Re: [Idr] AD Review of draft-ietf-idr-bgp-gr-notification-13

"John G. Scudder" <jgs@juniper.net> Tue, 03 April 2018 20:56 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C85812D877; Tue, 3 Apr 2018 13:56:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.489
X-Spam-Level:
X-Spam-Status: No, score=-2.489 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id orJh93Ykadm7; Tue, 3 Apr 2018 13:56:34 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1EA8912706D; Tue, 3 Apr 2018 13:56:34 -0700 (PDT)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w33Jubob006851; Tue, 3 Apr 2018 13:03:00 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=PPS1017; bh=rjvcPNR8wcmx4ZwO/M+xmAgHxxKpV+qobJXnltESH/s=; b=HFx3ERcofjxzydsKhaJNDxKxXxTLZ3owzy5S4qW7t/UdsQrzttuHkMWKZ8ZLKEcNHYgu /lpOqHXbrVtBMLXP1hGrg41bvDK31ikCMcKUwuFIyDSF3RV0KiqjzMZN4nWVbnkiKh/R Abt0Gf2NQG77XkEx8MEvPt0ACRvO/ZtDW4oFH24+B9oQCExQY5FqJONwR5siK9voamZO yDjW/eh9O805Wk++k3FRxrptbwGbh4N80PiDuYGQNxo+yJpDPvha4PZJSMTTTyStqOOC DiYiZJhJTKsNaW3S1AoMwrMTJk6jy8rY7SK49HaYUPXKF8vLYSSnDINwWY6aTh+40tly /A==
Received: from nam02-bl2-obe.outbound.protection.outlook.com (mail-bl2nam02lp0088.outbound.protection.outlook.com [207.46.163.88]) by mx0b-00273201.pphosted.com with ESMTP id 2h4ft681ng-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Tue, 03 Apr 2018 13:02:59 -0700
Received: from [172.29.34.63] (66.129.241.13) by SN1PR0501MB2077.namprd05.prod.outlook.com (2a01:111:e400:5962::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.653.5; Tue, 3 Apr 2018 20:02:57 +0000
From: "John G. Scudder" <jgs@juniper.net>
Message-Id: <03AE36E3-F18B-4F34-9A6C-242AA1CAB4EC@juniper.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_144961DE-722E-44BD-9D37-3B0C4F776424"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Tue, 03 Apr 2018 16:02:48 -0400
In-Reply-To: <CAMMESszAe0avmcX0X95uOwRu29cTvbx_t7ewBwU-Hig20SD9pg@mail.gmail.com>
Cc: draft-ietf-idr-bgp-gr-notification@ietf.org, idr-chairs@ietf.org, Jie Dong <jie.dong@huawei.com>
To: Alvaro Retana <aretana.ietf@gmail.com>, "idr@ietf. org" <idr@ietf.org>
References: <CAMMESszAe0avmcX0X95uOwRu29cTvbx_t7ewBwU-Hig20SD9pg@mail.gmail.com>
X-Mailer: Apple Mail (2.3273)
X-Originating-IP: [66.129.241.13]
X-ClientProxiedBy: DM3PR12CA0104.namprd12.prod.outlook.com (2603:10b6:0:55::24) To SN1PR0501MB2077.namprd05.prod.outlook.com (2a01:111:e400:5962::26)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: df0c6df4-daa5-4d67-83a5-08d5999de581
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:SN1PR0501MB2077;
