Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-11-03 Thread Sriram, Kotikalapudi
[Job]
>> Given the description:
>>
>>> "A multi-homed AS learns a route from one upstream ISP and announces
>>> a subprefix (subsumed in the prefix) to another upstream ISP."
>>
>> I'd classify this type of announcement a "hijack" or "attack", not a route 
>> leak.

[Chris]
>this makes sense to me, this is the equivalent of several well known
>instances of someone's 'internap' box leaking outside their span of
>control. So, I agree this is a hijack, not a leak... though clearly
>the subnets were 'leaked' outside the span of control, the effect is
>really a hijack of the remote prefix.

[Joel Jaeggli]
>hijack is the practical result of the more specific.
 >intent is of course something else.


Job and I discussed this in person, and as I understand he makes the following 
two important points regarding Type 5 (U-Turn with more specific) and 
why perhaps it should be omitted from the list of route-leak types:

1.   In Type 5, the offending AS receives a less specific and crafts an update 
with a more specific (with AS path intact, Kapela-Pilosov style). 
The update with the more specific basically was never announced by 
a neighbor and was not there in the RIB. So it is a newly crafted update, 
and not a route leak as such.

2.   The other instance of Type 5 was that the update with the more specific 
was there in the RIB but only for regional TE purpose, and was not meant 
to be announced via transit, but it was leaked. In this case, 
the leaked more specific route existed in the RIB, and was not crafted. 
The leak, however, can be thought of as a Type 1 (prefix) leak; 
no need to characterize it as a Type 5 (more specific).

 I am OK with Job’s line of reasoning. Hoping this is agreeable to others 
in the WG as well, I will proceed to update the draft to omit Type 5. 
However, if anyone feels there is some merit/rationale to keep Type 5, please 
speak up. 
Thanks.

 Sriram
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-11-01 Thread joel jaeggli
On 11/2/15 8:39 AM, Christopher Morrow wrote:
> oh well, since this conversation got re-ingnited..
> 
> On Sat, Oct 31, 2015 at 1:15 AM, Job Snijders  wrote:
>> I think "type 5: U-Shaped Turn with More Specific Prefix" should be
>> removed from the document.
>>
>> Given the description:
>>
>> "A multi-homed AS learns a route from one upstream ISP and announces
>> a subprefix (subsumed in the prefix) to another upstream ISP."
>>
>> I'd classify this type of announcement a "hijack" or "attack", not a
>> route leak.
> 
> this makes sense to me, this is the equivalent of several well known
> instances of someone's 'internap' box leaking outside their span of
> control. So, I agree this is a hijack, not a leak... though clearly
> the subnets were 'leaked' outside the span of control, the effect is
> really a hijack of the remote prefix.

hijack is the practical result of the more specific.

intent is of course something else.

> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 




signature.asc
Description: OpenPGP digital signature
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-11-01 Thread Christopher Morrow
oh well, since this conversation got re-ingnited..

On Sat, Oct 31, 2015 at 1:15 AM, Job Snijders  wrote:
> I think "type 5: U-Shaped Turn with More Specific Prefix" should be
> removed from the document.
>
> Given the description:
>
> "A multi-homed AS learns a route from one upstream ISP and announces
> a subprefix (subsumed in the prefix) to another upstream ISP."
>
> I'd classify this type of announcement a "hijack" or "attack", not a
> route leak.

this makes sense to me, this is the equivalent of several well known
instances of someone's 'internap' box leaking outside their span of
control. So, I agree this is a hijack, not a leak... though clearly
the subnets were 'leaked' outside the span of control, the effect is
really a hijack of the remote prefix.

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-11-01 Thread Sriram, Kotikalapudi
>There's seemingly 1 comment set not responded to on-list (job's last),
>but overall support seems positive. 

I have just posted responses to Job's comments.

>I'll ship a document shepherd
>review northbound post-ietf-meeting week.

Thank you.

>by then sriram should have an updated revision with comments dealt
>with as well I beleive?

Yes, we can co-ordinate that. Thanks.

Sriram

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-11-01 Thread Sriram, Kotikalapudi
Job,
Thanks for your comments. My responses below.

