Re: [Idr] Review of draft-abraitis-bgp-version-capability-07

"RFC ISE (Adrian Farrel)" <> Fri, 21 August 2020 21:14 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id D123C3A12D0 for <>; Fri, 21 Aug 2020 14:14:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id nrI-DSfDYrRW for <>; Fri, 21 Aug 2020 14:14:40 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 8E9863A12EC for <>; Fri, 21 Aug 2020 14:14:39 -0700 (PDT)
Received: from localhost (localhost []) by (Postfix) with ESMTP id 26615F407A0; Fri, 21 Aug 2020 14:14:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id nhaM0evXeyLs; Fri, 21 Aug 2020 14:14:13 -0700 (PDT)
Received: from (localhost []) by (Postfix) with ESMTP id 58F67F4079F; Fri, 21 Aug 2020 14:14:13 -0700 (PDT)
Received: from (SquirrelMail authenticated user rfcpise) by with HTTP; Fri, 21 Aug 2020 14:14:13 -0700
Message-ID: <>
In-Reply-To: <>
References: <> <> <> <> <> <> <> <> <>
Date: Fri, 21 Aug 2020 14:14:13 -0700
From: "RFC ISE (Adrian Farrel)" <>
To: "Robert Raszuk" <>
Cc: "Donatas Abraitis" <>,, "IDR List" <>
User-Agent: SquirrelMail/1.4.21
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Archived-At: <>
Subject: Re: [Idr] Review of draft-abraitis-bgp-version-capability-07
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 21 Aug 2020 21:14:47 -0000

I think I object to the idea that this is  bypass of IDR.

It is *still* not too late for IDR to pick up this work if they want to
(but it is very close to too late). What I would need to hear (and I
presume Alvaro as the responsible AD) is a clear statement that the WG
*does* want to work on this.

Robert, I read your email as saying that "I want roughly this function,
but I would not do it that way." (Please say if I misread you). That is
certainly possible, and the WG is never expected to approve work without
review and editing, but it is hard for an author who fails to get any
traction to be told much later that there is finally traction but only if
they discard their approach and start again.

Perhaps one of the perils of a FCFS registry is that codepoints are
relatively freely available and without WG control. But it isn't as though
the author did not put this up for review from IDR on several occasions.

Wrt draft-ietf-idr-operational-message, I note that this expired a few
days less than eight years ago. I think it is reasonable to assume that
the WG is not pursuing that idea.


Robert Raszuk wrote:
>> Not only iBGP. It's up to the administration scope. If that's a clos
>> topology of leaves and spines, most likely there will be eBGP used. >>
Or even especially routing on the host, or more complicated
>> Kubernetes/Docker deployments.
> Sure not just iBGP but the draft says this: "This capability is NOT
> RECOMMENDED for eBGP use."  I realize what you meant to say was that
> the  draft is "NOT RECOMMENDED" to be used between different
> operational domains.
> - - -
> In any case this is an interesting case of IDR bypass. If this is
> approved I can already see a line of other proposals. Where will it
> bring BGP time will tell.
> My intention is however just to point out that this is a protocol
> extension which IDR compliant implementations will need to be aware
> of.
> The document uses a very soft language in a number of places. Example:
> The Capability Length SHOULD be no greater than 64.
> Bottom line is that there is a lot of people in IDR and/or GROW who
> think that we need to exchange such information between BGP peers. I
> am one of them. In the past I wrote BGP diagnostic message draft then
> we merged it with Advisory Message into BGP Operational Message which
> was in fact adopted as IDR WG document
> I think BGP (well really OS) version is a useful information, but I do
> not think this should be part of BGP Capabilities as an opaque text.
> My recommendation here is to add a new message to BGP Operational
> Message document and move forward with that more general solution to
> the problem. If FRR can support BGP Operational Message we can
> document it and move one step closer to IDR LC.

Adrian Farrel (ISE),