[Idr] I-D Action: draft-ietf-idr-flowspec-interfaceset-03.txt

internet-drafts@ietf.org Sat, 11 March 2017 15:17 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: idr@ietf.org
Delivered-To: idr@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 83FBB129479; Sat, 11 Mar 2017 07:17:07 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.47.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <148924542752.2884.13750476757955011040@ietfa.amsl.com>
Date: Sat, 11 Mar 2017 07:17:07 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/NeLPmYrX1SIZrxGkyhN1HmzhAv4>
Cc: idr@ietf.org
Subject: [Idr] I-D Action: draft-ietf-idr-flowspec-interfaceset-03.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.17
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Mar 2017 15:17:07 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Inter-Domain Routing of the IETF.

        Title           : Applying BGP flowspec rules on a specific interface set
        Authors         : Stephane Litkowski
                          Adam Simpson
                          Keyur Patel
                          Jeff Haas
                          Lucy Yong
	Filename        : draft-ietf-idr-flowspec-interfaceset-03.txt
	Pages           : 15
	Date            : 2017-03-11

   BGP flowspec is an extension to BGP that allows for the dissemination
   of traffic flow specification rules.  The primary application of this
   extension is DDoS mitigation where the flowspec rules are applied in
   most cases to all peering routers of the network.

   This document will present another use case of BGP flowspec where
   flow specifications are used to maintain some access control lists at
   network boundary.  BGP flowspec is a very efficient distributing
   machinery that can help in saving OPEX while deploying/updating ACLs.
   This new application requires flow specification rules to be applied
   only on a specific subset of interfaces and in a specific direction.

   The current specification of BGP flowspec ([RFC5575]) introduces the
   notion of flow specification (which describes the matching criterion)
   and traffic filtering actions.  The flow specification is encoded as
   part of the NLRI while the traffic filtering actions are encoded as
   extended communities.  The combination of a flow specification and
   one or more actions is known as a flow specification rule.  [RFC5575]
   does not detail where the flow specification rules need to be

   Besides the flow specification and traffic filtering actions, this
   document introduces the notion of traffic filtering scope in order to
   drive where a particular rule must be applied.  In particular, this
   document introduces the "interface-set" traffic filtering scope that
   could be used in parallel of traffic filtering actions (marking,
   rate-limiting ...).  The purpose of this extension is to inform
   remote routers about groups of interfaces where the rule must be

   This extension can also be used in a DDoS mitigation context where a
   provider wants to apply the filtering only on specific peers.

The IETF datatracker status page for this draft is:

There's also a htmlized version available at:

A diff from the previous version is available at:

Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at: