Re: [GROW] BGP Looking Glass Capability

2021-07-27 Thread Thomas Mangin
Hello everyone,

While quite a few drafts have been using attributes to carry weird
information into BGP, this one proposes to use MP.
I can see how one may think it would be helpful and reduce implementation
burgen but I am not sure it is wise and I believe it goes beyond what
AFI/SAFI are for.

Also this reminds me very much of
https://datatracker.ietf.org/doc/html/draft-ietf-idr-operational-message
which I implemented but never saw traction.
So while I can see why this would benefit operational matters, I do not
believe the RFC as proposed should be accepted.

Sorry for being such a party pooper !

Thomas

On Sat, 24 Apr 2021 at 14:38, Rayhaan Jaufeerally (IETF) 
wrote:

> Dear GROW chairs and participants,
>
> I would like to propose draft-jaufeerally-bgp-lg-cap-00 (
> https://datatracker.ietf.org/doc/draft-jaufeerally-bgp-lg-cap/) as a
> mechanism for in-band dissemination of looking glass endpoints in BGP,
> using a new OPEN message capability.
>
> The rationale behind this is to facilitate automation around eBGP peering,
> for example  to make it possible to automatically detect if the peer has
> accepted some routes which are expected to be accepted.
>
> I'm aware that the underlying RFC8522 is an informational RFC and leaves
> some details unspecified for the response format (i.e. a schema for the
> queries/responses) but I believe that can be further refined in other works
> independent to this proposal.
>
> I would like to hear what the WG thinks, if this is a reasonable proposal
> which fits into the broader charter of GROW?
>
> Thanks,
> Rayhaan
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
>
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-12 Thread Thomas Mangin
 

Hello,

I would propose a draft wording change among the lines of
what is here. I have not defined a name for the "extra capability buffer
size", it may be advisable. So the wording is mostly to clarify the
intend and not intended verbatim.

Thomas

--

Before 

The BGP Extended
Message Capability is a new BGP Capability [RFC5492]
defined with
Capability code 6 and Capability length 0. 

After 

The BGP Extended
Message Capability is a new BGP Capability [RFC5492]
defined with
Capability code 6 and Capability length 2. 

The capability value will
be called "capability extra length" (encoded as 2 octets). 

The value
of the "capability extra length" MUST be added to the OPEN
"Optional
Parameters Length", and the "Optional Parameters" buffer
extended
accordingly. 

For backward compatibility with speakers not
aware of this capability,
the data processed when only reading "Optional
Parameters Length" of
"Optional Parameters" MUST provide a valid
capability boundary. 

Further drafts and RFC MUST explicitly indicate
if any defined capability 
must be stored within the non-extended
Optional Parameters buffer or
SHALL be added within the extended size.


Before 

An implementation that advertises support for BGP Extended
Messages
MUST be capable of receiving an UPDATE message with a length up
to
and including 65535 octets. 

After 

An implementation that
advertises support for BGP Extended Messages
MUST be capable of
receiving messages with a length up to
and including 65535 octets,
however the OPEN message length MUST still be
no greater than 4096. ___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-11 Thread Thomas Mangin
 

On 2017-03-11 18:06, Thomas Mangin wrote: 

>
https://github.com/Exa-Networks/exabgp/blob/master/lib/exabgp/bgp/message/open/capability/capabilities.py#L159

should
be:


https://github.com/Exa-Networks/exabgp/blob/974f97fc6be63f0b05755ffc3e1ea69a02c0505b/lib/exabgp/bgp/message/open/capability/capabilities.py#L159

As
I now fixed the issue but it means that in production there is speakers
which would break should multiple pairs of capabilities were used ...


The "to be continued in a second OPEN" option looks very very
appealing to me right now.

Thomas

 ___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-11 Thread Thomas Mangin
 

On 2017-03-10 22:32, Nick Hilliard wrote: 

> This is listed as a
MUST in 4721, so heas@ is probably correct that any
> implementation
which ignores this is terminally broken.

 I agree fully:
 - terminally
broken from a standard and compliance POV
 - working perfectly in
production from an operational one (most likely for years).

ExaBGP OPEN
with everything it implements is 173 bytes ATM.

SENDING ( 173) 
       00AD 0104 FFFD 00B4 7F00  9002
0601 0400 0100 0102 0601 0400 0100 0202 0601 0400 0100 0402 0601 0400
0100 8002 0601 0400 0100 8402 0601 0400 0100 8502 0601 0400 0100 8602
0601 0400 0200 0102 0601 0400 0200 0202 0601 0400 0200 0402 0601 0400
0200 8002 0601 0400 0200 8502 0601 0400 0200 8602 0601 0400 1900 4102
0601 0400 1900 4602 0601 0440 0400 4702 0601 0440 0400 4802 0641 0400
00FF FD

OPEN version=4 asn=65533 hold_time=180 router_id=127.0.0.0
capabilities=[Multiprotocol(ipv4 unicast,ipv4 multicast,ipv4
nlri-mpls,ipv4 mpls-vpn,ipv4 rtc,ipv4 flow,ipv4 flow-vpn,ipv6
unicast,ipv6 multicast,ipv6 nlri-mpls,ipv6 mpls-vpn,ipv6 flow,ipv6
flow-vpn,l2vpn vpls,l2vpn evpn,bgpls bgp-ls,bgpls bgp-ls-vpn),
ASN4(65533)]

But before caring about the 65k OPEN, we may want to
consider that the "Optional Parameters Length" which is a byte, so:

173
bytes with 19 bytes of header and 10 bytes of pre-capabilities OPEN
headers, so effectively 144 bytes are used for capabilities, so in this
OPEN there is still around 100 bytes left for the things I did not
implement .. which is not that much.

A simple solution would be to have
a capability that if present allow the pair "Optional Parameters Length"
/ "Optional Parameters" to be repeated multiple times (the "to be
continued capability" capability :p) ... It would then increase the size
from 100 to around 4k, at which point we can still extend it with
another capability allowing for another OPEN in another draft if we need
to span multiple OPEN. ATM all we have to do is forbid this capability
when we reach the 4k limit.

Quite ironically ExaBGP does not enforce
the "Optional Parameters Length", and therefore will read up to 4k in
capability in violation of the RFC ... /me starts looking in another
direction ...
But somehow it helps me with my point about the sleeping
beast, so I will not feel too bad about it
:p

https://github.com/Exa-Networks/exabgp/blob/master/lib/exabgp/bgp/message/open/capability/capabilities.py#L159

Let's
keep with the IETF "Robustness Principle" and just fix this with
4k.

Thomas

 ___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-09 Thread Thomas Mangin
 Hi Enke,

If we are going to take a long time to reach any consensus,
I would rather not change the OPEN size.

The gain with large MESSAGE is
within the UPDATE processing. Having large MESSAGE will drastically
reduce the processing of attributes per NLRI [1]. Having a smaller OPEN
is something we can decide ignore at the moment, there is no problem a
larger OPEN fixes today.

I would advocate to just change the draft to
clarify that all MESSAGEs but OPEN are affected and be done with it. Let
progress by step: this one is very easy to implement, anything more
would require more code and therefore is less likely to get in
production soon (it seems to be the lesson coming from RFC 8092).

I
would then advocate to look at extending the OPEN as another draft (that
we can then argue for years until there is pressure from the operational
to get consensus and another draft with happen instead :p), it does not
delay the benefit of 65k UPDATEs.

Thomas

[1] BGP was designed in a
time where CPU and memory were expensive. So it does did not disjoint
ATTRIBUTE and NRLI. They were both were packed in a same message to be
processed together (but if someone want to create new named attribute
messages and a new attribute to use to link it to an UPDATE - I am all
in favour to even reduce the CPU load on my routers).

On 2017-03-09
20:09, Enke Chen wrote: 

> Hi, Folks:
> 
> Let me add some specifics:
>

> Case 1: large OPEN only
> 
> If the local speaker is only interested
in getting the session established using a
> large OPEN, then it SHOULD
go ahead with the large OPEN and deal with the issue
> administratively
upon receiving a NOTIFICATION due to the large OPEN size. In this
> case
the remote speaker has to be upgraded to support the large message
capability.
> 
> Case 2: Prefer a large OPEN, but can live with a normal
size, predefined OPEN
> 
> Option 1: Start with a large OPEN. In case a
NOTIFICATION is received due to the
> large OPEN size, fall back to
using the predefined normal size OPEN.
> 
> Option 2: Start with the
normal size OPEN. If the OPEN from the remote speaker
> does not
contains the large message capability, proceed with the session
>
establishment. Otherwise send a CEASE message (with a new subcode) and
>
terminate the session (before sending the KEEPALIVE), and then start a
>
new session with the large OPEN.
> 
> With either Option, there should
be no impact on the GR or LLGR as the session
> did not reach the
ESTABLISHED state with the first OPEN.
> 
> Option 1 is more preferred
when the local speaker has the knowledge that the
> capability is
supported by the remote speaker based on the previous OPEN or via
>
administrative means. It also does not require any new protocol
definitions (like
> a new CEASE subcode).
> 
> In addition, I believe
that the large OPEN will not be needed any time soon and
> by the time
it is needed the large message capability should have been widely
>
deployed. Thus I think Option 1 is good and there should be no need to
specify
> Option 2.
> 
> Thanks. -- Enke
> 
> On 3/9/17 6:41 AM, Randy
Bush wrote:
> 
>>> Thank you for sharing this scenario. It would indeed
work at the small cost (or perhaps not so small) to require an extra
round trip at setup time which is most likely un-avoideable whatever is
done.
>> then a double open. i.e. a 4096 open which has the extended
capability exchange and then an optional extended open randy
___ GROW mailing list
GROW@ietf.org https://www.ietf.org/mailman/listinfo/grow [1]




Links:
--
[1] https://www.ietf.org/mailman/listinfo/grow
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-09 Thread Thomas Mangin
Hi Randy,

To never have to revisit this point, I would suggest for a capability 
containing a char of value N, for the N extra MESSAGE to be read before the KA, 
the extra MESSAGEs being OPENs, which should have the Version to Identifier 
data zero’ed (and ignored) with then the extra capabilities to be considered as 
if they were present at the end of the current OPEN.

The extra OPEN being themselves up to 65k in size.

Happy to provide an implementation to test against if we reach consensus.

Thomas

> On 9 Mar 2017, at 14:41, Randy Bush  wrote:
> 
>> Thank you for sharing this scenario. It would indeed work at the small
>> cost (or perhaps not so small) to require an extra round trip at setup
>> time which is most likely un-avoideable whatever is done. 
> 
> then a double open.  i.e. a 4096 open which has the extended capability
> exchange and then an optional extended open
> 
> randy

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-09 Thread Thomas Mangin
Hello Susan.

Just thinking out loud here ...

Thank you for sharing this scenario. It would indeed work at the small cost (or 
perhaps not so small) to require an extra round trip at setup time which is 
most likely un-avoideable whatever is done.

The issue which keeps me thinking would be which capabilities/feature should 
dropped in order to fulfil the 4096 bytes limit when the NOTIFICATION is 
received.
I would rather see the OPEN stay at 4096 and have an “extended OPEN capability” 
than the Notification trick as otherwise newer drafts/RFCs will otherwise not 
cover the point.

If a extended OPEN feature is added, new drafts can then decide to require the 
implementation of this OPEN extension, making the split easy (current 
capabilities in OPEN, newer in extension). Modifying the state machine to 
include a new MESSAGE (or extra OPEN of 65k) should not be too hard (I am sure 
you have heard the before :p)

In every case, some wording about the Connect(Retry)Timer and DelayOpenTime may 
also need to be considered to make sure no large delay is introduced during the 
BGP setup - re-sending an OPEN immediately after the NOTIFICATION or extra 
OPEN/Message (if doing so does not cause an issue with the state machine).

For today, with all the current RFC and drafts implemented, AFAIK we are still 
far from filling the OPEN, but perhaps “we" should take the time to see what 
the sum of of the capabilities for all the families is, to see what space is 
definitively left in the OPEN ..

It is not unreasonable to consider that a valid capability may need some large 
space at some point .. 
https://tools.ietf.org/html/draft-walton-bgp-hostname-capability-02 
<https://tools.ietf.org/html/draft-walton-bgp-hostname-capability-02> made me 
consider the size of the OPEN back in early 2016 - as I implemented it “for 
fun” at the time - So in Jan 2016 and ExaBGP still had 2*255 + 2 = 512 bytes 
spare in the OPEN but not much more.