>I think "type 5: U-Shaped Turn with More Specific Prefix" should be
>removed from the document.
>Given the description:
>"A multi-homed AS learns a route from one upstream ISP and announces
>a subprefix (subsumed in the prefix) to another upstream ISP."
>I'd classify this type of announcement a "hijack" or "attack", not a
>route leak.

There are a few things to note here:
* A route leak can be either accidental or attack (i.e. deliberate).  
(We have said earlier – may be 99% are accidental and 1% deliberate.
see slide 13: https://www.ietf.org/proceedings/93/slides/slides-93-sidr-5.pdf )
* Type 1 (U-Shaped Turn with Full Prefix) can be a deliberate attack as well.
* Type 5 is same as Type 1 except it has a more specific.
In both cases, the update is “propagated” by offending AS with the AS path left 
intact
(i.e. takes advantage of loop detection).
A hijack (or accidental mis-origination) is different because there the 
offending AS 
removes the AS path in essence and “re-originates”  (so data path to 
legitimate destination is not preserved in a hijack unlike Type 1 or Type 5). 
* If someone is being deliberate, they may prefer to use Type 5 over Type 1 
because Type (with more specific) is far more effective.

Please let me know if the above clarification helps.
 
>Also, the two mentioned examples are at odds with each other, in the
>first example an artificially crafted AS_PATH is used to exploit AS-PATH
>loop detection, in the second example, the more specifics observed by
>[Toonk2015-B] were more specifics not crafted by the offending ASN but
>by peers of the offending ASN for traffic engineering purposes. Those
>peers consciously deaggregated, assuming a limited, regionalized
>visibility of said prefixes.

The way I read [Toonk2015-B] is different. It says:
“One explanation for this could be that these are more specific prefixes 
announced by peers of Telekom Malaysia to Telekom Malaysia and 
are normally supposed to stay regional and not visible via transit.”
So the customers of Telekom Malaysia normally announce these more specifics to 
their transit but it is the transit Telekom Malaysia who is responsible
to keep them regional but failed to do so.
Let me know if you feel that is not the correct interpretation of [Toonk2015-B].

Thanks again.

Sriram 

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-11-01 Thread David Farmer
Thinking about this a bit, I prefer "hairpin turn" over "U-turn".  In my mind a 
"hairpin turn" is talking about a tight turn in a road and by necessity a tight 
turn for the traffic on the road, the road itself turns back on itself.  Where 
as a "U-turn" talks about a tight turn traffic makes on road, usually to 
reverse direction on the road or where only the traffic is turning back on 
itself.  Put another way, you can make a "U-turn" on a perfectly strait road, 
but you can't make a "hairpin turn" on a strait road.

In the Internet we have a different term for a "U-turn", we generally call that 
a "loopback".  Therefore I think "hairpin turn" is the most appropriate in this 
case, unless we really mean a "loopback".

Whichever term we use, it should be clearly defined, it should be obvious at 
this point there is no clear unambiguous common understanding to rely on here.

Thanks.

-- 
===
David Farmer  Email: far...@umn.edu
Office of Information Technology
University of Minnesota
2218 University Ave SE Phone: +1-612-626-0815
Minneapolis, MN 55414-3029   Cell: +1-612-812-9952
===


