Re: [GROW] [Lsr] IGP Monitoring Protocol

2022-07-08 Thread Robert Raszuk
Hi Acee,

Yes, by all means input from the operator's community is needed. It can be
collected through LSR WG, IDR WG or GROW WG. RTGWG could also contribute.
We have already seen input from some operators and their opinion on adding
and distributing more and more link state protocol and topology data in
BGP. More such input is very welcome.

And to your point about RFC9086 - I see nothing wrong in keeping BGP
information in BGP. So IGP Monitoring Protocol does not target to shut down
BGP-LS. It only aims to remove 100% of non BGP sourced information from it.

Controllers which today listen to BGP-LS need a number of information
sources and that spread will only keep increasing as more inputs are
becoming necessary for its computations.

Regards,
Robert.


On Fri, Jul 8, 2022 at 11:32 PM Acee Lindem (acee)  wrote:

> Hi Robert,
>
>
>
> *From: *Robert Raszuk 
> *Date: *Friday, July 8, 2022 at 4:36 PM
> *To: *Acee Lindem 
> *Cc: *lsr , IDR List , Susan Hares <
> sha...@ndzh.com>
> *Subject: *Re: [Lsr] IGP Monitoring Protocol
>
>
>
> Hi Acee,
>
>
>
> Thank you. I was not planning to present it in the upcoming IETF.
>
>
>
> > Let’s see how many stakeholders actually want to this protocol - then we
> can talk about a WG home.
>
>
>
> An alternative approach could be to see how many stakeholders do not want
> to further (for no good reason) to trash BGP. That to me would be in this
> specific case a much better gauge.
>
>
>
> In that case, it seems to me that this discussion should be relegated to
> IDR. Note that there is already non-IGP information transported in BGP-LS,
> e.g., Egress Peer Engineering (https://datatracker.ietf.org/doc/rfc9086/).
> I implemented this on our data center routers (NXOS) years and it is solely
> BGP specific.
>
>
>
> Thanks,
>
> Acee
>
>
>
> Kind regards,
>
> Robert
>
>
>
>
>
> On Fri, Jul 8, 2022 at 9:54 PM Acee Lindem (acee)  wrote:
>
> Speaking as WG chair:
>
>
>
> *From: *Lsr  on behalf of Robert Raszuk <
> rob...@raszuk.net>
> *Date: *Friday, July 8, 2022 at 3:21 PM
> *To: *lsr 
> *Cc: *IDR List , Susan Hares 
> *Subject: *[Lsr] IGP Monitoring Protocol
>
>
>
> Dear LSR WG,
>
>
>
> Based on ongoing discussion in respect to the future of BGP-LS I
> committed myself to put together an alternate proposal.
>
>
>
> The main goal is not to just publish a -00 version of the draft using
> different encapsulation. The goal is to make a useful tool which can help
> to export link state information from network elements as well as assist in
> network observability.
>
>
>
> The IGP Monitoring Protocol (IMP) draft has been posted and should be
> available at:
>
>
>
> https://datatracker.ietf.org/doc/draft-raszuk-lsr-imp/
>
>
>
> One of the key points I wanted to accomplish was full backwards
> compatibility with TLVs defined for BGP-LS. In parallel other formats
> (optional) are also supported.
>
>
>
> The PUB-SUB nature or FILTERING capabilities are in the spec however as
> noted in the deployment section there is no expectation that this should be
> supported directly on routers. Concept of Producer's Proxies has been
> introduced to support this added functionality as well as provide fan-out
> (analogy to BGP route reflectors).
>
>
>
> I encourage everyone interested to take a look and provide comments. At
> this point this document is nothing more than my individual submission.
> Offline I have had few conversations with both operators and vendors
> expressing some level of interest in this work. How we proceed further (if
> at all :) depends on WG feedback.
>
>
>
> Kind regards,
>
> Robert.
>
>
>
> PS, I do believe this work belongs in LSR WG pretty squerly.
>
>
>
> Let’s see how many stakeholders actually want to this protocol - then we
> can talk about a WG home.  By stakeholders, I mean operators and vendors
> who are committed to implementing and deploying it - not simply those who
> you are able to enlist as co-authors. Note that our IETF 114 LSR agenda is
> full (with multiple agenda items not making the cut).
>
>
>
> Thanks,
>
> Acee
>
>
>
>
>
>
>
>
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Proposing a well-known BGP community for Anycast

