Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00

Jared Mauch <jared@puck.nether.net> Thu, 29 November 2012 18:29 UTC

Return-Path: <jared@puck.nether.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7985821F89BA for <idr@ietfa.amsl.com>; Thu, 29 Nov 2012 10:29:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2GvYhvMFQjvi for <idr@ietfa.amsl.com>; Thu, 29 Nov 2012 10:29:50 -0800 (PST)
Received: from puck.nether.net (puck.nether.net [IPv6:2001:418:3f4::5]) by ietfa.amsl.com (Postfix) with ESMTP id 8195821F841B for <idr@ietf.org>; Thu, 29 Nov 2012 10:29:50 -0800 (PST)
Received: from [10.0.0.137] (173-167-0-105-michigan.hfc.comcastbusiness.net [173.167.0.105]) (authenticated bits=0) by puck.nether.net (8.14.4/8.14.4) with ESMTP id qATITgkv006282 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 29 Nov 2012 13:29:43 -0500
Mime-Version: 1.0 (Apple Message framework v1283)
Content-Type: text/plain; charset="windows-1252"
From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <CEEF8969-16D0-42B9-A093-F058E5D1848F@apnic.net>
Date: Thu, 29 Nov 2012 13:29:42 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <165A232F-F07C-4AD1-9A08-55A6BD238656@puck.nether.net>
References: <B6B72499-E9D0-4281-84EB-6CA53694866E@juniper.net> <2CDB688B-9C24-4AF5-8900-20A88211AC54@apnic.net> <1AF020BC-65F1-4484-AAAD-355A294A7692@kumari.net> <CEEF8969-16D0-42B9-A093-F058E5D1848F@apnic.net>
To: Geoff Huston <gih@apnic.net>
X-Mailer: Apple Mail (2.1283)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.6 (puck.nether.net [204.42.254.5]); Thu, 29 Nov 2012 13:29:43 -0500 (EST)
Cc: "idr@ietf. org" <idr@ietf.org>
Subject: Re: [Idr] WGLC on draft-ietf-idr-as-private-reservation-00
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Nov 2012 18:29:51 -0000

On Nov 29, 2012, at 1:21 PM, Geoff Huston wrote:

> On 30/11/2012, at 3:49 AM, Warren Kumari <warren@kumari.net> wrote:
> 
>> 
>> On Nov 28, 2012, at 10:07 PM, Geoff Huston <gih@apnic.net> wrote:
>> 
>>> 
>>> On 29/11/2012, at 8:26 AM, John Scudder <jgs@juniper.net> wrote:
>>> 
>>>> Folks,
>>>> 
>>>> We have received a request for a working group last call on draft-ietf-idr-as-private-reservation-00. A URL for the draft is http://tools.ietf.org/html/draft-ietf-idr-as-private-reservation-00
>>>> 
>>>> Please send comments to the list by December 14. [*]
>>>> 
>>> 
>>> I am opposed to this draft - increasing the size of a unordered non-unique identifier space is counter-productive.
>> 
>> … and I support it -- some folk have a need for more than 1023 "private" ASNs and *really really* don't want to do the "just reuse the same one and then use something like the 'allows-in' and similar hacks".
>> 
>> Yes, going to an RIR and requesting a few thousand global ASes is possible, but to me seems inelegant.
> 
> ???

I think the issue he raises here is that to provide uniqueness, one could ask for real ASNs, but folks may not or be unable to do this.  If they are not used on the big-I Internet, why should they come from that pool.

> 
>> 
>> Close to 100,000 reserved ones feels overly large to me, but it does line up nicely on a (decimal) boundary.
> 
> But if there is a single need for 100,000 code points in single coherent space then you have to ask how one could ensure uniqueness within the deployment space, as you are now talking about a large number of entities and a large coder point space, and according to your response, the reason why there is a driving need  duplicate an existing uniqueness framework is because the current framework we have for ensuring uniqueness of AS number code points is ... "inelegant"?

I raised this issue privately with someone earlier today as well.  Collisions are likely to happen as someone will either
take the min(private_as_space) and increment, or take max() and decrement.  It's impractical to take a random number from that space, and even if so, does not prevent a collision.  If you have a need for a unique ASN to avoid this case, one should apply for one, even if used on a private network.  In arin region it seems it would be $500 one time + $100/year.  Likely around the cost of those 10G optics or the O&M on the equipment being used so easily justified.

> Obviously I'm unconvinced by such as assertion, and remain opposed to the further progress of this document.

I share this reservation and respectfully disagree with my friend Warren on this topic.

- Jared