Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00

Brian Dickson <brian.peter.dickson@gmail.com> Fri, 30 November 2012 20:15 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E595B21F8688 for <idr@ietfa.amsl.com>; Fri, 30 Nov 2012 12:15:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.597
X-Spam-Level:
X-Spam-Status: No, score=-3.597 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HMyf25S228cl for <idr@ietfa.amsl.com>; Fri, 30 Nov 2012 12:15:05 -0800 (PST)
Received: from mail-bk0-f44.google.com (mail-bk0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 68C9F21F8678 for <idr@ietf.org>; Fri, 30 Nov 2012 12:15:05 -0800 (PST)
Received: by mail-bk0-f44.google.com with SMTP id w11so427882bku.31 for <idr@ietf.org>; Fri, 30 Nov 2012 12:15:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=OqbJ2UzXNLUzvDxqSIfRoVBELnJFDiv5n3YwJmUgIJs=; b=qjJ98eUNJOc0DBym1lJapoxIEc5iNt/TiR4x9P6GFY+VK+unAo0PrcyBCW7fRV3SAI lW0AonAKRb3wkX0HUemo5OhsN3KENEL40ywdaoM9XcPxNSYQ/86KOfkjWwNAtxyo3QLA 9U5bl0kp+D6AxHp+O0hXUYKaJmPBg0fmsBXYukU4cbmzKfDaXvWCtEMFnotgyW13LeJG 3N6bE/LQ/AusNLLIjfSwOrYTwdkSKdvct4pz0WztmarbHW8BluPPx0kBbMUZsOujTdv0 QLECjGY47vtSd0RqfbGg+sk+GXnL4vxy9qTao0tb5VmzUdoWpMhKVsw8yBjrWmBMh0HF APSA==
MIME-Version: 1.0
Received: by 10.204.9.11 with SMTP id j11mr786165bkj.53.1354306504431; Fri, 30 Nov 2012 12:15:04 -0800 (PST)
Received: by 10.204.66.83 with HTTP; Fri, 30 Nov 2012 12:15:04 -0800 (PST)
In-Reply-To: <CAL9jLaY2JKADpGAanovkDF8P0jt7iTbpj4J0SoBa_=LRBqS4Yw@mail.gmail.com>
References: <B6B72499-E9D0-4281-84EB-6CA53694866E@juniper.net> <D704E7E3-3A95-4696-9757-9E17605E670C@tony.li> <378E396E-3F4B-4ACC-83D1-C4931524FECD@puck.nether.net> <CA+b+ERneavhy1gzKRSnCfN+YjYcU0+3WgBg6f68gq=tpx8yV5g@mail.gmail.com> <1AC79BDA-C088-47B4-888D-4B0428FB7C4F@puck.nether.net> <B549F708-0D5E-4B22-AC91-B6CE61B258FE@tony.li> <CAL9jLaZdX_jem0JdSGHzuhc3GDZXMDR0kvMKq5xr3D-EWYbNVQ@mail.gmail.com> <866BC125-5820-45A6-A23B-19A0A3CC05DF@gmail.com> <CAL9jLaY2JKADpGAanovkDF8P0jt7iTbpj4J0SoBa_=LRBqS4Yw@mail.gmail.com>
Date: Fri, 30 Nov 2012 15:15:04 -0500
Message-ID: <CAH1iCirPR3Lf-fkw_WsM59+a1aZaH-RpGgCjMMsUW+DvvKqB+w@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Christopher Morrow <morrowc.lists@gmail.com>
Content-Type: multipart/alternative; boundary="00151758f4221d1a5804cfbc0e42"
Cc: idr wg <idr@ietf.org>, Tony Li <tony.li@tony.li>, Robert Raszuk <robert@raszuk.net>
Subject: Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Nov 2012 20:15:07 -0000

On Thu, Nov 29, 2012 at 11:54 PM, Christopher Morrow <
morrowc.lists@gmail.com> wrote:

> On Thu, Nov 29, 2012 at 2:27 PM, Brian Dickson
> <brian.peter.dickson@gmail.com> wrote:
>
> > If the "private use" ASNs were NOT from a well-known range, you would
> detect this how?
>
> some other macro of integers perhaps?
>

The point I was trying to make was, with the PRIVATE range, the purpose &
intent of the ASNs in THAT range is reasonably well defined.

