Re: [Idr] IETF LC for IDR-ish document <draft-ietf-grow-bgp-reject-05.txt> (Default EBGP Route Propagation Behavior Without Policies) to Proposed Standard

Robert Raszuk <robert@raszuk.net> Fri, 21 April 2017 15:19 UTC

Return-Path: <rraszuk@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16C25129516 for <idr@ietfa.amsl.com>; Fri, 21 Apr 2017 08:19:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.698
X-Spam-Level:
X-Spam-Status: No, score=-1.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kasy3UJ3Zprr for <idr@ietfa.amsl.com>; Fri, 21 Apr 2017 08:19:30 -0700 (PDT)
Received: from mail-oi0-x229.google.com (mail-oi0-x229.google.com [IPv6:2607:f8b0:4003:c06::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DF49127868 for <idr@ietf.org>; Fri, 21 Apr 2017 08:19:30 -0700 (PDT)
Received: by mail-oi0-x229.google.com with SMTP id s131so12961887oia.3 for <idr@ietf.org>; Fri, 21 Apr 2017 08:19:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=mUZi4me+xBv0N8Ltbr592tYF8/v8e1VOajshLfKp/f4=; b=u30JPOqB3LDAUCvjC0H241jZeI0WHtr254GlnddJ5s6zSHmzr7T/YS7rgkPJZQ429G DWytE9dEFO2+qpcPvwwmSmiG96MCvDL5Njc85HVvkA91m92Zjwhx9jnXCEBfs8vC7F8m cgOlbSYvvtU9Drpe94jQflF4QAWBn3wNh9eURLQ4ml4+ynYrxRFM4HCS9Q8KdptKFm4+ kSW/7O6O4cSxBc9S+6Vjna0SxkfHl24mccsfMt9xrjKFT1ARvqjBlRi07s+0Zsu5vNUI p7VFVwZlxzq2SUsop2mqC7YyZkbz2woJniQpbgmpIZbj4560NXdm/AUdau/m83c8QX0o mXcw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=mUZi4me+xBv0N8Ltbr592tYF8/v8e1VOajshLfKp/f4=; b=ZS9Llq6BxghCbk6SndOshsR6/T5sv+tAh+3LuyrcJzwGLWi+rw4PexBEqpdx7mJHrI hZ1AkLlNrarX4i9RvGiTk3sIIgQSfQPM4xS+livWd8+kNSbd1zrFfztlrZT0xtF00p6u ABG3bbkMsILNs6c0p3MPXnGWincsT36uCSoMHMOdSqxEndAW5lwKgmPhHSALYDYyx8BL MuD9IZxpieFbqbaT4vH2w70OnSzCSag2OtfY7B/gAY4Ypf6+B0jrruatInobdyCo3KB0 PvV7jCk3LhheHeLW2J38F0X19UNpWoEAhkWxKdJxMOUvOmmPe2laNFBvn69Vde0O8RYB s90g==
X-Gm-Message-State: AN3rC/6fEW0iyjNMry9eWkyRDbV4vhXMLwa+MN7jDEq9pG7OexzfG79y Q6Za0w+bUvOUsF8l+BLyUFhfnwhgtw==
X-Received: by 10.36.115.12 with SMTP id y12mr10887683itb.24.1492787969558; Fri, 21 Apr 2017 08:19:29 -0700 (PDT)
MIME-Version: 1.0
Sender: rraszuk@gmail.com
Received: by 10.79.170.4 with HTTP; Fri, 21 Apr 2017 08:19:28 -0700 (PDT)
In-Reply-To: <1334_1492785121_58FA17E1_1334_3109_1_53C29892C857584299CBF5D05346208A31CC4307@OPEXCLILM21.corporate.adroot.infra.ftgroup>
References: <20170420154142.lacvtplusepy3qcf@hanna.meerval.net> <b57162ec-f806-6e86-7713-58608f72c468@cisco.com> <20170420160736.GB15676@puck.nether.net> <75AC1A50-3DF8-4852-8FC6-BC302B121946@cisco.com> <CAH1iCirf=ha1mrw8EUzPp34R-DF=4J+=aFyMwVn2udi1UKNifw@mail.gmail.com> <CA+wi2hMPYcwbNhHtuWKWUXb4Lg3x81p786yLqeNEHFV1okGRvg@mail.gmail.com> <dc04fe80-f844-29b1-2676-8f2bbda0ecbe@juniper.net> <28014_1492762849_58F9C0E0_28014_6541_1_53C29892C857584299CBF5D05346208A31CC3773@OPEXCLILM21.corporate.adroot.infra.ftgroup> <20170421090145.f5yuhimb4qg7knrf@Vurt.local> <19977_1492775899_58F9F3DB_19977_3102_1_53C29892C857584299CBF5D05346208A31CC3DAC@OPEXCLILM21.corporate.adroot.infra.ftgroup> <20170421124011.mdxpyoijvfh7eus4@Vurt.local> <1334_1492785121_58FA17E1_1334_3109_1_53C29892C857584299CBF5D05346208A31CC4307@OPEXCLILM21.corporate.adroot.infra.ftgroup>
From: Robert Raszuk <robert@raszuk.net>
Date: Fri, 21 Apr 2017 17:19:28 +0200
X-Google-Sender-Auth: fDu7AM9Smj4t1JXZtwRanDRJoXE
Message-ID: <CA+b+ERn1vX_b20CGyNbck+_Gm0Dt=fqnxqWzdqHmHiPKNTWD_Q@mail.gmail.com>
To: "bruno.decraene@orange.com" <bruno.decraene@orange.com>
Cc: Job Snijders <job@instituut.net>, "idr@ietf.org" <idr@ietf.org>
Content-Type: multipart/alternative; boundary="001a11444dcaa6af35054daec8fa"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/Jazu56wMWk0tcxgOk9jzC0A9UF4>
Subject: Re: [Idr] IETF LC for IDR-ish document <draft-ietf-grow-bgp-reject-05.txt> (Default EBGP Route Propagation Behavior Without Policies) to Proposed Standard
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Apr 2017 15:19:33 -0000