Sincerely,

Thomas

> On 7 Mar 2017, at 22:25, Susan Hares  wrote:
> 
> Thomas: 
> 
> It is possible to create an option that requires implementation support
> extended messages upon receiving a notification.  If the sequence is: 
> Open-(4097 bytes) --> 
> <-notification (with indication message length is too long)
> 
> 
> (sequence allowed RFC4271 current FSM) 
> The extended messages would know to back down to 4096 and negotiate forward.
> This would not let your BGP speaker get stuck.  It seems reasonable to make
> the code take care of this problem rather than have a crisis in an
> operator's day. 
> 
> Open (< 4096) bytes) ---> 
> 
> Just let us know what you want. 
> 
> Sue 
> 
> 
> -Original Message-
> From: Thomas Mangin [mailto:thomas.man...@exa.net.uk] 
> Sent: Tuesday, March 7, 2017 4:39 PM
> To: grow@ietf.org
> Cc: Susan Hares
> Subject: Re: [GROW] Do you want BGP to extend the message size for all BGP
> messages or just UPDATES.
> 
> Hello Nick,
> 
> I can see one reason why it would become undesirable in the future: 
> 
> If a then recent speaker, with support with this draft/RFC, and with a
> yet-to be defined large number of capabilities, happened to generate an OPEN
> message of 4097 bytes (to match its configuration), this OPEN would most
> likely be seen as invalid by current implementations not supporting the
> extension.
> The excessive/invalid length when checking the OPEN message size will surely
> caused the session to be terminated.
> 
> It would therefore prevent any session to come up (even if otherwise
> everything is fine). Therefore should this size extension be applied, it
> should be applied to all message types BUT the OPEN message. I think we are
> currently not near needing 4096 bytes for OPEN (but the day will/may come).
> 
> ExaBGP would suffer from this issue as the check is currently performed on
> ALL messages as currently specified including the OPEN.
> 
> So I would suggest to just change the wording to include all message type
> but OPEN, and leave it as an exercise to the reader to write another draft
> allowing to break capabilities over multiple messages.
> 
> Sincerely,
> 
> Thomas
> 
>> On 7 Mar 2017, at 21:08, Nick Hilliard  wrote:
>> 
>> Susan Hares wrote:
>>> This email is to make you aware of the discussion on the Extended
>>> Messages draft (draft-ietf-idr-bgp-extended-messages-21).   Do you
>>> want the message size extended for all BGP messages or just UPDATE
>>> messages?   This probably is more important if you want to have a
>>> larger size OPEN, ROUTE-REFESH, and UPDATES.The IDR co-chairs
>>> value the operational input from GROW WG.
>> 
>> I don't see any reason an extended message size s

Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-09 Thread Thomas Mangin
+1 - it makes lots of sense.

Thomas

> On 7 Mar 2017, at 21:08, Nick Hilliard  wrote:
> 
> Susan Hares wrote:
>> This email is to make you aware of the discussion on the Extended
>> Messages draft (draft-ietf-idr-bgp-extended-messages-21).   Do you
>> want the message size extended for all BGP messages or just UPDATE
>> messages?   This probably is more important if you want to have a
>> larger size OPEN, ROUTE-REFESH, and UPDATES.The IDR co-chairs
>> value the operational input from GROW WG.
> 
> I don't see any reason an extended message size should be limited to
> just UPDATEs. Enke's suggestion for handling the single anomalous case
> (OPEN) looks reasonable.  I'd say, go for it!
> 
> Nick
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-09 Thread Thomas Mangin
 Hi Randy,

To never have to revisit this point, I would suggest for a
capability containing a char of value N, for the N extra MESSAGE to be
read before the KA, the extra MESSAGEs being OPENs, which should have
the Version to Identifier data zero'ed (and ignored) with then the extra
capabilities to be considered as if they were present at the end of the
current OPEN.

The extra OPEN being themselves up to 65k in size.

Happy
to provide an implementation to test against if we reach
consensus.

Thomas

On 2017-03-09 14:41, Randy Bush wrote: 

>> Thank
you for sharing this scenario. It would indeed work at the small cost
(or perhaps not so small) to require an extra round trip at setup time
which is most likely un-avoideable whatever is done.
> 
> then a double
open. i.e. a 4096 open which has the extended capability
> exchange and
then an optional extended open
> 
> randy
 ___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-09 Thread Thomas Mangin
 Hi Nick,

Looking at Quagga, Bird, GoBGP (I took a few minutes to read
their code and I am not overly familiar with any of them), they all
seems to perform the 4096 bytes check and send NOTIFICATION, so I would
only expect badly home brewed solution to suffer from the issue (not to
say we should not care).

That said, I would also assume the code path
for this scenario has never been run in production (and perhaps ever) in
the life of any BGP implementation so while it may look good, it may not
do what is expected. I believe some "real" world testing is in order


Thomas

On 2017-03-09 12:20, Nick Hilliard wrote: 

> Sue: I'd be
cautious with your approach. First, it's not guaranteed
> that some
badly coded bgp stack wouldn't crash with a 4097 byte OPEN
> message,
and secondly, you're not guaranteed that just because the stack
>
supports 4097 bytes on open due to e.g. unintentional coding reasons,
>
that it actually supports 4097 bytes by design and that it actually
>
works properly.
 ___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Do you want BGP to extend the message size for all BGP messages or just UPDATES.

2017-03-09 Thread Thomas Mangin
 (Resending as I previously use an email address which is not
registered on grow)

Hello Susan. 

Just thinking out loud here ...


Thank you for sharing this scenario. It would indeed work at the small
cost (or perhaps not so small) to require an extra round trip at setup
time which is most likely un-avoideable whatever is done. 

The issue
which keeps me thinking would be which capabilities/feature should
dropped in order to fulfil the 4096 bytes limit when the NOTIFICATION is
received. 

I would rather see the OPEN stay at 4096 and have an
"extended OPEN capability" than the Notification trick as otherwise
newer drafts/RFCs will otherwise not cover the point. 

If a extended
OPEN feature is added, new drafts can then decide to require the
implementation of this OPEN extension, making the split easy (current
capabilities in OPEN, newer in extension). Modifying the state machine
to include a new MESSAGE (or extra OPEN of 65k) should not be too hard
(I am sure you have heard the before :p) 

In every scenario, some
wording about the Connect(Retry)Timer and DelayOpenTime may also need to
be considered to make sure no large delay is introduced during the BGP
setup - re-sending an OPEN immediately after the NOTIFICATION or extra
OPEN/Message (if doing so does not cause an issue with the state
machine). 

At the moment, with all the current RFC and drafts
implemented, AFAIK we are still far from filling the OPEN, but perhaps
"we" should take the time to see what the sum of of the capabilities for
all the families is, to see what space is definitively left in the OPEN
.. 

It is not unreasonable to consider that a valid capability may need
some large space at some point ..
https://tools.ietf.org/html/draft-walton-bgp-hostname-capability-02 [2]
made me consider the size of the OPEN back in early 2016 - as I
implemented it "for fun" at the time - So in Jan 2016 and ExaBGP still
had 2*255 + 2 = 512 bytes spare in the OPEN but not much more AFAICR.


