Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protocol-11
"George, Wes" <wesley.george@twcable.com> Tue, 27 January 2015 18:16 UTC
Return-Path: <wesley.george@twcable.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D9D071A8913 for <sidr@ietfa.amsl.com>; Tue, 27 Jan 2015 10:16:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.475
X-Spam-Level:
X-Spam-Status: No, score=-0.475 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P3y2RND96CQY for <sidr@ietfa.amsl.com>; Tue, 27 Jan 2015 10:16:31 -0800 (PST)
Received: from cdpipgw01.twcable.com (cdpipgw01.twcable.com [165.237.59.22]) by ietfa.amsl.com (Postfix) with ESMTP id BA98C1A8927 for <sidr@ietf.org>; Tue, 27 Jan 2015 10:16:22 -0800 (PST)
X-SENDER-IP: 10.136.163.11
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="5.09,476,1418101200"; d="scan'208";a="823204110"
Received: from unknown (HELO PRVPEXHUB02.corp.twcable.com) ([10.136.163.11]) by cdpipgw01.twcable.com with ESMTP/TLS/RC4-MD5; 27 Jan 2015 13:08:06 -0500
Received: from PRVPEXVS10.corp.twcable.com ([10.136.163.41]) by PRVPEXHUB02.corp.twcable.com ([10.136.163.11]) with mapi; Tue, 27 Jan 2015 13:16:07 -0500
From: "George, Wes" <wesley.george@twcable.com>
To: sidr wg list <sidr@ietf.org>
Date: Tue, 27 Jan 2015 13:16:05 -0500
Thread-Topic: [sidr] wglc for draft-ietf-sidr-bgpsec-protocol-11
Thread-Index: AdA6XVG9QJ/TZARXRjK+TUH838nT2g==
Message-ID: <D0ED1F78.41051%wesley.george@twcable.com>
References: <4C184296-F426-40EF-9DB6-3AE87C42B516@tislabs.com>
In-Reply-To: <4C184296-F426-40EF-9DB6-3AE87C42B516@tislabs.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.7.141117
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/HS6klGz6NCHuVmwZVqHMef33nas>
Subject: Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protocol-11
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jan 2015 18:16:35 -0000
Gave this another review. Other than what I identify below, I think that this is ready to publish. First, some comments specific to the interaction between this draft's language and draft-ietf-sidr-as-migration: Section 4 discusses behavior for iBGP speakers. It may be appropriate to include another reference to the slightly different behavior defined in sidr-as-migration (see sections 5.2 and 5.3). Also, 4.1 says that AS_Path and BGPSec_Path are mutually exclusive (must not send both, etc.) and section 4 says that routes originated to other iBGP peers should omit BGPSec attributes. I don't think that this and sidr-as-migration are in conflict, but I want to have another pair of eyes looking at it to make sure that the recommendations for iBGP peers are in sync. This includes if you think that the text in sidr-as-migration should be updated for better clarity. 5.2 item 5- pcount=0 - again, want to make sure that the way that this is treated in as-migration is not in conflict with this instruction. The idea is that any AS-migration configuration should be local to the edge router under migration, and not require configuration changes on every router in the ASN pair (old + new), but since there is a signature from old_ASN to New_ASN with Pcount=0 coming from an iBGP neighbor, this is a detail we have to have right, whether it drives changes in your text or mine. Note: after Keyur's review, I made some wording changes to section 5.2 of as-migration, but it's still in my edit buffer, so the text in the current version is replaced by: 5.2 "When a PE router receives an update from an eBGP neighbor that is locally configured with AS-migration knobs (i.e. the opposite direction of the previous route flow), it MUST generate a signature from the old (local) ASN forward signing to the new (global) ASN with pCount=0. It is not necessary to generate the second signature from the new (global) ASN because the ASBR will generate that when it forward signs towards its eBGP peers as defined in normal BGPSec operation. Note that a signature is not normally added when a routing update is sent across an iBGP session. The requirement to sign updates in iBGP represents a change to the normal behavior for this specific AS-migration implementation only." Now, some general comments: Section 5: extreme circumstances...defer validation. Perhaps we should add a recommendation that this behavior be visible (i.e. Log messages, visible in bgp diagnostic information, etc.) While the circumstances that invoke this behavior is a matter of local policy/implementation, I think it's reasonable to add this recommendation to make sure that it's visible to the operator when it is happening. Section 5.2 - elsewhere in the document (7.3), you note that validation should stop when an invalid signature is found. However, I see no mention of that in the actual validation algorithm. That seems like good practice even if there isn't a long chain of signatures to validate. Additionally, 7.1's text "Thus, a BGPsec speaker MUST completely validate all BGPsec update messages received from external peers." seems to conflict with this recommendation because it says "completely". I think it's a wording problem, i.e. We're not saying you MUST validate the *entire* update, but rather you must validate ALL updates that you *receive* until you encounter an invalid signature within a given update, in which case you can stop and move to the next update. Also, it may be appropriate to state that the application of local policy on validation state may be dependent on the ASN, i.e. I may want to say that I want to drop or depref invalid BGPSec routes but carve out a list of exception ASNs where the policy is bypassed (or vice versa). This is largely an implementation detail and probably better discussed in detail in the ops considerations doc, but it may be important in the protocol doc because it requires more info to be passed from the validation machinery to the policy machinery - in other words, it can't just know that somewhere in this update, there was an invalid signature, and thus the update is invalid, it may need to know that the update is valid except for the signature for ASN1701 in order to have granular enough policy control. Section 6.1 "It is anticipated that, in the future mandatory, the algorithm suites document will be updated to specify a transition from the 'current' algorithm suite to a 'new' algorithm suite." This sentence is pretty hard to parse, wasn't sure if it's a misplaced word or just clunky. "We anticipate that in the future, the mandatory algorithm suites document..."