> On Nov 1, 2015, at 07:02, George, Wes  wrote:
> 
> I just went hunting for an instance of this in IETF land, and only found
> references related to two hosts talking to one another from behind the
> same NAT.
> So, I went hunting on the internet, and everywhere I saw an explanation,
> it was of the variant "going out the same interface it came in on" and
> used U-turn synonymously. I was unable to find a reference to a definition
> as I outlined below. That's not necessarily an issue but we may need to
> explain the term before we use it so that there is no confusion.
> 
> Thanks,
> 
> Wes
> 
> 
> On 10/31/15, 10:07 PM, "Sriram, Kotikalapudi"
>  wrote:
> 
>> Wes,
>> 
>> Thanks, Wes, for taking another look.
>> And thanks for laying out some interesting (and entertaining) alternative
>> names
>> that  can to used instead of "U-Turn".
>> Like we discussed in the hallway this morning, it makes sense to use
>> "Hairpin Turn"
>> instead of "U-Turn", especially considering "Hairpin Turn" has been used
>> in the VPN context.
>> 
>> Sriram
>> 
>> 
>> ________
>> From: George, Wes 
>> Sent: Friday, October 30, 2015 10:01 AM
>> To: Sriram, Kotikalapudi
>> Cc: grow-cha...@ietf.org; grow@ietf.org grow@ietf.org;
>> grow-...@tools.ietf.org
>> Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
>> (ends: 8/24/2015 - Aug 24)
>> 
>> On 10/12/15, 11:40 PM, "Sriram, Kotikalapudi"
>>  wrote:
>> 
>> 
>> Sriram, this is significantly improved. One substantial comment that I
>> still have with this version:
>> 
>>>> It is also unclear from the text exactly what you mean by U-Turn
>>>> (it's not going back the way it came, so actually hairpin might be a
>>>> better term),
>>>> so a few words to clarify might be useful.
>>> 
>>> Hairpin seems to have a connotation that the turn is tight/constricted.
>>> So now I use the phrase “U-shaped turn” instead of “U-turn”.
>> 
>> WG] This may be nitpicking, but I don't think that adding "shaped" is
>> actually much of an improvement. I was thinking of hairpin from the way
>> that it is used in VPNs, as in data that enters and leaves the network via
>> the same edge device, but typically on a different physical or logical
>> interface (instead of entering on one PE and leaving via another), rather
>> than the way that it is used on racetracks to describe a near 180 degree
>> turn.
>> Here are a few ideas I had of other ways to refer to this:
>> 
>> -  a "detour leak", in that traffic will be detouring through the leaking
>> ASN
>> -  "ASN-in-the-middle leak" - similar to MiTM such that invoking the
>> concept is useful, but it's necessary to disambiguate the two since the
>> latter has a specific and well-known meaning
>> -  "parrotting leak" or "game of telephone leak" in that it is repeating
>> something it learned elsewhere, but introducing a mistake, not unlike the
>> grade school game of telephone (if you're up for a reference to The
>> Simpsons, you could call it a "purple monkey dishwasher leak" but that
>> would likely require too much expla

Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-11-01 Thread George, Wes
I just went hunting for an instance of this in IETF land, and only found
references related to two hosts talking to one another from behind the
same NAT.
So, I went hunting on the internet, and everywhere I saw an explanation,
it was of the variant "going out the same interface it came in on" and
used U-turn synonymously. I was unable to find a reference to a definition
as I outlined below. That's not necessarily an issue but we may need to
explain the term before we use it so that there is no confusion.

Thanks,

Wes


On 10/31/15, 10:07 PM, "Sriram, Kotikalapudi"
 wrote:

