Re: [Idr] AD Review of draft-ietf-idr-bgp-extended-messages-20

"Susan Hares" <shares@ndzh.com> Wed, 15 March 2017 15:42 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B28621316BF; Wed, 15 Mar 2017 08:42:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.946
X-Spam-Level:
X-Spam-Status: No, score=0.946 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XgH5R0yUAILL; Wed, 15 Mar 2017 08:42:39 -0700 (PDT)
Received: from hickoryhill-consulting.com (50-245-122-97-static.hfc.comcastbusiness.net [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CAC11316B0; Wed, 15 Mar 2017 08:42:38 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=70.194.2.137;
From: Susan Hares <shares@ndzh.com>
To: 'Jeffrey Haas' <jhaas@pfrc.org>
Cc: 'Enke Chen' <enkechen@cisco.com>, 'idr wg' <idr@ietf.org>, 'Robert Raszuk' <robert@raszuk.net>, idr-chairs@ietf.org, draft-ietf-idr-bgp-extended-messages@ietf.org
References: <CA+b+ER=r6tF3t-THjN_zz5hOLETRV5MjpcoEo+79exeafWBNfQ@mail.gmail.com> <01b301d29758$180458e0$480d0aa0$@ndzh.com> <e2fd2bc1-94fa-66fb-e2f0-668ee5a1f1a1@cisco.com> <CE23F9A0-DC7B-4AC1-A6E4-6BF5A287B71D@nist.gov> <7657b686-0685-9bdf-17ba-e7d618a237aa@cisco.com> <C83C3A72-5059-4345-B0E7-AB7F9FD48E53@nist.gov> <edf306511fd84fbe8bceb4b5801be8ea@XCH-ALN-014.cisco.com> <bc0e6deb-f07b-4234-0c19-85acd162f5b6@cisco.com> <E6D510E4-34A6-40D4-A63F-47DA22EDB81B@pfrc.org> <004001d29874$9ed03840$dc70a8c0$@ndzh.com> <20170314225242.GM12864@pfrc.org>
In-Reply-To: <20170314225242.GM12864@pfrc.org>
Date: Wed, 15 Mar 2017 11:37:56 -0400
Message-ID: <027c01d29da2$1efbd8d0$5cf38a70$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJNmlyMtg6aifomFjff9yu//s8nwgIjEw3KAqFLPaYCQp+WoQI2iBGKAdk+iIwC04D/CwIGkEf6AU+yhXUBoGKx1QInXlwbn/fKQNA=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/9P7sjTao1T2lFo7DkLVtA1iMKDY>
Subject: Re: [Idr] AD Review of draft-ietf-idr-bgp-extended-messages-20
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Mar 2017 15:42:41 -0000

Jeff:

I now understand your "wiggle room".   We both agree on the FSM actions and
that we need operator input on the choices. 

1) Open Message < 4096 - hold while at BGP version 4  
  [This can be held at the Open Message header tests (event 22)]
  While all other MESSAGES > 4096 if 
  open capability for extended messages. 

2) all Messages at > 4096 - with BGP version 5 
    (no capability negotiation) 

3) Open Message < 4096  - with BGP version 4 +  Dynamic Capabilities
    All other BGP-4 messages > 4096 if 
    Open capability for extended messages 

4) Update message only at > 4096 
   if  Open capability for extended messages

Did I miss an open?  If not, I will open a request for feedback on IDR, and
add this to the grow request for input. 

Sue Hares 

-----Original Message-----
From: Jeffrey Haas [mailto:jhaas@pfrc.org] 
Sent: Tuesday, March 14, 2017 6:53 PM
To: Susan Hares
Cc: 'Enke Chen'; 'idr wg'; 'Robert Raszuk'; idr-chairs@ietf.org;
draft-ietf-idr-bgp-extended-messages@ietf.org
Subject: Re: [Idr] AD Review of draft-ietf-idr-bgp-extended-messages-20

Sue,


On Wed, Mar 08, 2017 at 08:29:37PM -0500, Susan Hares wrote:
> Caveat - I am not commenting on operational issues.  If your brief 
> comment denotes some operational issues, I would appreciate a longer 
> description on-list or off-list.
> 
> If you are comment on the functionality within the RFC4271 FSM, I am 
> not sure why the "wiggle room is reduced when the open message size is
changed"?
> I have been specific on this list as to the functionality a message 
> header length error enacts (Event 21) versus an Open Message Header enacts
(Event
> 22).    Please be as specific in your response if it is a FSM issues. 

This is to some extent a simple issue with regard to extended and
non-extended speakers trying to interoperate.  However, the version case
with the changes under discussion complicate the matter slightly.

Presume old RFC 4271 speaker, O.
Presume new extended message speaker E.

If E sends an open message > 4096 octets to O, the generally expected
behavior is that O will send a notification message with a Bad Message
Length subcode.  O has no reason to change its behavior.

E may have course note this specific error and try to back-off, if possible
to a <= 4096 message size.  However, I tend to agree with other threads that
we're better off blocking the peering session from coming up without further
intervention.  I am *not* a supporter of deferring the larger Open
operations to another message; we'd be better off getting something like
Dynamic Capabilities working and we've had a number of discussions about why
some of that behavior is problematic.

(Alternatively, we simply have the extended open message, but that's a bit
of a change in the FSM.)

So... why did I bring up the version negotiation point?

Mostly because for version negotiation to work, once we leave -4 behind, we
need to be able to generate an Unsupported Version Number error.  We can't
do that if the receiver simply dumps the session due to hitting the message
length validation failure first.

As I mention too tersely in my response... oh well.  But it does mean that
if we go with > 4k open messages that old speakers will only get upset about
PDUs that are too big rather than giving us other useful information about
why session negotiation is failing.

I suspect this is fine, but it should be a choice that is clearly
understood.

-- Jeff