One final point ...

> - An operator is likely to blindly copy paste the new key word (enable
policy
> "no filtering")  as part of configuring the session. In which case the
gain would
> be minimal

Exactly !

The draft assumes that there are operators managing those 55000 ASes who
already do know today what to put in their BGP policy and they are not
doing
it only because they are lazy and their vendor does not enforce them to do
it.

Are we really that bad in Internet NOCs ? Do we need configuration
enforcement
and RFCs like this ?

Wouldn't it be a much better to instead share a pointer to Best Practices
for EBGP
Policy Configuration wiki and even include such URL in deployment section
of the draft
under discussion ?

Thx,
r.


On Fri, Apr 21, 2017 at 4:32 PM, <bruno.decraene@orange.com> wrote:

> Job,
>
>  > From: Job Snijders [mailto:job@instituut.net]  > Sent: Friday, April
> 21, 2017 2:40 PM
> > EBGP Route Propagation Behavior Without Policies) to Proposed Standard
>  >
>  > On Fri, Apr 21, 2017 at 11:58:18AM +0000, bruno.decraene@orange.com
> wrote:
>  > > > From: Job Snijders [mailto:job@instituut.net]  > Sent: Friday,
> April 21, 2017 11:02 AM
>  > >  > You create a false dilemma stating that it is not clear to you
>  > >  > whether this is a "requirement draft or a solution draft",
>  > >
>  > > That editorial point should be easy to address.
>  > >
>  > > > and that those need to be separate.
>  > >
>  > > I've not said that.
>  >
>  > The use of the word 'or' in your sentence """it's not clear whether this
>  > draft is a requirement draft or a solution draft.""" led me to believe
>  > that you assert the two are mutually exclusive. Furthermore, from the
>  > context it appears that you recommend to abandon 'bgp-reject', start
>  > over with a requirements document, and then see what happens. If this is
>  > not the case please elaborate, and accept my apologies for interpreting
>  > it as I did.
>
> Thanks for the clarification.
> On my side, I don't think that there is a need for a dedicated problem
> statement document. IMHO the place for this problem statement is in the
> Introduction section of you document.
>
>  > >  > Did you review Alvaro's suggested changes which prompted the third
> IDR
>  > >  > consultation on this topic? They are viewable here:
>  > >  >
>  > >  >     http://htmlpreview.github.io/?https://github.com/jaredmauch/
> draft-mauch-bgp-
>  > >  > reject/blob/alvaro/draft-ietf-grow-bgp-reject-06-from-5.diff.html
>  > >
>  > > I was discussing the current version of the draft and comments sent on
>  > > the mailing list (e.g less than 24 hours ago, one author commented
>  > > that it does not believe that this document should be changed to
>  > > update RFC 4271: " I believe that Alvaro is wrong in the presumption
>  > > this document updates 4271. ".
>  > > I was not aware of this private repository. Indeed, this candidate
>  > > version is significantly different than the public one.
>  >
>  > The link to the publicly available private repository was meant as a
>  > convenience to you and the WG. It is a verbatim repetition of Alvaro's
>  > suggestions which were emailed to idr@ on April 18th. I hoped to make
>  > Alvaro's comments easier to read by creating the HTML rfcdiff. Did you
>  > perhaps miss that message?
>  >
>  >     https://mailarchive.ietf.org/arch/msg/idr/
> gU6sk8yrC3uF7aLERwnDh2cuFP4
>
> I had read Alvaro's email.
> What I had missed is the link to the private repository, and then its
> meaning. I had though (apparently incorrectly, sorry for this) that this
> were the candidate -06 that authors were working on. i.e. the latest
> "current" status of the draft. From your above clarification, this is not,
> and -05 is the latest version.
>
>  > >  > I'm disappointed that you've taken a CLI example I've provided as
>  > >  > the sole driver behind this effort. I did not mean to offer the CLI
>  > >  > example as an exhaustive list of reasons.
>  > >
>  > > That this incorrect: I've commented on this driver, plus the ones
>  > > indicated in the draft. What's missing has been authors' answer for
>  > > those requests for clarification.  For the third time, could authors
>  > > please document in the draft the drivers and the goal(s) that this
>  > > document aims at achieving. Then we'll be able to take into account
>  > > all drivers, plus authors will get IDR attention to their operational
>  > > feedback. Should be win-win.
>  >
>  > Please review the Introduction section of draft-ietf-grow-bgp-reject-05.
>  >
>  > Should you fail to identify drivers and goals in that section, can you
>  > elaborate what it is you do read in that section?
>
> I had tried in https://mailarchive.ietf.org/arch/msg/idr/
> 9Qn2bHQw1QIruWMCJIoEN0Z-qC4 but can try again below
>
>
> "   There are BGP routing security issues that need to be addressed to
> make the Internet more stable."
> Agreed, but not very specific. At least this does not present the specific
> points that this document wants to address/solve. (believe me, I wish you
> would address all BGP routing security issues but we probably do not want
> to put the bar too high, as it would be too hard to succeed)
>