X-Microsoft-Exchange-Diagnostics: 1; SN1PR0501MB2077; 3:bZdkW73lHLjhsAuWPVoIaJcTjH8/V+QyEZlCQ/KpxvlTJ0LlNNedzz/QAQdRtzschkgzzIoFVW1H9vJBcE3s0JVeEPCy/jmYQ6C0a7HXHIM/6K59hQroP0/FmypzGyD/SsafceeI1lJ/X+wVe8ytTVdG2FB9dclbFi4gLt4KnMtgwiE3Alcvu9gL3PUCH3lsI6Z8Ku/lv/Kdb5flx6STvbHDgIHfNuwBreVK9i/5Sv44g3ZQsw2yX/qniv77IEOF; 25:sFNB89KIgsajQnni1La7WPQjhdo0Q4uB9Vlznok1PwWGc5qEPlXD2hlLMPogpZ8shH1wcE+EaQ76eV0NopAJxBXTx31EmCkXSSkCudx6lJd+K6dnFJTlsH0pSnUnqdw3AihrQeXnETeOf6fS/Ged4g6kal8rVukX6CvHH26lsAlfi5cWpZKimpFb72HSnR+sTUmsYckIp3t1jjiHF4g9t6i2FyGnqQeLyUBJOFGAETUOk3wNfwCQNo4SfxlEA6SpichuQ2rAg5aLYK8KyE1gE0qCw06iMwHkKCY7ryzk0HNXzMkFwHNFTUqgPFEPC+j3WXQf5JhudytW7iQHJ9SkJg==; 31:ANxpgVFzSX5Y+VD4dewk560YKX/XrRsnvR06qt8DNwgY3VXasq88OAWtWmmgFPA99eNqQd479REvsouCQScwHn9M/CS4mCpUGbVec+T25fAqAywmnmQjBjwJdNcRh9JmCsGe9FVcenHnt8bP/AdrYri0wdlKGC1yDvIFEuKpxmAk9g2OvVQM6UeASXb+ue/IYueKEhykbNCSxAToWSFwjJe/KrLkBoKwpgWBzeJom3M=
X-MS-TrafficTypeDiagnostic: SN1PR0501MB2077:
X-Microsoft-Exchange-Diagnostics: 1; SN1PR0501MB2077; 20:2CjzmonbTNlrfLO+cw2hCscHDj1ZuFsotk48LRkLBEGXLsA2VmpBcgvNvkyBUm8IlyMfhHNwbl+AapiGAxmauLdjxC6LnuDpL37Ib7AnjVtIJft72aWUtrL5zh3NYW3H8z/DCaIXJP4l2Pkm9qY0RnYn1yWxWF5nFOlKP06O3wP55JxImo8qxz6YRqxJHNz7a/HFlnKspHgvuXEubGWDd1UVCx3jA28XaoPwelaPLdBQhyWqZCgIkg04kMY0KJCdk0+uA1+whHLYJRNj8HVAe27enWNK4QgCRG8PrBrF/PWquciJ66pneZ0E/cOYiqHNYtaame92jhT8gGuNKmlv8kRdCkG9oNk0g2801vsrEdSEBVHgnOn4HexNDyBLUre70GQGopo6GiDKsqjzo9gxC73Db6Dx/G0k0PIRUG144QoNyD7eR4frOXjPIWx2g5ngYz5SbP67OU++IhW0KMka1JMoVI6PNpsTgH3ftC80592C5y4NmQgk7GF9qqjp/OndxfzRQcoi3iInX7FkNJPZ7JZaLz5CLjvvdNbYPNqKwJkOD5IBVSF5AM2nNXeYwdXB48rTNAejyjFkaMQhMFTjUb6kJ2xgfdV0DD2K/NqrH98=
X-Microsoft-Antispam-PRVS: <SN1PR0501MB207737A80C211499D20274C7AAA50@SN1PR0501MB2077.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(85827821059158)(100405760836317);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231221)(944501327)(52105095)(93006095)(93001095)(3002001)(10201501046)(6055026)(6041310)(20161123562045)(20161123558120)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:SN1PR0501MB2077; BCL:0; PCL:0; RULEID:; SRVR:SN1PR0501MB2077;
X-Microsoft-Exchange-Diagnostics: 1; SN1PR0501MB2077; 4:xHgDYvZsMZvK7/Yutg1Fu3OmcTIRvqsZtErVHrARlypfgtw3EHel8pf4rUP4G8Igqwu+kmRjWo3iXxenAc4m1g/bjXhbDCGR6Ylr3zG7WfCbY5R5/4CUCgUmFrRojk2/vIuSQSq4SoVs3NnPCKaimiIQ0QYB/wUmh/hKeMDljrwUZVfdHadlaUqfPFxHSWz4L2gUi8NjnnB1muCwVOoQMynr3pbqrS01EyvO9dIxY0IeCVQteOFjZWj8WHDZM9THeYOLJB1MgAlV1uFmuQ35n+YaJUpqcyZCSGeUlUYfzi9aNZ29vrVFTWzYlR4fj3OW9Q8bXtz0VFkqXjimUWyb5uhc+1+cx0rW4X7ul6dHHKfMKZmq+0oJ3gpm5LzaFrF4
X-Forefront-PRVS: 0631F0BC3D
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6049001)(39860400002)(366004)(376002)(39380400002)(346002)(396003)(43544003)(199004)(51444003)(189003)(97736004)(84326002)(16586007)(16576012)(36756003)(83716003)(110136005)(316002)(386003)(76176011)(486006)(956004)(11346002)(2616005)(77096007)(59450400001)(52116002)(26005)(16526019)(53546011)(33964004)(476003)(186003)(446003)(5660300001)(82746002)(86362001)(68736007)(6486002)(236005)(966005)(7736002)(53936002)(33656002)(8936002)(6306002)(6666003)(8676002)(4326008)(229853002)(15650500001)(2906002)(3846002)(57306001)(6246003)(478600001)(69556001)(39060400002)(6116002)(105586002)(50226002)(81166006)(81156014)(66066001)(25786009)(606006)(106356001)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:SN1PR0501MB2077; H:[172.29.34.63]; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
Received-SPF: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1; SN1PR0501MB2077; 23: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
X-Microsoft-Antispam-Message-Info: ladXydv0YfCA6KOtbUYjFnIH+oEUWNV7py0L5Efg1tBQK3SeoC+xTvZECjLId8Za+6fD7TtEckJmgjfSQuMZqz9dN+SGSAduIcdIX6r92YW33QpeorERWu5X6sKuywJGln/m2dAoz66C7cJ4tDRTsXdOwsJFPrEbn1e8w2wZeQ6BetZeIKi7wPWTqCWkSRd/
X-Microsoft-Exchange-Diagnostics: 1; SN1PR0501MB2077; 6:oe8lWuhymTFaCG0iyYhxwU4uVMRplGp2fI0zDqqtjaiHc19LcsDptvmpvT2ZWAlDx2GdJGpDD4vuE1ouc3BI4w0M/NNpp3xUpxcxcHO2+X8+CCE+0y9XUfCa9mrlvnyQOFRGS0KFD5dAtXGz9USG1y2pLPLZ8grEOydZWmYhSfjZGopzSWR/YRWdomyIOcDfAKXC5vft13oUk16+Z9wMUoOWYe25n6TBT77hQrtP06qIn+dE1KGIZtBCNUuzhBGy6iT/pP+nh9k9Qjr+Uluu2CR+U8KvBWO6hJLycFi5eU8qDmM9VPG9twa3HTKos8zYYdLbTZkaV+gD9+jOO+YhT22p3h6FElGa/FZKa5Twd5Ils7MxaBl0OUIk3f97wqjRphdu7FWjmI4ZycnzPdG9CCNyYwRArVeP8xLR8A6JJB4OXjsGOIuBlpkW9fAEhhMSrPbRzoPKDJ6KoGhpNbEPpg==; 5:GKZRCSxPuC0fybglNx3zg4nZHjGlr8skyrgFQ7u7VwwIHl6yv4ooYHQmKZnW9b+PFS1ssgdIhydGaf70ZdKyGLahZ4tabcE3xbpl1ph0Of5DpiYek3fqiB3uolviotqMnRHb3WrBHwPZbHVN7V00sYjzgJgt3lD0BrAsqCg634k=; 24:Z8zr8gdPX9Nk6uWROyc4PuiP11GlZP3KDN+oi7T5qCNMfmQDtpvbKNiwdqNPBaTIPgXG7af0Ph7uZ51sWYDfb3T6OMyqtau/vYblno8c0dQ=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; SN1PR0501MB2077; 7:LRYgFQ+9Jwr89McP896SC8CXIA2PjSEOZR5E4BLQC33dsxb8iut/3V1xZDmIaWRCl2tjGWbimYBpOAhj1NIlEyYPWt/LhmfU/lfTOZ1yDxPJ/KLWpadfsMrP8OSIBQenOq7oic1dOjp76GMUiM0oaxArnkUeYnbPej+Go8Jn4jA+HIoiVsSM1c2uX4Oe7wqkeRWW7d7bF7dScPtDsHhflA7EXSzZ2udKFgNB00d/XeNiiU7hK+fodKzcCa2Wt/bX
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Apr 2018 20:02:57.3621 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: df0c6df4-daa5-4d67-83a5-08d5999de581
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR0501MB2077
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-04-03_08:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804030200
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/lDExm-z-cm3fYAOPJyuaDjURQ1A>
Subject: Re: [Idr] AD Review of draft-ietf-idr-bgp-gr-notification-13
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Apr 2018 20:56:37 -0000

