Re: [Idr] I-D Action: draft-ietf-idr-bgp-open-policy-15.txt

Alejandro Acosta <alejandroacostaalamo@gmail.com> Tue, 19 January 2021 16:10 UTC

Return-Path: <alejandroacostaalamo@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 589A83A1629 for <idr@ietfa.amsl.com>; Tue, 19 Jan 2021 08:10:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.36
X-Spam-Level:
X-Spam-Status: No, score=-2.36 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.262, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ChFRsoHn1Ist for <idr@ietfa.amsl.com>; Tue, 19 Jan 2021 08:10:18 -0800 (PST)
Received: from mail-qt1-x831.google.com (mail-qt1-x831.google.com [IPv6:2607:f8b0:4864:20::831]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A26A63A15FF for <idr@ietf.org>; Tue, 19 Jan 2021 08:10:18 -0800 (PST)
Received: by mail-qt1-x831.google.com with SMTP id z6so6980431qtn.0 for <idr@ietf.org>; Tue, 19 Jan 2021 08:10:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:from:to:references:message-id:date:user-agent:mime-version :in-reply-to:content-transfer-encoding:content-language; bh=6pqsnacdsBVCC5bCPMKOcIfQcvqomPGsGC8JdaUeQ/4=; b=bEylxucDDc5kPHLkBArH0ikIhBVjJNsPAjCvAs1LJLSF0nM06WfdDUtigHwehMkimA dPZ1gacbgE2vMIlF/8dqNhO3qyJoR0+JJYv+AdHw2/1GGpxySM32dy+XTxM9shBR6ZLR rodEXsIeBvQIY/XxNVTGHLCZvkA/xqvxXgEcD50SAQLyqww5MpZMN8Ns7dn30Hxr6ggB LE6coHDlYhFMlE5dkkNTcydPcO39d2XDvGnx4QMblGSxVSuYCvRNTFF3JYOI8ALgXskE jCfvE1r9Shx49No8Ck5mMxUZr/5CuQK/1D5wiW/Km+YRsu4rFJ5pX4FMCNXF8XJRlh4w QKyw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:from:to:references:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=6pqsnacdsBVCC5bCPMKOcIfQcvqomPGsGC8JdaUeQ/4=; b=cMkUTVkU/HqNRK4JSDFLVk+lT6FoLWkNuPa+K1tF0JTPZI6C0hsWUHZpwKeDWQKEiZ phlOw1A4OBbtYAm9zabbgCj/mBkkoqoBlkLstR7Dymr2scTa67+8U4RZxg7/AYViflJz qSRAZ0QdWaWBdSRoxUP7yqKyI8Y/MyjA11bSKY2PGf5NuVmMMMp43IbeMR/6MyD3iosD jZQI/GLQeShMJ3BF6fb8JrlP93IX28CHUtQDNKwgu7yhObvdrdkZyIqCB4Ny2LOLIcZK aQb3ZWtBTGg1mzkhHm6peVqXmZ1UwfpmEVIJU8wpAPRZsDR44CfoZpbk+SuDXxf5TdU3 cksg==
X-Gm-Message-State: AOAM530iJPfSGx6puuzUKty4K2/ja4g/3i5/Yf8FDDFRlQPiPBEjf/jo ARSh+uWyHGBqCOzxpVZ9XWNroeUShfI7ZzB2
X-Google-Smtp-Source: ABdhPJwx5h/dM+qEN9MrunAd0C2oU2bO1LXMAbkeQaYxzQxgsCJ5evYH8fkX6uP5XPD0dZI/gYnfLA==
X-Received: by 2002:ac8:4717:: with SMTP id f23mr4882452qtp.188.1611072617369; Tue, 19 Jan 2021 08:10:17 -0800 (PST)
Received: from Windows10AnyBody.local ([2001:470:5:516:cdbc:868e:d056:e643]) by smtp.gmail.com with ESMTPSA id l191sm13202355qke.7.2021.01.19.08.10.15 for <idr@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 19 Jan 2021 08:10:16 -0800 (PST)
From: Alejandro Acosta <alejandroacostaalamo@gmail.com>
To: idr@ietf.org
References: <161081288638.19019.5456683696650869664@ietfa.amsl.com> <1fcc652f-bf7c-9389-33d9-ad73b6519827@gmail.com>
Message-ID: <0f05da54-faa8-eb8e-9f57-c4d98ede03db@gmail.com>
Date: Tue, 19 Jan 2021 12:10:11 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.16; rv:78.0) Gecko/20100101 Thunderbird/78.6.1
MIME-Version: 1.0
In-Reply-To: <1fcc652f-bf7c-9389-33d9-ad73b6519827@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/SIpyb1SC_Cahlwa4Ew4ED-EDwT0>
Subject: Re: [Idr] I-D Action: draft-ietf-idr-bgp-open-policy-15.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Jan 2021 16:10:25 -0000