>Wes,
>
>Thanks, Wes, for taking another look.
>And thanks for laying out some interesting (and entertaining) alternative
>names
>that  can to used instead of "U-Turn".
>Like we discussed in the hallway this morning, it makes sense to use
>"Hairpin Turn"
>instead of "U-Turn", especially considering "Hairpin Turn" has been used
>in the VPN context.
>
>Sriram
>
>
>
>From: George, Wes 
>Sent: Friday, October 30, 2015 10:01 AM
>To: Sriram, Kotikalapudi
>Cc: grow-cha...@ietf.org; grow@ietf.org grow@ietf.org;
>grow-...@tools.ietf.org
>Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
>(ends: 8/24/2015 - Aug 24)
>
>On 10/12/15, 11:40 PM, "Sriram, Kotikalapudi"
> wrote:
>
>
>Sriram, this is significantly improved. One substantial comment that I
>still have with this version:
>
>>>It is also unclear from the text exactly what you mean by U-Turn
>>>(it's not going back the way it came, so actually hairpin might be a
>>>better term),
>>>so a few words to clarify might be useful.
>>
>>Hairpin seems to have a connotation that the turn is tight/constricted.
>>So now I use the phrase “U-shaped turn” instead of “U-turn”.
>
>WG] This may be nitpicking, but I don't think that adding "shaped" is
>actually much of an improvement. I was thinking of hairpin from the way
>that it is used in VPNs, as in data that enters and leaves the network via
>the same edge device, but typically on a different physical or logical
>interface (instead of entering on one PE and leaving via another), rather
>than the way that it is used on racetracks to describe a near 180 degree
>turn.
>Here are a few ideas I had of other ways to refer to this:
>
>-  a "detour leak", in that traffic will be detouring through the leaking
>ASN
>-  "ASN-in-the-middle leak" - similar to MiTM such that invoking the
>concept is useful, but it's necessary to disambiguate the two since the
>latter has a specific and well-known meaning
>-  "parrotting leak" or "game of telephone leak" in that it is repeating
>something it learned elsewhere, but introducing a mistake, not unlike the
>grade school game of telephone (if you're up for a reference to The
>Simpsons, you could call it a "purple monkey dishwasher leak" but that
>would likely require too much explanation ;-) )
>-  "[accidental | unintentional] transit leak" since the net result of the
>leak is that traffic will transit the leaking AS rather than its normal
>path
>
>
>Thanks,
>
>Wes
>
>
>Anything below this line has been added by my company’s mail server, I
>have no control over it.
>---
>
>
>
>
>This E-mail and any of its attachments may contain Time Warner Cable
>proprietary information, which is privileged, confidential, or subject to
>copyright belonging to Time Warner Cable. This E-mail is intended solely
>for the use of the individual or entity to which it is addressed. If you
>are not the intended recipient of this E-mail, you are hereby notified
>that any dissemination, distribution, copying, or action taken in
>relation to the contents of and attachments to this E-mail is strictly
>prohibited and may be unlawful. If you have received this E-mail in
>error, please notify the sender immediately and permanently delete the
>original and any copy of this E-mail and any printout.




This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-10-31 Thread Christopher Morrow
There's seemingly 1 comment set not responded to on-list (job's last),
but overall support seems positive. I'll ship a document shepherd
review northbound post-ietf-meeting week.

by then sriram should have an updated revision with comments dealt
with as well I beleive?

On Sat, Oct 31, 2015 at 11:07 PM, Sriram, Kotikalapudi
 wrote:
> Wes,
>
> Thanks, Wes, for taking another look.
> And thanks for laying out some interesting (and entertaining) alternative 
> names
> that  can to used instead of "U-Turn".
> Like we discussed in the hallway this morning, it makes sense to use "Hairpin 
> Turn"
> instead of "U-Turn", especially considering "Hairpin Turn" has been used in 
> the VPN context.
>
> Sriram
>
>
> 
> From: George, Wes 
> Sent: Friday, October 30, 2015 10:01 AM
> To: Sriram, Kotikalapudi
> Cc: grow-cha...@ietf.org; grow@ietf.org grow@ietf.org; grow-...@tools.ietf.org
> Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition 
> (ends: 8/24/2015 - Aug 24)
>
> On 10/12/15, 11:40 PM, "Sriram, Kotikalapudi"
>  wrote:
>
>
> Sriram, this is significantly improved. One substantial comment that I
> still have with this version:
>
>>>It is also unclear from the text exactly what you mean by U-Turn
>>>(it's not going back the way it came, so actually hairpin might be a
>>>better term),
>>>so a few words to clarify might be useful.
>>
>>Hairpin seems to have a connotation that the turn is tight/constricted.
>>So now I use the phrase “U-shaped turn” instead of “U-turn”.
>
> WG] This may be nitpicking, but I don't think that adding "shaped" is
> actually much of an improvement. I was thinking of hairpin from the way
> that it is used in VPNs, as in data that enters and leaves the network via
> the same edge device, but typically on a different physical or logical
> interface (instead of entering on one PE and leaving via another), rather
> than the way that it is used on racetracks to describe a near 180 degree
> turn.
> Here are a few ideas I had of other ways to refer to this:
>
> -  a "detour leak", in that traffic will be detouring through the leaking
> ASN
> -  "ASN-in-the-middle leak" - similar to MiTM such that invoking the
> concept is useful, but it's necessary to disambiguate the two since the
> latter has a specific and well-known meaning
> -  "parrotting leak" or "game of telephone leak" in that it is repeating
> something it learned elsewhere, but introducing a mistake, not unlike the
> grade school game of telephone (if you're up for a reference to The
> Simpsons, you could call it a "purple monkey dishwasher leak" but that
> would likely require too much explanation ;-) )
> -  "[accidental | unintentional] transit leak" since the net result of the
> leak is that traffic will transit the leaking AS rather than its normal
> path
>
>
> Thanks,
>
> Wes
>
>
> Anything below this line has been added by my company’s mail server, I
> have no control over it.
> ---
>
>
> 
>
> This E-mail and any of its attachments may contain Time Warner Cable 
> proprietary information, which is privileged, confidential, or subject to 
> copyright belonging to Time Warner Cable. This E-mail is intended solely for 
> the use of the individual or entity to which it is addressed. If you are not 
> the intended recipient of this E-mail, you are hereby notified that any 
> dissemination, distribution, copying, or action taken in relation to the 
> contents of and attachments to this E-mail is strictly prohibited and may be 
> unlawful. If you have received this E-mail in error, please notify the sender 
> immediately and permanently delete the original and any copy of this E-mail 
> and any printout.

