Re: [Idr] Fwd: I-D ACTION:draft-pmohapat-idr-acceptown-community-01.txt

"Ilya Varlashkin" <Ilya.Varlashkin@de.easynet.net> Wed, 30 April 2008 09:26 UTC

Return-Path: <idr-bounces@ietf.org>
X-Original-To: idr-archive@megatron.ietf.org
Delivered-To: ietfarch-idr-archive@core3.amsl.com
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B025C28C3A0; Wed, 30 Apr 2008 02:26:42 -0700 (PDT)
X-Original-To: idr@core3.amsl.com
Delivered-To: idr@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C7C2928C36B for <idr@core3.amsl.com>; Wed, 30 Apr 2008 02:26:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zMhtsxOl3lcQ for <idr@core3.amsl.com>; Wed, 30 Apr 2008 02:26:37 -0700 (PDT)
Received: from softy.ision.net (softy.ision.net [194.163.250.97]) by core3.amsl.com (Postfix) with ESMTP id 3C2983A690E for <idr@ietf.org>; Wed, 30 Apr 2008 02:26:07 -0700 (PDT)
Received: from paul.de.easynet.net ([195.180.208.152] helo=paul.adoffice.de.easynet.net) by softy.ision.net with esmtp (Exim 4.50) id 1Jr8Zk-0007E6-7p; Wed, 30 Apr 2008 11:26:08 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Wed, 30 Apr 2008 11:26:08 +0200
Message-ID: <7000E71D8C525042A815432358B2F1240138D45E@paul.adoffice.local.de.easynet.net>
In-Reply-To: <64E4CA6A-B8E4-4390-BDA6-39EF28E95AEA@tcb.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Idr] Fwd: I-D ACTION:draft-pmohapat-idr-acceptown-community-01.txt
Thread-Index: AciqfCRVickn4exISLyObOjsO0nbgQAJCx2w
References: <20080425213001.4EB133A69E7@core3.amsl.com> <64E4CA6A-B8E4-4390-BDA6-39EF28E95AEA@tcb.net>
From: Ilya Varlashkin <Ilya.Varlashkin@de.easynet.net>
To: Danny McPherson <danny@tcb.net>, idr idr <idr@ietf.org>
Subject: Re: [Idr] Fwd: I-D ACTION:draft-pmohapat-idr-acceptown-community-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: idr-bounces@ietf.org
Errors-To: idr-bounces@ietf.org

> -----Original Message-----
> From: idr-bounces@ietf.org [mailto:idr-bounces@ietf.org] On 
> Behalf Of Danny McPherson
> Sent: Wednesday, April 30, 2008 6:39 AM
> To: idr idr
> Subject: [Idr] Fwd: I-D 
> ACTION:draft-pmohapat-idr-acceptown-community-01.txt
> 
> 	
> Surprisingly, I don't recall seeing this draft discussed here yet.
> 
> In short, I think the is a really bad idea.  It's bad enough 
> the route reflection spec was changed from 1966 to 2796 to 
> permit an RR to reflect routes to a client even if they were 
> learned from that client - arguably, to enable an 
> implementation optimization, but for this to recommend a 
> well-known community and further recommend disabling RFC 1966 
> "suppression" on the RR if the BGP community is present in 
> order to save configuration overhead on the PEs is going a 
> bit overboard.
> 

I share Danny's view regarding this proposal. To me it seems like
ACCEPT_OWN doesn't add anything what is not possible today, while
potentially creates opportunities for new bugs in the heart of BGP route
handling both on RR and edge routers; as well as, from operational
prospective, undermining stable operations of the route reflector(s). 

Often operations of the core network and the edge are split between
different teams, and route reflectors are often operated by the core
team who needs to ensure that network runs fine as whole, once setup
RR's are usually left intact. ACCEPT_OWN implies that policies regarding
inter-VPN route import/export will shift from the edge to the core,
while still being operated by edge/access team. Due to misconfiguration
on RR during manipulation of inter-VPN policies, there will be risk to
affect routing stability of the whole network, which is bad idea.

Usually RR's do not have specific VPN's defined and just relay routes
based on generic BGP rules. ACCEPT_OWN will require RR to be aware at
least of some VPN's (many in fact, else it doesn't make sense). This
will require extra work on RR part, extra data structures, code, meaning
more opportunities for things to go wrong.

Next, it's quite possible that for the path optimisations BGP clients
will peer not only with RR, but also between themselves and
client-to-client reflection is disabled. This will break integrity of
the routing information within AS since RR will send modified updates
only to non-clients, while clients within the cluster will still have
original unmodified information about given prefix.

Last, same functionality as offered by ACCEPT_OWN is reasonably easy
implemented on PE via generic policies that are setup once VRF
provisioned. Complexity that is necessary to mark prefixes with
ACCEPT_OWN community is on par with complexity necessary to tag prefixes
with something else and use generic policies locally on PE. So at the
end of the day, moving policies to RR isn't magic bullet that will
eliminate need for any work on PE, and on the other hand efficient
generic policies can make PE configuration as easy as it would be done
on RR.

Kind regards,
iLya
_______________________________________________
Idr mailing list
Idr@ietf.org
https://www.ietf.org/mailman/listinfo/idr