Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspec-oid-12
"Juan Alcaide (jalcaide)" <jalcaide@cisco.com> Fri, 30 April 2021 18:33 UTC
Return-Path: <jalcaide@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 074CD3A223E; Fri, 30 Apr 2021 11:33:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.918
X-Spam-Level:
X-Spam-Status: No, score=-11.918 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=kVF7Pyzx; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=0XZA/e+y
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QYYnYW01gbFQ; Fri, 30 Apr 2021 11:33:19 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 562723A2242; Fri, 30 Apr 2021 11:33:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15966; q=dns/txt; s=iport; t=1619807599; x=1621017199; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=alhHvw/6MJ/i2yUzK52x9r3qcHARYZzpPVJf4VR1mdk=; b=kVF7PyzxbBdBowbXBd+W5H79FSW+hFBGCvmTvCAbBPiKpSzWruNPEgK2 z6Pip46lwrShsU4ZYoGZF14aBsgR00ZjigqoR/KPKnOFoSsfPSroAQOjB W6a82qjQJRIpX/YX+Ycnv4mArDVIKTgOF5F7Q6RYZ4IL5xoEzNsmcqUvW s=;
X-IPAS-Result: A0ADAAD9TIxgmI0NJK1aGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBQIFDBQEBAQELAYFSIy5+WjYxC4Q5g0gDhFlgiG4DgQyJJ48agS6BJQNUCwEBAQ0BASgKAgQBAYRQAheBZAIlNAkOAgQBAQEDAgMBAQEBAQUBAQECAQYEFAEBAQEBAQEBaIVQDYZEAQEBAwEjBA0MAQE3AQQHBAIBBgIOAwQBAQMCJgICAh8RFQgIAgQOBQiCaQGCVQMOIQEDC4xOkG0Cih96fzOBAYIEAQEGBASBOAKDew0LghMDBoEQKgGCeIQNhlMnHIFJQoEVQ4IpNj6CHkIBAQOBRRqDFTaCK4FZEFsGPh0JBFECFEk7MhUFGAEGAQ4MDSKUB0KVA5BXOVsKgxCJdo1zgkODFBCDVKFKl0KJaIMcjiWBKQ6EZgICAgIEBQIOAQEGgVQ4gVtwFTuCaVAXAg6OHwwNCYNOhRSFSXM4AgYBCQEBAwl8iU8tgQcBgQ8BAQ
IronPort-PHdr: A9a23:1cQyShAHCD20jTej1xMUUyQVnBdPi93PFgcI9poqja5Pea2//pPke VbS/uhpkEShdYre4vNAzeHRtvOoVW8B5MOHt3YPONxJWgQegMob1wonHIaeCEL9IfKrCk5yH MlLWFJ/uX3uN09TFZXxYlTTpju56jtBUhn6PBB+c+LyHIOahs+r1ue0rpvUZQgAhDe0bb5oa husqgCEvcgNiowkIaE0mXP0
IronPort-HdrOrdr: A9a23:nkGD2a//HY873dAX5A1uk+Gpcb1zdoIgy1knxilNYDRvWIixi9 2ukPMH1RX9lTYWXzUalcqdPbSbKEm8ybdc2qNUGbu5RgHptC+TLI9k5Zb/2DGIIUPD38Zn/+ Nbf6B6YeeeMXFTh8z3+RT9Nt4mzsWO/qzAv5ag815GZ2hRGsZdxi1+DRuWFVAzYQFAC4YwGp b03Ls4mxOLf3MLYsOnQkQfV+/YqNHR0L7gaxgKBxkogTP+zA+Awrj8DhSew1MiQypCqI1Sv1 Ttvi7YwuGYs/+9wgLBzGO71fRrsfbo19crPr32tuE7MTPp4zzYAbhJe7rHhzwtpfHq1VBCqq ixnz4FH+Ber0zcZXu0pxyF4Xih7B8L52X5wVGVxVvPyPaJPg4SMMZKiYJHfhax0SNJ17sQvN MprgCknqFaAh/akCP268KgbWAWqmOPvXEgneQP5kYvN7c2Vb5LoYQTuGNTHZsQdRiKkLwPLe h0AMnQoMtRaFORBkqpx1VH/drEZAVWIj62Bmw5/uCF2Tlfm350i2ECwtYEo3sG/JUhD7FZ+u XtKM1T5fJzZ/5TSZg4KPYKQMOxBGCIawnLKniuLVPuE7xCE27RqqTw/K4+6IiRCd415ap3vK 6EfEJTtGY0dU6rI9aJxod3/hfER3j4ejjx1MdE5dxctqfnTLTmdQ2PIWpe1veIkrE6OIn2Sv yzMJVZD7vINm31A7tE2AX4Rt1cMn8bXMoJussqWl6Hr87RQ7ea8dDzQbL2Hv7AADwkUmTwDj 8oRz7oPvhN6UitRzv5jXHqKjXQU3262ag1PLnR/uAVxoRIHJZLqBIphVOw4dzOLTVDt6cxbV ZvOb+PqNLjmUCGuULzq0l5MBtUCUhYpJ/6VWlRmAMMO0ToNbAZu9uefmhW1GCdJgB2St7XFA I3nSUyxYuHa7irgQwyAdOuNWyXy1EJomiRcpsakqqfodv+doggFZYgUqxpHQDNHxh48Dwa8F trWUshfAvyBznugaKqgNgoH+nZbcB7mxruC9VTs2jjuUKVotwPSnMXUyW1a9OehR8jSlNv9w ZM2p5apIDFuD60bUMjnewzMTR3GRWqKYMDKD7AWaJ5tfTAfhpqQWKDmDqA4itDClbCxgE1nW zuLSqdZPfRJEFS00ooiJrCwRdTaniXeV52ZzRct4BwfF625kpb4Kusere51XeXZx855twldB vBYTcUP2pVto2K/RaIhTePEmgnzJ0yPurbSK8uaa3Xx2nFEvz6qYgWW/BT55prL9bor6sCVv +eYRacKHfiB/ouwBH9nAdoBABk7H0lm+jvwhvr8Syx22M+G+PbJD1dNvsmCsDZ62jvXPCT1p plydozoOurK230LtqL07veYTIGKhTdpweNPqwVgIERuaI5r71oGZbHFTPOyXFcxR07aN7ui1 l2etUz3JnRfot0O8ACcSNQ+VQk0NyJMUswqwTzRuszZ0skgXPXN86AioC45oYHEwmEvk/9KF Of+ypS87PeUyyP2aUTBqgwLW5VAXJMo0hK7aeHbcndGQ+qf+ZM8B6mKXe7aqZaU7XAFrMKrB p2iuv46dO/Zm79wkTXsjR6KK4VrDriTsO2HQ6WGelHt9a9Ik+Bh6O24Mi1yDf7IAHLH3gwlM lAbwgXaM8GlzwpyIsw2SK2Qrbsok0kn0BFiAsX3mLFy8yj+iPDAUpCMQfFmZ1YUjlYL2iQga 3+gJ2l/WW45CIAxILKG0hRdMxfAtQcToD4KCF1NMgb1YTYiJYHk2BEexchD2k1lTD70adnxN 6CqYfvZ9E=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.82,263,1613433600"; d="scan'208";a="730160576"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Apr 2021 18:33:18 +0000
Received: from mail.cisco.com (xbe-aln-004.cisco.com [173.36.7.19]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 13UIXITv018064 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 30 Apr 2021 18:33:18 GMT
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xbe-aln-004.cisco.com (173.36.7.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Fri, 30 Apr 2021 13:33:17 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Fri, 30 Apr 2021 13:33:17 -0500
Received: from NAM04-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Fri, 30 Apr 2021 14:33:16 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZV0ylWewu4P3PUCmcMN5Pb87+N6JtMeGgJPy6LMcw3Qr/vRCbofETGykQZ7uRgQjkk4SIsjAaqhit1QCbjA2iZf/IH3Jhp5FGdzBn0gObpnip3th2xeE72Ok1G+u/Zc3ud4O7Fw5rEqC3XVN2uWynEVLaYEpkzlNfWNu66BjpM+Abl7OgcPtxqh/DytkHgEONudJuBgfYA7e1AsGK/QotojsqWdZ/ytVc+Osu6updT9q+GuFoQnAu6vupDjm44GpnMeAwScpLCnPvhY6dpHXmHRlqsRMGlqNmc3zEGV39ZkZXXUfPIF/2xxpVJCrde4JaV+sh3ET4vOUyitHWFGZJA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=alhHvw/6MJ/i2yUzK52x9r3qcHARYZzpPVJf4VR1mdk=; b=PnETHHEEd1nupt0xwFDgBnw80PgtyThdEmVuYIxfhD83ccK4S6AWdZlJKeDwLw6M40sguz2GlmByH/ONltGNsncuBr2d6boOzmi9m8cgCpz5I9Ebh+l25YWpbBN3NJy86nG3HPSCDPsv4j56h487wd0NR/4lhoTo6TEbe4TAT6++Tmm6oqqpRgHiRPWcbfE/Hmmb/y+LVy0EnBiZNo8WU5zwPZooZlbm+NiDtjbp+uIptbWKB6USHZCHwVsv9MMjtV67ML1C/ibcrpg6dWo8ZAzwsyMDMPNY6cgxpll9oTmrBAm8Sa761j6c6JwCCDt4mmJ1NbeSTQRZkE/zQrSOpw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=alhHvw/6MJ/i2yUzK52x9r3qcHARYZzpPVJf4VR1mdk=; b=0XZA/e+yBJpoM9lJZPMeGb5svCPWQkLZUG0+pUPrZ3ORhdFcSNr7OsQbnnIwXChNn6NUN7E+eFusq8wFc4BSwCPKsBWqet6GnWOlMIrNQmrvpYocJQNsB32icGiSgefl9frXXl53sPh8PG6Yzuo3fSPj6q/v6H2ZsH8XLTkv0Co=
Received: from DM6PR11MB3194.namprd11.prod.outlook.com (2603:10b6:5:5c::25) by DM5PR11MB1691.namprd11.prod.outlook.com (2603:10b6:3:b::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.26; Fri, 30 Apr 2021 18:33:15 +0000
Received: from DM6PR11MB3194.namprd11.prod.outlook.com ([fe80::e4e0:cf18:7be1:8019]) by DM6PR11MB3194.namprd11.prod.outlook.com ([fe80::e4e0:cf18:7be1:8019%7]) with mapi id 15.20.4065.026; Fri, 30 Apr 2021 18:33:15 +0000
From: "Juan Alcaide (jalcaide)" <jalcaide@cisco.com>
To: Alvaro Retana <aretana.ietf@gmail.com>
CC: "David Smith (djsmith)" <djsmith@cisco.com>, Susan Hares <shares@ndzh.com>, James Uttaro <ju1738@att.com>, "idr-chairs@ietf.org" <idr-chairs@ietf.org>, IDR List <idr@ietf.org>
Thread-Topic: [Idr] AD Review of draft-ietf-idr-bgp-flowspec-oid-12
Thread-Index: AQHW9QDI2xQHpdk2Z0uhqDf2mVgKOao9DtUAgAurHfCAELXogIAN/PdwgAAuCICAFAtZgIAAcYEAgCyKm/CAAOBHAIAIe2uQgAxLrACAD6nPQA==
Date: Fri, 30 Apr 2021 18:33:14 +0000
Message-ID: <DM6PR11MB319466B7490F9E5BBFF7C0AECD5E9@DM6PR11MB3194.namprd11.prod.outlook.com>
References: <CAMMESsxqRWK2vDPyj-0_ruYoW7pkautFc09MoFBUTKxG23=tyA@mail.gmail.com> <000701d6f57c$6c20ff60$4462fe20$@ndzh.com> <DM6PR11MB319495819681585AA858E54BCDB29@DM6PR11MB3194.namprd11.prod.outlook.com> <CAMMESswvncvo68dYp95P+9gkgKgPpmgY3Yr-xC3=hdt-1YigYQ@mail.gmail.com> <SN6PR11MB320012D1B66CF35D18DCB212CD9F9@SN6PR11MB3200.namprd11.prod.outlook.com> <CAMMESszDCb70G6YbdpiAnv0mYEC52=abh89QW7cXaEdfgVzOxw@mail.gmail.com> <EBC0EE4B-063B-44A4-A74B-FCAE6EDBA511@cisco.com> <00f001d71500$db52a9d0$91f7fd70$@ndzh.com> <DM6PR11MB3194DEF968FD730D08FFFFBACD759@DM6PR11MB3194.namprd11.prod.outlook.com> <CAMMESsxjUetknSv=Q+PHxzQfx8VqgtGitr3jW84bJuZD41puOQ@mail.gmail.com> <DM6PR11MB3194CAFF7F6373A8B193D1A2CD709@DM6PR11MB3194.namprd11.prod.outlook.com> <CAMMESsxhx87=zz6jTni52814wnEnhaH6VapeRG9Z7Km66jnC=A@mail.gmail.com>
In-Reply-To: <CAMMESsxhx87=zz6jTni52814wnEnhaH6VapeRG9Z7Km66jnC=A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [83.38.90.229]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ff782f53-27d1-458a-dcf8-08d90c066acf
x-ms-traffictypediagnostic: DM5PR11MB1691:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DM5PR11MB16910B0E3C1C1BBA126EAD73CD5E9@DM5PR11MB1691.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR11MB3194.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(396003)(346002)(39860400002)(136003)(376002)(8676002)(186003)(52536014)(86362001)(26005)(5660300002)(66556008)(966005)(38100700002)(478600001)(66946007)(30864003)(55016002)(9686003)(4326008)(76116006)(6506007)(122000001)(8936002)(83380400001)(316002)(54906003)(53546011)(71200400001)(6916009)(66574015)(64756008)(66476007)(7696005)(2906002)(33656002)(66446008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR11MB3194.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ff782f53-27d1-458a-dcf8-08d90c066acf
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Apr 2021 18:33:14.9840 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 47pbDPZAneOcj7IOucT00P454VbsSIuLf8e1e+D1FmDL70ZgghWNNmNULQfL1kGrz+erkn89XAkOgEE48QDkkQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR11MB1691
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.19, xbe-aln-004.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/scVl0ZGhJtAx6cYH8pF6Nn0mnlc>
Subject: Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspec-oid-12
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Apr 2021 18:33:24 -0000
Thanks for your comments Alvaro. I'll add them and also a few more nits/clarifications inspirited by them. In particular the following. Let me know if you agree or you have other suggestions --> Match conditional statement with condition in past tense <snip> A possible case would be if AS_PATH contained only ASNs that *were* known to belong to a common administrative domain. </snip> --> The text between ** is also added, so we are removing it from RFC8955 (our new rule is no a rule of the BGP specification) <snip> [RFC8955] states: BGP implementations MUST also enforce that the AS_PATH attribute of a route received via the External Border Gateway Protocol (eBGP) contains the neighboring AS in the left-most position of the AS_PATH attribute. **While this rule is optional in the BGP specification, it becomes necessary to enforce it here for security reasons.** </snip> --> 4.1: Remove use cases when redefining rules b.2.2 and b.2.3. Everything is moved to the explanation section (since there was some duplication). --> Redefinition of the rule removes the word NLRI (between **), so it's consistent with the naming of the rest of the document. <snip> BGP Flow Specification implementations MUST enforce that the AS in the left-most position of the AS_PATH attribute of a Flow Specification route received via the External Border Gateway Protocol (eBGP) matches the AS in the left-most position of the AS_PATH attribute of the best-match unicast route for the destination prefix embedded in the Flow Specification** NLRI**. </snip> --> I originally added AS_CONFED_SET because the [I-D.ietf-idr-deprecate-as-set-confed-set] is not an RFC yet. But I'll gladly remove AS_CONFED_SET reference for clarity if that's ok. And just add a note in case it's not deprecated yet. Only concern is that it was (could have been) mentioned in both sections 4.1 and 5. So I thought perhaps the best place to add the note would be at the end of the introduction. My proposal: <snip> Throughout this document, some references are made to AS_CONFED_SEQUENCE AS_PATH segments. If AS_CONFED_SET ASPATH segments are supported, same considerations MUST apply to them. Note, however, that AS_CONFED_SET segments are expected to be deprecated per [I-D.ietf-idr-deprecate-as-set-confed-set], and thus support for them will soon not be required. </snip> -J -----Original Message----- From: Alvaro Retana <aretana.ietf@gmail.com> Sent: Tuesday, April 20, 2021 9:18 PM To: Juan Alcaide (jalcaide) <jalcaide@cisco.com> Cc: David Smith (djsmith) <djsmith@cisco.com>; Susan Hares <shares@ndzh.com>; James Uttaro <ju1738@att.com>; idr-chairs@ietf.org; IDR List <idr@ietf.org> Subject: RE: [Idr] AD Review of draft-ietf-idr-bgp-flowspec-oid-12 On April 12, 2021 at 7:32:04 PM, Juan Alcaide wrote: [+ WG + Chairs] Juan: Hi! > Here it goes: > https://tools.ietf.org/html/draft-ietf-idr-bgp-flowspec-oid-13 I looked at the update and have some remaining comments -- mostly minor and nits. I am starting the IETF Last Call -- you can address my comments as part of other potential LC comments. Thanks! Alvaro. [Line numbers from idnits for -13.] == Unused Reference: 'RFC6793' is defined on line 487, but no explicit reference was found in the text ... 15 Abstract 17 This document describes a modification to the validation procedure 18 defined for the dissemination of BGP Flow Specifications. The 19 dissemination of BGP Flow Specifications requires that the originator 20 of the Flow Specification matches the originator of the best-match 21 unicast route for the destination prefix embedded in the Flow 22 Specification. For an iBGP received route, the originator is 23 typically a border router within the same autonomous system. The 24 objective is to allow only BGP speakers within the data forwarding 25 path to originate BGP Flow Specifications. Sometimes it is desirable 26 to originate the BGP Flow Specification any place within the 27 autonomous system itself, for example, from a centralized BGP route 28 controller. However, the validation procedure will fail in this 29 scenario. The modification proposed herein relaxes the validation 30 rule to enable Flow Specifications to be originated within the same 31 autonomous system as the BGP speaker performing the validation. 32 Additionally, this document revises AS_PATH validation rules so Flow 33 Specifications received from an eBGP peer can be validated when such 34 peer is a BGP route server. [nit] s/Specification any place/Specification from any place [nit] s/revises AS_PATH/revises the AS_PATH ... 93 2. Introduction ... 127 Figure 1 illustrates this principle. R1 (the upstream router) and RR 128 need to validate the Flow Specification whose embedded destination 129 prefix has a best-match unicast route (dest-route) originated by 130 ASBR2. ASBR2 could originate the Flow Specification, and it would be 131 validated when received by RR and R1. Sometimes the Flow 132 Specification needs to be originated on AS1. ASBR1 could originate 133 it, and Flow Specification would still be validated. In both cases, 134 the Flow Specification is originated by a router in the same 135 forwarding path as the dest-route. For the case where AS1 has 136 thousands of ASBRs, it becomes impractical to originate different 137 rules on each ASBR in AS1 based on which ASBR each dest- route is 138 learned from. The objective is to advertise all the Flow 139 Specifications from the same route-controller. [nit] s/originated on AS1/originated inside AS1 [minor] s/different rules/different Flow Specification rules [nit] s/dest- route/dest-route ... 159 3. Motivation ... 234 In addition, an operator MAY extend the requirements above for a 235 group of ASes via policy. This is described in section (b.2.3) of 236 the validation procedure. [minor] Let's keep the Normative actions to the mechanism: s/MAY/may ... 251 4.1. Revision of Route Feasibility ... 264 2. The AS_PATH attribute of the Flow Specification is empty or 265 contains only AS_CONFED_SEQUENCE and/or AS_CONFED_SET segments 266 [RFC5065]. [] I had suggested only AS_CONFED_SEQUENCE because of the recommendations in rfc6472 and draft-ietf-idr-deprecate-as-set-confed-set. I'm ok if you want to leave the current text -- an alternative would be to mention (in the "Explanation" below) that only AS_CONFED_SEQUENCE should be present and to add an Informative reference to draft-ietf-idr-deprecate-as-set-confed-set. 268 1. This condition SHOULD be enabled by default (it may be 269 disabled by explicit configuration as described on the 270 next list item (b.2.1)).. an empty AS_PATH. [] The update left some orphaned text. Also, the new text above (b.2) now mentions the empty AS_PATH so there's no need for this bullet. And it refers to itself (b.2.1). 272 2. This condition MAY be disabled by explicit configuration 273 on a BGP speaker. A possible case would be if we know for 274 a fact that only the right egress border routers (i.e. 275 those that are also egress border routers for the best 276 routes) are originating a Flow Specification NLRI. [nit] Who are "we"? s/if we know for a fact /if it is known 278 3. As an extension to this rule, a given non-empty AS_PATHs 279 (or AS_PATHS containing only AS_CONFED_SEQUENCE and/or 280 AS_CONFED_SET segments), MAY be validated by policy. A 281 possible case would be if the AS_SEQUENCE and AS_SET 282 contained only ASes that are known to belong to our own 283 administrative domain. [minor] The new text is confusing mentioning first AS_CONFED_* and then AS_*. Suggestion> 3. As an extension to this rule, a given non-empty AS_PATH MAY be validated by policy. A possible case would be if AS_PATH contained only ASNs that are known to belong to a common administrative domain. ... 306 4.2. Revision of AS_PATH Validation 308 [RFC8955] states: 310 BGP implementations MUST also enforce that the AS_PATH attribute of a 311 route received via the External Border Gateway Protocol (eBGP) 312 contains the neighboring AS in the left-most position of the AS_PATH 313 attribute. [minor] Indent this paragraph to show that it is a quote from rfc8955. 315 This rule prevents the exchange of BGP Flow Specification NLRIs at 316 Internet exchanges with BGP route servers [RFC7947]. Therefore, this 317 document also redefines the [RFC8955] AS_PATH validation procedure 318 referenced above as follows: 320 BGP Flow Specification implementations MUST enforce that the AS in 321 the left-most position of the AS_PATH attribute of a Flow 322 Specification route received via the External Border Gateway Protocol 323 (eBGP) matches the AS in the left-most position of the AS_PATH 324 attribute of the best-match unicast route for the destination prefix 325 embedded in the Flow Specification NLRI. [minor] Indent this paragraph to show that it is the updated text. ... 370 5. Topology Considerations 372 [RFC8955] indicates that the originator may refer to the originator 373 path attribute (ORIGINATOR_ID) or (if the attribute is not present) 374 the transport address of the peer from which the BGP speaker received 375 the update. If the latter applies, a network should be designed so 376 it has a congruent topology amongst ipv4 unicast routes and Flow 377 Specification routes. By congruent topology, it is understood that 378 for the two equivalent routes (i.e. the Flow Specification route and 379 its best-match unicast route) are learned from the same peer accross 380 the AS. That would likely not be true, for instance, if some peers 381 only negotiated one type of address-family or if each address-family 382 had a different set of policies. [minor] the generic text should apply to any AF. s/ipv4 unicast routes/unicast routes ... 389 Explanation: 391 Consider the validation procedure preceding this document. The 392 second condition (b.2) does not exist. The two following 393 scenarios have a non-congruent topology: [] The original text made sense. Suggestion> Consider the following scenarios of a non-congruent topology without the second condition (b.2) being added to the validation procedure: ... 430 7. Security Considerations 432 This document updates the route feasibility validation procedures for 433 Flow Specifications learned from iBGP peers and through route 434 servers. This change is in line with the procedures in [rfc8955] and 435 thus maintain security characteristics equivalent to the existing 436 security properties of BGP unicast routing. [nit] s/rfc8955/RFC8955 [End -13.]
- [Idr] AD Review of draft-ietf-idr-bgp-flowspec-oi… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Susan Hares
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Juan Alcaide (jalcaide)
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Juan Alcaide (jalcaide)
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… David Smith (djsmith)
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Susan Hares
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Juan Alcaide (jalcaide)
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Juan Alcaide (jalcaide)
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Juan Alcaide (jalcaide)
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Juan Alcaide (jalcaide)
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgp-flowspe… Juan Alcaide (jalcaide)