Hi WG,

As co-chair, I want to point out that the AD asked the WG for comments ("I want to ask the WG to consider..."). Since Alvaro asked more than three months ago and nobody answered, maybe nobody has anything to say -- as he points out ("[After I wrote the text above…] I found that some of the points have been discussed on the list already"), this topic was beaten to death in March 2017 (https://www.ietf.org/mail-archive/web/idr/current/msg17679.html and the following thread, specifically in the context of session culling which Alvaro brings up). Also, for reference the original WGLC all the way back in May 2014 is here: https://www.ietf.org/mail-archive/web/idr/current/msg13202.html.

However, maybe some people have just missed Alvaro's request, so if you have comments you want considered, please send them by April 10. I will follow up myself (with cu-author hat).

Thanks,

--John

> On Dec 7, 2017, at 4:11 PM, Alvaro Retana <aretana.ietf@gmail.com> wrote:
> 
> Dear authors:
> 
> I just finished reading this document — I have some comments, please see the list below.
> 
> I understand the intent of this document: instead of resetting a BGP session when a NOTIFICATION is received, use Graceful Restart; if the session is going to *really* be reset, then use the new Hard Reset sub-code.  That makes sense to me…but, is that the only code/sub-code for which it makes sense to do a hard reset?  The NOTIFICATION has always had the “stigma” of being something bad, so much that we (idr/IETF) have even worked on ways to reduce its use (rfc7606, for example).  I want to ask the WG to consider whether other code/sub-code NOTIFICATION combinations should also result in a hard reset.  I think there are several cases, for example:
> 
> (1) rfc4486 (Subcodes for BGP Cease Notification Message) defines “Administrative Shutdown” ("a BGP speaker decides to administratively shut down its peering with a neighbor”).  It seems to me that the sender of this NOTIFICATION would not want to "follow the rules for the Receiving Speaker” (as specified in Section 4).
> 
> (2) rfc4486 also defines "Administrative Reset” ("a BGP speaker decides to administratively reset the peering with a neighbor”); no more details are provided, but that sounds like a hard reset to me.
> 
> (3) …there’s probably others...
> 
> Having said all that, I note that Section 3.1. (Sending a Hard Reset) specifies the “encapsulation” (for lack of a better word) of the real reason for the Hard Reset.  If the consensus is to go forward with that, and not call out other exceptions, then I think that the text in 3.1 should expand more on the encapsulation operation and the rationale for doing it this way, and the document should also address other recent work that recommends the use of Administrative Shutdown, for example draft-ietf-grow-bgp-session-culling (a BCP currently in the RFC Editor’s Queue).
> 
> [After I wrote the text above…] I found that some of the points have been discussed on the list already — please include some of that discussion/analysis in the document.
> 
> 
> I’ll wait until the issue above and ones marked Major (below) are addressed before starting the IETF LC.
> 
> Thanks!
> 
> Alvaro.
> 
> 
> 
> Major:
> 
> M1. Unfortunately, rfc4724 failed to setup a registry for the Restat Flags (or the Flags for Address Family), which means that anyone is able to use the bits in there (assuming the receiver looks at them, of course).  Given that there are only a few bits, and to prevent conflicts, I would really like to see a registry set up.  This document is already tagged to Update rfc4724, so it seems like a good place to establish the registries.  [If for some reason you rather not include that information here, then we can take care of it elsewhere.  IOW, this request is not a requirement.]
> 
> 
> M2. Section 4.1. (Rules for the Receiving Speaker) has me a little confused.  Are the proposed changes contingent to setting the N bit?  The text starts by saying: "As part of this extension, routes from the peer previously marked as stale MUST NOT be deleted, until and unless the optional timer…expires…”…does that mean that the timer is no longer optional?   Then you also say: “...if the Graceful Notification ("N") bit is not set in the newly received Graceful Restart Capability, no new actions are triggered on the Receiving Speaker -- in particular, a clear "N” bit does not trigger deletion of stale routes.”  If I understand rfc4724 correctly, stale routes could be deleted — the text indicates changes in the behavior even if the N bit is not set, right?  If you are Updating this section of rfc4724, what would make it crystal clear is an “OLD/NEW” notation of the text (as in, this is the OLD text…and this is the NEW text…).
> 
> 
> M3. Security Considerations:  Maybe not a security issue, but something to think about.  Section 4.1 says that “routes...previously marked as stale MUST NOT be deleted, until and unless the optional timer...expires, or unless a Hard Reset is performed.  This supersedes the “consecutive restarts” requirement…”.  Not deleting the stale routes and not making the timer mandatory could result in stale routes that live forever if an attacker manages to create consecutive restarts (by simply sending NOTIFICATIONS before EoR) — stale routes are ok in the short term, but may point in the wrong direction eventually.  Is this an issue?  I think that it would be mitigated if the timer was made mandatory (with a nice default).
> 
> 
> 
> Minor:
> 
> P1. Section 4: “...receive and send BGP NOTIFICATION messages in Graceful mode...” What is “Graceful mode”?
> 
> 
> 
> Nits:
> 
> N1. In Section 2, please indicate that the first figure corresponds to the GR Capability from rfc4724.
> 
> N2. s/subcode is defined known as/subcode is defined as
> 
> N3. s/Graceful Notification flag/Graceful Notification bit   (For consistency)
> 
> N4. The operation is obviously per-AF; maybe it’s worth saying that somewhere just for completeness.