[Idr] draft-ietf-idr-ix-bgp-route-server-11

Michael H Lambert <lambert@psc.edu> Mon, 20 June 2016 16:10 UTC

Return-Path: <lambert@psc.edu>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 5593512D51C for <idr@ietfa.amsl.com>; Mon, 20 Jun 2016 09:10:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.328
X-Spam-Status: No, score=-3.328 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.426, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id JJskEPVTiale for <idr@ietfa.amsl.com>; Mon, 20 Jun 2016 09:10:40 -0700 (PDT)
Received: from mailer2.psc.edu (mailer2.psc.edu [IPv6:2001:5e8:2:46::6a]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01F9112D1CA for <idr@ietf.org>; Mon, 20 Jun 2016 09:10:39 -0700 (PDT)
Received: from dengue.psc.edu (dengue.psc.edu []) (authenticated bits=0) by mailer2.psc.edu (8.13.8/8.13.8) with ESMTP id u5KGAcRb008352 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 20 Jun 2016 12:10:39 -0400
From: Michael H Lambert <lambert@psc.edu>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Mon, 20 Jun 2016 12:10:55 -0400
To: idr@ietf.org
Message-Id: <0F2F74E2-B3CB-4447-9C7C-028F47E6490F@psc.edu>
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/2Kj5TwAJWHXYx46R-LCvrPktl8c>
Subject: [Idr] draft-ietf-idr-ix-bgp-route-server-11
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jun 2016 16:10:41 -0000

This may have been discussed before and I just couldn't find it in the archives, and it may be too late in the process to ask the question, but should RFC 7606 (Revised Error Handling for BGP) apply to peering sessions with route server clients?  It does run counter to attribute transparency, but it can help insure that the "right" session is reset and that known (or knowable) bad announcements are properly propagated.