Re: [Idr] WG adoption call for draft-xu-idr-neighbor-autodiscovery

Eric C Rosen <erosen@juniper.net> Thu, 12 July 2018 15:33 UTC

Return-Path: <erosen@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69DFF130E8E; Thu, 12 Jul 2018 08:33:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x2Maet_fhsrx; Thu, 12 Jul 2018 08:33:21 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E152B130EA7; Thu, 12 Jul 2018 08:33:19 -0700 (PDT)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w6CEYOcC007831; Thu, 12 Jul 2018 07:35:19 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type; s=PPS1017; bh=E/TmHHbkI/omvnoPSOr2jZZXydM3SEOEGjokTz1NW4Y=; b=HyDaSgYbkRaDEOmrTvtOpc4fPUBiTyX2VYI45/ucVHpWTNG4/zFfJxe75cBhlv7VL9+v j2+uuEzGk8WVv8NwaIFhOfvGzE3275k24BFKi4YdsPtU0lnrIpeVHzHKWdWwc3ejd7W6 HEQt5mEFuVekduOGMEfcubj7XQ1vaHhqBkp6bOMlPOsRJ0ovHUR9h/9nCQy7DROSvUth xNSM74FzuL/cz4ZrDFyGu/FslPFGUiyfXb00IhkdZv7CpXHfye/fTz4tp3KpGwZjAskM UsRjNmQ+NiZAQnFv4/6jwbo9dj773Yi4+dyOijVK2MnECeAQc2cchVCJEMnShBb4rL61 dQ==
Received: from nam02-bl2-obe.outbound.protection.outlook.com (mail-bl2nam02lp0087.outbound.protection.outlook.com [207.46.163.87]) by mx0a-00273201.pphosted.com with ESMTP id 2k622y0wuu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 12 Jul 2018 07:35:19 -0700
Received: from [172.29.35.4] (66.129.241.10) by CY4PR0501MB3859.namprd05.prod.outlook.com (2603:10b6:910:90::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.952.15; Thu, 12 Jul 2018 14:35:15 +0000
To: Susan Hares <shares@ndzh.com>, idr@ietf.org
Cc: draft-xu-idr-neighbor-autodiscovery@ietf.org
References: <013701d41227$579d2d10$06d78730$@ndzh.com>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <d0ae2da8-e932-84f2-f634-3e0f280a6fb5@juniper.net>
Date: Thu, 12 Jul 2018 10:35:12 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0
MIME-Version: 1.0
In-Reply-To: <013701d41227$579d2d10$06d78730$@ndzh.com>
Content-Type: multipart/alternative; boundary="------------C938491F718AAC7BA07682D3"
Content-Language: en-US
X-Originating-IP: [66.129.241.10]
X-ClientProxiedBy: BYAPR02CA0037.namprd02.prod.outlook.com (2603:10b6:a03:54::14) To CY4PR0501MB3859.namprd05.prod.outlook.com (2603:10b6:910:90::20)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0ad0c2ca-ce43-4625-fe56-08d5e804afbe
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(2017052603328)(7153060)(7193020); SRVR:CY4PR0501MB3859;