2022-07-08 Thread Michael Hallgren
+1
mh

8 juillet 2022 21:19 "Randy Bush"  a écrit:

>> Meaning, please add a note to the security considerations saying don't
>> trust communities (this one included) from untrusted sources. See rfc
>> 7999 S6.
> 
> because A trusts B, A does not know B's inbound security model. so B
> could have accepted the community from C with conditions less strict
> than A would have applied.
> 
> don't trust communities. treat this community as a clue, not a fact.
> 
> randy
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Proposing a well-known BGP community for Anycast

2022-07-08 Thread Randy Bush
> Meaning, please add a note to the security considerations saying don't
> trust communities (this one included) from untrusted sources.  See rfc
> 7999 S6.

because A trusts B, A does not know B's inbound security model.  so B
could have accepted the community from C with conditions less strict
than A would have applied.

don't trust communities.  treat this community as a clue, not a fact.

randy

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Proposing a well-known BGP community for Anycast

2022-07-08 Thread heasley
Fri, Jul 08, 2022 at 05:13:37PM +0200, Robert Raszuk:
> > I do not understand Robert's issues with this community.
> 
> Let me say that I like it from operational perspective.
> 
> However from routing perspective I have doubts on how this community is
> going to be originated and how it is going to be used.
> 

I do not preceive these concerns to be unique to this community.  rfc7999
(BLACKHOLE) is of little difference, for eg.  The draft and comments on
the WG ML have noted a few uses, besides it being informational.

> Example 1: Hyperscaler has global POP footprint and is offering anycast
> services for its VPCs. So lot's of prefixes are going to be marked as such.
> Is the expectations that ISPs will/shall use it ?

maybe; that is their decision, not ours nor the originating AS's.  They
might ignore BLACKHOLE, GRACEFUL SHUT, or no_export too.  They might
choose to ignore (or not) it only from Hyperscaler.  They might have a
specific agreement with Hyperscalar to observe the community.

> Example 2: Enterprise is injecting same prefix from different locations. It
> could be anycast or not. Or maybe as mentioned one host route within such
> /24 is true anycast. Is ISP suppose to alter their local pref according to
> such marking ? Even if there is no really ANYCAST service behind at all ?

They might; both are their decision.  They might not observe the community
for prefixes shorther than /24 (/64).  They might just not ignore (use) the
MEDs received.  They might not observe it for prefixes with an AS_PATH
greater than 1 AS.  They might advertise the more specific with no-export.

> Example 3: How do we detect misuse and accidental or purpose marking by
> malicious guys in the middle ?

you know that is not possible today.  You can choose to craft your policy
to limit from whom it is accepted or have other constraints, just as with
any other community.

Seems like we've been over this for other communities.  Besides Jeff's
requested changes (your Ex 2 & 3), perhaps you just want prefix lengths
addressed?

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Proposing a well-known BGP community for Anycast

2022-07-08 Thread Robert Raszuk
> I do not understand Robert's issues with this community.

Let me say that I like it from operational perspective.

However from routing perspective I have doubts on how this community is
going to be originated and how it is going to be used.

Example 1: Hyperscaler has global POP footprint and is offering anycast
services for its VPCs. So lot's of prefixes are going to be marked as such.
Is the expectations that ISPs will/shall use it ?

Example 2: Enterprise is injecting same prefix from different locations. It
could be anycast or not. Or maybe as mentioned one host route within such
/24 is true anycast. Is ISP suppose to alter their local pref according to
such marking ? Even if there is no really ANYCAST service behind at all ?

Example 3: How do we detect misuse and accidental or purpose marking by
malicious guys in the middle ?

Thx,
R.







On Fri, Jul 8, 2022 at 5:01 PM heasley  wrote:

> Thu, Jul 07, 2022 at 12:21:27PM -0400, Jeffrey Haas:
> >
> >
> > > On Jul 7, 2022, at 11:50 AM, Robert Raszuk  wrote:
> > > But most if not all of those do not affect intradomain traffic
> engineering rules.
> > >
> > > So I think Jeff's point is how much trust is needed to overwrite your
> own
> > > policy in selecting exit points and overwriting your EPE policy, TE
> policy, Local Pref etc ...
> >
> > Exactly.
> >
> > > And I think misuse of those can happen even over direct peerings if
> the overall objective is
> > > to avoid double checking the community against prefix lists.
> >
> > Exactly.
>
> Meaning, please add a note to the security considerations saying don't
> trust
> communities (this one included) from untrusted sources.  See rfc 7999 S6.
>
> What a receiver's policy does with the community (or several other
> well-knowns or another AS'es self-defined) is their decision.  The document
> clearly dictates that a bgp implementation SHOULD NOT (imo MUST NOT) apply
> [automatic] special handling of the community.  I do not understand
> Robert's
> issues with this community.
>
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Proposing a well-known BGP community for Anycast

2022-07-08 Thread heasley
Thu, Jul 07, 2022 at 12:21:27PM -0400, Jeffrey Haas:
> 
> 
> > On Jul 7, 2022, at 11:50 AM, Robert Raszuk  wrote:
> > But most if not all of those do not affect intradomain traffic engineering 
> > rules. 
> > 
> > So I think Jeff's point is how much trust is needed to overwrite your own 
> > policy in selecting exit points and overwriting your EPE policy, TE policy, 
> > Local Pref etc ... 
> 
> Exactly.
> 
> > And I think misuse of those can happen even over direct peerings if the 
> > overall objective is 
> > to avoid double checking the community against prefix lists. 
> 
> Exactly.

Meaning, please add a note to the security considerations saying don't trust
communities (this one included) from untrusted sources.  See rfc 7999 S6.

What a receiver's policy does with the community (or several other
well-knowns or another AS'es self-defined) is their decision.  The document
clearly dictates that a bgp implementation SHOULD NOT (imo MUST NOT) apply
[automatic] special handling of the community.  I do not understand Robert's
issues with this community.

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


[GROW] draft-lucente-grow-bmp-tlv-ebit-02 - review/comment

2022-07-08 Thread Thomas.Graf
Hi Paolo,

I reviewed

https://datatracker.ietf.org/doc/html/draft-lucente-grow-bmp-tlv-ebit-02

and have some minor nits and simplifications in wording to be considered.

Best wishes
Thomas


Change from


   Vendors need the ability to define proprietary Information Elements,

   because, for example, they are delivering a pre-standard product.


To



   Vendors need the ability to define proprietary Information Elements

   for various reasons such as delivering a pre-standard product.


Change from



   This This would align with Also for code point assignment to be

   eligible, an IETF document needs to be adopted at a Working Group and

   in a stable condition.


To



   This aligns also with code point assignments where a document

   needs to be at stable condition in IETF Working Group first.




Change from



   shipped to network operators to be tested there as well.


To



   shipped to network operators for testing.


Change from



   This would align with This document re-defines the format of IANA-

   registered TLVs in a backward compatible manner with respect to

   previous documents and existing IANA allocations;


To



   This document re-defines the format of IANA-

   registered TLVs in a backward compatible manner with respect to

   previous documents and existing IANA allocations;



Change from


   The encoding specified in this document applies to all existing BMP

   Message Types and their namespaces defined in Future BMP Message

   Types MUST make use of the TLV encoding defined in this document.



To



   The TLV encoding specified in this document applies to all existing

   and future BMP Message Types and their namespaces.

.



smime.p7s
Description: S/MIME Cryptographic Signature
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow