Re: [Idr] IETF LC for IDR-ish document <draft-ietf-grow-bgp-reject-05.txt> (Default EBGP Route Propagation Behavior Without Policies) to Proposed Standard

Enke Chen <enkechen@cisco.com> Sun, 23 April 2017 20:01 UTC

Return-Path: <enkechen@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 693F6129446 for <idr@ietfa.amsl.com>; Sun, 23 Apr 2017 13:01:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.303
X-Spam-Level:
X-Spam-Status: No, score=-17.303 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-2.8, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OtqQByivcB2P for <idr@ietfa.amsl.com>; Sun, 23 Apr 2017 13:01:23 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1B32120727 for <idr@ietf.org>; Sun, 23 Apr 2017 13:01:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2260; q=dns/txt; s=iport; t=1492977683; x=1494187283; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=M5/tkrWTQ6W7dSXHlHgsABRu8nUVJjy4dutwsQDgC60=; b=jN9jjCQdmI5UM6pO96nmgAb/aktjxITmjAJw2DZ0S2/gB+ZcJIxufuew ZFAbu7+tVMKGBDMnhv19m6Lo5gfxZVwBtXayRlkH90tcyTutstUY2xrq9 aDF7Z+XtNotlk3QhWBrNbGKI3ptRVqY9R9qXPqlRMeo0LSswtmzHtdqK4 Y=;
X-IronPort-AV: E=Sophos;i="5.37,241,1488844800"; d="scan'208";a="240157042"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Apr 2017 20:01:23 +0000
Received: from [10.82.216.221] (rtp-vpn3-221.cisco.com [10.82.216.221]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id v3NK1MV6010172; Sun, 23 Apr 2017 20:01:22 GMT
To: Mikael Abrahamsson <swmike@swm.pp.se>
References: <68B29403-9AD9-4F06-9FE4-3F077E793D9F@puck.nether.net> <275cf744-1f64-bcbc-dabe-a47479921230@cisco.com> <20170420154142.lacvtplusepy3qcf@hanna.meerval.net> <b57162ec-f806-6e86-7713-58608f72c468@cisco.com> <32C0B4EE-6241-49F9-97F2-7107AC68678D@juniper.net> <e513849d-f895-0499-7bf4-5ecb24cadab7@cisco.com> <4CE4AF1E-0C80-423E-B19D-5750FCAFAD89@juniper.net> <23283_1492759950_58F9B58E_23283_375_1_53C29892C857584299CBF5D05346208A31CC352B@OPEXCLILM21.corporate.adroot.infra.ftgroup> <20170421084638.l6pbvtznfsxnq2wy@Vurt.local> <23291_1492766305_58F9CE61_23291_9725_1_53C29892C857584299CBF5D05346208A31CC399E@OPEXCLILM21.corporate.adroot.infra.ftgroup> <20170421095839.sralcy7aos5mzzic@Vurt.local> <d57ed214-945a-54b8-e04f-cb8610f789e4@cisco.com> <alpine.DEB.2.02.1704231447550.5591@uplift.swm.pp.se>
Cc: "idr@ietf.org" <idr@ietf.org>, Enke Chen <enkechen@cisco.com>
From: Enke Chen <enkechen@cisco.com>
Message-ID: <ee6e3ad8-d5c2-16c5-4464-3473d9a6443a@cisco.com>
Date: Sun, 23 Apr 2017 13:01:21 -0700
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <alpine.DEB.2.02.1704231447550.5591@uplift.swm.pp.se>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/VNxVdACNM5D0kt6-Q42vWgWEPe8>
Subject: Re: [Idr] IETF LC for IDR-ish document <draft-ietf-grow-bgp-reject-05.txt> (Default EBGP Route Propagation Behavior Without Policies) to Proposed Standard
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Apr 2017 20:01:25 -0000

Hi, Mikael:

On 4/23/17 5:56 AM, Mikael Abrahamsson wrote:
> On Fri, 21 Apr 2017, Enke Chen wrote:
> 
>> Job,
>>
>> IMO the most important point from the discussion is that any BGP extension
>> or behavior change must be backward compatible, which this document is lacking
>> or even missing.  After more than 20 years of BGP deployment, the world is no
>> longer "green field" any more.
> 
> I have been involved in running core networks since late 90ties. I've deployed
> several vendors gear. Yes, going from IOS to IOS XR with the change to XR having
> default deny if there is no policy, that was a single occasion "oh", and then I
> knew that. The good part here is that it's failsafe "close", so that you don't announce
> anything by accident. In IOS you have to basically paste two lines at once, with
> the first line being the creation of the neighbor, the second line being shutdown. 
> Then you can configure the rest. Otherwise there is a race condition in the immediacy
> of a per-line, immediate committing operating system such as IOS.

I think the premature session bring up is fixable. Your email has been forwarded to
the IOS development team.

> 
> This is just bad design. It's "fail open" default. If you somehow fail to paste that
> second shutdown line, you're now fully-open, announcing and accepting all routes.
> 
> If IOS would be changing its defaults, the CLI line migration code could by default
> insert a PERMIT-ALL policy statement, or some other means where an upgrade would keep 
the behaviour of the box intact across operating system versions.
> 
> So I fully support draft-ietf-grow-bgp-reject-05 because it just makes more operational
> sense than the old default that for instance IOS implements. We need default fail-close,
> because it just creates less problems than default fail-open.
> 

> If this doesn't make sense, why was it chosen for IOS XR back in the early 00ds?

I don't think that folks are saying this "deny all" doe not make sense.  When you
start a *new* software, certainly you are free to choose a default based on the most
up-to-date knowledge.

As I understand, that was the case for IOS XR as a new and separate software release.
 
Regards,  -- Enke