Gen-ART LC review of draft-ietf-grow-route-leak-problem-definition-04

Pete Resnick <presnick@qti.qualcomm.com> Mon, 21 March 2016 16:28 UTC

Return-Path: <presnick@qti.qualcomm.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A59E112D906; Mon, 21 Mar 2016 09:28:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.021
X-Spam-Level:
X-Spam-Status: No, score=-7.021 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=qti.qualcomm.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GY1hTfPFeQmX; Mon, 21 Mar 2016 09:28:12 -0700 (PDT)
Received: from wolverine02.qualcomm.com (wolverine02.qualcomm.com [199.106.114.251]) (using TLSv1.2 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A64C12D8F6; Mon, 21 Mar 2016 09:28:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qcdkim; t=1458577692; x=1490113692; h=from:to:subject:date:message-id:mime-version; bh=Xrvv/+I3iqeBtWlrF8gmMmT8F4+5H2sw1QuIynKnoII=; b=lwEOYaqXWOT+MjlBMrTNhkhLLdc+QC9Rp5IbR5TElkK5h1apStTJoeGO nhy2q4+E1B5LVPXogFTfcH2k4usM0t7nMeiZn8knipLQ7JCJg62mddgiq /0OdeWix577QnJ8iip0MhyWH/qYFOFoDX65LwKT//KDcIvRtAdGwIdDAT o=;
X-IronPort-AV: E=Sophos;i="5.24,372,1455004800"; d="scan'208,217";a="273250920"
Received: from ironmsg04-l-new.qualcomm.com (HELO Ironmsg04-L.qualcomm.com) ([10.53.140.111]) by wolverine02.qualcomm.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 21 Mar 2016 09:28:08 -0700
X-IronPort-AV: E=McAfee;i="5700,7163,8110"; a="1086954406"
Received: from nasanexm01f.na.qualcomm.com ([10.85.0.32]) by Ironmsg04-L.qualcomm.com with ESMTP/TLS/RC4-SHA; 21 Mar 2016 09:28:08 -0700
Received: from [10.64.162.141] (10.80.80.8) by NASANEXM01F.na.qualcomm.com (10.85.0.32) with Microsoft SMTP Server (TLS) id 15.0.1130.7; Mon, 21 Mar 2016 09:28:07 -0700
From: Pete Resnick <presnick@qti.qualcomm.com>
To: General Area Review Team <gen-art@ietf.org>, aqm@ietf.org, draft-ietf-grow-route-leak-problem-definition.all@ietf.org, IETF discussion list <ietf@ietf.org>
Subject: Gen-ART LC review of draft-ietf-grow-route-leak-problem-definition-04
Date: Mon, 21 Mar 2016 11:28:06 -0500
Message-ID: <41136C0E-1BA9-4855-B084-618DED1B9257@qti.qualcomm.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_MailMate_A7133B6B-B979-413B-8A03-5C17C17D549D_="
X-Mailer: MailMate (1.9.4r5234)
X-Originating-IP: [10.80.80.8]
X-ClientProxiedBy: NASANEXM01E.na.qualcomm.com (10.85.0.31) To NASANEXM01F.na.qualcomm.com (10.85.0.32)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/EdSvNkdVOlXd3EXu2XF4w2YC3KA>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2016 16:28:14 -0000

I am the assigned Gen-ART reviewer for this draft. The General Area
Review Team (Gen-ART) reviews all IETF documents being processed
by the IESG for the IETF Chair.  Please treat these comments just
like any other last call comments.

For more information, please see the FAQ at

<http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.

Document: draft-ietf-grow-route-leak-problem-definition-04
Reviewer: Pete Resnick
Review Date: 2016-03-21
IETF LC End Date: 2016-03-28

Summary: This draft is on the right track but has open issues, described 
in this review.

Major issues:

None.

Minor issues:

- Figure 1, along with the discussion of it in section 3, was confusing 
to me. First of all, am I correct that the example displays *two* leaks? 
That is, there's the leak from AS3 to ISP2, and then there are the 
propagated leaks from ISP2 to the rest of the world. Also, "(P)" seems 
to be used as both a leaked prefix (from ISP1 through AS3 to ISP2 and 
then propagated from there) as well as what looks to be a normal prefix 
update between ISP1 and ISP2. Are all of the occurrences of "(P)" in 
Figure 1 identical? Or is the prefix update between ISP1 and ISP2 also a 
leak? What leaks is Figure 1 intended to show?

- In 3.1: "The leak often succeeds because...". Do you really means 
"succeeds" and not "occurs"? If so, what does "succeeds" mean in this 
context?

- The description in section 3.5, starting from "However", really needs 
a complete rewrite. It's ungrammatical to the point that I'm not really 
sure I understand what it is trying to say.

Nits/editorial comments:

- I've mentioned before that I find the "academic research paper" style 
a bit jarring in IETF documents. I particularly don't like the use of 
"we" and "us", since it's not clear whether "we" is the authors (which 
is how it's used in academic papers, but is inappropriate for an IETF 
document), the WG, the IETF, etc. Instead, I would replace all instances 
of "we" with "this document", or simply re-word into the passive, since 
a subject is rarely needed for these sentences. For example, the 
abstract could be rewritten as such:

    A systemic vulnerability of the Border Gateway Protocol routing
    system, known as 'route leaks', has received significant attention 
in
    recent years.  Frequent incidents that result in significant
    disruptions to Internet routing are labeled "route leaks", but to
    date a common definition of the term has been lacking.  This 
document
    provides a working definition of route leaks, keeping in mind the
    real occurrences that have received significant attention. Further,
    this document attempts to enumerate (though not exhaustively)
    different types of route leaks based on observed events on the
    Internet.  The aim is to provide a taxonomy that covers several 
forms
    of route leaks that have been observed and are of concern to 
Internet
    user community as well as the network operator community.

Please do similar edits throughout.

Similarly, the referencing of authors by name seems like bad form for an 
IETF document.

OLD
    This document builds on and extends earlier work in the IETF by
    Dickson 
[draft-dickson-sidr-route-leak-def][draft-dickson-sidr-route-
    leak-reqts].
NEW
    This document builds on and extends earlier work in the IETF
    [draft-dickson-sidr-route-leak-def][draft-dickson-sidr-route-leak-
    reqts].
END

OLD
                              Mauch [Mauch] observes that these are
       anomalies and potentially route leaks because very large ISPs 
such
       as ATT, Sprint, Verizon, and Globalcrossing do not in general buy
       transit services from each other.  However, he also notes that
       there are exceptions when one very large ISP does indeed buy
       transit from another very large ISP, and accordingly exceptions
       are made in his detection algorithm for known cases.
NEW
                              [Mauch] observes that these are anomalies
       and potentially route leaks because very large ISPs such as ATT,
       Sprint, Verizon, and Globalcrossing do not in general buy transit
       services from each other.  However, it also notes that there are
       exceptions when one very large ISP does indeed buy transit from
       another very large ISP, and accordingly exceptions are made in 
its
       detection algorithm for known cases.
END

- Last paragraph in section 2: I'm left wondering what sorts of things 
that other folks might consider leaks *aren't* covered by the 
definition. Perhaps you want to mention that?

- In 3.6, when you say "more specifics", are you using that as a noun to 
mean "more specific prefixes"? It's very hard to read in its current 
form.

- Section 5 is superfluous. I'd delete it.

- On a side note, I must say that the writing style of the "Example 
incidents" caused me quite a bit of giggling. "Examples include 
symmetrical book stacking, just like the Philadelphia mass turbulence of 
1947, and the biggest interdimensional crossrip since the Tunguska blast 
of 1909 [GhostBusters1984]." Reading them aloud helps. :-) (No need for 
a change; they're fine as is. They just sound funny to a person not in 
the field.)

pr
-- 
Pete Resnick <http://www.qualcomm.com/~presnick/>
Qualcomm Technologies, Inc. - +1 (858)651-4478