Sincerely, 

Thomas 

On 2017-03-09 12:20, Nick Hilliard wrote: 

>
Thomas: you have more experience with this and your advice sounds
>
reasonable.
> 
> Sue: I'd be cautious with your approach. First, it's
not guaranteed
> that some badly coded bgp stack wouldn't crash with a
4097 byte OPEN
> message, and secondly, you're not guaranteed that just
because the stack
> supports 4097 bytes on open due to e.g.
unintentional coding reasons,
> that it actually supports 4097 bytes by
design and that it actually
> works properly.
> 
> Nick
> 
> Susan Hares
wrote:
> 
>> Thomas: It is possible to create an option that requires
implementation support extended messages upon receiving a notification.
If the sequence is: Open-(4097 bytes) --> <-notification (with
indication message length is too long) (sequence allowed RFC4271 current
FSM) The extended messages would know to back down to 4096 and negotiate
forward. This would not let your BGP speaker get stuck. It seems
reasonable to make the code take care of this problem rather than have a
crisis in an operator's day. Open (< 4096) bytes) ---> Just let us know
what you want. Sue -Original Message- From: Thomas Mangin
[mailto:thomas.man...@exa.net.uk] Sent: Tuesday, March 7, 2017 4:39 PM
To: grow@ietf.orgCc: Susan Hares Subject: Re: [GROW] Do you want BGP to
extend the message size for all BGP messages or just UPDATES. Hello
Nick, I can see one reason why it would become undesirable in the
future: If a then recent speaker, with support with this draft/RFC, and
with a yet-to be defined large number of capabilities, happened to
generate an OPEN message of 4097 bytes (to match its configuration),
this OPEN would most likely be seen as invalid by current
implementations not supporting the extension. The excessive/invalid
length when checking the OPEN message size will surely caused the
session to be terminated. It would therefore prevent any session to come
up (even if otherwise everything is fine). Therefore should this size
extension be applied, it should be applied to all message types BUT the
OPEN message. I think we are currently not near needing 4096 bytes for
OPEN (but the day will/may come). ExaBGP would suffer from this issue as
the check is currently performed on ALL messages as currently specified
including the OPEN. So I would suggest to just change the wording to
include all message type but OPEN, and leave it as an exercise to the
reader to write another draft allowing to break capabilities over
multiple messages. Sincerely, Thomas 
>> 
>>> On 7 Mar 2017, at 21:08,
Nick Hilliard  wrote: Susan Hares wrote: 
>>> 
>>>>
This email is to make you aware of the discussion on the Extended
Messages draft (draft-ietf-idr-bgp-extended-messages-21). Do you want
the message size extended for all BGP messages or just UPDATE messages?
This probably is more important if yo

Re: [GROW] ietf 97 agenda

2016-11-21 Thread Thomas Mangin
> Have you tried?

Thank you John and Job. A long time ago I got one (not personal). 
19092 Exa Networks Ltd
I could not recall it was allowed for individuals. Thank you for correcting my 
misunderstanding.

Still my point stands:

The problem is that developers do not know what code they can use for 
experimentation when they see TBD in a draft. 
The proposed document does not prevent anyone to continue squatting and 
polluting the DFZ with unknown attributes when implementing new drafts.

It does ask developers to go through a convoluted way to re-encode attributes 
to experiment and them fully re-code the feature when it needs to go to 
production.
Thank you but no thank you: as a developer, I just want to know that I can use 
some attribute code safely.

AS operators will know what code is run on their kit, and can make sure that 
there is no conflict of experimental features.
(And it would be trivial for WG chairs to make sure drafts do use different 
codes).

Also this draft may introduce a new number of new challenges:
Once we have IANA defined sub-attributes, we may also see vendors “matching” 
some other vendors experimental feature - which IMHO would be unadvisable. What 
then ?
What need will vendors then have to standardise their own namespace ?

Just reserving a range such (let say 200-254) for experimentation and making 
them non eBGP transitive would match what is already done with Private ASN, 
preventing their propagation is MUCH simpler, and let people experiment as they 
want.

(see included patch which would implement such draft/RFC)

Thomas

—
diff --git a/lib/exabgp/bgp/message/update/attribute/attributes.py 
b/lib/exabgp/bgp/message/update/attribute/attributes.py
index cedd82b..0745117 100644
--- a/lib/exabgp/bgp/message/update/attribute/attributes.py
+++ b/lib/exabgp/bgp/message/update/attribute/attributes.py
@@ -227,6 +227,8 @@ class Attributes (dict):
   alls = set(keys + default.keys() if with_default else [])

   for code in sorted(alls):
+   if code in range(200,255) and local_asn != peer_asn:
+   continue
   if code in (
   Attribute.CODE.INTERNAL_SPLIT,
   Attribute.CODE.INTERNAL_WATCHDOG,
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] ietf 97 agenda

2016-11-21 Thread Thomas Mangin
Jeff,

As I am not pushing for an alternate draft, would you agree that there is no 
need to test feature on EBGP links and that this attribute should therefore be 
limited to iBGP to protect the innocents ?
EBGP testing should be done using the right final encoding using the proper 
attribute code.

