I support Hávard's observations. I'd also like to comment that the notation of "prepends 5" meaning "5 + 1" is a bit confusing for all of the examples. Consider instead just saying what the announced as-path length is. Operators prepend 5 because their intent is "announce 6". :-)
Rather than try to cast the (very contrived) scenario as a form of route leaking, I'd suggest the authors focus on the impact of downstream consumers of the prepending. In particular, the example here simply notes that the receiving AS had a desire to use one path, but the upstream providers in executing their own motivations caused them to not have such a preferable path by default. Sadly, too bad for this downstream operator. The more hops away you are from a given bit of reachability, the less your opinion tends to matter over what the announcements look like. It's likely time for them to form a business relationship with the announcing AS or one of their immediate service provider ASes. (And thus, reinforcing business motivations that push the AS diameter of the Internet to remain small...) -- Jeff > On Feb 18, 2022, at 7:28 AM, Havard Eidnes <he=40uninett...@dmarc.ietf.org> > wrote: > > Hi, > > here are a few comments about section 3.1 in the draft: > > Other than the missing comma in the list of routers/ASes, near > the end there is talk about a route leak. However, I don't think > what's stated here as a route leak is what's commonly understood > to be a route leak. > > I think a route leak is commonly understood to be when a route is > announced to a neighbor in violation of the (intended) routing > policy, i.e. a route leak can be the result of an erroneously > implemented intended routing policy. I can't see how that's the > case here, because no routing policy has been expressed for "I". > This probably means that "I" re-advertises all routes it > receives, from any edge on any other edge, and therefore by > definition can't have a "route leak". > > It's another matter that the traffic pattern from B to J in the > stated scenario involves a change to a path which traverses I. > > If we instead of "thinking BGP" in the drawing in 3.1, suppose we > think "RIP with max metric 64" instead. Of course when you > adjust metrics on any interface in the topology, traffic flows > will shift around. I can't quite understand when we do the > similar thing in BGP it's such a big problem? > > Admittedly, by prepending outgoing route announcements towards a > given peer, you only affect "one end of the link", and there's a > fair chance that asymmetric traffic patterns will result if > that's the only thing which is done. But... Is that a problem? > > I think the problem desribed in section 3.1 could do with a bit > clearer description of why this is problematical. > > Regards, > > - Håvard > > _______________________________________________ > GROW mailing list > GROW@ietf.org > https://www.ietf.org/mailman/listinfo/grow _______________________________________________ GROW mailing list GROW@ietf.org https://www.ietf.org/mailman/listinfo/grow