Re: [Idr] WG Last Call on Extened Message Support

"Jakob Heitz (jheitz)" <jheitz@cisco.com> Mon, 11 February 2019 23:17 UTC

Return-Path: <jheitz@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06F25131155 for <idr@ietfa.amsl.com>; Mon, 11 Feb 2019 15:17:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -12.512
X-Spam-Level:
X-Spam-Status: No, score=-12.512 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=cQ6DThIG; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=ZKIHe/Ne
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B-7jBfAxfWGq for <idr@ietfa.amsl.com>; Mon, 11 Feb 2019 15:17:01 -0800 (PST)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2658A1200D8 for <idr@ietf.org>; Mon, 11 Feb 2019 15:17:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=127723; q=dns/txt; s=iport; t=1549927021; x=1551136621; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=xiQ5ZlKBq3si4LgWELv1v0vg7XCT98bw2e85ZdHQR0M=; b=cQ6DThIGitpMT1yHJyQzl88dNE/mEmtxXkzC6fLRWPB2uUvvI8K1el0P bwa1fUuSQjmNzKwMCU0vfCsWry4y9P7LzEOSPSbk0n8Hp8YbGW/ZdkwMS iibqXHS6MoPHLFvNNKT1A1zRAI4JAbnzebFQMf2kIeNj3sWPiSskM9U4B M=;
IronPort-PHdr: 9a23:jrLwBRT9hYs7Val6Zc4TTmhoytpsv++ubAcI9poqja5Pea2//pPkeVbS/uhpkESUDNfA8/wRje3QvuigQmEG7Zub+FE6OJ1XH15g640NmhA4RsuMCEn1NvnvOi46EcVeRndu/mqwNg5eH8OtL1A=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ADAACwAWJc/5hdJa1jGQEBAQEBAQEBAQEBAQcBAQEBAQGBUgMBAQEBAQsBgQ0jUANndAQLJwqDeoFfgWgDj3eCV3yXFxSBEANUCwEBIgqBBV2CXgIXgygiNQgNAQMBAQIBAQJtHAyFSgEBAQECARoBCAoTAQE3AQQLAgEIDgMDAQEBFgsBBgMCAgIwFAkIAgQOBRSDCwQBAYEdTAMNBwEBDqA/AooUcYEvgngBAQWBMAETQYMBAxWCCwMFjEMXgUA/gRABJx+CFwcugx4BAQIBARaBAhIBCwEGAQcvCQYGAQkJgkoxgiaJZRgBCgcghW+HE4twCQKHNosYGYFtgXaDVWmCVYdqi0KEMIwjAgQCBAUCDQEBBYFIATUNWHFwFTsqAYJBE4FlJAkDBRKDS4UUhT9yAQEBAYEkikEBDheBCAExbQEB
X-IronPort-AV: E=Sophos;i="5.58,360,1544486400"; d="scan'208,217";a="513348954"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 11 Feb 2019 23:16:58 +0000
Received: from XCH-ALN-018.cisco.com (xch-aln-018.cisco.com [173.36.7.28]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id x1BNGwMq002179 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 11 Feb 2019 23:16:58 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-ALN-018.cisco.com (173.36.7.28) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 11 Feb 2019 17:16:57 -0600
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 11 Feb 2019 18:16:56 -0500
Received: from NAM04-SN1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Mon, 11 Feb 2019 17:16:56 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xiQ5ZlKBq3si4LgWELv1v0vg7XCT98bw2e85ZdHQR0M=; b=ZKIHe/NeEhepemSOPiEA/uaXwV/fWf1DcPZVxVTt62hYzJHicCau/x+xrV+T3OHhmnWxYjhEf6lQEq+0I37hUS3we3T/Rd+Hkss0V2gTIq/Jgg4LZa9mWO8wSQfl3SPWpO+/2DLcoKoS01c0bTnNkluQYjrtS7vEgY7OIbBT/2w=