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-10-31 Thread Sriram, Kotikalapudi
Wes,

Thanks, Wes, for taking another look. 
And thanks for laying out some interesting (and entertaining) alternative names 
that  can to used instead of "U-Turn".
Like we discussed in the hallway this morning, it makes sense to use "Hairpin 
Turn" 
instead of "U-Turn", especially considering "Hairpin Turn" has been used in the 
VPN context.

Sriram



From: George, Wes 
Sent: Friday, October 30, 2015 10:01 AM
To: Sriram, Kotikalapudi
Cc: grow-cha...@ietf.org; grow@ietf.org grow@ietf.org; grow-...@tools.ietf.org
Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 
8/24/2015 - Aug 24)

On 10/12/15, 11:40 PM, "Sriram, Kotikalapudi"
 wrote:


Sriram, this is significantly improved. One substantial comment that I
still have with this version:

>>It is also unclear from the text exactly what you mean by U-Turn
>>(it's not going back the way it came, so actually hairpin might be a
>>better term),
>>so a few words to clarify might be useful.
>
>Hairpin seems to have a connotation that the turn is tight/constricted.
>So now I use the phrase “U-shaped turn” instead of “U-turn”.

WG] This may be nitpicking, but I don't think that adding "shaped" is
actually much of an improvement. I was thinking of hairpin from the way
that it is used in VPNs, as in data that enters and leaves the network via
the same edge device, but typically on a different physical or logical
interface (instead of entering on one PE and leaving via another), rather
than the way that it is used on racetracks to describe a near 180 degree
turn.
Here are a few ideas I had of other ways to refer to this:

-  a "detour leak", in that traffic will be detouring through the leaking
ASN
-  "ASN-in-the-middle leak" - similar to MiTM such that invoking the
concept is useful, but it's necessary to disambiguate the two since the
latter has a specific and well-known meaning
-  "parrotting leak" or "game of telephone leak" in that it is repeating
something it learned elsewhere, but introducing a mistake, not unlike the
grade school game of telephone (if you're up for a reference to The
Simpsons, you could call it a "purple monkey dishwasher leak" but that
would likely require too much explanation ;-) )
-  "[accidental | unintentional] transit leak" since the net result of the
leak is that traffic will transit the leaking AS rather than its normal
path


Thanks,

Wes


Anything below this line has been added by my company’s mail server, I
have no control over it.
---




This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-10-30 Thread Job Snijders
Hi all,

On Mon, Aug 10, 2015 at 01:29:41PM -0400, Christopher Morrow wrote:
> Howdy grow folk,
> please consider this a WGLC for:
>   draft-ietf-grow-route-leak-problem-definition
> 
> Abstract:
>   "A systemic vulnerability of the Border Gateway Protocol routing
>system, known as 'route leaks', has received significant attention in
>recent years.  Frequent incidents that result in significant
>disruptions to Internet routing are labeled "route leaks", but to
>date we have lacked a common definition of the term.  In this
>document, we provide a working definition of route leaks, keeping in
>mind the real occurrences that have received significant attention.
>Further, we attempt to enumerate (though not exhaustively) different
>types of route leaks based on observed events on the Internet.  We
>aim to provide a taxonomy that covers several forms of route leaks
>that have been observed and are of concern to Internet user community
>as well as the network operator community."
> 
> there have been 3 revisions of this document in the WG, along with 2
> prior to adoption. A new read-through of the document and comments
> prior to sending this along to the IESG would be great!
> 
> Let's get that done in the next 14 days and pass this up the chain for
> further review/comment/process.

I think "type 5: U-Shaped Turn with More Specific Prefix" should be
removed from the document.

Given the description:

"A multi-homed AS learns a route from one upstream ISP and announces
a subprefix (subsumed in the prefix) to another upstream ISP."

I'd classify this type of announcement a "hijack" or "attack", not a
route leak.

Also, the two mentioned examples are at odds with each other, in the
first example an artificially crafted AS_PATH is used to exploit AS-PATH
loop detection, in the second example, the more specifics observed by
[Toonk2015-B] were more specifics not crafted by the offending ASN but
by peers of the offending ASN for traffic engineering purposes. Those
peers consciously deaggregated, assuming a limited, regionalized
visibility of said prefixes.

Thoughts?

Kind regards,

Job

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-10-30 Thread George, Wes
On 10/12/15, 11:40 PM, "Sriram, Kotikalapudi"
 wrote:


Sriram, this is significantly improved. One substantial comment that I
still have with this version:

>>It is also unclear from the text exactly what you mean by U-Turn
>>(it's not going back the way it came, so actually hairpin might be a
>>better term),
>>so a few words to clarify might be useful.
>
>Hairpin seems to have a connotation that the turn is tight/constricted.
>So now I use the phrase “U-shaped turn” instead of “U-turn”.

WG] This may be nitpicking, but I don't think that adding "shaped" is
actually much of an improvement. I was thinking of hairpin from the way
that it is used in VPNs, as in data that enters and leaves the network via
the same edge device, but typically on a different physical or logical
interface (instead of entering on one PE and leaving via another), rather
than the way that it is used on racetracks to describe a near 180 degree
turn.
Here are a few ideas I had of other ways to refer to this:

-  a "detour leak", in that traffic will be detouring through the leaking
ASN
-  "ASN-in-the-middle leak" - similar to MiTM such that invoking the
concept is useful, but it's necessary to disambiguate the two since the
latter has a specific and well-known meaning
-  "parrotting leak" or "game of telephone leak" in that it is repeating
something it learned elsewhere, but introducing a mistake, not unlike the
grade school game of telephone (if you're up for a reference to The
Simpsons, you could call it a "purple monkey dishwasher leak" but that
would likely require too much explanation ;-) )
-  "[accidental | unintentional] transit leak" since the net result of the
leak is that traffic will transit the leaking AS rather than its normal
path


Thanks,

Wes


Anything below this line has been added by my company’s mail server, I
have no control over it.
---




This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-10-12 Thread Sriram, Kotikalapudi
Andrei,

>I think that the document is ready to move forward.
>My only comment is that it seems that cases 2&3 are sub-cases of 1 and
>may also apply to 5,6,7 (i.e. specifics can also be announced in
>"lateral" peering). Perhaps it is worth highlighting this fact for
>completeness.

Thank you for your suggestions and support.
In the version-03 draft that was just submitted,
I put in a new paragraph to incorporate your suggestion. 
Please see Section 4, second paragraph.
Please note that the Types are now organized as subsections,
and also reordered. So the Type numbers (#1 through #7) have been shuffled.

Sriram

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-10-12 Thread Sriram, Kotikalapudi
Charles, 

Thank you for your suggestions and support.
Just submitted a version-03 draft in which your suggestions have been 
incorporated.

