Re: [Idr] Destination-IP-Origin-AS Filter for BGP Flow Specification

"Wanghaibo (Rainsword)" <> Fri, 08 November 2019 01:48 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id C0FE81200CC for <>; Thu, 7 Nov 2019 17:48:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -3.601
X-Spam-Status: No, score=-3.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_SBL=0.5, URIBL_SBL_A=0.1] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id q9NY52nKmPfI for <>; Thu, 7 Nov 2019 17:48:38 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id D320B12004A for <>; Thu, 7 Nov 2019 17:48:37 -0800 (PST)
Received: from (unknown []) by Forcepoint Email with ESMTP id 7D837DCDC23BD2BA2C0B for <>; Fri, 8 Nov 2019 01:48:36 +0000 (GMT)
Received: from ( by ( with Microsoft SMTP Server (TLS) id 14.3.408.0; Fri, 8 Nov 2019 01:48:35 +0000
Received: from ([fe80::40a8:f0d:c0f3:2ca5]) by ([]) with mapi id 14.03.0439.000; Fri, 8 Nov 2019 09:48:24 +0800
From: "Wanghaibo (Rainsword)" <>
To: Jeffrey Haas <>
CC: Robert Raszuk <>, "" <>, Zhuangshunwan <>, "idr@ietf. org" <>
Thread-Topic: [Idr] Destination-IP-Origin-AS Filter for BGP Flow Specification
Thread-Index: AQHVkzhgbTLi2TlKoUev/Znja6jzI6d8OJtQgAM+6oCAAQ4XsA==
Date: Fri, 8 Nov 2019 01:48:24 +0000
Message-ID: <>
References: <> <> <>
In-Reply-To: <>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
x-originating-ip: []
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <>
Subject: Re: [Idr] Destination-IP-Origin-AS Filter for BGP Flow Specification
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 08 Nov 2019 01:48:40 -0000

Hi Jeffrey,

	Flowspec is designed for security protection, but current usage is not limited to security protection, 
    but also to optimize traffic. Using Flowspec to optimize traffic is safer and more reliable than send routes to router.

    Our scenario here is for optimize traffic. The actions here are all performed on the routers. You need to perform a FIB lookup to get dest-as.

    This does violate some of the current rules and introduces a certain performance penalty,
    but it can reduce the demand for Flowspec entry space, so you can use this rule in the appropriate scenario.


-----Original Message-----
From: Jeffrey Haas [] 
Sent: Friday, November 8, 2019 1:38 AM
To: Wanghaibo (Rainsword) <>
Cc: Robert Raszuk <>et>;; Zhuangshunwan <>om>; idr@ietf. org <>
Subject: Re: [Idr] Destination-IP-Origin-AS Filter for BGP Flow Specification


On Tue, Nov 05, 2019 at 08:11:12AM +0000, Wanghaibo (Rainsword) wrote:
> PS: Netflow is already supporting statistical traffic based on Dest-IP-Origin-AS, it already download Dest-IP-Origin-AS to FIB entry, this prosess can be reused.

>From a forwarding perspective, this is the detail that bothers me.

Flowspec right now is currently independent of FIB state.  It functions on the firewall layer, which is typically implemented prior to FIB.

What this feature implies is something roughly like:
Packet comes in, hits rule to check dst-as.
dst-as lookup needs to happen as one of:
- communicate to BGP routing process. (not likely to scale)
- trigger a FIB lookup, check returned dst-as.  Violates pipelining in many
- Have the entire FIB's dst-as-map pushed into memory for firewall,
  implement as a longest-match lookup on that collection.

-- Jeff