the result of an erroneously
> implemented intended routing policy.  I can't see how that's the
> case here, because no routing policy has been expressed for "I".
> This probably means that "I" re-advertises all routes it
> receives, from any edge on any other edge, and therefore by
> definition can't have a "route leak".
> 
> It's another matter that the traffic pattern from B to J in the
> stated scenario involves a change to a path which traverses I.
> 
> If we instead of "thinking BGP" in the drawing in 3.1, suppose we
> think "RIP with max metric 64" instead.  Of course when you
> adjust metrics on any interface in the topology, traffic flows
> will shift around.  I can't quite understand when we do the
> similar thing in BGP it's such a big problem?
> 
> Admittedly, by prepending outgoing route announcements towards a
> given peer, you only affect "one end of the link", and there's a
> fair chance that asymmetric traffic patterns will result if
> that's the only thing which is done.  But...  Is that a problem?
> 
> I think the problem desribed in section 3.1 could do with a bit
> clearer description of why this is problematical.
> 
> Regards,
> 
> - Håvard
> 
> _______________________________________________
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow