Re: [Idr] I-D Action: draft-ietf-idr-large-community-01.txt

Nick Hilliard <nick@foobar.org> Sun, 09 October 2016 23:34 UTC

Return-Path: <nick@foobar.org>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47445129417 for <idr@ietfa.amsl.com>; Sun, 9 Oct 2016 16:34:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4aBg6xk731qO for <idr@ietfa.amsl.com>; Sun, 9 Oct 2016 16:34:10 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D0BF124281 for <idr@ietf.org>; Sun, 9 Oct 2016 16:34:09 -0700 (PDT)
X-Envelope-To: idr@ietf.org
Received: from cupcake.local (admin.ibn.ie [46.182.8.8]) (authenticated bits=0) by mail.netability.ie (8.15.2/8.15.2) with ESMTPSA id u99NY4uq020332 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 10 Oct 2016 00:34:05 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.ibn.ie: Host admin.ibn.ie [46.182.8.8] claimed to be cupcake.local
Message-ID: <57FAD3EA.6070800@foobar.org>
Date: Mon, 10 Oct 2016 00:34:02 +0100
From: Nick Hilliard <nick@foobar.org>
User-Agent: Postbox 5.0.4 (Macintosh/20161007)
MIME-Version: 1.0
To: "t.petch" <ietfc@btconnect.com>
References: <147531113077.4216.12599976309263776317.idtracker@ietfa.amsl.com> <20161001085434.GW20697@Vurt.local> <005b01d21d58$aaf869e0$4001a8c0@gateway.2wire.net> <20161003095936.GC20697@Vurt.local> <04cf01d21d68$52c656a0$4001a8c0@gateway.2wire.net> <20161003115723.GD20697@Vurt.local> <57F27D3F.7090404@foobar.org> <00da01d22085$4f0f2ee0$4001a8c0@gateway.2wire.net> <57F78B7D.609@foobar.org> <333030E6-0422-4A34-B07B-90D5F8E9F116@gmail.com> <57F92043.20301@foobar.org> <A9BBA442-361F-444F-9AFC-33FAAF5F6061@gmail.com> <00ff01d22214$a9832440$4001a8c0@gateway.2wire.net>
In-Reply-To: <00ff01d22214$a9832440$4001a8c0@gateway.2wire.net>
X-Enigmail-Version: 1.2.3
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/omEW2PwEMZHywN-4sL3LYqxL-YQ>
Cc: idr@ietf.org
Subject: Re: [Idr] I-D Action: draft-ietf-idr-large-community-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Oct 2016 23:34:12 -0000

t.petch wrote:
> There is nothing IMHO in
> '   Global Administrator:  A four-octet namespace identifier.  This
>       MUST be an Autonomous System Number assigned by IANA.'
> which says whose ASN it is, just that it must be an ASN; if you allow
> IPv4 addresses, Router ID, IGP Area numbers and so on, anything else
> that fits into 32 bit, then it all breaks down so it MUST be an ASN.  At
> a stretch, that wording includes private ASN since those values are
> assigned by IANA although we might want to point that out explicitly.

There's something I'm not getting here in this discussion.

Let's step back a bit and start with a principal:  "if a policy cannot
be enforced, it is bad policy".

There is no way a priori for a router to have knowledge of what ASNs
have or have not been assigned, either by IANA or any other assignment body.

If a standards track document is created which mandates that a specific
identifier field "MUST" contain a ASN assigned by IANA, there is no
practical way for another router to check this.  Because the MUST cannot
be checked or enforced in any meaningful way, a formal requirement of
this form automatically falls into the realm of bad policy.

The best option here is - as Brian noted - to align with 1997 semantics
and make a recommendation to operators that the global administrator
field should be an ASN, and to stay well clear of attempting to define
what an ASN is, or is not. Operators are adults and will do what works
for them; there's no need to be over-prescriptive.

Nick