Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00

"Susan Hares" <shares@ndzh.com> Fri, 21 December 2012 16:05 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A781B21F8711 for <idr@ietfa.amsl.com>; Fri, 21 Dec 2012 08:05:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.091
X-Spam-Level: *
X-Spam-Status: No, score=1.091 tagged_above=-999 required=5 tests=[AWL=0.586, BAYES_00=-2.599, DOS_OUTLOOK_TO_MX=1, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aVF4BObSih7Q for <idr@ietfa.amsl.com>; Fri, 21 Dec 2012 08:05:21 -0800 (PST)
Received: from hickoryhill-consulting.com (unknown [64.9.205.143]) by ietfa.amsl.com (Postfix) with ESMTP id 92ED021F86A4 for <idr@ietf.org>; Fri, 21 Dec 2012 08:05:21 -0800 (PST)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=64.112.195.202;
From: Susan Hares <shares@ndzh.com>
To: 'Nick Hilliard' <nick@foobar.org>
References: <1AC79BDA-C088-47B4-888D-4B0428FB7C4F@puck.nether.net> <B549F708-0D5E-4B22-AC91-B6CE61B258FE@tony.li> <CAL9jLaZdX_jem0JdSGHzuhc3GDZXMDR0kvMKq5xr3D-EWYbNVQ@mail.gmail.com> <20121129191043.GA9189@puck.nether.net> <50D328DC.2020906@umn.edu> <20121220152721.GA3551@puck.nether.net> <50D33972.8090302@umn.edu> <50D33D9D.3070400@foobar.org> <m2bodoodtx.wl%randy@psg.com> <020a01cddefc$dd1e5590$975b00b0$@ndzh.com> <20121220223820.GA19458@puck.nether.net> <50D3991B.2040809@foobar.org> <027701cddf09$1d074d90$5715e8b0$@ndzh.com> <50D44B5A.4080308@foobar.org>
In-Reply-To: <50D44B5A.4080308@foobar.org>
Date: Fri, 21 Dec 2012 11:05:03 -0500
Message-ID: <038301cddf94$f04303d0$d0c90b70$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQF9v/6ArthbJCXvPOQlollKSNupRwJmxqN6Ae2IgloCr9hVXgEa8bQpAbE5dxQCO7v+TgI2uifkAwjVA9cBmIxC9QJWdUb9Ai04lyEB39IjngGCNXspl+1U4NA=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Cc: idr@ietf.org
Subject: Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Dec 2012 16:05:22 -0000

Nick:

Before I start, these are great questions.  Before, I start, I must repeat
John limited the discussion to the range comments.  Please get your comments
in often and early today on the range.

----------

Now, as to your questions... 
RFC 1930 says: 

10. Reserved AS Numbers

   The Internet Assigned Numbers Authority (IANA) has reserved the
   following block of AS numbers for private use (not to be advertised
   on the global Internet):

I will address "global Internet" rather than the phrase "Internet".

Many "fun" adventures in the past with BGP infrastructure have generally
been found to be someone's leak or accident.  Leaks/accidents if painful
enough, will inspire code and operational changes. There tales of equally
fun adventures within the private VPN or private DC space, but it is not the
concern of RFC1930. 

I believe that operations people are smart.  If they ignore "MUST" for
private VPN or private DC, they must deal with the problems.  If they wish
to standardize it, they'll speak up.  If operators want better knobs to
handle private AS, operators will define it. If operators define knobs for
private AS, it's a great topic to talk about in Grow or IDR. 

If they break the global Internet using private AS space, that's what
RFC1930 is for and this draft modifies.  Your stated cases match my
understanding of our original discussions on RFC1930. 

 Your reasons for deciding against rfc 6666 are interesting, I will re-read
RFC 6666.  As you've stated your reasons, I do not think the circumstances
match either the original intent of RFC1930 or the intent of the "MUST" or
"must" in the operational paragraph. 

Sue  


-----Original Message-----
From: Nick Hilliard [mailto:nick@foobar.org] 
Sent: Friday, December 21, 2012 6:43 AM
To: Susan Hares
Cc: 'Jon Mitchell'; idr@ietf.org; stbryant@cisco.com
Subject: Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00

On 20/12/2012 23:24, Susan Hares wrote:
> I'd be interested in you suggesting the situations would be valid to 
> leak the AS private path AS to a peer, before we downgrade to a "SHOULD".

the proposed text states: "If Private Use ASNs are used and prefixes are
originated from these ASNs which are destined to the Internet, Private Use
ASNs must be removed from the AS_PATH before being advertised to the global
Internet."

To start off, there's the usual problem: what do we mean when we talk about
"the Internet"?

In fact there's more to the situation.  We're dealing with operational stuff
here rather than protocol specification, i.e. human behaviour rather than
computer specifications.  I'd have no problem with throwing "MUST"
around when dealing with protocol handling, but when it gets to operational
stuff, I would be a lot more circumspect for several reasons:

- operational people will happily ignore a MUST if they feel it suits their
purpose at a specific time.

- the Internet is a bunch of interconnected networks and what works for
policy for one network peer might not work for another.

- I don't not have the wisdom or the foresight to predict every eventuality
where there might be legitimate reasons to forward a prefix with a private
ASN over an ebgp peer.

- I suspect most private asn leaks we see in the DFZ are accidental, and
MUST won't help in this situation.

- if this is specified as 2119-compatible MUST, vendors may be tempted to
hardwire an AS path prefix filter for ebgp sessions into their code in a way
which cannot be circumvented (in the same way that e.g. 169.254/16 is
hardwired and cannot be used in a bgp NLRI).  I'd see lots of value in
having a vendor default of not forwarding private ASNs, but I think this
could be quite harmful to have an absolute prohibition

Private ASN leaks are going to happen in two main circumstances: accidental
and deliberate.  I don't think that putting in "MUST" will actually deal
with either. What's important from an operational point of view is getting
vendors to implement a default but overrideable filter so that the bar for
accidental leaks is raised to a sufficiently high point that accidental
leaks are only going to happen when the safety nets are removed.

If we're going to make a statement on this one way or another, I think it
should be along the lines of SHOULD rather than MUST, and that we should
consider including a vendor hint to suggest that the default implementation
behaviour would be to filter private asns.

This complicates issues slightly because we get into an issue of semantics:
 does the prefix get dropped?  Or does the private ASN component get
stripped from the AS path?

In term of specific situations where this might be useful, yeah, mergers and
acquisitions would be one.  Others might include private peering between ASN
confederations.  Or interconnections between the large number of private
networks around the world, many of which use a mixture of private and public
ASNs.  Or test peerings.

Anyway, these were some of the issues that cropped up during the WG
discussion phase for rfc 6666.  We eventually decided to go with the idea of
making a recommendation that the prefix shouldn't be transferred over ebgp
sessions, and specifically made the point in the security section to
highlight it.  This avoided the issue of defining "the Internet", while
encapsulating what we wanted to say in the way that we wanted to say it.

Nick