? Or if that was the intended word order, I think it says that we're anticipating that the algorithm suites doc will be mandatory and that it will be updated to transition to new suites. Let's be a little clearer - we already know that the algorithm suites doc will be mandatory, so we shouldn't really need to qualify this statement so much. Thanks, Wes George On 1/26/15, 5:45 PM, "Sandra Murphy" <sandy@tislabs.com> wrote: >The editor of draft-ietf-sidr-bgpsec-protocol, BGPsec Protocol >Specification, indicate that all issues have been addressed and the draft >is ready for a working group last call. > >This starts a working group last call for >https://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-11. > >Please review the draft and send comments to the list. Please include >whether you believe the draft is ready for publication. > >This wglc will end on 9 February 2015. > >--Sandy, speaking for the wg co-chairs This E-mail and any of its attachments may contain Time Warner Cable proprietary information, which is privileged, confidential, or subject to copyright belonging to Time Warner Cable. This E-mail is intended solely for the use of the individual or entity to which it is addressed. If you are not the intended recipient of this E-mail, you are hereby notified that any dissemination, distribution, copying, or action taken in relation to the contents of and attachments to this E-mail is strictly prohibited and may be unlawful. If you have received this E-mail in error, please notify the sender immediately and permanently delete the original and any copy of this E-mail and any printout.
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… David Mandelberg
- [sidr] wglc for draft-ietf-sidr-bgpsec-protocol-11 Sandra Murphy
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… George, Wes
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Sriram, Kotikalapudi
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… David Mandelberg
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Michael Baer
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… David Mandelberg
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Michael Baer
- [sidr] David M's point about the bgpsec protocol … Sandra Murphy
- Re: [sidr] David M's point about the bgpsec proto… Randy Bush
- Re: [sidr] David M's point about the bgpsec proto… Randy Bush
- Re: [sidr] David M's point about the bgpsec proto… Sandra Murphy
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Keyur Patel (keyupate)
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Montgomery, Douglas
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Randy Bush
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Sriram, Kotikalapudi
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… David Mandelberg
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Matthew Lepinski
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Michael Baer
- Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protoc… Sriram, Kotikalapudi
- [sidr] Levels of BGPsec/RPKI validation, was: Re:… Iljitsch van Beijnum
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Roque Gagliano (rogaglia)
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Iljitsch van Beijnum
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… David Mandelberg
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Iljitsch van Beijnum
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Sandra Murphy
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Roque Gagliano (rogaglia)
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Randy Bush
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Geoff Huston
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Sriram, Kotikalapudi
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Randy Bush
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Jared Mauch
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Iljitsch van Beijnum
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Sriram, Kotikalapudi
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Iljitsch van Beijnum
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Randy Bush
- Re: [sidr] [Idr] Levels of BGPsec/RPKI validation… Tim Bruijnzeels
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Matthew Lepinski
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Iljitsch van Beijnum
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Matthew Lepinski
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Iljitsch van Beijnum
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Sriram, Kotikalapudi
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Stephen Kent
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Iljitsch van Beijnum
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Stephen Kent
- Re: [sidr] Levels of BGPsec/RPKI validation, was:… Sriram, Kotikalapudi