Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

"Susan Hares" <shares@ndzh.com> Tue, 25 August 2015 21:06 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E40F1B3064; Tue, 25 Aug 2015 14:06:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.355
X-Spam-Level:
X-Spam-Status: No, score=-96.355 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aUDr8hwyGWse; Tue, 25 Aug 2015 14:06:38 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AFF7F1B305E; Tue, 25 Aug 2015 14:06:37 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.218.207;
From: Susan Hares <shares@ndzh.com>
To: "'Sriram, Kotikalapudi'" <kotikalapudi.sriram@nist.gov>, "'George, Wes'" <wesley.george@twcable.com>, 'Christopher Morrow' <christopher.morrow@gmail.com>, grow-chairs@ietf.org, grow-ads@tools.ietf.org, grow@ietf.org
References: <CAL9jLaaOPvY2WZtunCOkuuCDV5-Do+cpHBfa8eEhquGdzSLVuA@mail.gmail.com>, <D1F79D0A.6543F%wesley.george@twcable.com> <CY1PR09MB0793887590CEB8964D11977A84780@CY1PR09MB0793.namprd09.prod.outlook.com>
In-Reply-To: <CY1PR09MB0793887590CEB8964D11977A84780@CY1PR09MB0793.namprd09.prod.outlook.com>
Date: Tue, 25 Aug 2015 17:06:32 -0400
Message-ID: <00ef01d0df79$ebfbd0d0$c3f37270$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQCR/yMDPXz2s/nkEsJwroMg/IM7IQGZnjy5ApAb2xegeaeMIA==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/grow/wcArn18yk-8rC9-m1qMqL9LdvoU>
Cc: "'John G. Scudder'" <jgs@bgp.nu>
Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Aug 2015 21:06:39 -0000

Siram: 

Do you want me to post this for a cross-review in IDR? 

Sue Hares 

-----Original Message-----
From: GROW [mailto:grow-bounces@ietf.org] On Behalf Of Sriram, Kotikalapudi
Sent: Tuesday, August 18, 2015 8:18 AM
To: George, Wes; Christopher Morrow; grow-chairs@ietf.org;
grow-ads@tools.ietf.org; grow@ietf.org grow@ietf.org
Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
(ends: 8/24/2015 - Aug 24)

Thank you, Wes.
The comments you've offered are greatly helpful for improving accuracy as
well as clarity in what is being said. 
I plan to incorporate them in the next revision (v. -03) soon.

Sriram   
________________________________________
From: GROW <grow-bounces@ietf.org> on behalf of George, Wes
<wesley.george@twcable.com>
Sent: Monday, August 17, 2015 2:45 PM
To: Christopher Morrow; grow-chairs@ietf.org; grow-ads@tools.ietf.org;
grow@ietf.org grow@ietf.org
Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
(ends: 8/24/2015 - Aug 24)

I've reviewed the latest version, and generally think that it is ready to
proceed once the below comments are addressed. A cross-review from IDR might
also be useful before it goes to IETF LC.

There are several areas in Section 3 where you use attack and leak
interchangeably in a way that adds a bit of confusion. I think it'd be
better to pick one and stick with it, probably leak rather than attack, and
only use attack if you are describing something that is almost always
malicious rather than accidental.
I.e.
attack type 1 - "The update basically makes a
      U-turn at the attacker's multi-homed AS.  The attack (accidental
      or deliberate) often succeeds"
Previously, you say that you refer to the leaking AS as the "offending AS".
I'd suggest using that here instead of "the attacker's". Similarly, you've
already said that most leaks are unintentional, so it might be better to
simplify that next sentence by saying "the leak often succeeds"
and eliminate the parenthetical. It is also unclear from the text exactly
what you mean by U-Turn (it's not going back the way it came, so actually
hairpin might be a better term), so a few words to clarify might be useful.
Type 2 - "Update is crafted by the attacker...success of the attack" - same
comment here about attack vs leak vs offending AS

Type 4 - While often the increase in prefixes causes its own problems
(dramatically increased routing table size, exceeded max prefix limit,
etc) you may want to add some text to the effect of "these more specifics
may cause the routes to be preferred over other aggregate announcements,
thus redirecting traffic from its normal best path" as that makes it clearer
what the impact of the leak is in this case.

Type 5 - I'm not sure that the terms "lateral" or "non-hierarchically
peering" really add a lot to the explanation. The rest of your text sounds
more like you're describing a non-transit relationship (typically only
announce their customer routes to each other), which I think would be an
easier term to define and more likely to be something readers would be
familiar with. Either way, the explanation in this section could benefit
from a good editing pass for clarity.

Type 6/7- "its provider" - do you mean its transit provider? Otherwise it's
unclear what distinguishes this from type 5, and again would be useful to
use transit/non-transit to clarify.

Also, an editorial nit/personal preference: since there are so few sections
to this document, it might be useful to take each of the subtypes and make
it a subsection of section 3 (e.g. 3.1 3.2, 3.3...), so that it's easier to
refer to it in text and reviews - subsections can have HTML anchors so that
you can link right to them, and they show up in the table of contents as
well.

Thanks,

Wes

_______________________________________________
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow