Re: [Idr] I-D Action: draft-ietf-idr-large-community-01.txt

"Jakob Heitz (jheitz)" <jheitz@cisco.com> Sun, 09 October 2016 21:55 UTC

Return-Path: <jheitz@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A9131295B4 for <idr@ietfa.amsl.com>; Sun, 9 Oct 2016 14:55:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.517
X-Spam-Level:
X-Spam-Status: No, score=-17.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RQwVqXAfSMc3 for <idr@ietfa.amsl.com>; Sun, 9 Oct 2016 14:55:47 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34A97129491 for <idr@ietf.org>; Sun, 9 Oct 2016 14:55:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4909; q=dns/txt; s=iport; t=1476050147; x=1477259747; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=S804GXIdrFzXQmYbDBhmNKgRohxhLXpbR7iBV7LGZHQ=; b=KDEHYjiMLfSemrZaHbLsnNWbvAJ+EDD0dLRUxBdjrgx4ftkUK2BMHcoP 6gWJpIV2HozukH4ZIla8Ipj1INEJnkvr2XWXEDUvfOIkqjzE+nKApHjyM oX5sfZ0mv4ktaVr3SdKt/n5yATC4WB8flq3229Ndyr18Ek1OrM/usH51i k=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AkAQCmvPpX/5NdJa1dGQEBAQEBAQEBAQEBBwEBAQEBgzwBAQEBAR1XfAeNLJcCh1uMVoILGwuCRIM2AoF6OBQBAgEBAQEBAQFeJ4RhAQEBBAEBATc0CwwEAgEIEQQBAQEeCQchBgsUCQgCBAENBQgMiCIDFw69HA2DZAEBAQEBAQEBAQEBAQEBAQEBAQEBARgFhj2EVYJHh18FmUo1AYxxgwSBdY4Ghw+BVIQUg34BHjZLgmYFHIFTcgGHAIEAAQEB
X-IronPort-AV: E=Sophos;i="5.31,468,1473120000"; d="scan'208";a="156141882"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 09 Oct 2016 21:55:33 +0000
Received: from XCH-RCD-013.cisco.com (xch-rcd-013.cisco.com [173.37.102.23]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id u99LtXYS006850 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 9 Oct 2016 21:55:33 GMT
Received: from xch-aln-014.cisco.com (173.36.7.24) by XCH-RCD-013.cisco.com (173.37.102.23) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Sun, 9 Oct 2016 16:55:32 -0500
Received: from xch-aln-014.cisco.com ([173.36.7.24]) by XCH-ALN-014.cisco.com ([173.36.7.24]) with mapi id 15.00.1210.000; Sun, 9 Oct 2016 16:55:32 -0500
From: "Jakob Heitz (jheitz)" <jheitz@cisco.com>
To: "t.petch" <ietfc@btconnect.com>, Brian Dickson <brian.peter.dickson@gmail.com>, Nick Hilliard <nick@foobar.org>
Thread-Topic: [Idr] I-D Action: draft-ietf-idr-large-community-01.txt
Thread-Index: AQHSG79TGAvzbRTYaUOLNdatGR0q+6CTny8AgALbUg+AAFuDAP//w9BUgABdGYCAAD/ogIAFnPnpgABp4oCAAKSCAIABPgaAgAA9LACAAJUrsoAAug9w
Date: Sun, 09 Oct 2016 21:55:32 +0000
Message-ID: <aade5f06410e4b24833e7680d534ddb3@XCH-ALN-014.cisco.com>
References: <147531113077.4216.12599976309263776317.idtracker@ietfa.amsl.com> <20161001085434.GW20697@Vurt.local> <005b01d21d58$aaf869e0$4001a8c0@gateway.2wire.net> <20161003095936.GC20697@Vurt.local> <04cf01d21d68$52c656a0$4001a8c0@gateway.2wire.net> <20161003115723.GD20697@Vurt.local> <57F27D3F.7090404@foobar.org> <00da01d22085$4f0f2ee0$4001a8c0@gateway.2wire.net> <57F78B7D.609@foobar.org> <333030E6-0422-4A34-B07B-90D5F8E9F116@gmail.com> <57F92043.20301@foobar.org> <A9BBA442-361F-444F-9AFC-33FAAF5F6061@gmail.com> <00ff01d22214$a9832440$4001a8c0@gateway.2wire.net>
In-Reply-To: <00ff01d22214$a9832440$4001a8c0@gateway.2wire.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.21.85]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/pdPMs-Iil0D68ag6t7InNhzuVZ4>
Cc: "idr@ietf.org" <idr@ietf.org>
Subject: Re: [Idr] I-D Action: draft-ietf-idr-large-community-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Oct 2016 21:55:49 -0000

Router software will not treat an UPDATE message as malformed
if the Global Administrator field of a Large Community does not contain an ASN.
It doesn't even know that it's an ASN. It's just 32 bits.

I don't think we can or should specify anything stronger than:

A receiving BGP speaker is permitted to remove unexpected
Large Communities from received routes. A Large Community that
is intended to be sent to multiple ASes SHOULD contain an ASN
in the Global Administrator field. The ASN SHOULD be one that
is assigned to the entity
that defines the meaning of the rest of the Large Community.
This allows a route to carry multiple Large Commuinties, the meaning
of each being defined by different independent entities.

Thanks,
Jakob.


> -----Original Message-----
> From: Idr [mailto:idr-bounces@ietf.org] On Behalf Of t.petch
> Sent: Sunday, October 09, 2016 2:55 AM
> To: Brian Dickson <brian.peter.dickson@gmail.com>; Nick Hilliard <nick@foobar.org>
> Cc: idr@ietf.org
> Subject: Re: [Idr] I-D Action: draft-ietf-idr-large-community-01.txt
> 
> --- Original Message -----
> From: "Brian Dickson" <brian.peter.dickson@gmail.com>
> To: "Nick Hilliard" <nick@foobar.org>
> Cc: <idr@ietf.org>
> Sent: Saturday, October 08, 2016 9:14 PM
> >
> > > On Oct 8, 2016, at 9:35 AM, Nick Hilliard <nick@foobar.org> wrote:
> > >
> > > Brian Dickson wrote:
> > >> Is there anything you envision in use of large communities that
> > >> cannot be supported by use of ASNs and private ASNs? I can't see
> > >> anything that would not fit into those two use cases.
> > >
> > > There are plenty of situations where the semantics of what you're
> > > suggesting would be troublesome to define, for example,
> confederations,
> > > asn translation or asn migration, leading to cases where there would
> be
> > > multiple asns being legitimate on a single router.
> > >
> >
> > The operator setting the community would need to know the intended
> semantics. The other operator would need to establish what acceptable
> communities could be used and the corresponding semantics.
> >
> > The operator doing anything complicated will already need to
> understand the ASN gymnastics; the corresponding communities follow
> those same gymnastics.
> >
> > > And even if these cases could be cleared up easily, what happens
> when
> > > someone injects a prefix tagged with a community which isn't the
> same as
> > > their ASN?
> >
> > I said ASN. I didn't say THEIR ASN.
> 
> That is what I intended, although it has not been construed as such.
> 
> There is nothing IMHO in
> '   Global Administrator:  A four-octet namespace identifier.  This
>       MUST be an Autonomous System Number assigned by IANA.'
> which says whose ASN it is, just that it must be an ASN; if you allow
> IPv4 addresses, Router ID, IGP Area numbers and so on, anything else
> that fits into 32 bit, then it all breaks down so it MUST be an ASN.  At
> a stretch, that wording includes private ASN since those values are
> assigned by IANA although we might want to point that out explicitly.
> 
> And as Brian says, security is something else.  Anyone can forge anyone
> else's ASN in there, but that is possible with other BGP data (in the
> absence of SIDR or some such) so the security needs careful
> consideration.
> 
> Tom Petch
> 
> > That is the apparent disconnect.
> >
> > Nothing should enforce what ASN value is used.
> >
> > > You're then stuck with the situation where you're defining
> > > one thing as a MUST in the semantic specification section of the
> rfc,
> > > while down in the Security Considerations section, it's going to
> need to
> > > be admitted that there's no guarantee whatsoever that the global
> > > administrator field in the large community was actually set by the
> ASN
> > > which announced the prefix.
> >
> > Correct. That is the intended behavior.
> >
> > The ASN value will rarely be the ASN setting the community. The cases
> where the sender uses its own ASN can already be handled with extended
> communities.
> >
> > >  Worse still, once it's been changed, there
> > > is no practical way for a neighbor to detect this change, as s-bgp
> isn't
> > > a thing.
> > >
> > > Realistically, vendors are going to implement ways of modifying the
> > > field in exactly the same way as rfc1997 communities can be set to
> > > anything at all at any policy specification point in a bgp-enabled
> network.
> >
> > Yes, and this is the desired state of affairs. Complete parity with
> 1997.
> >
> > Brian
> > _______________________________________________
> > Idr mailing list
> > Idr@ietf.org
> > https://www.ietf.org/mailman/listinfo/idr
> 
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr