[GROW] BMP @ IETF 106 Hackathon, GROW WG Feedback

<Thomas.Graf@swisscom.com> Sun, 17 November 2019 11:39 UTC

Return-Path: <Thomas.Graf@swisscom.com>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C85D1200F6 for <grow@ietfa.amsl.com>; Sun, 17 Nov 2019 03:39:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.397
X-Spam-Level:
X-Spam-Status: No, score=-2.397 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=swisscom.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fKExQ-Jol7Qb for <grow@ietfa.amsl.com>; Sun, 17 Nov 2019 03:39:26 -0800 (PST)
Received: from mail.swisscom.com (mailout110.swisscom.com [138.188.166.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6B541200F5 for <grow@ietf.org>; Sun, 17 Nov 2019 03:39:24 -0800 (PST)
Received: by mail.swisscom.com; Sun, 17 Nov 2019 12:38:38 +0100
Message-ID: <1953435119.3003898.1573990718311@ss007565.tauri.ch>
MIME-Version: 1.0
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha256"; boundary="----=_Part_3003896_1232624979.1573990718311"
X-Mailer: Totemo_TrustMail_(Notification)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AXDRFfGaeJr2f0cNvnaUiig6Ylz/1MO0Jl10mSjzvMroqruHNOpjsGiex0srh9uxWODIT6maDn9z14Pw3uPbC50sHXZ0nVAUx9N8odHsh6n0n70MgvRfXLt8dXWmoAWxcCnZ2eOGiGKY+iAOVEE6RYfb9iUBelHbChXA2YGTb56acj2lD1g5pa94H72yS3voPRSX3uz+0SSoj+cUfF0cIQeoZgwJexlbQK43ZnQotVp00TLe9XQBcE5uKaabXwcHEPhMaA1oJEiGLwb3EUjPgHd50gEfBSZwskxK29sBdGr7bAzSY8XPnOffTbJKr67uLV8E1J2630O9/wAUwKMt1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NdsSOqcJdkTsMcQY04XfO4x9/1XUyk4KUfl7I0uemPo=; b=Lki4s/uirCGCM17oVSltrK+jEJFP2bz3TwgPhkHDIU1vJXqpWUmm2y5GEp00PkDyQa05SB2N9xLM0X2jPgqHHsx5SHnfkxXWf7BB+8DYOd/bYmH7lJ/++T8e34CEX8NhzzF07odj8BRlDa05Q18RIDrwnJnaoMh+pCy+/CTtQflOjkAlg8QxQ4NC1AGoyrPNOoh8N8RqNHsgX8jSqAnXH7KRKg+QeR3aLP2l+lLIOjvwt5Rnp2SEQgXjWBfBgE+CYyCZ0aLBcaXPSHUpQwpMcWlR3GAD3Wsb8OSadPjQgANv1r1r1YR6hcTDro+EDosS95b8045RTF5kZ66/di/XtQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=swisscom.com; dmarc=pass action=none header.from=swisscom.com; dkim=pass header.d=swisscom.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Swisscom.onmicrosoft.com; s=selector1-Swisscom-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NdsSOqcJdkTsMcQY04XfO4x9/1XUyk4KUfl7I0uemPo=; b=ZYZPGL8NS4BobdV3xpUbOGmXX0XpLC1xFlH2FgOg23BpJOjCDCyvgeWiWiRnlEr0KSSeLf9i5g+pP7GmmKdYFikx3v/woztIgpixrQmT3bguU0JiHSYZZTXMIyBHtuDSu+x+ewQO5ZJpsAqqX70QtrCwN91DKtvu7tf8F20iESo=
From: Thomas.Graf@swisscom.com
To: grow@ietf.org
CC: guyunan@huawei.com, camilo@us.ntt.net, paolo@ntt.net, Matthias.Arnold@swisscom.com, christian.kuster@huawei.com
Thread-Topic: BMP @ IETF 106 Hackathon, GROW WG Feedback
Thread-Index: AdWdNwSmxKxMwi2MRyu/afeyg5jJuQ==
Date: Sun, 17 Nov 2019 11:38:32 +0000
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Enabled=True; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_SiteId=364e5b87-c1c7-420d-9bee-c35d19b557a1; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Owner=Thomas.Graf@swisscom.com; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_SetDate=2019-11-17T11:38:24.6877636Z; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Name=C2 General; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Application=Microsoft Azure Information Protection; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_ActionId=d2ec5c2f-fd7d-44ed-a38c-b26795f010e1; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Thomas.Graf@swisscom.com;
x-originating-ip: [61.8.238.244]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5cc8251e-4947-4ece-6657-08d76b52acc4
x-ms-traffictypediagnostic: VI1PR02MB5293:|VI1PR02MB5293:
x-ms-exchange-purlcount: 1
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <VI1PR02MB5293803D2D8EC62A21E12B7789720@VI1PR02MB5293.eurprd02.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02243C58C6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(396003)(346002)(39850400004)(136003)(376002)(199004)(189003)(86362001)(33656002)(55016002)(66574012)(9686003)(74316002)(2501003)(10300500001)(66066001)(476003)(14454004)(2906002)(6306002)(54896002)(54906003)(486006)(66556008)(66476007)(66446008)(66946007)(316002)(66616009)(256004)(14444005)(5024004)(6436002)(76116006)(7736002)(52536014)(5640700003)(26005)(5660300002)(10290500003)(25786009)(790700001)(6116002)(3846002)(71200400001)(71190400001)(4326008)(7696005)(81156014)(81166006)(4743002)(64756008)(1730700003)(6506007)(102836004)(6916009)(413944005)(186003)(2351001)(99286004)(478600001)(8936002)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR02MB5293; H:VI1PR02MB4429.eurprd02.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: swisscom.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: TJbyTgmb4ukGNGbduSwBxEIktbT4kwULEMNv2kolHicTRj3L0lUO6YiGkl4c2bjC3r4Wjc0UTIcNQqjFLntqoh6novPrJab9s2t9f+Hffy4XWpgOv7Er6Opj9y84U7bEAsnzXc2rh86DibnhpX4NNPUjRiYKjJEunosg+QAQJhQiPf77YE+rKKUbuOKhD00YYA+szgWnhqiBfKDm0n/rMqzKJdQ45LdAe8b/TDGTG7lt/wJo3c2HJaKk/OxzTfQZ/CER8rs28za6JYCdwmkWENvnIJN80hodUShmaUjOgONJdgWDF7tauUAQ1bbu+LGG7Eo7dDE8NPo87B3pfHSo+XYM8YbPJ69nfUpia+MZchyFaw6SzvRtWnAZSPiK4yKvg/LMY28EI0sTpxu8r8jEAUtxHwaIvkidyFhSfjcWAyILtIKhFNncZ2h8tgTUBd2jGRV5D2cyPSA5ljulgVCshnIa6ygtY6OzsHqAE0n2Q8w=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5cc8251e-4947-4ece-6657-08d76b52acc4
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Nov 2019 11:38:32.4967 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 364e5b87-c1c7-420d-9bee-c35d19b557a1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pH2pwI6ilBVZoXO4t6DHKXNXvgbICDhH+5hYkz5zvVAn7ijia1XgojxDSxQji3AjEFqmW3HKjQcP0pPdv2IK5tGSzrDdcb+joC7Ub/DZaOE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR02MB5293
X-OriginatorOrg: swisscom.com
X-Trustmail: processed
Archived-At: <https://mailarchive.ietf.org/arch/msg/grow/fGfFqS0LTdg47-oGdSA7qqck5qs>
Subject: [GROW] BMP @ IETF 106 Hackathon, GROW WG Feedback
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Nov 2019 11:39:30 -0000