Sincerely,

Thomas

> On 21 Nov 2016, at 14:40, Jeffrey Haas  wrote:
> 
> Thomas,
> 
> On Thu, Nov 17, 2016 at 09:40:00AM +, Thomas Mangin wrote:
>> Thank you for your answer.
>> I would be curious to hearing your view on the possible risks the new 
>> un-regulated, vendor controlled, space this draft creates as your document 
>> is silent about it.
> 
> This was commented somewhat further in IDR and also during my code points
> presentation in IDR at IETF 97 (suggested reading).
> 
> There is somewhat of a need for fully private space.  We're starting to see
> this very strongly in data center contexts wherein BGP is used as a
> transport and there's significant danger of contamination of fully internal
> features leaking into the public Internet.  But as I mentioned in the IDR
> thread, this was not my initial motivation for the draft.  It does, however,
> serve as a fine starting point for that discussion.
> 
>> I can not see why I would want to implement your draft as a step toward 
>> implementing another draft (the end goal) which does not require it at all, 
>> unless it is intended to be used like like MultiProtocol as a generic 
>> extension mechanism and not only a test feature.
>> The implementation difficulty is not the barrier: I can perfectly see how I 
>> could change the class inheritance of ExaBGP while keeping the attribute 
>> interface to implement your draft.
>> 
>> We need to fix a human problem : laziness, lack of time or information 
>> leading to the squatting. 
> 
> As noted in my code point presentation, laziness is *not* the issue.  As you
> note in your own response, developers need something they can use when TBD
> is specified.
> 
>> In my view, asking over-worked developers / teams to add some complex code 
>> to test new features mean will not lead to a behavioural change.
>> All that is required is to give the developer the playground they need to 
>> not bother network operation, as the dangers caused by transitive nature of 
>> attributes were already fixed with RFC7606. 
>> 
>> “Public” IANA resource such as IP and ASN have “private” ranges, among other 
>> reason, for experimentation.
> 
> Private is an excellent example.  If a particular path attribute code space
> was marked private, this doesn't stop the issue of collisions.  If your
> implementation uses 240 and another uses 240, you'll run into the same
> treat-as-withdraw encoding problems we've seen with other forms of
> squatting.
> 
> Essentially, private doesn't help you.  Neither does a playground.  
> 
> The fundamental issue, as noted in the code point presentation, is that BGP
> path attributes have a large "blast radius".  It's very difficult to keep
> them localized in their current form and thus there's a need to be very
> strict about what is used globally.
> 
>> I my naive view, every draft could simply cherry pick a code. The numbers of 
>> “in-flight documents” is not high, I would expect simple self-policing on 
>> list to be enough with a large enough resource pool.
>> Should a clash occur, a new draft can quickly fix the issue. Happy to hear 
>> if others have better ideas.
> 
> Such "cherry picking" is essentially just squatting.  It's also antisocial
> in global BGP.  If someone has code deployed in a transit scenario wherein
> they're squatting on something that was intended to be globally deployed,
> the code point is outright toxic now: you can't safely use it for either
> feature.  This is why there's 4 code points going through IANA deprecation
> in IDR right now.
> 
> Don't make this 5+.
> 
>> But if an operator is willing / care enough to use experimental features in 
>> his production network and/or with another operator, I am pretty sure they 
>> will have the motivation to make sure to do their due diligence to make sure 
>> there is no clashes.
> 
> They don't have the tools.
> 
>> Perhaps the solution would be to required a “disabled until explicitly 
>> enabled on iBGP” default behaviour for these attribute codes.
> 
> iBGP doesn't make this safe.
> 
>> Optional explicit configuration of the feature eBGP session is something I 
>> would expect vendors to add due to customer/user demand :-)
> 
> I do comment on this even in the experimental context in my draft.  However,
> this doesn't work safely in a squatting context.
> 
> -- Jeff

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] ietf 97 agenda

2016-11-21 Thread Thomas Mangin
Hello Jeff,

Thank you for your answer.
I would be curious to hearing your view on the possible risks the new 
un-regulated, vendor controlled, space this draft creates as your document is 
silent about it.

> As mentioned elsewhere in thread, PENs are easy to get hence suggesting that
> managed code pode.  I tried to make sure that was clear in the [IANA-PEN]
> link, but perhaps there's text I could add to make it more explicit?

It can not harm. I was clearly ill-informed.

>> Also it changes the way features are coded and would require re-coding once 
>> the format is stable and or the code is defined and not simply a code change 
>> which is for me unwise and an overkill.
> 
> I have admittedly not taken a look at your implementation […]

I can not see why I would want to implement your draft as a step toward 
implementing another draft (the end goal) which does not require it at all, 
unless it is intended to be used like like MultiProtocol as a generic extension 
mechanism and not only a test feature.
The implementation difficulty is not the barrier: I can perfectly see how I 
could change the class inheritance of ExaBGP while keeping the attribute 
interface to implement your draft.

We need to fix a human problem : laziness, lack of time or information leading 
to the squatting. 
In my view, asking over-worked developers / teams to add some complex code to 
test new features mean will not lead to a behavioural change.
All that is required is to give the developer the playground they need to not 
bother network operation, as the dangers caused by transitive nature of 
attributes were already fixed with RFC7606. 

“Public” IANA resource such as IP and ASN have “private” ranges, among other 
reason, for experimentation.
I can not se any harm to extend this principle more widely to help, not the 
operators this time, but the developers.

>> I would rather see a much simpler solution: allocate some code point for 
>> development and make them iBGP transitive only, (and give operators an 
>> option to bypass this limit on selected eBGP links if they so wish...)
> 
> And how would you propose to deal with code point allocation for this?  For
> example, we already have 255 available.


A simple code is not enough, but a range would allow multiple features 
developed in parallel (in one code base), while also allowing possible cross 
vendor interoperability testing.
TBD is a terrible word to read in a draft when you are trying to implement it. 
TDB is not a valid integer value, and 255 as a single available value is not 
enough, so it is not used.
The wording in draft need to contain the information developers needs to 
implement the draft as they understand it.

I my naive view, every draft could simply cherry pick a code. The numbers of 
“in-flight documents” is not high, I would expect simple self-policing on list 
to be enough with a large enough resource pool.
Should a clash occur, a new draft can quickly fix the issue. Happy to hear if 
others have better ideas.

But if an operator is willing / care enough to use experimental features in his 
production network and/or with another operator, I am pretty sure they will 
have the motivation to make sure to do their due diligence to make sure there 
is no clashes.

Perhaps the solution would be to required a “disabled until explicitly enabled 
on iBGP” default behaviour for these attribute codes.
Optional explicit configuration of the feature eBGP session is something I 
would expect vendors to add due to customer/user demand :-)

Sincerely,

Thomas

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-07-02 Thread Thomas Mangin

Hello David,

Given the above, and the fact that it would require 'hacks' to realise 
this transitive nature, to ask the authors to reduce the scope to it 
being non-transitive, would render the draft somewhat impotent in 
these regards. I can see why there is resistance from the authors to 
do this.

[…]


You worded the operational case as I also see it and notice that I did 
not explicitly say that I had no objection with the document as it is 
currently worded.


Thomas

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-28 Thread Thomas Mangin

On 28 Jun 2016, at 16:36, Job Snijders wrote:


On Tue, Jun 28, 2016 at 11:27:52AM -0400, Christopher Morrow wrote:


that seems reasonable, though I don't think it necessarily addresses
Nick's issue that: "YIKES! please don't mention that IXP's can/will 
do

this sort of function"



I still question the validity of Nick's concern. Since when do LEA 
read
RFCs/drafts like draft-ietf-grow-blackholing and then conclude "oh, 
this

RFC says that blackholing at IXPs can't be done, alrighty then, we'll
show ourselves out!".

LEAs will request what LEAs will request, regardless of technical
feasibility or IETF's acknowledgement/denial a facilitating mechanism
exists.


Job,

Not putting any particular IXP’s hat on, but as an individual I 
_strongly_ agree with Nick. I see no reason to mention IX in the 
document.


The IX community is trying to make sure we do not become the filtering 
sink of the internet (it would not do anyone any good - except perhaps 
transit providers :wink: :wink:)


A long time ago, working for another employer, my team wrote a software 
called ’CleanFeed’ (it was trademarked - a trademark now owned by 
BT) and then demo’ed to BT, which code named a similar project with 
the same name. Today, the whole UK industry has to contend with ‘ISP 
level filtering’.