If a large number of ASNs are used, AND non-contiguous, whose intent is
unclear or not specified (and may or may not be "private", as in, not
intended for announcements towards the Public Internet), there is no
general way for a third party to infer the intent. In fact, generally,
intent cannot be inferred.

On the other hand, if there is a new block where the one rule is, "Do NOT
announce to the Internet", then the only inference rules are very clear.

If you see it on the Public Internet, it does not belong and can be ignored
safely, and should not be propagated to one's Internet peers/customers.



>
> >
> > This actually does a lot to demonstrate the usefulness of the old range,
> and of having a new range larger in size.
>
> how does it help show a larger size range would be helpful?
>
> >
> > If 192.168.0.0/16 was the only RFC 1918 space, the value of 10.0.0.0/8might not be as clear.
> > The analogy is pretty clear.
> >
>
> expand pls.
>
> > Not only is there value in more space, there is value in distinct ranges.
>
> a distinct range is of value, sure. how are more ranges helpful though?
>

A larger contiguous block means anyone USING that block can impose
structure on that block.
Since the block is private, there are no restrictions on how someone
partitioning their own instance might do so.

Structure => tool-friendly

Using tools is generally preferably to managing things manually, and if
done well, reduces the likelihood of errors that lead to non-Internet ASNs
showing up on the Internet.

E.g. a hierarchical network architecture, which incorporates such private
ASNs, e.g. pre-allocated in blocks (by continent, NFL city, router, etc.),
is much simpler to understand (inside the network doing this), and
scalable, and by having the private ASNs from a single well-known and
re-used range, enables third parties to know that the ASNs are not public
Internet ASNs.

The new range of private ASNs not only works for filters, but also various
OSS systems, e.g systems to monitor BGP announcements, which can alert when
anomalous announcement activity is seen.



>
> > Having non-globally-unique space that is well known allows third parties
> to detect leaks, filter, and make permanent bogon filters.
> >
>
> you mean it makes people carry crufty config for exceptions forever...
> sure.
> it also does show some obvious routing problems to the world, or does
> it? maybe it's not a routing problem but a 'forgot to
> cut/paste/replace my ASN for my customer ASN' ? it's not clear at all
> from the data on the wire, except that the reaction to: "I see 65535
> in an as-path" is "that is bad".
>
> if I see:
>  198.41.0.0/24 as-path: 1 2 3 26415 65534
>
> is that a leak or a missed configuration on a 26415 device? (forgot to
> put remove-private-asn on the upstream neighbor to 3).
>
>
It DOES NOT MATTER what the original intent was, or why you see the
questionable ASN.

What does matter, is that it does not belong, and can/should be
ignored/blocked/whatever.

The only time you SHOULD care (i.e. why it shows up), is if the ASN
immediately to the left (of the private ASN) is your own, at which point
you really should take direct action. The important thing is,  YOU will (or
at least should) have all the info you need to figure out why etc.

Without such a well-defined range, there is not always a clear relationship
between the cause and the effect, and the ideal corrective action.

However, with a pre-defined range or set of ranges, you are actually very
concise when you say, "I see 65xxx and that is bad". Nothing more is needed.

Regardless of cause, the effect is "that is bad". At which point, however
many ways there are to get rid of the bad, the correct course is, "make it
go away". As long as there _is_ a way, things are good.

Additionally,  there are plenty of mechanisms for doing ASN re-writing,
which are more general-purpose than just "remove-private-as". So, prior to
hardcoded support for new ASN blocks, the necessary mechanisms to achieve
the same functionality are ALREADY available. There is no need to tie it to
router firmware, as such. (E.g. AS rewriting for ASN migration during
merger/acquisition activity, etc.)


> > In case it is not obvious:
> >
> > Support (strongly).
>
> mostly I'm ambivalent at this point. I'm not really in favor of adding
> more complexity here, especially when there is a regular remedy: "Hi
> ARIN, I need 300 asns for my next 300 deployments, all which are
> scheduled to happen in the next Y days, all of which have a unique
> routing policy."
>
>
The proposal REMOVES complexity, by removing the non-public ASNs from the
RIR-managed space.
It simplifies the logic for non-Internet ASN usage. And for managing a mix
of public and "other" usage, for an SP, managing two pools of ASNs is
pretty straightforward. Especially if one of those does not require
interaction with an RIR.

Hopefully, this clarifies the questions Chris had, as well as illustrating
some of the finer points made earlier.

Brian