Re: [Idr] I-D Action: draft-ietf-idr-deprecate-as-set-confed-set-01.txt

"Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov> Tue, 12 November 2019 00:01 UTC

Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 281DB1200FF for <idr@ietfa.amsl.com>; Mon, 11 Nov 2019 16:01:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nist.gov
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZL1d0N2_kIoK for <idr@ietfa.amsl.com>; Mon, 11 Nov 2019 16:01:32 -0800 (PST)
Received: from GCC02-DM3-obe.outbound.protection.outlook.com (mail-dm3gcc02on2136.outbound.protection.outlook.com [40.107.91.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 876A41200FD for <idr@ietf.org>; Mon, 11 Nov 2019 16:01:32 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=J4UYcp2wJnoXEKdBaNyIV0K6ezsX+e1TjU/JtFmdiQx8h9biof2xeMdLhy3RFqsewYPT7wx03Vwb8g/t/CMEaG1T2MVU5SC0NQkYtSoUkW1OmFDt3GHLwrasMGsvGXi9lumPykYW+CDtpFJe6lKd6f6pcHGg75d8Hl+R4wuqF6TepUPOTPWa6FKdDnFnxQn26vfIzLtIamatLxbBHyDNITF2IDO4HkdFvJUHw3dz3gAhsEU/MOge2kY593t2YIiM/1FX1IThhRO5s62vHYGwcLC6wiBG+q9cCaTBGUmhl77TSUVKii6V5aTTfvO5xnT/BjWawQ3vXFEcDCEiE2UdEQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bRsNqz1tCKIeQTXKTR7R7X/xilIZI/nkeHH6Unwd1vw=; b=j4ocF4dtoQnlNkX/xfZRhLtyo1iwoTTia89eVz0PcwaG1cO1NUlrrpnsMbSaBaYY8Kgl4lGYDYqKiQyvSgUaajxjyzc4hqkj9dOL2VigHWHTaSeFFGtO9zi8ay0skNoYayO9Wc7EBlU5GLl7BnjZ0ZpXhmXW4mxNS9K2XvBCIzPBTDSODoUQWYtv9fkF6GPD1nIJJYRshRJbgrT2dmFQ0B6HT/ZqC1SiCxgUPVrceUQ9213aO4jDSHLRY6UMOKpFKXv/hJzr5J1g/abaJH522oA0IW+4VTSPGra5qs2SrTg7UGgfRCFffxUjiWhORLtsixGdv8+fT/jbYJMpCnGlkQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nist.gov; dmarc=pass action=none header.from=nist.gov; dkim=pass header.d=nist.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nist.gov; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bRsNqz1tCKIeQTXKTR7R7X/xilIZI/nkeHH6Unwd1vw=; b=nxCX8QNqZcfkxgdLANw0E/66Ocv+nQFh/STQ4YTsmlG8sUhwd9nu4NjhjHIHc15PzIExBT+beO784DWrsm/yjI5vFDpMq9EbrJZCwMV3l+Qx6/5z4F2DfXIIu7d4ju0c7tfk/xMHNtPXSKsZhFErQ+yKSGv7mwf3C8puRbLIEIA=
Received: from BN6PR09MB1331.namprd09.prod.outlook.com (10.172.21.141) by BN6PR09MB1186.namprd09.prod.outlook.com (10.172.18.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2430.22; Tue, 12 Nov 2019 00:01:28 +0000
Received: from BN6PR09MB1331.namprd09.prod.outlook.com ([fe80::a0aa:132a:121f:3495]) by BN6PR09MB1331.namprd09.prod.outlook.com ([fe80::a0aa:132a:121f:3495%3]) with mapi id 15.20.2430.027; Tue, 12 Nov 2019 00:01:28 +0000
From: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
To: Jeffrey Haas <jhaas@pfrc.org>, john heasley <heas@shrubbery.net>
CC: IDR <idr@ietf.org>, Warren Kumari <warren@kumari.net>
Thread-Topic: [Idr] I-D Action: draft-ietf-idr-deprecate-as-set-confed-set-01.txt
Thread-Index: AQHVmOmyEaGXvXTW/kiVr5gPZProeQ==
Date: Tue, 12 Nov 2019 00:01:28 +0000
Message-ID: <BN6PR09MB133110D70E9A9411665B087684740@BN6PR09MB1331.namprd09.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=kotikalapudi.sriram@nist.gov;
x-originating-ip: [132.163.222.96]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: ab5e9226-a0f1-4d32-dc32-08d7670377a2
x-ms-traffictypediagnostic: BN6PR09MB1186:|BN6PR09MB1186:
x-ms-exchange-purlcount: 1
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BN6PR09MB11866E8BABCFA1462528963784770@BN6PR09MB1186.namprd09.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 021975AE46
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(136003)(366004)(346002)(39860400002)(396003)(376002)(189003)(199004)(66446008)(8676002)(54906003)(110136005)(7736002)(8936002)(316002)(229853002)(305945005)(6436002)(14444005)(256004)(81166006)(81156014)(25786009)(66574012)(5660300002)(66556008)(64756008)(52536014)(66476007)(74316002)(7696005)(102836004)(6506007)(71190400001)(71200400001)(486006)(476003)(186003)(26005)(9686003)(2906002)(66066001)(3846002)(6116002)(14454004)(478600001)(66946007)(76116006)(91956017)(86362001)(966005)(33656002)(6306002)(55016002)(99286004)(6246003)(4326008); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR09MB1186; H:BN6PR09MB1331.namprd09.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: A9+KnoV/0ugWIUG9OpDHg30ZJnrk4wbJINTkdPoBrnz2tcq6DQyFdJKGDFVA+8I+yGWCx/oX9J8Yn4bSchBjkpG22pQ1aH1Q7LXo/4XvFGswRyaKBoyDxxJuKmSVL0Rj5lLreXaI4D3TG/Htn5luc9kdYI1w0BdbW1LLFpA9rnj3rPdbrSWoiVkYQSPjIhlO9cR01jiU5GyK8dkjguaN2uzLQNjXrbxcfVKf/t6ZNQOsKRQ2ovz+iZe7gpo0MqupBzED75Fh5pljJrM29w0rQlml2v/0r6ttIpz2z/YMo4CvZqUwlXza9JVIFHXgSjO3iGmJvLolInqfcZ/4iIV9la0K/jQkiuBELuPTstxAtjOmRP7C4p/bycrT6i5l5AS71344SgloRuUUgEnoTBUQ7aJ5eYgvj4PWp3rh0OdnQwks0vNBK22ysuzxL/9VlJ++6rsNJQJMKB4MNI4pD6hGOXz4INCZMR2SZ5AKZoam6To=
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-Network-Message-Id: ab5e9226-a0f1-4d32-dc32-08d7670377a2
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Nov 2019 00:01:28.4639 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KW/ajFVfMCUtxdhB//eLunkbx6xbMQDaWcHtFdN4moYox1xwUjlaHPH7iRaE8XnXWbrG37Xc/WzDY7nE8LPfEw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR09MB1186
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/nxMd1rBjOieRZa5Npq4XlKs97Ro>
Subject: Re: [Idr] I-D Action: draft-ietf-idr-deprecate-as-set-confed-set-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Nov 2019 00:01:36 -0000

