Re: [sidr] Comment on draft-ietf-sidr-origin-validation-signaling-01
Danny McPherson <danny@tcb.net> Wed, 16 November 2011 00:56 UTC
Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F147D11E80B2 for <sidr@ietfa.amsl.com>; Tue, 15 Nov 2011 16:56:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.583
X-Spam-Level:
X-Spam-Status: No, score=-102.583 tagged_above=-999 required=5 tests=[AWL=0.016, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nt7XSH8a9NIG for <sidr@ietfa.amsl.com>; Tue, 15 Nov 2011 16:56:37 -0800 (PST)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id E877811E8082 for <sidr@ietf.org>; Tue, 15 Nov 2011 16:56:36 -0800 (PST)
Received: by dog.tcb.net (Postfix, from userid 0) id 85A4A268063; Tue, 15 Nov 2011 17:56:36 -0700 (MST)
Received: from [172.16.6.19] (122.147.35.3 [122.147.35.3]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; Tue, 15 Nov 2011 17:56:36 -0700 (MST) (envelope-from danny@tcb.net)
X-Avenger: version=0.7.8; receiver=dog.tcb.net; client-ip=122.147.35.3; client-port=53094; syn-fingerprint=65535:44:1:64:M1460,N,W3,N,N,T,S MacOS 10.4.8; data-bytes=0
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Danny McPherson <danny@tcb.net>
In-Reply-To: <0A1020B9-07CB-4558-97C2-AE49AC9E8ED4@cisco.com>
Date: Tue, 15 Nov 2011 19:56:29 -0500
Content-Transfer-Encoding: 7bit
Message-Id: <A9A98858-011D-4049-B651-AB6A848E5757@tcb.net>
References: <74F0D6F4-EA7B-4B2E-B195-D34448CD4CDF@tcb.net> <0A1020B9-07CB-4558-97C2-AE49AC9E8ED4@cisco.com>
To: Pradosh Mohapatra <pmohapat@cisco.com>
X-Mailer: Apple Mail (2.1084)
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] Comment on draft-ietf-sidr-origin-validation-signaling-01
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Nov 2011 00:56:38 -0000
On Nov 15, 2011, at 6:39 PM, Pradosh Mohapatra wrote: > Can you describe specific concerns you have with using extended community? > It does work with confederations. Confederation in this context was referring to the _current inability of BGPSEC to natively accommodate AS confederations, or IBGP in general, for that matter, where Member-ASes commonly apply 'policy' at Member-ASBRs and no implicit transitive trust relationship would exist. While I don't want to overly conflate this function with that issue, it does intersect in that Opaque Extended Communities already assume a transitive trust relationship and in a world where the value of an Opaque Extended Community would be used to convey the validation state of a prefix an IBGP speaker has no way to validate the semantic integrity of the string. Its essentially what I have today, and into the future secure routing should enable me to verify this. > Do you have alternatives in mind for incremental deployment case? I'm not sure what you mean by "incremental deployment" here, are you referring to the case where it gets enabled and deployed but no IBGP speaker applies policy based on the validation state until all IBGP speakers support prefix origin validation capability as defined in the document? I suspect this is what S3.1 is implicitly conveying. I'm not convinced incremental deployment of the validation state processing capability within IBGP should be supported. The current Deployment Considerations section makes me uneasy in that it's essentially saying "if you don't support this Opaque value and decision algorithm modification as prescribed in S.3 then you should develop static policy maps that influences the best path selection *the same way* as what would have been enabled by an implementation of this extension." -- i.e., that may not even be feasible in some operating environments and the complexity it presents is likely conducive to misconfiguration that introduce forwarding loops in the network. Does that make sense? -danny
- [sidr] Comment on draft-ietf-sidr-origin-validati… Danny McPherson
- Re: [sidr] Comment on draft-ietf-sidr-origin-vali… Danny McPherson
- Re: [sidr] Comment on draft-ietf-sidr-origin-vali… Pradosh Mohapatra