Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00

Jon Mitchell <jrmitche@puck.nether.net> Fri, 21 December 2012 14:34 UTC

Return-Path: <jrmitche@puck.nether.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A716B21F8546 for <idr@ietfa.amsl.com>; Fri, 21 Dec 2012 06:34:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.567
X-Spam-Level:
X-Spam-Status: No, score=-6.567 tagged_above=-999 required=5 tests=[AWL=0.032, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a4Ibhlosvhhf for <idr@ietfa.amsl.com>; Fri, 21 Dec 2012 06:34:21 -0800 (PST)
Received: from puck.nether.net (puck.nether.net [IPv6:2001:418:3f4::5]) by ietfa.amsl.com (Postfix) with ESMTP id D3E1221F8512 for <idr@ietf.org>; Fri, 21 Dec 2012 06:34:21 -0800 (PST)
Received: from puck.nether.net (puck.nether.net [204.42.254.5]) by puck.nether.net (8.14.4/8.14.4) with ESMTP id qBLEY8oP015484 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 21 Dec 2012 09:34:08 -0500
Received: (from jrmitche@localhost) by puck.nether.net (8.14.4/8.14.4/Submit) id qBLEY8Sb015483; Fri, 21 Dec 2012 09:34:08 -0500
Date: Fri, 21 Dec 2012 09:34:08 -0500
From: Jon Mitchell <jrmitche@puck.nether.net>
To: Nick Hilliard <nick@foobar.org>
Message-ID: <20121221143408.GC8731@puck.nether.net>
References: <50D328DC.2020906@umn.edu> <20121220152721.GA3551@puck.nether.net> <50D33972.8090302@umn.edu> <50D33D9D.3070400@foobar.org> <m2bodoodtx.wl%randy@psg.com> <020a01cddefc$dd1e5590$975b00b0$@ndzh.com> <20121220223820.GA19458@puck.nether.net> <50D3991B.2040809@foobar.org> <027701cddf09$1d074d90$5715e8b0$@ndzh.com> <50D44B5A.4080308@foobar.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <50D44B5A.4080308@foobar.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.6 (puck.nether.net [204.42.254.5]); Fri, 21 Dec 2012 09:34:08 -0500 (EST)
Cc: idr@ietf.org, Susan Hares <shares@ndzh.com>
Subject: Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Dec 2012 14:34:22 -0000

On Fri, Dec 21, 2012 at 11:43:22AM +0000, Nick Hilliard wrote:
> On 20/12/2012 23:24, Susan Hares wrote:
> > I'd be interested in you suggesting the situations would be valid to leak
> > the AS private path AS to a peer, before we downgrade to a "SHOULD". 
> 
> the proposed text states: "If Private Use ASNs are used and prefixes are
> originated from these ASNs which are destined to the Internet, Private Use
> ASNs must be removed from the AS_PATH before being advertised to the global
> Internet."
> 
> To start off, there's the usual problem: what do we mean when we talk about
> "the Internet"?

Terminology seems clear as outside of the "single organization" context
to which Private Use is defined?  This term is the same as in RFC 1930,
and I don't believe the leaks we see are due to semantic issues in that
document, nor future leaks will be based on mis-reading of this text.

> - operational people will happily ignore a MUST if they feel it suits their
> purpose at a specific time.

This is always true even for protocol specifications, implementers can
choose to forgo being RFC compliant for their own reasons.  At MUST it
will be obvious they are not in the right, if we soften it to should,
maybe the operators who ignore the SHOULD will say "the RFC didn't say I
MUST remove them" if asked to fix it?

> 
> - the Internet is a bunch of interconnected networks and what works for
> policy for one network peer might not work for another.

Private Use by definition should be not be seen on the Internet, we are
still awaiting the case where it should be seen outside a single
organization.

> 
> - I don't not have the wisdom or the foresight to predict every eventuality
> where there might be legitimate reasons to forward a prefix with a private
> ASN over an ebgp peer.

The draft doesn't say not to send to eBGP peers, just peers outside of
your organization.

> 
> - I suspect most private asn leaks we see in the DFZ are accidental, and
> MUST won't help in this situation.
> 

Nothing produced by IETF will help in this situation, however I think
IETF should specify what is the correct behavior.

> - if this is specified as 2119-compatible MUST, vendors may be tempted to
> hardwire an AS path prefix filter for ebgp sessions into their code in a
> way which cannot be circumvented (in the same way that e.g. 169.254/16 is
> hardwired and cannot be used in a bgp NLRI).  I'd see lots of value in
> having a vendor default of not forwarding private ASNs, but I think this
> could be quite harmful to have an absolute prohibition


Since this is not a protocol specification, I think this is personally
unlikely.  Given there is argueably (but not verifiably) many more
Private ASNs in use than Public ASNs, changing this default seems
unlikely.  Given the impact of leaked private ASNs versus leaked RFC
1918 space, and vendors not defaulting to not sending that, it would
seem unlikely this becomes a default.  But whether or not it does or not
is not likely going to be due to the operational considerations section
of this RFC in my opinion.

> 
> Private ASN leaks are going to happen in two main circumstances: accidental
> and deliberate.  I don't think that putting in "MUST" will actually deal
> with either. What's important from an operational point of view is getting
> vendors to implement a default but overrideable filter so that the bar for
> accidental leaks is raised to a sufficiently high point that accidental
> leaks are only going to happen when the safety nets are removed.

I agree that nothing in this IETF draft will likely solve the leak
problem, however at least someone might point to it as an indication of
what is correct or not.

> 
> If we're going to make a statement on this one way or another, I think it
> should be along the lines of SHOULD rather than MUST, and that we should
> consider including a vendor hint to suggest that the default implementation
> behaviour would be to filter private asns.

I don't think this draft nor this section is a good place to specify
vendor implementation behavior.  This was meant to be guidance for
operators in use of Private ASNs.

> 
> This complicates issues slightly because we get into an issue of semantics:
>  does the prefix get dropped?  Or does the private ASN component get
> stripped from the AS path?

Yes, if we take it out of operator control and into vendor
implementation guidance, these would become risks.

> 
> In term of specific situations where this might be useful, yeah, mergers
> and acquisitions would be one.  Others might include private peering
> between ASN confederations.  Or interconnections between the large number
> of private networks around the world, many of which use a mixture of
> private and public ASNs.  Or test peerings.

I think you are focusing on some possible vendor implementation that
doesn't exist that prevents Private Use ASN exchange over every eBGP
peering and is not configurable rather than the guidance to operators.
If ANY of these cases require routes to go to the global Internet,
Private Use ASNs MUST not be in the AS_PATH as the draft says.   If
these use cases are not for routes that go to the global Internet, the
statment didn't apply in the first place.

Jon