Dear Job, Fredrik,

I disagree. The last thing we need is for IXPs to randomly begin
applying new "inject one's own ASN into AS_PATH" behaviour to their
routeservers - anything which deviates from the de-facto standard will
result in a lot of time spent with IXPs working on migrating to the new
thing. Just look at all the effort it takes to get a no-brainer like
proper ingress route filtering pushed through..

I'm happy that everything has finally gotten to the point where
route-servers consistently apply the AS_PATH stripping behaviour - and I
consider it a reason _not_ to participate in the route-servers if their
ASN is still visible in the AS_PATH. For example, this proposed change
would wreak a lot of havoc on those networks with a wide geographical
footprint relying on consistent route announcements to ensure traffic
doesn't experience scenic routing. During the migration period, longhaul
traffic would be all over the place as a result of the differing AS_PATH
lengths that are seen at the various ingress points of an autonomous
system participating in route-servers.

What I _would_ support is a semi-standardized or well-known BGP
community to indicate whether a prefix was, at some point in its
lifecycle, propagated by a routeserver on an IXP. Better yet, a BGP
Large Community so that it's not stripped by other "community-filtering"
networks before it reaches a point where the route can be stored into a
database for later forensics.

Best regards,
Martijn Schmidt

On 18-12-17 12:41, Fredrik Korsbäck wrote:
> On 2017-12-18 11:50, Job Snijders wrote:
>> Dear GROW,
>>
>> After the gazillionth routing incident in which an IXP route server
>> amplified the problem, I think it is time we explore mechanisms to
>> improve accountability, auditability & make debugging easier.
>>
>> It is common practise for route server operators to configure their
>> route server in such a way that the route server does not append its own
>> ASN to the AS_PATH attribute. Many IXPs view this practise as
>> justifiable because it gives them a competitive advantage over transit
>> providers.
>>
>> RFC 7947 reasons "a route server does not participate in the process of
>> forwarding data between client routers", but meanwhile quite some IXPs
>> have more equipment and layer-2 hops as part of the forwarding path than
>> comparable IP networks for similar distances. [1] [2] [3] Does it even
>> matter that the route server device itself is not part of the
>> forwarding path? For all intents and purposes it is a BGP hop. The route
>> server is not under administrative control of the RS participants.
>>
>> Whenever routing incidents occur, it takes considerable effort to
>> pinpoint which route server BGP speakers amplified the problem. Quite
>> some correlation & verification work is needed to reliably point out
>> which route server at what IXP contributed to the propagation of a
>> hijack or a route leak. If IXP route servers were visible in the
>> AS_PATH (just like normal IP networks), I think we'd see a lot more
>> responsible behavior and the implementations of route filters.
>>
>> Consider the following scenarios. When client A & client B at the same
>> IX have a bilateral session with each other, it doesn't matter whether
>> the route server injects its AS in the AS_PATH: the bilateral session
>> makes the route server control-plane path irrelevant. Since it is common
>> practise to assign a higher local preference to 'peering' routes
>> compared to 'transit' routes, in the case that client A & client B don't
>> have a bilateral session and only see each other via the route server,
>> padding the AS_PATH with the route servers ASN still won't have an
>> negative effect. It is only in corner cases that the AS_PATH becomes the
>> tie-breaker, and I find it hard to use those as justification to
>> sacrifice all of the route server's visibility.
>>
>> Another benefit is that if route servers behave like normal BGP
>> speakers, client's dont need to disable safety checks such as "no bgp
>> enforce-first-as". Or that routing policy to match on prefixes coming
>> from the route server (on devices not connected to the IX) are simpler
>> if the ASN is vislble, and of course the same applies to analysis of MRT
>> dumps or use of BGP data in applications such as spam filtering. Or
>> think of hunting down announcements that became ghost routes, without
>> all ASNs visible in the AS_PATH as operator you'll be going through
>> severe pains to find the ghost route perpetrator.
>>
>> Decades ago some argued that route servers should provide an experience
>> as close to bilateral peering as possible. But fast forward to 2017, we
>> see route servers with hundreds of thousands of paths, thousands of
>> sessions, in essence route servers became partial transit providers. I'd
>> argue that route server operators should assume their fiduciary duty and
>> stop hiding themselves. This will allow both operators & researchers to
>> more easily pinpoint issues, and help fix them.
>>
>> In summary, I think RFC 7947 section 2.2.2.1 & 2.2.2.2 were misguided,
>> should be revisited, perhaps deleted. Thoughts?
>>
>> Kind regards,
>>
>> Job
>>
>> [1]: https://ams-ix.net/technical/ams-ix-infrastructure
>> [2]: https://www.linx.net/tech-info-help/network-topology
>> [3]: https://www.nl-ix.net/network/projected-core-map-2017/
>>
>
> Hi.
>
> This makes alot of sense actually. Now that we live in a world where a
> route-server and an IXP is not what it used to be we need to consider
> IXPs as any ISP out there. Heck, some of these IXPs runs bigger
> infrastructures then most of their customers do.
>
> Injecting the RS asn into the path makes troubleshooting much easier
> and helps us understand the routingt-able alot better, and having a RS
> ASN show up when backtracking an incident on f.e BGP Play will shorten
> the lead-time to figuring out what actually happened significantly.
>
> I do see a problem however that we kinda need to change this all at
> the same time to not get very wonky routing for those relying heavily
> on routeservers  - this i have no idea how to coordinate.
>
> but should it be done? Yes it should 

_______________________________________________
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow

Reply via email to