Dear GROW WG,

We tested interoperability between router and data-collection for the following BMP drafts and RFC's at the past two days at the IETF 106 hackathon.


  *   draft-ietf-grow-bmp-local-rib (BGP Local RIB)
  *   RFC 8671 (BGP Adj-RIB Out)

Attached you will find a slide deck describing


  *   what we did
  *   our findings and discovery of missing gaps
  *   and next steps for hackathon 107

We would like to collect some feedback from the GROW working group regarding the following two questions:


  *   We noticed that depending on vendor implementation of draft-ietf-grow-bmp-local-rib, BGP next-hop attribute value of local originated routes are exposed differently (127.0.0.1 vs. 0.0.0.0). We noticed that RFC 4271 does specify how BGP next-hop attribute is defined when propagated to neighbors, but does not specify what the next-hop attribute value should be when route is locally originated and still is in BGP local RIB installed, before it is propagated to any peer. We would like to collect best common practice among vendors and would like to understand if you would support that we describe this common practice in draft-ietf-grow-bmp-local-rib or not.
  *   We noticed that BMP peer up message type implementation of RFC 8671 differs among vendors. Depending on vendors, the BMP collector either receives one or 4 peer up peer up messages (with different O and L bit set in peer header) if BMP Adj-RIB Out and/or post policy is configured. We would like to understand which vendor implemented/understood what; which approach makes sense the most and why. If there are reasons why one of the two possibilities could causing issues/drawbacks, we would like to understand the reasons.


And last but not least if you are interested to participate in the next BMP hackathon at IETF 107 in Vancouver please let us know. The bigger and diverse the group is, the better. We like to validate and test BMP implementations, feedback and contribute input to the GROW working group for a better BMP standardization. Thanks a lot for your support.

Best Wishes
Thomas Graf