Re: [Idr] new ID on expansion of private use ASN range

Jon Mitchell <jrmitche@puck.nether.net> Tue, 03 July 2012 14:16 UTC

Return-Path: <jrmitche@puck.nether.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4429321F8823 for <idr@ietfa.amsl.com>; Tue, 3 Jul 2012 07:16:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.223
X-Spam-Level:
X-Spam-Status: No, score=-6.223 tagged_above=-999 required=5 tests=[AWL=0.376, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yFQj6j8CavYE for <idr@ietfa.amsl.com>; Tue, 3 Jul 2012 07:16:22 -0700 (PDT)
Received: from puck.nether.net (puck.nether.net [IPv6:2001:418:3f4::5]) by ietfa.amsl.com (Postfix) with ESMTP id 139A821F881C for <idr@ietf.org>; Tue, 3 Jul 2012 07:16:22 -0700 (PDT)
Received: from puck.nether.net (puck.nether.net [204.42.254.5]) by puck.nether.net (8.14.4/8.14.4) with ESMTP id q63EGTRC032559 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 3 Jul 2012 10:16:29 -0400
Received: (from jrmitche@localhost) by puck.nether.net (8.14.4/8.14.4/Submit) id q63EGT6Q032558; Tue, 3 Jul 2012 10:16:29 -0400
Date: Tue, 03 Jul 2012 10:16:29 -0400
From: Jon Mitchell <jrmitche@puck.nether.net>
To: Randy Bush <randy@psg.com>
Message-ID: <20120703141629.GC22598@puck.nether.net>
References: <20120702164834.GB13713@puck.nether.net> <m2zk7hxli9.wl%randy@psg.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <m2zk7hxli9.wl%randy@psg.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.6 (puck.nether.net [204.42.254.5]); Tue, 03 Jul 2012 10:16:29 -0400 (EDT)
Cc: idr@ietf.org
Subject: Re: [Idr] new ID on expansion of private use ASN range
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2012 14:16:23 -0000

Randy / Chris -

Sorry in advance for the long message, I tend to be verbose.  As I
stated in my message to Robert, the use cases I was hoping to solve were
a single customer that has requirements for much more than a thousand
sites (not connected via an IGP which may have unique routing
requirements or redundancy).  I'd venture that the number of private
ASNs (unattached from each other) deployed is at least an order of
magnitude, if not several orders, higher than public ASNs allocated.

This goes to Chris's message as well... there seems to  be interest to
ask for justification of use of these ASNs.  The use of BGP has expanded
so much in Enterprise networks especially for remote site connectivity,
when no justification or process was required to use BGP like they
utilized any other routing protocol internally.  For those who want to
move this to a Public ASN paradigm, I encourage you to submit the
appropriate proposal to change both IANA/RIR policies to be so lenient
that I can walk in and request 10K+ ASNs with minimal justification and
low cost.  I don't see much value in increasing the administrative
burden on the network operators or the registries for ASN processing of
these use cases, but if others do I'm at least interested in seeing the
proposal and how well it is received.  After all, 32 bit ASNs appear to
be "like rain" because of the justification required today, while we at
the same time have determined that the 32 bit IPv4 resource requiring
less justification and using larger allocation blocks was not big enough
long term for growth of networks.

Also if we go down this method of using public ASNs for building larger
internal networks, some folks may want knobs back to hide their
multitude of ASNs from the Internet w/o deploying confederations or
having to aggregate every prefix at a higher level, as they want to
maintain a short and consistent AS_PATH for other reasons.  Also, since
private Use ASNs that are already allocated will likely exist for a
really long time, and no one is proposing some sort of active
notification/deprecation strategy as part of a proposal (yet) we will
still need all the existing knobs / complexitiy in current vendor
implementations on top of the new one.  To me extending the one command
(I'm aware of) that already recognizes private ASNs to strip a second
range seems like a better approach and not overly complex.  Please note
as-override nor allow-as-in are examples of command that fit in this
criteria, but their future use may be lessoned but not eliminated by
this proposal.  

For the other use cases where SPs are providing service to customers who
likely are using private ASNs (either in the existing range or the new),
I encourage these SPs to see if a non-private ASN or range of ASNs can
be allocated to them for these use cases and would support any proposals
that reduce the justification needed to assign these if the existing RiR
policies are deemeed to stingy.

Jon


On Tue, Jul 03, 2012 at 06:05:34PM +0900, Randy Bush wrote:
> the motivation is not clearly stated.  the only thing i could find
> was
> 
>    The limited size of the current range of private use ASNs has led to
>    the usage of a number of implementation specific features that
>    manipulate the AS_PATH or remove AS_PATH based loop prevention
>    described in Section 9 of [RFC4271].
> 
> and it is not clear how more private ASs will ameliorate this.
> 
> perhaps a clear statement of need, and why this is the best solution,
> right up front would be helpful.
> 
> randy