X-Microsoft-Exchange-Diagnostics: 1; CY4PR0501MB3859; 3:lkYM1aAXsGgroPEi69zMrto9/EVqnd+thngntnxgcOripmMTGMytQS3srDLFv6QWjTloWzygHJ+RggPrb7ZMdB24nN6j6HsZC3UR1UhLGIiJfU/ecmfS9mHwQAJB/k6ZkYIgdFLO6yBO7WEZuz2QRqhfgdk52u6tTmG/Vb0vdOrH/VrReCgfArNYnXyVvILEDvLHRlIvdfVo6rGqImsK4HKDCqKLJKkFf25uhr2sulzOkADbArbMqf1vv06Nnn/w; 25:Ag7FRNNn35BZZWbB8HFZ/4uHxGKUS4zkdl39WkQGFhoBAfvAK8GeBmwN0HQ8jZRiOPHeqkOxoKmEUW3nLQbO3QcL4v3Vb8VbG6vS6+1fPrKmetLxQYfd4oMJAVbPX0mXSz+Xke8QcLfdyJ5Ov5PAcekXzAvUE+vbUpeIR+5HHu8WEIFVJMmLB9M5g4saif8+ylCD5j9cKhQdmQkb4qmaT0GEwM3L0N8cWfu8KKSjmDQ8vPhQ+jO3e3/B/kW8ZF3KYgu4ag4anrScW653p/GRFTRBPjD/8hz3tMlgAlLy30RFl+Yf+Mvdq/EYSF25wlxVFkH6PMxtsO4qwqicEJ3kAg==; 31:Lyr12H+2lOVXIhhT2HG1VWAWbFlvH6MSd00EONMCzdtoISQ2AmPLbksPVCCVWPsL/PT/NJMQ/N+jbDfhYg1p+kyhlNQno8ZKz6QgQx9Z2c3Tmxr4I6YqPr8GK54svNVbq5PBysBA6RxPQ8Kt2PjI+zWIvxFy7yck4XyTf49jwS5wnD08R1KuVt8jzqU5v84OqdtxUc34xZMn0St5WRXkU6BPVxgXw/DvOzRN0cVHbDk=
X-MS-TrafficTypeDiagnostic: CY4PR0501MB3859:
X-Microsoft-Exchange-Diagnostics: 1; CY4PR0501MB3859; 20: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
X-Microsoft-Antispam-PRVS: <CY4PR0501MB3859E674C613420FDFAEBC45D4590@CY4PR0501MB3859.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(35073007944872);
X-MS-Exchange-SenderADCheck: 1
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3231311)(944501410)(52105095)(3002001)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123558120)(20161123560045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:CY4PR0501MB3859; BCL:0; PCL:0; RULEID:; SRVR:CY4PR0501MB3859;
X-Microsoft-Exchange-Diagnostics: 1; CY4PR0501MB3859; 4:3vYh6+F2Ueq5Jq4NTkkh8nE4Pa5D0wmqj9gER/wwrZEkYNVApV0kkCD0aBViPcSubnCfcG0c7alNNjjBdg7NUrYMiCMlsaEZrZFSEo8zIhufkEsK9L3hB6gWSBG4jQ0mMUBiAsIkP1wwBwsTfJggqU6yljYFzw5ubFVRga9CoWsjkD3xaCi/6x4yz775/koQ35tNq/Zk1DbzorjMCghVQpSA3kDps8SnwtpyRzBHRQoV1/05eb/lZdk2gyRvDL+3CCRDd+h/EzIn+kXtKhoKJNPHA1EBUXYYHNJ05JHaTohAOnE4toVOl+F5H01WKo6dKxdzhM0IXdOkw76gXBNbBMhPhGIHVELwStEUYZQGDo4=
X-Forefront-PRVS: 0731AA2DE6
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6049001)(366004)(376002)(346002)(396003)(39860400002)(136003)(189003)(199004)(76176011)(65806001)(33964004)(3260700006)(229853002)(25786009)(31696002)(386003)(6666003)(14444005)(52116002)(97736004)(478600001)(81156014)(5660300001)(8676002)(4326008)(106356001)(54896002)(7736002)(81166006)(551544002)(6246003)(16526019)(105586002)(84326002)(77096007)(26005)(86362001)(58126008)(64126003)(16586007)(16576012)(3846002)(6116002)(11346002)(8936002)(65826007)(36756003)(956004)(31686004)(486006)(446003)(37036004)(2616005)(6486002)(53936002)(476003)(68736007)(2906002)(65956001)(316002)(66066001)(69594002); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR0501MB3859; H:[172.29.35.4]; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
