Re: [GROW] Support for Enterprise-specific TLVs in BMP

Thomas.Graf@swisscom.com Tue, 03 November 2020 11:58 UTC

Return-Path: <Thomas.Graf@swisscom.com>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DD143A07CE for <grow@ietfa.amsl.com>; Tue, 3 Nov 2020 03:58:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yaYhUNxwkP2j for <grow@ietfa.amsl.com>; Tue, 3 Nov 2020 03:58:18 -0800 (PST)
Received: from mail.swisscom.com (mailout110.swisscom.com [138.188.166.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AD6C3A044E for <grow@ietf.org>; Tue, 3 Nov 2020 03:58:15 -0800 (PST)
Received: by mail.swisscom.com; Tue, 3 Nov 2020 12:58:13 +0100
MIME-Version: 1.0
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="----=_Part_193829_1482692272.1604404692792"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dsDIc3EdkniBnX5opGwIpybN8quuTiBIysWy8wxvbpBfOJmSzKbymVOd6Kz3lLEXLBn18UYSJgffBep81PeG4JiRTN19i19YhbuOH285Dnt8c6arhfOXFnsxuCCcgQJZtwqsAebSmK7xPBY7psb4w0+N5CwbpSPoLlJtGhR3WKAYPkIWOZ+Gic8GsjmbGnipqLTxUEhEgLRyF6QPBqF/6uF1YfIxSR3y5ypEBaS7sSNKoVdqY9mL+Trdj0blQKSf8437NN584Qg75hfNrQLlSXXRcQPBsdA6XfR62e4XOXhQLlhrhFpb0gczJpvuECwy3re3HbTyTe5HJiX+PVdwOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rCIqxB9nG/wrOEfn+rDwxY2yTp43DZEMxmJBErLpfpo=; b=GuWYg+6iD1sEtW5Zx/hw93bysYXbmEV3DOVGjWsu2IbCf9lr6+jqn0l93k/+DF4wn/Dl2j3NQ8dLqM3c8nNdM7HnwNORZ4TwfNzzSFBpApBCmmYShDHJRz2HOxoDly1cuYgGcUeM/fC4oIYJgic0nFT1MPlCWae1Lx7SWMjJsxkBecO7msfy+EzXaqb1vKO9X0IT0Z9ku77EAka6odvAmJBT9Km7mal8ZP2LqoSPSSGbWR6qJAk9Ur2QORcDsUsqTR3+tsHflYsrHvY0Q94X6b/LrpRKujDVmFEd4+xrzhsrOpl0HP7XqfcGDk0yPKylEeatc1vwkpbIK9vyWx9bQw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=swisscom.com; dmarc=pass action=none header.from=swisscom.com; dkim=pass header.d=swisscom.com; arc=none
From: Thomas.Graf@swisscom.com
To: paolo@ntt.net, grow@ietf.org
Thread-Topic: [GROW] Support for Enterprise-specific TLVs in BMP
Thread-Index: AQHWq5owtRiXGzTi1U+sO6oAA00Bi6m2VdKg
Date: Tue, 03 Nov 2020 11:58:09 +0000
Message-ID: <ZRAP278MB012564E76FDA9F0A6A5E2FDB89110@ZRAP278MB0125.CHEP278.PROD.OUTLOOK.COM>
References: <366e142a-6235-2d60-ad64-00a1da34133a@ntt.net>
In-Reply-To: <366e142a-6235-2d60-ad64-00a1da34133a@ntt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Enabled=True; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_SiteId=364e5b87-c1c7-420d-9bee-c35d19b557a1; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Owner=Thomas.Graf@swisscom.com; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_SetDate=2020-11-03T11:58:08.0914850Z; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Name=C2 General; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Application=Microsoft Azure Information Protection; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_ActionId=8e8ec5d9-3924-46a1-a597-231afba75a5d; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Extended_MSFT_Method=Automatic
authentication-results: ntt.net; dkim=none (message not signed) header.d=none;ntt.net; dmarc=none action=none header.from=swisscom.com;
x-originating-ip: [138.188.166.41]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3bddbd57-d491-45f2-888d-08d87fefbb9e
x-ms-traffictypediagnostic: ZRAP278MB0141:
x-microsoft-antispam-prvs: <ZRAP278MB01411C66E02AE2464792BF0389110@ZRAP278MB0141.CHEP278.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: JF1AmUxDJqsxEaOduseSFMk9psUD1keJGU+3Wvece9xBiRmebrSYfZFEj2me3HCOb7OE2FrEKp/SMGNDh3r7z3i7HD2sEWp6lM/jN04nKiN+iZt5hMWoV39+5C1FWyBKO0K5S24BkSLAv0PIL3dpdvCLrbhDaexBnZMFErN9nqhJ3w6apMQfmchQ6osP5D1dWf0s6oVrF+lT1jWRHGwUd2ANR7CtxaMGUmWoSUAC4FT8XqYWBU/flw/hlx7rErcc2MPDu4nre2/eDf8gOTFiFYkyqERrHrTp6xLqy63aWbVdefwSiNGC0eV/ggj+Tvadl7rQEw/0TvVYK/Bpp9QehKyRTOU8TUJz5uCg/7MFqeivbbz2EKJSETpotP0MixYhoCV1gi3JSs1+Vyu6ebBLwg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:ZRAP278MB0125.CHEP278.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(136003)(346002)(376002)(396003)(39860400002)(7696005)(110136005)(6506007)(83380400001)(55016002)(53546011)(45080400002)(64756008)(66556008)(66446008)(10300500001)(9686003)(33656002)(66476007)(66946007)(76116006)(10290500003)(478600001)(8676002)(71200400001)(52536014)(186003)(966005)(8936002)(26005)(316002)(2906002)(5660300002)(86362001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: ZRAP278MB0125.CHEP278.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 3bddbd57-d491-45f2-888d-08d87fefbb9e
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Nov 2020 11:58:09.3569 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 364e5b87-c1c7-420d-9bee-c35d19b557a1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6S780XST9o68g3L7cC5qnlbr0Qr5CHduCizB2tyQvRRvc1Jcnr5tESKiyjLbFjnlHlXsp8Z2EtYmgNkYyQxls8TC/lLoCQ6eiCwYsEgNumc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: ZRAP278MB0141
X-OriginatorOrg: swisscom.com
X-CFilter-Loop: Reflected
X-Mailer: Totemo_TrustMail_(Notification)
X-Trustmail: processed
Archived-At: <https://mailarchive.ietf.org/arch/msg/grow/fy-G02FeYgmYC1i3TrpPNFc9RXU>
Subject: Re: [GROW] Support for Enterprise-specific TLVs in BMP
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Nov 2020 11:58:20 -0000

Hi Paolo and Jeffrey,

First of all I am in support of Enterprise-specific TLVs in BMP. It's important to be equal to other data-collection protocol such as IPFIX and YANG push.

Jeffrey slide on "Code Point Management" describe perfectly the problem space and need this draft addresses.

I like to bring some additional context in this discussion which hopefully help to clarify the need and reason for enterprise registry. About the different kind of registry types.

As done with bmp-loc-rib
https://www.iana.org/assignments/bmp-parameters/bmp-parameters.xhtml

code points can be assigned temporarily as described in section 2 of RFC 7120
https://tools.ietf.org/html/rfc7120#section-2

In order to be eligible, the draft needs to be adopted at a working group and in a stable condition. That means the applicability of ebit is in early development where interop ability among vendors is tested and shipped to network operators to be tested there as well.  I suggest to clearly described this in the ebit draft and maybe consider also RFC 8126 section 4.1 which describes the differences between enterprise and experimental registry. 
https://tools.ietf.org/html/rfc8126#section-4.1

Best wishes
Thomas

-----Original Message-----
From: GROW <grow-bounces@ietf.org> On Behalf Of Paolo Lucente
Sent: Monday, October 26, 2020 2:16 PM
To: grow@ietf.org
Subject: [GROW] Support for Enterprise-specific TLVs in BMP


Dear GROW WG Rockstars,

I would like to get some feedback / encourage some conversation around the topic of supporting Enterprise-specific TLVs in BMP (or
draft-lucente-grow-bmp-tlv-ebit-01) so to see whether it is appropriate to ask the Chairs for WG adoption.

Context: with the Loc-RIB (draft-ietf-grow-bmp-local-rib) and Adj-Rib-Out (RFC 8671) efforts we increased the possible vantage points where BGP can be monitored; then the goal of draft-ietf-grow-bmp-tlv is to make all BMP message types extensible with TLVs since by RFC 7854 only a subset of them do support TLVs.

Motivation: i would like to supplement what is already written in the Introduction section of the draft "Vendors need the ability to define proprietary Information Elements, because, for example, they are delivering a pre-standards product, or the Information Element is in some way commercially sensitive.", in short prevent TLV code point squatting.

Successful IETF-standardized telemetry protocols, ie. SNMP and IPFIX, do provision to extend standard data formats / models in order to pass enterprise-specific information - including the fact that not everything can be represented in a standard format, especially when data does touch upon internals (ie. states, structures, etc.) of an exporting device. 
This is also true, more recently, with the possibility to extend standard YANG models.

In this context, in order to further foster adoption of the protocol, BMP should follow a similar path like the other telemetry protocols.

Approach: reserving the first bit of a TLV type to flag whether what follows is a private or a standard TLV and, if private, provide the PEN in the first 4-bytes of the TLV value is a simple and successful mechanism to achieve the motivation that was merely copied from IPFIX, a case of nothing new under the Sun.

Current feedback: the only feedback that was received was last year in Singapore and it was along the lines of: we are at IETF and we should not open the backdoor for / facilitate insertion of non-standard elements.

Thoughts? Opinions? Tomatoes?

Paolo

_______________________________________________
GROW mailing list
GROW@ietf.org
https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fgrow&amp;data=04%7C01%7CThomas.Graf%40swisscom.com%7C8e59dfcfe10049770cdc08d879b1524b%7C364e5b87c1c7420d9beec35d19b557a1%7C1%7C0%7C637393149780032342%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=vGqvOnCFbXFWaaccQplg66o1HF%2FE8rKRGEeZ0MWXSQQ%3D&amp;reserved=0