You do NOT want to open any pandora’s box.

Sincerely,

Thomas

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Working Group Adoption Call: draft-petrie-grow-mrt-add-paths

2015-11-02 Thread Thomas Mangin
I support the adoption of this draft.

Thomas

http://exa.net.uk/about/contact-us
On 2 Nov 2015, at 6:48, Christopher Morrow wrote:

> Howdy WG folks,
>
> Please consider this the start of a 3 week Adoption call for the noted
> draft who's abstract is:
>  "This document updates the Multi-threaded Routing Toolkit (MRT) export
>  format for Border Gateway Protocol (BGP) routing information by
>  extending it to support the Advertisement of Multiple Paths in BGP
>  extensions."
>
> Please read/comment/advise by:
> 11/23/2015 - Nov 23 2015
>
> thanks!
> -chris
> grow-co-chair
>
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] BMP server implementation

2014-08-07 Thread Thomas Mangin
Hello Robert,

I follow Ryu in relation with openstack  where it seems there is now several 
effort to use BGP for service IP announcement and migration.

With decentralised announcements having a way to check that expected 
announcement correctly propagated make sense. 

I have indeed not looked at its openflow side and may well have read more to 
your post than was.

Thomas
---
from my iPhone

> On 7 Aug 2014, at 12:22, Robert Raszuk  wrote:
> 
> Thomas,
> 
> I did not demoralize anyone.
> 
> I simply question how bmp fits Ryu. If you would know what Ryu is perhaps 
> typu would share similar doubts.
> 
> Thx,
> R.
> 
>> On Aug 7, 2014 11:53 AM, "Thomas Mangin"  
>> wrote:
>> Robert,
>> 
>> You are perfectly entitled to this opinion - however but demoralising 
>> Shishio I fail to see what your post achieves ...
>> 
>> I welcome any new implementation of any RFC defined standard. I may not have 
>> a use for ruy's but giving others the option can not be a bad thing.
>> 
>> Sincerely,
>> 
>> Thomas
>> ---
>> from my iPhone
>> 
>> > On 7 Aug 2014, at 11:03, Robert Raszuk  wrote:
>> >
>> > Hello Shishio,
>> >
>> > Sorry to ask the messenger, but what Ryu has to do with BMP ? Or for
>> > that matter OpenFlow or OpenStack ? Enhancing Ryu with BMP is like
>> > attaching a flower to the elephant :).
>> >
>> > Is Ryu suffering from such lack of popularity that bad so it is now
>> > trying to enter BGP protocol monitoring space with its overhead ? What
>> > value add Ryu provides to BMP processing or for that matter any
>> > routing protocols ?
>> >
>> > BMP server and parser is just tiny user space code. The best is to
>> > keep it standalone as far as possible from such "frameworks".
>> >
>> > You may find an example of an open source BMP receiver code from Stephen 
>> > here:
>> >
>> > https://code.google.com/p/bmpreceiver/source/browse/#svn%2Ftags%2Frelease-1.1
>> >
>> > Best regards,
>> > R.
>> >
>> >
>> >> On Thu, Aug 7, 2014 at 9:35 AM, Shishio Tsuchiya  
>> >> wrote:
>> >> F.Y.I
>> >> Ishida-san who is NTT R&D announced Ryu has implemented BMPv3 on JANOG ml 
>> >> .
>> >>
>> >> https://github.com/osrg/ryu
>> >>
>> >> It supports BMPv3 and we confirmed interoperability with Cisco ASR1000 
>> >> and Juniper MX960.
>> >>
>> >> Regards,
>> >> -Shishio
>> >>
>> >> ___
>> >> GROW mailing list
>> >> GROW@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/grow
>> >
>> > ___
>> > GROW mailing list
>> > GROW@ietf.org
>> > https://www.ietf.org/mailman/listinfo/grow
>> >
>> 
>> ___
>> GROW mailing list
>> GROW@ietf.org
>> https://www.ietf.org/mailman/listinfo/grow
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] BMP server implementation

2014-08-07 Thread Thomas Mangin
Robert,

You are perfectly entitled to this opinion - however but demoralising Shishio I 
fail to see what your post achieves ...

I welcome any new implementation of any RFC defined standard. I may not have a 
use for ruy's but giving others the option can not be a bad thing.

Sincerely,

Thomas 
---
from my iPhone

> On 7 Aug 2014, at 11:03, Robert Raszuk  wrote:
> 
> Hello Shishio,
> 
> Sorry to ask the messenger, but what Ryu has to do with BMP ? Or for
> that matter OpenFlow or OpenStack ? Enhancing Ryu with BMP is like
> attaching a flower to the elephant :).
> 
> Is Ryu suffering from such lack of popularity that bad so it is now
> trying to enter BGP protocol monitoring space with its overhead ? What
> value add Ryu provides to BMP processing or for that matter any
> routing protocols ?
> 
> BMP server and parser is just tiny user space code. The best is to
> keep it standalone as far as possible from such "frameworks".
> 
> You may find an example of an open source BMP receiver code from Stephen here:
> 
> https://code.google.com/p/bmpreceiver/source/browse/#svn%2Ftags%2Frelease-1.1
> 
> Best regards,
> R.
> 
> 
>> On Thu, Aug 7, 2014 at 9:35 AM, Shishio Tsuchiya  wrote:
>> F.Y.I
>> Ishida-san who is NTT R&D announced Ryu has implemented BMPv3 on JANOG ml .
>> 
>> https://github.com/osrg/ryu
>> 
>> It supports BMPv3 and we confirmed interoperability with Cisco ASR1000 and 
>> Juniper MX960.
>> 
>> Regards,
>> -Shishio
>> 
>> ___
>> GROW mailing list
>> GROW@ietf.org
>> https://www.ietf.org/mailman/listinfo/grow
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Route leaks

2014-07-26 Thread Thomas Mangin
Hello,

It is from 2007 but may still be relevant to this work :-)
http://thomas.mangin.com/data/pdf/LINX%2057%20-%20Mangin%20-%20BGP%20Leak.pdf

IMHO, any solution should allow to implement the solutions presented but more 
easily.