Received-SPF: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1; CY4PR0501MB3859; 23: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
X-Microsoft-Antispam-Message-Info: HT73CUCfjVSBMUcfv1Ztuvahc79Q8yy/TkmapySEqsij+KIXbP23KodR3WzT8Aa8+SHXFoksAAplRvP5l0WvdIFo21ZVHxT/UfoFbTvPH4KmtMG5cuQRc4Y6+E5lEw4fETInM+uvn+imI0cT/XGqVOYVrcluM0bl9Wd+dkVZJPatgYjdvEk/PeKE77HLckKrn9T8jHoOKNYqTufqbzqEoTpa6kjQ1ITy5QURgQUmIRz7DQkKZCzMPanp6Qx1P8ikEcH6GMd+WNfsG5SW0uhCLihjGw1YtNH6KBbqQgcRjbjx5rmSB32RIMgSdpsb5M8qLOOgNOcNFtnP+eyh7HqddmUuTrF0N2DYhegpjs8h3JE=
X-Microsoft-Exchange-Diagnostics: 1; CY4PR0501MB3859; 6:oORsS3876F3zj+ej5SXeK+nHzH25tkniYLO2cUZNiMCoOmR62lqSz/p79kXdRWYbMBX8pv3+ol0tMSrq2pQZAAwMytKi+A27/qupCt8Cd0HpMOpXdefjlqVsX4zJwciNJh/ymW6lztqC+ya+sOahW0upae5eY5Upw9tcA5wa/GqAHTNK2/Ze9T4Gk5+bf7F+Pu5mcpB8RcHvPgM/eFJW9F6LXy6t0jH1SGT72gsBpVLEnXy7CGqROQMPxJ1U3fR21fQHQGCNV9SAefVFe9fJwQs5N+iGp0qEVfcrjFU8pHO8jtm+QSCGjScygExXhpVX4kYGN4xXSuRsy378jq8w1hJM+bjhBrp0b1cnxWT01zXxHSk33KGBrq1/FTQDF7eI1NNa6YP/wUxdCEiQFneM+BlH6boxDt9/7xuFjuH9Ohvopc/ILTwTKmnkqENhM7+VNfGvb0Wuu0A8/E2vWi0BUQ==; 5:sR7uRgVzRjtXJ9+HeNmBByw8b+njPWkKyJD+vDOmPkRpCU9CUkI+/Y9YjKCCgXDOzlBq4ER01C0XYBBELIft8URgLPpB8XDdDg5a+Fi5pcu+jc1r/Se46vs9Ey8J0ZrXgLYXjaUsSToYYJi0Z8QW/GzFyIVLCIpmFBI+OrC/sIY=; 24:7DyBooQ2wxzG2Lv0bEhU5Vb6/rTRbvr92lAeQxhkXJSg4sbrOLWx1SyuxKFio84FG+K3iywZtkVe2Ts8sCl/H/GKIa4QdQactuVBk1+PEak=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; CY4PR0501MB3859; 7:LbJz6VHeADJxDfwPrIRH7qcbczf1qycO7yT+XGdrI53iSwuCQUrx7evIcc85BuO9VeTQLekT3I64zgTuSkfqVu2XaJbF1v12B77pnNFG7ygtOBuMi789d1eQLuFdzklOshmmNkS2gJYBh0ti9fFv2YY2gi3tlxoLG5n840ooCK128EG+bc5jQWwvwp70W2Hvqo+4CTqn5ALcl2Te6k3lI3GbZAAC6BewN/r3cE3De8XTk/gSTucexcnPldB5Kb6x
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jul 2018 14:35:15.9459 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0ad0c2ca-ce43-4625-fe56-08d5e804afbe
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR0501MB3859
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-07-12_06:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807120153
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/Xt_0Kjas8sHXNFSFxc6R2nGDjlg>
Subject: Re: [Idr] WG adoption call for draft-xu-idr-neighbor-autodiscovery
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jul 2018 15:33:25 -0000

