[Idr] Fw: New Version Notification for draft-ietf-idr-route-leak-detection-mitigation-06.txt

"Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov> Tue, 07 March 2017 03:45 UTC

Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 973B9128BA2; Mon, 6 Mar 2017 19:45:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rKwVqoNnyf7q; Mon, 6 Mar 2017 19:45:45 -0800 (PST)
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0136.outbound.protection.outlook.com [23.103.201.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B61F312706D; Mon, 6 Mar 2017 19:45:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=P9cIF0soAOiPFw3nFF7no3R2RwFG0qYFdB3YsCo0KQo=; b=hcSyfAKt0bj0fMskVM9698SbmMnU9fRc5PwrkwxKMTAijKyG+/6dmmZqQljzFpd9FpM06Ot97NiL/n2ELIzifHMmfE5MIRUXvR2HiamHPKnyv4NJIUej0WiecVdsrHI/e34v/DJoVuA1mOPlY77MmAWKr94Wt/1pNCSfQm+szY0=
Received: from DM2PR09MB0446.namprd09.prod.outlook.com (10.161.252.145) by DM2PR09MB0447.namprd09.prod.outlook.com (10.161.252.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.947.12; Tue, 7 Mar 2017 03:35:41 +0000
Received: from DM2PR09MB0446.namprd09.prod.outlook.com ([10.161.252.145]) by DM2PR09MB0446.namprd09.prod.outlook.com ([10.161.252.145]) with mapi id 15.01.0947.020; Tue, 7 Mar 2017 03:35:41 +0000
From: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
To: IDR <idr@ietf.org>
Thread-Topic: New Version Notification for draft-ietf-idr-route-leak-detection-mitigation-06.txt
Thread-Index: AQHSlu7P5Kft+0ekvk2MFAsD/mD0OqGItr2o
Date: Tue, 07 Mar 2017 03:35:41 +0000
Message-ID: <DM2PR09MB044635AB56742B1D3D82682F842F0@DM2PR09MB0446.namprd09.prod.outlook.com>
References: <148885555293.15065.2709695938640044668.idtracker@ietfa.amsl.com>
In-Reply-To: <148885555293.15065.2709695938640044668.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=nist.gov;
x-originating-ip: [129.6.218.70]
x-ms-office365-filtering-correlation-id: 13691988-8a3e-4199-e9da-08d4650b07ff
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081); SRVR:DM2PR09MB0447;
x-microsoft-exchange-diagnostics: 1; DM2PR09MB0447; 7:Gy5hpJfsPF8cPEvAHnGoBGx75Rb6alscQxSPTxan9oVLHFyDoq96BHMGPVBuf7aOjabH/WyIvnZxXBI547ZFRumavX2DrmHZfWUc1hjC7+41Ne9rLynBq2blcjUZqmugW9MMn/GOiwb4ntFNqE/WH2glv5HIrTrPhxJb5CkbS1IcKAuJuRoVURBHmKoYA0G0Z2ltc2o3QG90kwI5XtSMNVzSY4Y8OyPDgDQMMw8YxasrkfAJuGFEbumFQ4mnmrSUQ7subZ+uDjZKkhdvmCxVBX7GBHV818TxXDrvh4j89WBDSYxPMEXzMptfUceay4hsORqNLt2Jrp0VgcqC9qcD2g==
x-microsoft-antispam-prvs: <DM2PR09MB04475B75E7AF5971F87D2B86842F0@DM2PR09MB0447.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6055026)(6041248)(20161123558025)(20161123560025)(20161123562025)(20161123564025)(20161123555025)(6072148); SRVR:DM2PR09MB0447; BCL:0; PCL:0; RULEID:; SRVR:DM2PR09MB0447;
x-forefront-prvs: 0239D46DB6
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(7916002)(39410400002)(39860400002)(39840400002)(39850400002)(39450400003)(377454003)(377424004)(8936002)(3660700001)(33656002)(15650500001)(450100001)(2900100001)(3280700002)(3846002)(102836003)(6116002)(66066001)(6436002)(2473003)(229853002)(9686003)(2906002)(6506006)(55016002)(8676002)(81166006)(25786008)(54906002)(99286003)(6306002)(77096006)(189998001)(2950100002)(74316002)(106116001)(6916009)(7736002)(76176999)(7696004)(50986999)(5660300001)(54356999)(86362001)(305945005)(110136004)(38730400002)(230783001)(92566002)(53546006)(53936002)(122556002)(4326008); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR09MB0447; H:DM2PR09MB0446.namprd09.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2017 03:35:41.7308 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR09MB0447
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/kTyD-xQdHsg69KAe56hnlK1jaqo>
Cc: "idr-chairs@ietf.org" <idr-chairs@ietf.org>, "draft-ietf-idr-route-leak-detection-mitigation.authors@ietf.org" <draft-ietf-idr-route-leak-detection-mitigation.authors@ietf.org>
Subject: [Idr] Fw: New Version Notification for draft-ietf-idr-route-leak-detection-mitigation-06.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Mar 2017 03:45:47 -0000