Thomas

On 26 Jul 2014, at 18:14, Doug Montgomery  wrote:

> What seems necessary to address the set of problems we examined is the 
> ability to:
> 
> 1. Tag additional semantics for an individual announcement who's meaning is 
> globally known.
> 
> 2. To have these tags be transitive, remaining on the route end to end (not 
> just one hop).
> 
> 3. In speaking to operators who were concerned about intentional leaks of 
> routes to critical infrastructure, it seems that the tags should be secured 
> so that a party anyone where on the net could verify which AS added the tag 
> on transmission to specific peer, and verify if a tag had be modified or 
> stripped in transit.
> 
> It did not appear to us that this was achievable with current community 
> mechanisms.   One could easily implement such semantics through some new 
> variant of community+protections, but it did not seem the current mechanism 
> addressed what we perceived as the requirements.
> 
> dougm
> 
> 
> 
> 
> On Fri, Jul 25, 2014 at 3:12 PM, Tony Tauber  wrote:
> How is this different than tagging with communities today?
> In either case, the provider's correct action on the semantics is needed (and 
> can go awry through misconfiguration).
> 
> Tony
> 
> On Fri, Jul 25, 2014 at 1:40 PM, Doug Montgomery  wrote:
> The last point that Sriram made is important to the higher level discussion 
> of the problem.
> 
> Semantically what we are proposing is that a BGP speaker can ad a semantic 
> tag to a route that describes restrictions on the intent of the authorization 
> that is implicit in sending a peer a BGP route.
> 
> Note that the one tag we suggested was not "DOWN" or "CUSTOMER" it was the 
> intent that the sender expects that you will not redistribute this update to 
> transit providers.
> 
> "I am sending you this route, but I do not wish it propagated to your 
> providers"
> 
> So discussing the semantics of the tag: what that tag applies to (e.g., 
> specific route, vs peering session), what the tags attempt to signal, what 
> the security properties of such a tag should be, and what policies might one 
> build using such tags ... is the important part.
> 
> The specific encoding proposed was the result of one attempt to think through 
> these issues ... but not all the thoughts made it into the draft.
> 
> 
> 
> dougm
> -- 
> DougM at Work
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 
> 
> 
> 
> 
> -- 
> DougM at Work
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] current state of BMP implementations?

2014-06-03 Thread Thomas Mangin
Hi Stephen,

This is great news. Thank you for this work,

Thomas

On 3 Jun 2014, at 17:55, Stephen Stuart  wrote:

> Bertrand Duvivier was kind enough to refer me to someone at Cisco who 
> provided some BMP V3 sample data, so the monitoring station code at 
> https://code.google.com/p/bmpreceiver/ has been updated to understand BMP V3 
> as spoken by a Cisco (thanks, Bertrand!). I'm happy to take patches to fix 
> assertions or expand the printing of BGP message content (especially 
> multi-protocol NLRI information), and it's always nice to get new files of 
> sample data.
> 
> Stephen
> 
> 
> On Tue, Nov 5, 2013 at 3:34 PM, Stephen Stuart  wrote:
> https://code.google.com/p/bmpreceiver/
> 
> Tested against the JUNOS draft -01 sender implementation.
> 
> Stephen
> 
> 
> On Tue, Nov 5, 2013 at 2:21 PM, John Kemp  
> wrote:
> On 11/5/13 11:07 AM, Jeffrey Haas wrote:
> > On Tue, Nov 05, 2013 at 09:32:16AM -0800, John Kemp wrote:
> >> Can anyone summarize the current state
> >> of the Juniper or Quagga work on BMP?
> > BMPv1 support has been available in JUNOS for a while now.
> > BMPv3 support will be in 13.3.
> >
> > -- Jeff
> 
> Anyone publish any client station code?
> 
> John Kemp
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] last call for draft-ietf-grow-ix-bgp-route-server-operations

2014-03-19 Thread Thomas Mangin
support

Thomas

On 19 Mar 2014, at 13:12, p...@lugs.com wrote:

> Hello all,
> 
> This is the last call for the draft-ietf-grow-ix-bgp-route-server-operations. 
>  This document has been discussed at multiple meetings, and on the mailing 
> list.
> 
> Although this is last call, we ask for those who have reviewed the document 
> to voice their opinion that the draft is ready for submission, and of course 
> point any issues related to why the draft is not ready.
> 
> The last call will end 2nd April 2014.
> 
> Thanks
> 
> peter   
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] call for adoption draft-snijders-rpsl-via-03

2014-03-19 Thread Thomas Mangin
+1

Thomas

On 19 Mar 2014, at 13:09, p...@lugs.com wrote:

> Hello all,
> 
> This past IETF job snijders presented the draft draft-snijders-rpsl-via-03.  
> I would like to initiate the call for adoption.  There was support for this 
> work at the meeting in london, and we would like confirmation on the mailing 
> list before adopting the work.
> 
> Please read the draft at 
> https://datatracker.ietf.org/doc/draft-snijders-rpsl-via
> 
> Thanks
> 
> peter   
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Fwd: [iab-ch...@iab.org: Call for Review of draft-iab-filtering-considerations-06.txt, "Technical Considerations for Internet Service Blocking and Filtering"]

2014-02-05 Thread Thomas Mangin
I only read the document once but from my experience as an operator of a 
network based L7 filtering solution for schools ( and ICAP ), I found no issue 
with the definition problematic or the technical limitations described.

Without getting into details about the different options and their pros and 
cons - I see little which could be added but perhaps adding to the reading 
material list Richard Clayton's excellent work on the subject :

Failures in a Hybrid Content Blocking System
http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf

Ignoring the Great Firewall of China
www.cl.cam.ac.uk/~rnc1/ignoring.pdf

Thomas Mangin 

Sent from my iPad

> On 5 Feb 2014, at 23:21, Nick Hilliard  wrote:
> 
> should grow people consider whether to comment on this?
> 
> Nick
> 
>  Original Message 
> Subject: [iab-ch...@iab.org: Call for Review of
> draft-iab-filtering-considerations-06.txt, "Technical Considerations for
> Internet Service Blocking and Filtering"]
> Date: Wed, 5 Feb 2014 14:17:27 -0500
> From: Jeffrey Haas 
> To: na...@nanog.org
> 
> It's IETF stuff.  Operator sanity check would probably be appreciated. :-)
> 
> -- Jeff
> 
> - Forwarded message from IAB Chair  -
> 
> Date: Wed, 29 Jan 2014 11:16:56 -0500
> From: IAB Chair 
> To: IETF Announce 
> Cc: IAB , IETF 
> Subject: Call for Review of draft-iab-filtering-considerations-06.txt,
> "Technical Considerations for Internet Service Blocking and Filtering"
> 
> This is a call for review of "Technical Considerations for Internet
> Service Blocking and Filtering" prior to potential approval as an
> IAB stream RFC.
> 
> The document is available for inspection here:
> https://datatracker.ietf.org/doc/draft-iab-filtering-considerations/
> 
> The Call for Review will last until 26 February 2014.
> Please send comments to i...@iab.org.
> 
> On behalf of the IAB,
>  Russ Housley
>  IAB Chair
> 
> - End forwarded message -
> 
> 
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] current state of BMP implementations?