While I think a BGP neighbor auto-discovery protocol would be useful in 
certain scenarios, I don't think the WG should adopt this document at 
the current time.

There is so much overlap with the idr-lldp-peer-discovery draft that I 
don't see how the WG could adopt both of them.  The 
idr-neighbor-autodiscovery draft thus should not be adopted unless the 
intention is to reject the idr-lldp-peer discovery draft. Is that the 
intention?  I don't recall seeing much discussion comparing and 
contrasting the two.

For neighbor auto-discovery, I'd think that the biggest issue by far 
would be security.  All this draft really suggests about security is 
"don't use this in any environment where it is possible for the Hellos 
to be spoofed".   A somewhat more detailed set of applicability 
restrictions would seem to be warraned.

The draft does propose to use the Generalized TTL Security Mechanism on 
the BGP sessions established as a result of receiving Hellos, but 
doesn't seem to suggest using the GTSM on the Hellos themselves. Either 
way, whether GTSM actually provides any signficant amount of security 
would have to be examined.

Even if there's no need for security in DC networks, what will happen 
when someone uses this to auto-discover neighbors on, e.g., an EVPN 
Broadcast Domain or other overlay.  Also, someone will want to use 
scoped IP multicast to allow the Hellos go to several hops, in order to 
auto-discover multi-hop EBGP peers.  (Compare to Targeted LDP Hellos.)  
Are these possible use cases supposed to be prohibited?  How?  Is there 
even an analysis of DC networking security needs?

I'm a little surprised to see LDP Hellos held up as model of something 
that is proven to work well.  In LDP, the Hello stuff is really a major 
complication (one might even say "a big mess"), because you have both 
"Hello adjacencies" and "session adjacencies", and you have to handle 
all the possible interactions between them. At least the LDP Hello stuff 
is an integral part of the LDP state machine; this sort of relationship 
between state machines is not really discussed in the 
idr-neighbor-autodiscovery draft.

LDP Hellos are also a known security problem (especially, but not only, 
when targeted to non-neighboring nodes).  In fact Targeted LDP Hellos 
provide no value other than to create an attack vector. However, it is 
hard to remove the Targeted Hellos because the Hello mechanism is such 
an integral part of the LDP state machine.  We should make sure we don't 
drive BGP down the same road.

The competition between BGP keepalives and periodic Hellos for deciding 
whether to bring the session down is also a potential source of problems 
that needs to be discussed.

It is interesting that routes are automatically created due to receipt 
of Hellos.  But the talk of giving these routes a smaller admin distance 
than certain other routes is a bit scary.  Attempts to adjust the admin 
distance never seem to work quite right, and frequently have unintended 
side-effects.  Also, there's very little protection against having 
several mechanisms that each create routes under the assumption that 
their own routes will have a smaller admin distance than any other.

I'm surprised to see the Hellos carrying a list of ASNs from which the 
transmitter will accept connections.  Isn't that a little like saying "I 
won't let you log in unless you type one of the following passwords"?

Something needs to be said about interaction with existing BGP security 
measures (TCP-MD5), such as they are.

My take on Sue's questions would be:

> 1) Does BGP need to have an autodiscovery mechanism for peers within Data 
Centers?

An autodiscovery mechanism certainly seems useful.  However, its use 
needs to be carefully restricted, and the applicability restrictions 
needs to be very clearly stated.

 > 2) Does this mechanism work for other deployments?

Unknown.  It's somewhat surprising that this issue is not even addressed 
in the draft.

 >3) If so, should be passed in BGP Hello message?  Or should it be a 
part of another protocol (e.g. LLDP, BFD, etc).

Unknown.  It's somewhat surprising that this issue is not even addressed 
in the draft.

BTW, it's not at all clear whether the "BGP Hello" mechanism can be 
regarded as part of the BGP protocol.  It seems like a brand new 
UDP-based mechanism, and adding it doesn't seem to be any simpler than 
adding a more generic neighbor discovery protocol.

In the DC, one could also ask whether whatever procedure is used to tell 
a node what its IP address is should not also be used to tell it who its 
BGP neighbors are.

 > 4)Does this interact with any of the LSVR work?

Unknown.  It's somewhat surprising that this issue is not even addressed 
in the draft.

I think more work needs to be done on the draft before we can really 
evaluate whether it is a good basis for future work.