Re: [Idr] IETF LC for IDR-ish document <draft-ietf-grow-bgp-reject-05.txt> (Default EBGP Route Propagation Behavior Without Policies) to Proposed Standard

Nick Hilliard <nick@foobar.org> Mon, 24 April 2017 19:59 UTC

Return-Path: <nick@foobar.org>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0599129502 for <idr@ietfa.amsl.com>; Mon, 24 Apr 2017 12:59:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jOGSkIQW38it for <idr@ietfa.amsl.com>; Mon, 24 Apr 2017 12:59:17 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA8A6129442 for <idr@ietf.org>; Mon, 24 Apr 2017 12:59:16 -0700 (PDT)
X-Envelope-To: idr@ietf.org
Received: from crumpet.local (089-101-070074.ntlworld.ie [89.101.70.74] (may be forged)) (authenticated bits=0) by mail.netability.ie (8.15.2/8.15.2) with ESMTPSA id v3OJx7oG033347 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 24 Apr 2017 20:59:07 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.ibn.ie: Host 089-101-070074.ntlworld.ie [89.101.70.74] (may be forged) claimed to be crumpet.local
Message-ID: <58FE590A.9050302@foobar.org>
Date: Mon, 24 Apr 2017 20:59:06 +0100
From: Nick Hilliard <nick@foobar.org>
User-Agent: Postbox 5.0.12 (Macintosh/20170323)
MIME-Version: 1.0
To: Enke Chen <enkechen@cisco.com>
CC: Mikael Abrahamsson <swmike@swm.pp.se>, "idr@ietf.org" <idr@ietf.org>
References: <68B29403-9AD9-4F06-9FE4-3F077E793D9F@puck.nether.net> <275cf744-1f64-bcbc-dabe-a47479921230@cisco.com> <20170420154142.lacvtplusepy3qcf@hanna.meerval.net> <b57162ec-f806-6e86-7713-58608f72c468@cisco.com> <32C0B4EE-6241-49F9-97F2-7107AC68678D@juniper.net> <e513849d-f895-0499-7bf4-5ecb24cadab7@cisco.com> <4CE4AF1E-0C80-423E-B19D-5750FCAFAD89@juniper.net> <23283_1492759950_58F9B58E_23283_375_1_53C29892C857584299CBF5D05346208A31CC352B@OPEXCLILM21.corporate.adroot.infra.ftgroup> <20170421084638.l6pbvtznfsxnq2wy@Vurt.local> <23291_1492766305_58F9CE61_23291_9725_1_53C29892C857584299CBF5D05346208A31CC399E@OPEXCLILM21.corporate.adroot.infra.ftgroup> <20170421095839.sralcy7aos5mzzic@Vurt.local> <d57ed214-945a-54b8-e04f-cb8610f789e4@cisco.com> <alpine.DEB.2.02.1704231447550.5591@uplift.swm.pp.se> <ee6e3ad8-d5c2-16c5-4464-3473d9a6443a@cisco.com> <alpine.DEB.2.02.1704240928120.5591@uplift.swm.pp.se> <09173019-86ee-4f81-d57f-f664d642f633@cisco.com>
In-Reply-To: <09173019-86ee-4f81-d57f-f664d642f633@cisco.com>
X-Enigmail-Version: 1.2.3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/9kdn0nsbib0YrCXNXufwFOKESIE>
Subject: Re: [Idr] IETF LC for IDR-ish document <draft-ietf-grow-bgp-reject-05.txt> (Default EBGP Route Propagation Behavior Without Policies) to Proposed Standard
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Apr 2017 19:59:19 -0000

Enke Chen wrote:
> The CLI migration falls apart when a customer skips releases and jumps
> from one release ("permit all") to another ("deny all").

Enke,

config downgrading is why the "downward-compatible-config" IOS
configuration command exists.  Config upgrading is relatively
straightforward, although it takes years to implement.

Changing defaults and commands is something which has happened on many
occasions over the lifetime of IOS, from radical config breaking "ip
classless", or my personal favourite, "mop enabled" in the interface
config mode, which changed default backwards and forwards on several
occasions, not just once (I'd love to hear the back-story about how and
why that happened, btw).  Other well known examples include the modular
QoS config mechanism which removed the older qos config mechanisms.

Just because a large vendor doesn't like changing defaults, that doesn't
mean it's not a sensible thing to standardise.

No-one is under any illusion that there is a cost to vendors
implementing this but right now, the cost of not doing it is borne by
other people, and we're tired of it.

Nick