Jeff,

Sorry it took me time to respond. My responses are inline.
I'll look forward to connecting with you in Singapore and going over the key points.

>
… snip…
>
>> > The implications:
>> > - You have to provide an entire revised section 9.1.4 for RFC 4271.
>> 
>> This is no longer relevant given my response above.
>> However, section 9.1.4 says (in the last paragraph):
>>    “If a BGP speaker chooses to aggregate, then it SHOULD either include
>>    all ASes used to form the aggregate in an AS_SET, or add the
>>    ATOMIC_AGGREGATE attribute to the route.”
>> We could recommend changing it to:
>>    “If a BGP speaker chooses to aggregate, then it SHOULD 
>>    add the ATOMIC_AGGREGATE attribute to the route.”
>
>Minimally, that's necessary.
>
>I think we'll find that makes things more annoying than set elements at some
>point down the line.  The motivation to remove sets is that origin
>validation gets difficult/impossible.  You'll find most implementations
>don't have a way to test for atomic aggregate in policy at all.
>
>Why would you care?  AA says "never deaggregate".  At some place in the
>network, a given prefix may be encountered with and without AA set.  In one
>of these cases, it used to be the case that the path was shortened from a
>calculated standpoint (this is a side effect of proxy aggregation - as-sets
>are length one for the whole set).  And now they're differently comparable.
>
>This is an edge case.  But once this thing ships as an RFC, I'll set a timer
>for the incoming request for a knob to deal with its consequences.

Yes, AA says "never deaggregate". 
But IMO, it seems correct to say that AA is vestigial.
I think ASes perhaps pay little attention to it because they do not usually
have a need to deaggregagte something that was aggregated elsewhere.
That is why aggregation seems to be working fine with AGGREGATE alone 
and without inserting AA or AS_SET in the Update.
Please see my explanation in an earlier post: 
https://mailarchive.ietf.org/arch/msg/idr/BxaurATmHTUIxlE8lulR36Y5nF0 

>
>> > 
>> > Misc. open issue:
>> > - What do you do about "atomic aggregate?"
>> > - You're also deprecating appendix  F.6 of RFC 4271
>> > - You're modifying recommendations for appendix F.4 of RFC 4271.
>> > 
>> 
>> I think we don’t need to change anything about ATOMIC_AGGREGATE
>> for the purpose of this document.

>
>I'll wait on others to comment here.  It's been my observation over nigh 20
>years of BGP that even the inventor of the feature didn't fully understand
>what it did.  And now, courtesy of removing sets, it'll be more mandated
>than before.

I don’t think AA will be more mandated due to the removal of sets.
IMO, AA can also be possibly deprecated as I tried to explain above.