Received: from BN6PR11MB2050.namprd11.prod.outlook.com (10.173.26.20) by BN6PR11MB0003.namprd11.prod.outlook.com (10.161.158.154) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1601.19; Mon, 11 Feb 2019 23:16:54 +0000
Received: from BN6PR11MB2050.namprd11.prod.outlook.com ([fe80::55bb:9b28:e053:42d7]) by BN6PR11MB2050.namprd11.prod.outlook.com ([fe80::55bb:9b28:e053:42d7%12]) with mapi id 15.20.1601.023; Mon, 11 Feb 2019 23:16:54 +0000
From: "Jakob Heitz (jheitz)" <jheitz@cisco.com>
To: Susan Hares <shares@ndzh.com>
CC: "Dongjie (Jimmy)" <jie.dong@huawei.com>, "Borchert, Oliver (Fed)" <oliver.borchert=40nist.gov@dmarc.ietf.org>, "bruno.decraene@orange.com" <bruno.decraene@orange.com>, "Borchert, Oliver (Fed)" <oliver.borchert@nist.gov>, "idr@ietf.org" <idr@ietf.org>
Thread-Topic: [Idr] WG Last Call on Extened Message Support
Thread-Index: AdS3xjQ/tSoF1syoSCC0lUpnr5BmnQACO/8QABUu6QAACB5qAAA9Z2KAAE3h5wAAIOhfgABz6gyAAVYD7AAAEMH5LQ==
Date: Mon, 11 Feb 2019 23:16:53 +0000
Message-ID: <1E129C92-97F7-4E25-AB5B-6E9A921D679D@cisco.com>
References: <007b01d4b7c6$5b002210$11006630$@ndzh.com> <16873_1548768802_5C505622_16873_491_9_53C29892C857584299CBF5D05346208A489AE8F1@OPEXCAUBM43.corporate.adroot.infra.ftgroup> <009501d4b7f1$962d0080$c2870180$@ndzh.com> <F7673729-36C3-441C-87AE-BA8C63EF3157@nist.gov> <76CD132C3ADEF848BD84D028D243C927C3286B43@NKGEML515-MBX.china.huawei.com> <00e201d4ba3f$34bb67b0$9e323710$@ndzh.com> <76CD132C3ADEF848BD84D028D243C927C32AEB75@NKGEML515-MBS.china.huawei.com> <ba5ddfd47a7c42db8e3ad1fba72fd18a@XCH-ALN-014.cisco.com>, <00de01d4c21c$d91e6e30$8b5b4a90$@ndzh.com>
In-Reply-To: <00de01d4c21c$d91e6e30$8b5b4a90$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jheitz@cisco.com;
x-originating-ip: [1.127.109.217]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2b0a337f-3bce-4f13-1664-08d6907702af
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600110)(711020)(4605077)(2017052603328)(7153060)(7193020); SRVR:BN6PR11MB0003;
x-ms-traffictypediagnostic: BN6PR11MB0003:
x-ms-exchange-purlcount: 7
x-microsoft-exchange-diagnostics: 1;BN6PR11MB0003;23:eVU5dWGJG1AfTjc8e12Pn4x7DWr7ldXWryaMwHdGkP133eclk8e2tT+wpkOK2jw6mgkAcvOOxR+ZoIDfnFp1ocp8EspuJoVv9MB2snCtOvpkuKqBaK5RvAAEF0xp/z9+1vIGFtq83urawSSH2flAdJ5AepAL8RagyvEWRQXVZ8BhDcd/4LGlIoJvygkPn5X2qJJAFcLWEo5jsHj0B6ecmOmmybWPu79Gk67MzJHKZSIhCT0OshK09gyyiLf1wu697P81lqQ5q9abzckJWJuyUe0zPW/1bD1Gux3YXKMUJxTtVuKKJhYGm2PMdKjZuhjmIn+iPvdwUAbn47QhEft4VhjZWeXE6EM8f3TrjzLT8DWkFQSfcY6Ua4xsDJtQGk1M4qnyBJm2gwTPR/89j6Gl4TrSN+pkIuwDUCitXXIwd+Mv/TByHGNVxu/ABHIuz0p8o/fzckBrLAvBDFyGlJd3ebIxh3Genq2mfMkZB2QqpIm5mq6j4uhyi+Rd1ocAZOyxKhTopv5pYjXophy0qS9aAGARl/BCqPHfoTXaX12pTw5DVbLErQiCZEnm1LSWsVu+AzfONU27bSoRu1PPJZbEzUN4duj+u8BTMsoUGBtOkrNLrkyUILaOILYAlZ7x3Qb/XOrbz5QALIJggoTi6UhbCrS7QdSWJMry88/UaZCRghsINz1hQF0pg+8Wti9iIEKzeXvV1aYecN/