> "  Route leaks [RFC7908] are part of the  problem, but software defects or
> operator misconfigurations can  contribute too."
> - I agree that route leak is an important issue. But they seem to be
> already worked on by draft-ymbk-idr-bgp-open-policy or
> draft-ietf-idr-route-leak-detection-mitigation. Plus this document is not
> a general solution to route leak, so this is also not the point that this
> document wants to address (because otherwise, it failed)
> - Software defect won't probably be addressed by this proposal.
> - Misconfiguration won't probably be addressed by this proposal. In
> particular no effort is made to ensure that the export/import policy is
> good/correct.
>
> "   Many deployed BGP speakers send and accept any and all route
>    announcements between their BGP neighbors by default.  This practice
>    dates back to the early days of the Internet, where operators were
>    permissive in sending routing information to allow all networks to
>    reach each other.  As the Internet has become more densely
>    interconnected, the risk of a misbehaving BGP speaker poses
>    significant risks to Internet routing."
>
> Ok, this is a statement of facts. But:
> All BGP speakers requires configuration to establish an EBGP session. When
> doing this configuration, the operator needs to apply the right policy.
> But this draft is not helping to solve "the right" policy issue. All it
> requires is an additional configuration key word. This is an improvement
> but:
> - This does not cover configuration mistakes.
> - An operator is likely to blindly copy paste the new key word (enable
> policy "no filtering")  as part of configuring the session. In which case
> the gain would be minimal
>
> It's also not clear to me if we can assume that the operator is a
> reasonable guy which wants to do the good thing, but failed because of a
> mistake or an improper configuration tool; or if this operator just does
> not give a damn.
> IMHO, given that the guy/company is an operator doing this to get money, I
> would personally opt for the former. In which case, he could be asked and
> should be happy to add one single configuration line to enable those new
> default behaviors. This alone would address my concern. In addition, as
> this document requires a software upgrade, one could signal this new
> behavior in the BGP Open, such that you could check by yourself.
>
>
> "   This specification intends to improve this situation by requiring the
>    explicit configuration of a BGP import and export policy for any
>    External BGP (EBGP) session such as customers, peers, or
>    confederation boundaries for all enabled address families.  When this
>    solution is implemented, BGP speakers do not accept or send routes
>    without policies configured on EBGP sessions."
>
> That is not part of the problem statement but a summary of the solution.
> (yet, a useful summary as part of the Introduction)
>
>
>  > I find it hard to believe that the Introduction passed through SECDIR,
>  > RTGDIR, GENART, OPSDIR, and GROW Last Call, and was clear to those
>  > involved, yet you indicate that drivers & goals are not clear, I am not
>  > sure what I can do to further your understanding in that regard.
>
> I find it equally hard that nobody complains on the impact/cost in term of
> existing EBGP configuration missing the new required policy, and impact on
> service provisioning tools (while they are notoriously heavy, expensive and
> not very flexible).
> Plus I'm not saying that this document has no benefit. I'm saying that it
> also has cost. And by carefully considering both, we could probably find a
> tradeoff satisfying all parties (that's my optimistic side, but just like
> anybody I can be wrong)
>
>
> Given my vision of the cost/benefit, in term of solution I think that the
> below change would be reasonable tradeoff. At least it would address my
> main concern:
>
> OLD:  A BGP speaker MAY provide a configuration option to disable the
> preceding behaviors, but it MUST implement them by default.
> NEW: A BGP speaker MUST provide a configuration option to enable the
> preceding behaviors. Until network/service provisioning are upgraded, it
> SHOULD be disabled by default. Such provisioning tools should be upgraded
> soon is order to prepare for the future new default behavior.
>
> Optionally, on the solution side:
> - I would also support the addition of a BGP capability to signal whether
> this behavior is enabled or not. This would allow an EBGP peer to reject
> the EBGP session if the configuration is not acceptable to them. But I can
> live without.
> - I would prefer that the BGP session be closed, rather than keeping it up
> and not considering the received routes/not sending routes.
>
> Thanks,
> Kind regards,
> --Bruno
>
>  > Kind regards,
>  >
>  > Job
>
> ____________________________________________________________
> _____________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez
> recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou
> falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and
> delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.
>
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr
>