In this version 06 draft, the following sections are new or significantly updated:     

4.  Mechanisms for Prevention, Detection and Mitigation of Route Leaks . . 6
4.1.  Ascertaining Peering Relationship . . . . . . . . . . . .   6
     4.2.  Prevention of Route Leaks at Local AS: Intra-AS Messaging…   7
       4.2.1.  Non-Transitive BGP Community for Intra-AS Messaging …   7
       4.2.2.  Non-Transitive BGP pRLP Attribute for Intra-AS Messaging …    8
    6.5.  Per-Hop RLP Field or Single RLP Flag per Update?  . . . .  16
8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  19

Section 6.5 has a fresh new illustrated example for understanding 
comparisons between per-hop RLP Field vs. single RLP Flag per update.

Comments welcome.

Thanks,
Sriram  

________________________________________
From: internet-drafts@ietf.org <internet-drafts@ietf.org>
Sent: Monday, March 6, 2017 9:59 PM
To: Sriram, Kotikalapudi (Fed); Montgomery, Douglas (Fed); Andrei Robachevsky; Brian Dickson; Keyur Patel
Subject: New Version Notification for draft-ietf-idr-route-leak-detection-mitigation-06.txt

A new version of I-D, draft-ietf-idr-route-leak-detection-mitigation-06.txt
has been successfully submitted by Kotikalapudi Sriram and posted to the
IETF repository.

Name:           draft-ietf-idr-route-leak-detection-mitigation
Revision:       06
Title:          Methods for Detection and Mitigation of BGP Route Leaks
Document date:  2017-03-06
Group:          idr
Pages:          24
URL:            https://www.ietf.org/internet-drafts/draft-ietf-idr-route-leak-detection-mitigation-06.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-idr-route-leak-detection-mitigation/
Htmlized:       https://tools.ietf.org/html/draft-ietf-idr-route-leak-detection-mitigation-06
Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-idr-route-leak-detection-mitigation-06

Abstract:
   RFC 7908 provides a definition of the route leak problem, and also
   enumerates several types of route leaks.  This document first
   examines which of those route-leak types are detected and mitigated
   by the existing origin validation (OV) [RFC 6811].  It is recognized
   that OV offers a limited detection and mitigation capability against
   route leaks.  This document specifies enhancements that significantly
   extend the route-leak prevention, detection, and mitigation
   capabilities of BGP.  One solution component involves intra-AS
   messaging from ingress router to egress router using a BGP Community
   or Attribute.  This intra-AS messaging prevents the AS from causing
   route leaks.  Another solution component involves carrying a per-hop
   route-leak protection (RLP) field in BGP updates.  The RLP fields are
   proposed to be carried in a new optional transitive attribute, called
   BGP RLP attribute.  The RLP attribute helps with detection and
   mitigation of route leaks at ASes downstream from the leaking AS.