LQuPzIKH2p9I5jGa4P6tmw0V8Qi0HRX2tixZoK+6EGVTTK3uXcPin0NINCbWEh5oh5yFPlL4SNgCME5N9oIe4CZyg4SuCKDZq1W8RAzybX9CpdZdeiAZiPcH3lWri75YXh654+nWuyemV8fX26HUMRw1zdByJZIPQwAxqtr8CugerNkKOEu+2GrZlh5KdwcWvtwTk4+G4gbs09EVoNAOx7TuT45zsca8r/jT4owiGjqifYrQPUaNVL3jJ0zMXe7l3CaJuN+zcIJT/UwUGHTIbx2ikgmsvgoODIHhe43iId1Nb+0XhOBpPRLllH+8vhIlM16ev3guJ86Qa72xxwXIKwXceLPIKvmoWqitaIwOrm7jphT80YSdu2nRVo3lI/hQ2hEikcDFpmUFnGZFaMhylGlcnfEYesRu6ECBZo+wBMBFJ6C6eGwq0s8Whm881XwX5xz22p5f3AxdNwZW+hTt+FXcjRKIEC4fo9EgGx/1yqlMScmROptOtmvCARtxpb75n7b7h87dHyanEpfXuxL53+gjjv0HP1QDmJ/5CegVXHGhC3bKn2dKh2O/u+ATgKsk7h5elYj7iq9qmUG3v7V9DY8b6/TPqn0NgwH9xHN35PRvOyo3PQJO6sZFIa5fQ68IkFLwttaP8Zx6Gm7M+guxsly+EZseCO9H22Hqt01HHJ5pQ2769C24lsw7tYcxGJVkKenfzaks/wS+j5uzjTojmY2WyO19ybhJmW3ebAkzENRhwXHGJD4wrN7J19hUeyD5VuWCfxex6KdkeeRZw9naiVM6FOj0QLyY=
x-microsoft-antispam-prvs: <BN6PR11MB000377C337F2194BF08DEC12C0640@BN6PR11MB0003.namprd11.prod.outlook.com>
x-forefront-prvs: 0945B0CC72
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(366004)(346002)(396003)(136003)(39860400002)(129404003)(189003)(199004)(66066001)(82746002)(446003)(105586002)(606006)(30864003)(86362001)(33656002)(186003)(106356001)(93886005)(790700001)(3846002)(6116002)(486006)(53936002)(25786009)(2616005)(476003)(11346002)(6916009)(478600001)(102836004)(26005)(6306002)(54896002)(6512007)(236005)(53946003)(71190400001)(71200400001)(6486002)(2906002)(81166006)(81156014)(14444005)(83716004)(6436002)(229853002)(316002)(5024004)(14454004)(8936002)(256004)(68736007)(66574012)(4326008)(97736004)(7736002)(966005)(54906003)(6506007)(53546011)(76176011)(6246003)(99286004)(15650500001)(36756003)(8676002)(569006); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR11MB0003; H:BN6PR11MB2050.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: kTDoC084zsA71ZaGc0hFrcpPyd7s/7UjmIkOcfr5TBu4uNwtSM14sfYI8Ob3ysjjbU1YmYliXdNDufksR0dY14yphRMDrnJL6fLBaofRrI70327HekjHCbHVdWAdwXytEplHWj7H/mqPK7ucwUyY8A7+dVDm42nyxss4/WY303Xse2Ay+WXdfVTGCSHLi85lIRHwTAhJJDDFfNOEZ7IAEaQQITKdf77tv4nXEYl7bWqKvd8pQLUWlo6adtfQwMBBTTXXPb+Tn2esrTISJmHuph0F8xQPtENQcQzzuJmxURxSsq0Xc8obxJndywuPVCjYX8NsOFNkEO/sWNQ5ZjJFdB7fT28Tjgx/52WNmfjJWzMDYNhSWF1sYT6najg9hWOgWe0XqXJ8c63OcDivnItIpf3gAPyCNsvxyfQpAiO234E=
Content-Type: multipart/alternative; boundary="_000_1E129C9297F74E25AB5B6E9A921D679Dciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 2b0a337f-3bce-4f13-1664-08d6907702af
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2019 23:16:53.8069 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB0003
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.28, xch-aln-018.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/Z9FlKjHaObR3aGuSY8H7B_dOvdE>
Subject: Re: [Idr] WG Last Call on Extened Message Support
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2019 23:17:06 -0000

Sue,

Sorry if I'm a bit behind, but could you elaborate the problem with BGP-LS please. Can you give some examples of a BGP-LS NLRI and associated path attribute that will not fit 4096 bytes?

Thanks,
Jakob.


On Feb 11, 2019, at 11:18 PM, Susan Hares <shares@ndzh.com<mailto:shares@ndzh.com>> wrote:

Jakob:

Thanks for mentioning the correct information the BGPSec as far as the specifications.  Whether or not the RSA-2048 would have been useful to BGPSec, is left for the OPS group handling SIDR deployment.

The focus of this discussion is to remove any future obstacles to the use of BGP-LS attributes/NLRI.  Two potential limits exist:  a) message size (greater than 4096) and b) error handling.

Sue Hares

From: Idr [mailto:idr-bounces@ietf.org] On Behalf Of Jakob Heitz (jheitz)
Sent: Monday, February 4, 2019 3:14 PM
To: Dongjie (Jimmy); Susan Hares; 'Borchert, Oliver (Fed)'; bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>; 'Borchert, Oliver (Fed)'
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: Re: [Idr] WG Last Call on Extened Message Support

BGPSec dropped the requirement for extended messages because the
signature was changed from RSA-2048 (256 byte sig) to ECDSA P-256 (64 byte sig).
https://mailarchive.ietf.org/arch/msg/sidr/LRHPuO5MF0u-vWuhNAVeVN_8fIU

There is no mention of extended messages in https://tools.ietf.org/html/rfc8205
All mention of it was struck out in:
https://tools.ietf.org/rfcdiff?url2=draft-ietf-sidr-bgpsec-protocol-23.txt

Regards,
Jakob.

From: Idr <idr-bounces@ietf.org<mailto:idr-bounces@ietf.org>> On Behalf Of Dongjie (Jimmy)
Sent: Friday, February 1, 2019 10:45 PM
To: Susan Hares <shares@ndzh.com<mailto:shares@ndzh.com>>; 'Borchert, Oliver (Fed)' <oliver.borchert=40nist.gov@dmarc.ietf.org<mailto:oliver.borchert=40nist.gov@dmarc.ietf.org>>; bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>; 'Borchert, Oliver (Fed)' <oliver.borchert@nist.gov<mailto:oliver.borchert@nist.gov>>
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: Re: [Idr] WG Last Call on Extened Message Support

Hi Sue,

Thanks for updating the implementation report.

My understanding was that bullet 4 was to cover the behavior of section 5 paragraph 1, bullet 5 was to cover the behavior of section 5 paragraph 2.

But after rereading section 5, I realize that both paragraph 1 and 2 are talking about the behavior of a BGP speaker which does not advertise the extended message capability to its peer, so perhaps bullets 4 and 5 in the implementation report could be merged as below:

4. When receives an extended message without advertising the BGP Extended Message Capability to this peer (Error Handling).
4a. Accepts the extended message if the BGP speaker is able to process extended message (but was configured not to advertise the capability)   [Section 5, paragraph 1 MAY]
4b. Does not accept the extended message, follows RFC4271 handling and sends Bad Message Length Notification [Section 5, paragraph 1 SHOULD NOT, and paragraph 2 MUST)

Hope this helps to reduce the confusion.

Best regards,
Jie


From: Susan Hares [mailto:shares@ndzh.com]
Sent: Friday, February 01, 2019 11:03 PM
To: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>; 'Borchert, Oliver (Fed)' <oliver.borchert=40nist.gov@dmarc.ietf.org<mailto:oliver.borchert=40nist.gov@dmarc.ietf.org>>; bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>; 'Borchert, Oliver (Fed)' <oliver.borchert@nist.gov<mailto:oliver.borchert@nist.gov>>
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: RE: [Idr] WG Last Call on Extened Message Support

JIe, Bruno and Oliver:

Thank you for your input.   You are correct that the error handling behavior was unclear based on the questions in the chart.   The purpose of the chart is to provide other BGP WGs (Bess, SPRING, LSVR) a clear indication of changes to the base BGP specification.

I’ve reformatted sections 4 and 5 of the chart.

To section 4 I’ve added:
4c            Does send Extended Message  - with a yes from all implementations (based on their email)

Section 5, I’ve alter to be:
5              Error handing
5a           Accepts Extended message without receiving
             BGP Extended Message Capability [Section 5 paragraph 1 MAY]

5b           If receives Extended Message without BGP extended message support,
             follows RFC4271 handling and sends Bad message length Notification
            [section 5 paragraph 2 MUST]

Oliver – if you would read the current text and let me know the updated message.  I believe the answer for all 3 implementations is “yes” due to 4b.   Please let me know and I will update the information in the chart.

To follow-up on Jie’s comments, the text did not accurately represent the error handling.   Section 5, paragraph 1 has a “SHOULD NOT” modified by a “MAY”, which results in simply a “MAY”.   For readability, I think the “SHOULD NOT” provides useful information  to the implementer,  but it cannot be tested accurately when combined with the “MAY”.

Let me give you an example of that:
If the peer did not send a BGP Extended Message capability, and it accepts the extended message (with a length of 10,000 bytes), it could have a liberal policy of MAY as a default in the implementation.   The “on-wire” observations cannot tell – only the implementation’s policy (default + configured).

I also broke out the management information away from the specification information.

Sue Hares

From: Dongjie (Jimmy) [mailto:jie.dong@huawei.com]
Sent: Wednesday, January 30, 2019 8:53 PM
To: Borchert, Oliver (Fed); Susan Hares; bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>; Borchert, Oliver (Fed)
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: RE: [Idr] WG Last Call on Extened Message Support

Hi Oliver, Bruno and Sue,

To my understanding, bullet 5/5a/5b in the implementation report is corresponding to the second paragraph in section 5 “Error Handling”:

A BGP speaker that does not advertise the BGP Extended Messages
   capability might also genuinely not support Extended Messages.  Such
   a speaker MUST follow the error handling procedures of [RFC4271] if
   it receives an Extended Message.  Similarly, any speaker that treats
   an improper Extended Message as a fatal error, MUST treat it
   similarly.

Thus it is to describe the error handling behavior of an implementation version which does not support extended message.

While I agree this could be misleading for a report of implementation which supports extended message capability, maybe it could be used to verify the behavior of an old version which does not support this capability?

Best regards,
Jie

From: Idr [mailto:idr-bounces@ietf.org] On Behalf Of Borchert, Oliver (Fed)
Sent: Wednesday, January 30, 2019 4:35 AM
To: Susan Hares <shares@ndzh.com<mailto:shares@ndzh.com>>; bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>; Borchert, Oliver (Fed) <oliver.borchert@nist.gov<mailto:oliver.borchert@nist.gov>>
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: Re: [Idr] WG Last Call on Extened Message Support

Bruno and Susan,

I cannot speak for the ExaBGP Implementation but for BGPSEC-IO and QuaggaSRx.
I believe when I compiled the report, I mis-read 5a and overlooked the “not” and read instead: “Does send Extended Message Capability”.
Therefore the implementation report for section 5a must be corrected from “Yes” into “No” for both BGPSEC-IO and QuaggaSRx

BGPSEC-IO and QuaggaSRx, both do send the extended message capability if so configured.
I just checked the code and run it again. I copy/pasted the relevant output generated by BGPSEC-IO,

Oliver

-----  output of BGPSEC-IO  -------

./bgpsecio -f bgpsecio.test.cfg.qsrx
Starting bgpsecio 0.2.0.25...
Send:  (Open message send from BGPSEC-IO to QuaggaSRx)
OPEN Message
  +--marker: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
…
     +--Optional Parameter: Capability
     |  +--Type: Capability (2)
     |  +--Length: 2
     |  +--Capability: Extended message support capability
     |     +--Type: Extended message support capability (6)
     |     +--Length: 0
…

Received: (Open message send from QuaggaSRx and received by BGPSEC-IO)
OPEN Message
  +--marker: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
…
     +--Optional Parameter: Capability
        +--Type: Capability (2)
        +--Length: 2
        +--Capability: Extended message support capability
           +--Type: Extended message support capability (6)
           +--Length: 0
BGP-receiver thread created!



From: Idr <idr-bounces@ietf.org<mailto:idr-bounces@ietf.org>> on behalf of Susan Hares <shares@ndzh.com<mailto:shares@ndzh.com>>
Date: Tuesday, January 29, 2019 at 11:43 AM
To: "bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>" <bruno.decraene@orange.com<mailto:bruno.decraene@orange.com>>
Cc: "idr@ietf.org<mailto:idr@ietf.org>" <idr@ietf.org<mailto:idr@ietf.org>>
Subject: Re: [Idr] WG Last Call on Extened Message Support

Bruno:

Thank you for your comments on this topic – as I think

I did receive reports privately that we have 1 full implementations of draft-ietf-idr-bgp-extended-messages off list which is not listed in this report.   I hope those implementers will volunteer this information on the list.   If not, I will share this information with Alvaro and the IESG.

The SIDR work did define draft-ietf-bgp-extended-messages as a requirement and only moved to not specifying it when we could not quickly pass this through WG LC.

The real needs are a growing BGP-LS that may run out of BGP message space.  As my previous email to IDR indicates, I was hoping this handles an BGP message whose length is bigger than 4096 bytes.   Thank you for the correction of:

“The issue is not specific to attributes bigger than 4096 octets, but to BGP message whose length is bigger than 4096, irrespective of the size of each attribute.”


As to your comment:

“Why is this limited to future specifications? A priori, using existing BGP mechanism (AFI/SAFI, attributes, * communities) one could exceed the size of 4096 octets. How does the BGP speaker supposed to behave in this case? This should be described in this specification. Note that this is not a case of error handling, as every BGP speaker is behaving as specified.”

This problem has been true for years, and thus as co-chairs had hoped to have the draft-ietf-bgp-extended-messages passed years ago.   As BGP-LS attributes grow use and in number, the potential of exceeding the BGP message limit increases.  It seems like a good direction to prevent issues.

I hope the authors will comment on the changes you suggested to the text.

Cheers,
Susan Hares



From: bruno.decraene@orange.com<mailto:bruno.decraene@orange.com> [mailto:bruno.decraene@orange.com]
Sent: Tuesday, January 29, 2019 8:33 AM
To: Susan Hares
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: RE: [Idr] WG Last Call on Extened Message Support

Hi WG,

Please find below some comments.
As of today, I don’t believe this specification is ready to be progressed to IESG/RFC, especially for a document updating RFC 4271 (core BGP spec).

> The WG chairs intend to forward this draft to the IESG with the current level of implementation.

https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-extended-implementations<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftrac.ietf.org%2Ftrac%2Fidr%2Fwiki%2Fdraft-ietf-idr-bgp-extended-implementations&data=02%7C01%7Coliver.borchert%40nist.gov%7C40bb8a943e614b1637f308d68608d6cd%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C636843769859165043&sdata=hXBbOXqwvXqtCV%2B9PbP%2F7IE6WJjWUA2boM33Kds%2Bgh4%3D&reserved=0> says : 5a

Does not send Extended Message capability

Yes

Yes

Yes


I may be misunderstanding the implementation report, but my reading of the above is that none of the reported implementations sends the capability hence no implementation supports draft-ietf-idr-bgp-extended-messages.. Here this document is updating RFC 4271, so it is not a minor extension for a niche use case. So I don’t see the arguments for not requiring the IDR’s usual two interoperable implementations.

----
§ 1
“ As BGP is extended to support newer AFI/SAFIs and
   newer capabilities (e.g., [I-D.ietf-sidr-bgpsec-protocol<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-idr-bgp-extended-messages-27%23ref-I-D.ietf-sidr-bgpsec-protocol&data=02%7C01%7Coliver.borchert%40nist.gov%7C40bb8a943e614b1637f308d68608d6cd%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C636843769859165043&sdata=uZS%2BbN9v5cir2o5L3U3jP2xFPbY4Tz%2FNnBPfdH7iDf0%3D&reserved=0>]), there is
   a need to extend the maximum message size beyond 4096 octets.  “

https://tools.ietf.org/html/draft-ietf-idr-bgp-extended-messages-27#section-1<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-idr-bgp-extended-messages-27%23section-1&data=02%7C01%7Coliver.borchert%40nist.gov%7C40bb8a943e614b1637f308d68608d6cd%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C636843769859165043&sdata=YVWHAFbYRjG%2FlWPbpw2rW8uGQ6QXss3dufm%2FqHgRvDw%3D&reserved=0>


[I-D.ietf-sidr-bgpsec-protocol<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-idr-bgp-extended-messages-27%23ref-I-D.ietf-sidr-bgpsec-protocol&data=02%7C01%7Coliver.borchert%40nist.gov%7C40bb8a943e614b1637f308d68608d6cd%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C636843769859165043&sdata=uZS%2BbN9v5cir2o5L3U3jP2xFPbY4Tz%2FNnBPfdH7iDf0%3D&reserved=0> is now RFC 8205 (thanks for updating the reference). It has removed the normative/any reference to draft-ietf-idr-bgp-extended-messages. So presumably BGP Sec does not need draft-ietf-idr-bgp-extended-messages.
Can we have an update on this?
Can the introduction of draft-ietf-idr-bgp-extended-messages be updated to introduce on the real reasons/needs?

----
§4

§3 says “A peer which does not advertise this capability MUST NOT send BGP
   Extended Messages, and BGP Extended Messages MUST NOT be sent to it.”

Fine. Text in §4 should probably be aligned with the above ..e.g.

OLD: A BGP speaker
   MAY send Extended Messages to its peer only if it has received the
   Extended Message Capability from that peer.

NEW:
A BGP speaker
   MAY send Extended Messages to its peer only if it has sent and received the
   Extended Message Capability to and from that peer.

----

“   Applications generating information which might be encapsulated
   within BGP messages MUST limit the size of their payload to take the
   maximum message size into account.”

