Re: [Idr] new ID on expansion of private use ASN range

Jon Mitchell <jrmitche@puck.nether.net> Fri, 06 July 2012 17:29 UTC

Return-Path: <jrmitche@puck.nether.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59E6021F85CD for <idr@ietfa.amsl.com>; Fri, 6 Jul 2012 10:29:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.325
X-Spam-Level:
X-Spam-Status: No, score=-6.325 tagged_above=-999 required=5 tests=[AWL=0.274, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OKW0KyIezLjM for <idr@ietfa.amsl.com>; Fri, 6 Jul 2012 10:29:10 -0700 (PDT)
Received: from puck.nether.net (puck.nether.net [IPv6:2001:418:3f4::5]) by ietfa.amsl.com (Postfix) with ESMTP id A6A1421F85C7 for <idr@ietf.org>; Fri, 6 Jul 2012 10:29:10 -0700 (PDT)
Received: from puck.nether.net (puck.nether.net [204.42.254.5]) by puck.nether.net (8.14.4/8.14.4) with ESMTP id q66HTP6d009875 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 6 Jul 2012 13:29:25 -0400
Received: (from jrmitche@localhost) by puck.nether.net (8.14.4/8.14.4/Submit) id q66HTPrv009874; Fri, 6 Jul 2012 13:29:25 -0400
Date: Fri, 06 Jul 2012 13:29:25 -0400
From: Jon Mitchell <jrmitche@puck.nether.net>
To: Christopher Morrow <morrowc.lists@gmail.com>
Message-ID: <20120706172924.GA9128@puck.nether.net>
References: <20120702164834.GB13713@puck.nether.net> <m2zk7hxli9.wl%randy@psg.com> <20120703141629.GC22598@puck.nether.net> <CAL9jLaa0Q6Zwrce8cxYY_VtDOsnjdQF6gG+bEC3T4LZbJYuZ7w@mail.gmail.com> <4FF350D3.2030205@umn.edu> <CAL9jLabgDnEZVb=SuH=ShEm=jmt6FwxpK-PNtnpc7gUvPBfV-A@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAL9jLabgDnEZVb=SuH=ShEm=jmt6FwxpK-PNtnpc7gUvPBfV-A@mail.gmail.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.6 (puck.nether.net [204.42.254.5]); Fri, 06 Jul 2012 13:29:25 -0400 (EDT)
Cc: idr@ietf.org
Subject: Re: [Idr] new ID on expansion of private use ASN range
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Jul 2012 17:29:11 -0000

On Tue, Jul 03, 2012 at 10:18:30PM -0400, Christopher Morrow wrote:
> On Tue, Jul 3, 2012 at 4:06 PM, David Farmer <farmer@umn.edu> wrote:
> > So Chris, why does clothing store with 1.5k endsites want those ASNs
> > publicly registered. ?I tend toward why not, but they frequently seem to not
> > want them publicly registered.
> 
> I'd want them registered in case I happen to link my corp network with
> any partners, less pain in the rear when it comes to 'who's net is
> this anyway?' discussions.

[JM] Unless we assume that all Enterprise operators are unable to make
wise decisions, I agree they should choose to use a Public ASN to make
this connection, likely at their HQ or in a dedicated DMZ network, as
they are probably not bringing in partner connections directly at their
stores.  Often this ASN will advertise an aggregate network or very
small number of networks containing the servers that need access to the
data from this extranet partner and no data from the extranet partner
will go directly to the store terminals situations but I think it is
hard to justify the next conclusion that they should register the other
1500 ASNs needed for this networking scenario just because they should
register that one.  Of course this is only one example of a single use
case, and walking through every use case of private use ASNs does not
seem useful.


> 
> TODAY they choose the path of zero resistance, 'our vendor said use
> 65something... oh, 65535, done.' :(
> 
> I'm not sure it's in our best interest to continue to let people paint
> themselves into a corner needlessly. (if we can fairly easily avoid
> it)

[JM]  Many networks are succesfully using private use ASNs, I suspect
we'll never know how many (although I'd guess far more individual
private ASN instances are deployed thank Public) since we don't connect
to them all or have to deal with them.  In my mind the only thing that
would have painted anyone into a corner would have been if such a
private use range had never existed in the first place and they were
forced to register every ASN, as likely this would have lessoned BGP
adoption overall (since there are many use cases that will not meet the
RIR justification requirements), when otherwise it was the right
protocol for their needs.

I don't see how this draft, providing a larger private use range, changes
the situation given that there are no plans or even feasible way to make
the existing private use ASN space to go away.  Not increasing the space
will only result in further hacks being used (internally) by networks
that need more than 1000 ASNs, not suddenly create a desire or a
realistic path to getting public ASNs.  Even if we theoritically could
take away away all private use space this may not get the result you
want either, but may push operators who don't want to incur this burden
to utilize other parts of the vast ASN space that they don't think will
be allocated soon.  I'm not suggesting this is wise or proper behavior,
just pointing out it has been done in other resources such as IPv4
private use space when the size was not sufficient for the requirements.

I welcome approaches/proposals to encourage a lower threshold for when
to use a public ASN and lowering the administrative and justification
burdens to obtaining them, and would be happy to work with anyone who
wants to solve this problem.  However as Brian pointed out, this draft's
progress should not be tied to the success of that effort as they are
solving different problems.