Re: [Idr] Fwd: New Version Notification for draft-spaghetti-idr-bgp-sendholdtimer-05.txt

heasley <heas@shrubbery.net> Thu, 04 August 2022 19:32 UTC

Return-Path: <heas@shrubbery.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80EBEC157B48 for <idr@ietfa.amsl.com>; Thu, 4 Aug 2022 12:32:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aFaNB3S29l_R for <idr@ietfa.amsl.com>; Thu, 4 Aug 2022 12:32:02 -0700 (PDT)
Received: from sea.shrubbery.net (sea.shrubbery.net [129.250.47.99]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20002C157B4F for <idr@ietf.org>; Thu, 4 Aug 2022 12:32:01 -0700 (PDT)
Received: by sea.shrubbery.net (Postfix, from userid 7053) id 18A3A394E7D; Thu, 4 Aug 2022 19:32:01 +0000 (UTC)
Date: Thu, 04 Aug 2022 19:32:01 +0000
From: heasley <heas@shrubbery.net>
To: Robert Raszuk <robert@raszuk.net>
Cc: heasley <heas@shrubbery.net>, Ben Cox <ben=40benjojo.co.uk@dmarc.ietf.org>, "idr@ietf. org" <idr@ietf.org>
Message-ID: <YuwesdSd7y857JxS@shrubbery.net>
References: <CAOj+MMGR4f3eLEDZY++1m4Lpo9joG4L9OrWbeF6kREn-9a9onA@mail.gmail.com> <c6e44213-7667-0f67-71a4-634411cd102b@foobar.org> <CAOj+MMFajL6E42WCzC0ZqrfSBZjU-0B=ZzmtvCRPkuMzU8z5QA@mail.gmail.com> <Yun6e5jSb0OYZGAX@shrubbery.net> <CAOj+MMFRJr=cs+5DVOp72BVn_j3NgANwNftyj=jRbdsvPpg-wA@mail.gmail.com> <CANJ8pZ9oNvd0CGEbOQQpeZ1Sf-=ctVy8yhD0XFK-qYiE08BZUA@mail.gmail.com> <CAL=9YSX-iXEOQrERA5M_ZbG68UmgacchdODk7uwT3p0ZjLgJow@mail.gmail.com> <CAOj+MMFTikXbAC81mU7SiUHFq==5y5k9cSMK91B5YGVfAQLEvQ@mail.gmail.com> <YuwU6hQK4ywdM5ho@shrubbery.net> <CAOj+MMFUGhNhEE=Y3i57kgFLjkPX_URkqrBam80RqJ4SB3WYQQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAOj+MMFUGhNhEE=Y3i57kgFLjkPX_URkqrBam80RqJ4SB3WYQQ@mail.gmail.com>
X-PGPkey: http://www.shrubbery.net/~heas/public-key.asc
X-note: live free, or die!
X-homer: i just want to have a beer while i am caring.
X-Claimation: an engineer needs a manager like a fish needs a bicycle
X-reality: only YOU can put an end to the embarrassment that is Tom Cruise
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/QQ5Y1znBMMYXmpnFVmUrKZ6-JrE>
Subject: Re: [Idr] Fwd: New Version Notification for draft-spaghetti-idr-bgp-sendholdtimer-05.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Aug 2022 19:32:02 -0000

Thu, Aug 04, 2022 at 08:56:43PM +0200, Robert Raszuk:
> Thx for the example. Of course UPDATES work as KEEPALIVES, but this case
> seems to be about not reading/draining either.

yes, as has been mentioned several times on this thread, there are cases
where the remote never drains the socket for days or more.  A bug, clearly.

> The current draft for adoption already recommends mangling with BGP State
> Machine. If we go and solve it at TCP no change to BGP State Machine is
> needed. So this is more than implementation choice.

you mean alter; mangling is your opinion.

RFC7606 is an example of altering BGP to accomodate broken implementations
and, while I personally would prefer a way to punish the broken
implementation, the RFC explains how that is not possible and this is a
reasonable way to address the problem.  This draft seems similar in this
respect.

Tell us how to fix it in TCP.  Jeff has already explained how it would
not necessarily address the problem, depending upon how an implementation
separates the TCP and BGP.  TCP KAs may (probably will) continue to work,
so what else is there?

> So assume we bring the session back. Do we require manual UP ?

IMO, implementation/operator decision.  Could be like existing
max-prefix exceeded implementations.  This also seems like a post-adoption
discussion item; whether the draft makes any recommendation at all.