[GROW] draft-ietf-grow-bgp-session-culling next steps

Job Snijders <job@ntt.net> Fri, 26 May 2017 14:05 UTC

Return-Path: <job@instituut.net>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EAD6129534 for <grow@ietfa.amsl.com>; Fri, 26 May 2017 07:05:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.018
X-Spam-Level:
X-Spam-Status: No, score=-0.018 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_SORBS_SPAM=0.5, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lQRg_uVd0eJV for <grow@ietfa.amsl.com>; Fri, 26 May 2017 07:05:06 -0700 (PDT)
Received: from mail-wm0-f52.google.com (mail-wm0-f52.google.com [74.125.82.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B87CD128B90 for <grow@ietf.org>; Fri, 26 May 2017 07:05:05 -0700 (PDT)
Received: by mail-wm0-f52.google.com with SMTP id e127so22096968wmg.1 for <grow@ietf.org>; Fri, 26 May 2017 07:05:05 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:subject:message-id:mime-version :content-disposition:user-agent; bh=GPBtOyhiuFzNiA4UivuSj2LRdnG7tMAlPOvl+ifv3Ac=; b=e4DwRsLYR4NiBns3KoyRxb8EF7H6KmKU6Ht5kDivcwR4P00eKPFFnTvOACwkD3NxQp qsdY3CakVsKgrSpC+VVusveCviQoPxBZdPzzuZz8P3nzmzTjj+PD2sLG+KhxDxD63kbI XXZDrCyyMyhUYipohnmJpaLY/T7VGLCUR/DEoPuj/w9+3rYsiUVREUp3pPVA9w+XV0Xc spoujqn1LJ9UK/gMBUV2waiu08RI0YmbgncAM3MnLjLDTcQKYlFDEilXpZoFLKuN7MP2 zODdjkb1WJVYwmXdeM0/6zsbbRb7fDURPbwJ7J7lNQkIZAycZK2T3pRn/x6RzAnJ6src WXsw==
X-Gm-Message-State: AODbwcA0T4z9bW2YSQ1wx+z6omj/PePqy4Q31mrjTybfbD/b/HD0iQMd ySwUqIw4MrU3JZ0LDZ+dvA==
X-Received: by 10.80.208.155 with SMTP id v27mr2570903edd.71.1495807504001; Fri, 26 May 2017 07:05:04 -0700 (PDT)
Received: from localhost ([2001:67c:208c:10:a0d4:a036:684a:8eb4]) by smtp.gmail.com with ESMTPSA id b3sm615494ede.9.2017.05.26.07.05.02 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 26 May 2017 07:05:02 -0700 (PDT)
Date: Fri, 26 May 2017 16:05:02 +0200
From: Job Snijders <job@ntt.net>
To: grow@ietf.org, furry13@gmail.com, thomas.king@de-cix.net, kawakami@mfeed.ad.jp, bruno.decraene@orange.com, draft-ietf-grow-bgp-session-culling@ietf.org
Message-ID: <20170526140502.dqozbt2ziyfotgbw@Vurt.local>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
X-Clacks-Overhead: GNU Terry Pratchett
User-Agent: NeoMutt/20170306 (1.8.0)
Archived-At: <https://mailarchive.ietf.org/arch/msg/grow/yZZuRaKjOM1hnC-dqDDo1t8QwMY>
Subject: [GROW] draft-ietf-grow-bgp-session-culling next steps
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 May 2017 14:05:07 -0000

Hi GROW,

I've compiled a todo list to outline the next steps for the
draft-ietf-grow-bgp-session-culling document.

IXP Community feedback (possible action for Thomas, Yuya)
---------------------------------------------------------

After the initial version of this Internet-Draft was published, a few
IXPs have expressed interest in implementing the 'involuntary culling'
mechanism to reduce the negative impact of maintenance on their
platform. I hope we'll receive feedback from them on the readability and
structure of the document. As was stated before there are a number of
IXPs which have already implemented the mechanism, but they did that
before this document existed, I think feedback from new users will be
very valuable, so I'd like to try and collect some of that.

To shut or not to shut (possible action for Jen)
------------------------------------------------

Jen Linkova wanted to add text to offer an alternative to
administratively shutting down EBGP sessions: she advocated to withdraw
all routes & stop using received routes. Conceptually this would align
with simply removing policies associated with a EBGP peer before
commencing maintenance if the platform supports
draft-ietf-grow-bgp-reject.

While I look forward to a text proposal, I'm not sure if this should be
part of the BCP: the operator lacks visibility of the maintenance event
in their syslog (most implementions won't log that all routes were
withdrawn), and it precludes the use of draft-ietf-idr-shutdown to
inform others on what is going on.

Or perhaps this is a subjective matter driven by local considerations
and we should describe both approaches. If we describe both:

    o how do we facilitate a newcomer reading the document, how to
      decide which of the two to use?

    o What terminology would we use to contrast from "Voluntary BGP
      Session Teardown"?

    o if you choose a deny-import/deny-export approach, shouldn't you
      ideally start with a gshut 65535:0 approach and subsequently
      withdraw, to prevent hyper local blackholing?

    o What do other operators think about deny-import/deny-export rather
      then shutting?

So... should this I-D include the method at all?

We can also accept that the BCP is to administratively shut, but that
some operators will have their own methods.

BGP g-shut (possible action for Bruno et al)
--------------------------------------------

Bruno promised a new, fresh version of draft-ietf-grow-bgp-gshut which
would focus on the rfc1997 well-known community 65535:0 - I would
appreciate if this is posted at some point so we can make an Informative
reference to a non-zombie draft.  NTT (as2914) & Coloclue (as8283)
implemented experimental rfc1997 gshut support for customers and it
appears to work as advertise (no pun intended ;-).

Add examples for more platforms (everyone)
------------------------------------------

We're tracking examples of culling configs in this repository
https://github.com/bgp/bgp-session-culling-config-examples - if you see
a missing implementation and know how to configure involuntary culling,
please consider adding an example through a pull-request or an email to
the authors. Thanks!

Kind regards,

Job