Hello,

   So sorry, I just found this:

https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-open-policy


Thanks,


Alejandro,


On 19/1/21 11:51 AM, Alejandro Acosta wrote:
> Hello,
>
>   I know it's late and this draft was already asked for publication 
> (congratulations). I think this is a terrific job and I can  imagine 
> different scenarios.
>
>   I wonder if there is already some working code somewhere?, probably 
> some beta code for quagga, frr, etc?.
>
>
> Thanks,
>
>
> Alejandro,
>
>
> On 16/1/21 12:01 PM, internet-drafts@ietf.org wrote:
>> A New Internet-Draft is available from the on-line Internet-Drafts 
>> directories.
>> This draft is a work item of the Inter-Domain Routing WG of the IETF.
>>
>>          Title           : Route Leak Prevention using Roles in 
>> Update and Open messages
>>          Authors         : Alexander Azimov
>>                            Eugene Bogomazov
>>                            Randy Bush
>>                            Keyur Patel
>>                            Kotikalapudi Sriram
>>     Filename        : draft-ietf-idr-bgp-open-policy-15.txt
>>     Pages           : 11
>>     Date            : 2021-01-16
>>
>> Abstract:
>>     Route leaks are the propagation of BGP prefixes which violate
>>     assumptions of BGP topology relationships; e.g. passing a route
>>     learned from one lateral peer to another lateral peer or a transit
>>     provider, passing a route learned from one transit provider to
>>     another transit provider or a lateral peer.  Existing approaches to
>>     leak prevention rely on marking routes by operator configuration,
>>     with no check that the configuration corresponds to that of the eBGP
>>     neighbor, or enforcement that the two eBGP speakers agree on the
>>     relationship.  This document enhances BGP OPEN to establish 
>> agreement
>>     of the (peer, customer, provider, Route Server, Route Server client)
>>     relationship of two neighboring eBGP speakers to enforce appropriate
>>     configuration on both sides.  Propagated routes are then marked with
>>     an Only to Customer (OTC) attribute according to the agreed
>>     relationship, allowing both prevention and detection of route leaks.
>>
>>
>>
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-ietf-idr-bgp-open-policy/
>>
>> There are also htmlized versions available at:
>> https://tools.ietf.org/html/draft-ietf-idr-bgp-open-policy-15
>> https://datatracker.ietf.org/doc/html/draft-ietf-idr-bgp-open-policy-15
>>
>> A diff from the previous version is available at:
>> https://www.ietf.org/rfcdiff?url2=draft-ietf-idr-bgp-open-policy-15
>>
>>
>> Please note that it may take a couple of minutes from the time of 
>> submission
>> until the htmlized version and diff are available at tools.ietf.org.
>>
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>
>>
>> _______________________________________________
>> Idr mailing list
>> Idr@ietf.org
>> https://www.ietf.org/mailman/listinfo/idr