I don’t see what new behavior is been defined here. If there is none, I would suggest to remove this sentence

----
   A BGP announcement will, in the normal case, propagate throughout the
   BGP speaking Internet; and there will undoubtedly be BGP speakers
   which do not have the Extended Message capability.  Therefore,
   putting an attribute which can not be decomposed to 4096 octets or
   less in an Extended Message is a likely path to routing failure.


The issue is not specific to attributes bigger than 4096 octets, but to BGP message whose length is bigger than 4096, irrespective of the size of each attribute.
Please elaborate on what you mean by “an attribute which can not be decomposed to 4096 octets”

---
“   It is RECOMMENDED that BGP protocol developers and implementers are
   conservative in their application and use of Extended Messages.”

What does this mean exactly? That they don’t use this extension? That they don’t use this extension unless XX_TO BE SPECIFIED_XX?

---
  Future protocol specifications will need to describe how to handle
   peers which can only accommodate 4096 octet messages.

Why is this limited to future specifications? A priori, using existing BGP mechanism (AFI/SAFI, attributes, * communities) one could exceed the size of 4096 octets. How does the BGP speaker supposed to behave in this case? This should be described in this specification. Note that this is not a case of error handling, as every BGP speaker is behaving as specified.


----
Depending on the above specification, a section describing the operational consequences in a network (such as the Internet, BGP Enabled ServiceS/VPN networks) is probably needed. Possible consequences could be BGP NLRI being removed in the middle of such network, or (extended) community (such as Route Targets) been removed. Both having significant consequences on the availability provided by the network.

---
§4
OLD: The Extended Message Capability only applies to all messages except for the OPEN message.
Probably
NEW: The Extended Message Capability applies to all message types except for the OPEN message (type 1).
----
§8

“This extension to BGP does not change BGP's underlying security issues »

Before evaluating this, I think this document should first specified how a BGP messages bigger than 4096 octets is handled when it needs to be sent to a received not supporting this extension.

Nits:
OLD : to reduce compexity
NEW : to reduce complexity

Thanks,
--Bruno

From: Idr [mailto:idr-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, January 29, 2019 12:33 PM
To: idr@ietf.org<mailto:idr@ietf.org>
Subject: [Idr] WG Last Call on Extened Message Support


This begins a 2 week WG LC on Extended Message Support for BGP (draft-ietf-idr-bgp-extended-messages-27).  You can access the draft at:

https://datatracker.ietf.org/doc/draft-ietf-idr-bgp-extended-messages/<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-idr-bgp-extended-messages%2F&data=02%7C01%7Coliver.borchert%40nist.gov%7C40bb8a943e614b1637f308d68608d6cd%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C636843769859321289&sdata=okjTeLe6DcTaRV2USy2My6HXDRynupmXlB0i7gUwynA%3D&reserved=0>

The authors should indicate whether they know of any IPR.   Implementers are encouraged to update the  implementation data at:

https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-extended-implementations<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftrac.ietf.org%2Ftrac%2Fidr%2Fwiki%2Fdraft-ietf-idr-bgp-extended-implementations&data=02%7C01%7Coliver.borchert%40nist.gov%7C40bb8a943e614b1637f308d68608d6cd%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C636843769859321289&sdata=PoRyFofs04%2FC%2F%2FgbXL2zyED3SW6MrESpHiIE2e7p4cA%3D&reserved=0>

The draft provides a means for expanding the BGP message to 65535 octets for all messages except OPEN messages.  BGP message space is running short for all of the potential attributes or additions proposed by BGP-LS features.

The WG chairs intend to forward this draft to the IESG with the current level of implementation.

As you comment on the draft, please consider if: a) the technology is mature, b) the additional space in a BGP message would be helpful for those deploying BGP-LS or SR, and c) if the specification is ready for publication.

Sue Hares (WG Chair, Shepherd)



_________________________________________________________________________________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.