>
>> Yes, we can say “deprecate appendix  F.6 of RFC 4271”.  
>> We can say the same about F.4 “deprecate appendix  F.4 of RFC 4271”.  
>> F.4 is no longer relevant when AS_SET is deprecated.
>> 
>> However, I think rather than get specific about such instances, 
>> it better to have an overarching statement. So, the draft now includes
>> this statement in Section 4:
>> 
>>    “Wherever mentions of AS_SET or AS_CONFED_SET occur in [RFC4271] and
>>    [RFC5065], appropriate modification or elimination of the text must
>>    be made in future RFCs that would replace these RFCs, consistent with
>>    the deprecation of AS_SET and AS_CONFED_SET.”

>
>You're making an intrusive change to RFC 4271.  Handwaving details and
>leaving them up to generally clueless implementors to intuit was is meant
>here is not something we should ship.
>

I am happy to work with you to exactly chart out these details.
We can discuss this in person in Singapore.

>For my part, I'll strongly suggest to the chairs that we do not pass this
>document through WGLC without this dealt with.  Too many of us spent too
>many cycles on RFC 4271 and the consequences of sloppy wording thereafter
>not to do so.
>

See my response above. We can make it right.


>[impacts of proxy aggregation]
>> Regarding your question “How do you do this”, here is my two cents worth.
>> I think if AS X is aggregating (without using AS_SET) P1/24 (from cust. A), 
>> P2/24 (from cust. B), P3/24 (from cust. C)  and P4/24 (from cust. D) to P/22,
>> then AS X will announce the P/22 aggregate to its transits and later peers
>> (while including ATOMIC_AGGREGATE attribute in the aggregate update),
>
>Implication for RPKI, it is the originating AS and is permitted in the ROA
>to originate such a shortened route.
>
>> but not to the customers. 
>
>To do so, configuration related to the aggregation now must be pushed to the
>ASBR connections of the component routes.

I trust this cannot be new to operators. Hard to imagine that those who
aggregate prefixes are sending only the aggregate to their downstream customers 
and not sending the components, i.e., the more specific prefixes.

… snip …

>> AS X will announce to each of the four customers,
>> only the more specific prefixes contributed by the other three customers. 
>
>This point is correct, and should be documented, because it interacts with
>the operational model change above. 

OK. Yes.

>
>We didn't have to filter the less specific to the providers, but we do now.
>That is likely to be a prefix filter.  We need to ensure that the more
>specifics get propagated.  That prefix filter has to be correctly specified
>vs. the filter on the less specific.  (I.e. don't just reject >= /22 to the
>peers!)

“We didn't have to filter the less specific to the *providers*” ?
Did you mean *customers* instead?
Less specific (aggregate of customer routes) is meant to be 
sent to the providers (upstream).

>
>> In addition, RFC 4271 (sec. 9.1.4) says the following for all other ASes
>> (transits, peers, customers of peer, etc.) that receive the aggregate:  
>>  “In particular, a route that carries the
>>    ATOMIC_AGGREGATE attribute MUST NOT be de-aggregated.”  
>> 
>> I don’t think we need to put text in the document regarding the above
>> since it seems to be adequately covered in RFC 4271. Your take?
>
>You also now have the fun of what happens when the route gets around to the
>back door of such an aggregated service provider.
>
>Simplified example:
>
>   Internet --- Aggregating -------- Customer
>                               |                                |
>                              +---------------------+
>
>The customer announces P1/24.
>
>Aggregating upstream, that peers with customer, generates P1/22, a less
>specific of the more specific P1/24.  It announces it upstream to the
>Internet, and suppresses P1/24.
>
>The customer at some point receives P1/22.  This covers their internal
>address space of P1/24.
>
>Previously, when AS_SETs were used, P1/22 would have been dropped by the
>Customer automatically as a loop.  This no longer happens.

I see not much harm if P1/22 is installed at the customer’s AS.
They need reachability for the rest of the P1/22 (besides the P1/24).
Likely, the aggregating AS announced the other components of
the aggregate P1/22 to the customer. Data traffic gets routed to those more 
specifics and the less specific (P1/22) is only a backup route in the customer's AS.

>
>It is a BCP that providers should filter routes that cover their address
>space.  Filtering out P1/24 and longer is easy.  What do they do about
>P1/22?  What filtering construct says "this overlaps my /24?"  You've
>created a new policy need, I think. *

Referring to your * -- you may be right that AS operators 
(your customers) are smart :)
P1/22 gets installed and is a backup route in the customer's AS. 
There no harm and no need to filter it. 
The more specific routes (P1/24 and other components of P1/22) are primary.

>
>If the internal P1/24 reachability goes away, we may end up in temporary
>forwarding loops until the Internet converges.  (Internal traffic heads
>toward the Internet via the /22 to eventually arrive back through the
>Aggregating ISP.)  Alternatively we end up with some new need to filter
>outbound traffic for routes we know we announce.

When P1/24 reachability goes away, shouldn’t the aggregating AS
re-aggregate without the P1/24? Then the looping wouldn’t 
occur except may be for a short transient period. 
Additionally, at present, doesn’t the recovery happen fast?
Companies employ live standby BGP session etc. for fast recovery.

Thanks.

Sriram
   
>
>-- Jeff
>
>* There's a chance I'm missing the obvious here.  Generally, my customers
>are more clever about using our policy than I am. :-)
>