2013-12-10 Thread Thomas Mangin
Hello Robert,

Some people have asked for it ... I have been quite busy recently so it did not 
make it to the top of the list.

At the moment, BMP is processed by a separate application but I intend to 
change this when I implement v7. Like everyone my issue is that I need more 
hours in my days :-)
This year, I updated ExaBGP's code to be able to pass raw packets to the 
backend process (and not only a text or JSON representation) so serialising 
them on disk using the MTR container format should not be to hard to add. 

If many people are saying that they would use it, then I will bump the feature 
up the list.

Thomas

On 10 Dec 2013, at 09:24, Robert Raszuk  wrote:

> Do you have also plan to add MRT encap to ExaBGP ? 
> 
> Thx,
> r.
> 
> 
> On Tue, Dec 10, 2013 at 10:20 AM, Thomas Mangin 
>  wrote:
> Feel free to CC me so I can make sure the capture(s) work with ExaBGP too 
> when I upgrade BMP v7 :-)
> 
> Thank you,
> 
> Thomas
> 
> On 9 Dec 2013, at 20:32, Stephen Stuart  wrote:
> 
>> If you can send me some output of your BMP implementation captured with 
>> netcat (or equivalent), I'd be happy to work on making the receiver 
>> implementation work against it (see https://code.google.com/p/bmpreceiver).
>> 
>> Thanks,
>> Stephen
>> 
>> 
>> On Tue, Nov 5, 2013 at 12:06 PM, Bertrand Duvivier (bduvivie) 
>>  wrote:
>> Hi,
>> 
>> FYI for Cisco,
>> 
>> BMP development is completed for IOS-XE and IOS classic.
>> 
>> Implementation is based on BMPv7
>> FCS target Nov 2013 (few more weeks)
>> 
>> One small deviation from the BMPv7 draft:
>> We also added few extra BMP statistics: few TCP stats, the goal is to 
>> monitor/detect slow peers by monitoring TCP.
>> 
>> Current BMP (cisco) stats and values are:
>> 32767 : SRTT: the Smooth Round-Trip Timer is a measurement of the average 
>> time that it takes a packet to be sent and acknowledged by the remote peer.
>> 32768 : RTTO: the round-trip timeout in milliseconds.
>> 32769 : RTV: the variance of the round-trip time in milliseconds.
>> 32770 :KRTT: the new round-trip (K stands for Karn's algorithm) timeout. It 
>> measures the round-trip time, in milliseconds, for packets that have been 
>> retransmitted.
>> 32771 :minRTT: the smallest round-trip timeout.
>> 32772 :maxRTT: the largest round-trip timeout.
>> 32773 :ACK hold: the acknowledgment delay timeout used to delay 
>> acknowledgements to allow time to add data to the packet.
>> 32774 :Datagrams: the largest data segment in bytes
>> 
>> Working with author to standardize these stats, will update our 
>> implementation as soon as standardized.
>> 
>> BRGDS Bertrand
>> Cisco BGP product manager.
>> 
>> From: Jeffrey Haas 
>> Subject: Re: [GROW] current state of BMP implementations?
>> Date: November 5, 2013 8:07:36 PM GMT+01:00
>> To: John Kemp 
>> Cc: grow@ietf.org
>> 
>> On Tue, Nov 05, 2013 at 09:32:16AM -0800, John Kemp wrote:
>> 
>> Can anyone summarize the current state
>> of the Juniper or Quagga work on BMP?
>> 
>> BMPv1 support has been available in JUNOS for a while now.
>> BMPv3 support will be in 13.3.
>> 
>> -- Jeff
>> ___
>> GROW mailing list
>> GROW@ietf.org
>> https://www.ietf.org/mailman/listinfo/grow
>> 
>> ___
>> GROW mailing list
>> GROW@ietf.org
>> https://www.ietf.org/mailman/listinfo/grow
>> 
>> ___
>> GROW mailing list
>> GROW@ietf.org
>> https://www.ietf.org/mailman/listinfo/grow
> 
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 
> 



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] current state of BMP implementations?

2013-12-10 Thread Thomas Mangin
Feel free to CC me so I can make sure the capture(s) work with ExaBGP too when 
I upgrade BMP v7 :-)

Thank you,

Thomas

On 9 Dec 2013, at 20:32, Stephen Stuart  wrote:

> If you can send me some output of your BMP implementation captured with 
> netcat (or equivalent), I'd be happy to work on making the receiver 
> implementation work against it (see https://code.google.com/p/bmpreceiver).
> 
> Thanks,
> Stephen
> 
> 
> On Tue, Nov 5, 2013 at 12:06 PM, Bertrand Duvivier (bduvivie) 
>  wrote:
> Hi,
> 
> FYI for Cisco,
> 
> BMP development is completed for IOS-XE and IOS classic.
> 
> Implementation is based on BMPv7
> FCS target Nov 2013 (few more weeks)
> 
> One small deviation from the BMPv7 draft:
> We also added few extra BMP statistics: few TCP stats, the goal is to 
> monitor/detect slow peers by monitoring TCP.
> 
> Current BMP (cisco) stats and values are:
> 32767 : SRTT: the Smooth Round-Trip Timer is a measurement of the average 
> time that it takes a packet to be sent and acknowledged by the remote peer.
> 32768 : RTTO: the round-trip timeout in milliseconds.
> 32769 : RTV: the variance of the round-trip time in milliseconds.
> 32770 :KRTT: the new round-trip (K stands for Karn's algorithm) timeout. It 
> measures the round-trip time, in milliseconds, for packets that have been 
> retransmitted.
> 32771 :minRTT: the smallest round-trip timeout.
> 32772 :maxRTT: the largest round-trip timeout.
> 32773 :ACK hold: the acknowledgment delay timeout used to delay 
> acknowledgements to allow time to add data to the packet.
> 32774 :Datagrams: the largest data segment in bytes
> 
> Working with author to standardize these stats, will update our 
> implementation as soon as standardized.
> 
> BRGDS Bertrand
> Cisco BGP product manager.
> 
> From: Jeffrey Haas 
> Subject: Re: [GROW] current state of BMP implementations?
> Date: November 5, 2013 8:07:36 PM GMT+01:00
> To: John Kemp 
> Cc: grow@ietf.org
> 
> On Tue, Nov 05, 2013 at 09:32:16AM -0800, John Kemp wrote:
> 
> Can anyone summarize the current state
> of the Juniper or Quagga work on BMP?
> 
> BMPv1 support has been available in JUNOS for a while now.
> BMPv3 support will be in 13.3.
> 
> -- Jeff
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow