[Idr] Debugging accepted routes from BGP speakers

Jared Mauch <jared@puck.nether.net> Mon, 18 November 2019 08:54 UTC

Return-Path: <jared@puck.nether.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 8E361120854 for <idr@ietfa.amsl.com>; Mon, 18 Nov 2019 00:54:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id xbKFkylE-dpo for <idr@ietfa.amsl.com>; Mon, 18 Nov 2019 00:54:32 -0800 (PST)
Received: from puck.nether.net (puck.nether.net [IPv6:2001:418:3f4::5]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3053112084F for <idr@ietf.org>; Mon, 18 Nov 2019 00:54:32 -0800 (PST)
Received: from [IPv6:2001:67c:370:128:dd33:ff93:abbe:14ac] (unknown [IPv6:2001:67c:370:128:dd33:ff93:abbe:14ac]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by puck.nether.net (Postfix) with ESMTPSA id BD8265401AD; Mon, 18 Nov 2019 03:54:29 -0500 (EST)
From: Jared Mauch <jared@puck.nether.net>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 18 Nov 2019 03:54:27 -0500
References: <157406668522.14183.13795160095173591028.idtracker@ietfa.amsl.com>
To: IDR <idr@ietf.org>
Message-Id: <EC0AF47A-D6F3-4903-A597-C0F18520A8B0@puck.nether.net>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/D70akFAmLe-BdRJazJPgWlLffiI>
Subject: [Idr] Debugging accepted routes from BGP speakers
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Nov 2019 08:54:34 -0000


As a network operator we often don’t know if our ISPs are accepting the routes we send to them.  This makes it difficult at times for operators to debug things.  This is a first stab at a draft to try and propose a method to have the remote device echo back some route counts (and possibly NLRI) that were both accepted and rejected by the remote speaker.

It’s got a few things that I know need to be fixed at minimum, but I wanted to share this more broadly now.

I’m interested in feedback and ready to accept your arrows.

- Jared

> URL:            https://www.ietf.org/internet-drafts/draft-mauch-bgp-accepted-00.txt
> Status:         https://datatracker.ietf.org/doc/draft-mauch-bgp-accepted/
> Htmlized:       https://tools.ietf.org/html/draft-mauch-bgp-accepted-00
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-mauch-bgp-accepted
> Abstract:
>   This document defines a method to receive accepted and rejected NLRI
>   over a BGP peering session.