>Seems like a good document, the only thing I noticed was some of the
>citations have trailing slashes when not needed, leading to 404.
>[Kapela-Pilosov] [Khare] [Mauch-nanog] for me at least.

I have removed the trailing slashes. So the URLs should be good now.
Just fyi – added a new reference -- [Anwar].

Sriram  

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-10-12 Thread Sriram, Kotikalapudi
Jeff,

Thanks a lot for your comments and support. 
Just submitted a version-03 draft in which your suggestions/comments have been 
incorporated.
Also, please see responses below. 

>Please consider updating the "replaces-by" for the draft to the original
>draft-sriram...

I think that is a comment for the chairs. 

>In general, this document is clear and very well written.  It does an
>excellent job at summarizing the landscape for route-leaks and provides lots
>of citations (which I haven't validated for
>correctness vs. the issues) for study.  

Thank you for the kind compliments.

>The majority of my comments are minor terminology tweaks, some additional
>explanations which might or might not be useful content and one discussion
>point for re-organizing some of the types.

>I'm supportive of this document moving forward even if my comments were not
>immediately addressed. 

Thank you. Your comments have pretty much all been addressed
in the revised -03 version just submitted.


>In your section on "type 2", where you use the term "aggregates", consider
>normalizing your terminology on "more specific" and "less specific" routes.
>While aggregate is semantically clear in this section, aggregation is often
>considered in the context of taking multiple more-specific prefixes and
>generating a new, less specific prefix.

Done. I now use the "more specifics / less specifics" terminology per your 
suggestion 
(avoided using "aggregates" where ever not relevant). 

>Type 3 attacks may also be called a "re-origination" attack.  Consider
>working that into the text, please.  

Done.

>Similar to my comment on type 2, Type 4 is treating the matter as a
>"de-aggregation" rather than simply announcing internal more specific
>routes.  Some of this is perspective, as seen by a receiver, but
>understanding the issue is perhaps better done 
>from the perspective of the originator.

Done. Changes made in the document accordingly.

>One source of type 4 issues have included how some older vendor implementations
>handled its configuration, leading to a trasient announcement of the more
>specifics.  A related one may be related to intentional generation of less
>specifics from internal more specifics.  In this case, routes contributing
>to the aggregate are configured with policy that is intended to suppress
>contributing routes, but such policy is only effective after the less
>specific aggregate route is created; this creation may lag for various
>implementation reasons.

Thank you for sharing the insight. I understand 
it is not meant for making changes in the document.

>Consider s/prefix-routes/routes/.  The prefix- seems a bit redundant, at
>least in a BGP routing context.

The substitution has been made in the revised doc.

>Types 5,6 and 7 are effectively forms of type 1.  The only thing varying is
>the *context* of the leaked route source AS and destination AS roles.
>Perhaps it's worth considering re-grouping the four sections in a way that
>highlights that?

I have changed the Types list into Subsections (3.1. through 3.7) 
per Wes's suggestion. And then I reordered/regrouped
those sections (Types) per your suggestion.
Basically, I've put the types you noted above together
(now they are Sections 3.1 through 3.4).
Also, please see the related comment I have 
added in the 1st paragraph in Section 4.

Sriram  

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-10-12 Thread Sriram, Kotikalapudi
Wes,

>I've reviewed the latest version, and generally think that it is ready to
>proceed once the below comments are addressed. 

Thank you for your comments and support.
Just submitted a version-03 draft in which your suggestions/comments have been 
incorporated.
Also, please see responses below. 

>There are several areas in Section 3 where you use attack and leak
>interchangeably in a way that adds a bit of confusion. I think it'd be
>better to pick one and stick with it, probably leak rather than attack,
>and only use attack if you are describing something that is almost always
>malicious rather than accidental.
>I.e.
>attack type 1 - "The update basically makes a
>U-turn at the attacker's multi-homed AS.  
>The attack (accidental or deliberate) often succeeds"
>Previously, you say that you refer to the leaking AS as the "offending
>AS". I'd suggest using that here instead of "the attacker's". 

Done. Replaced “attacker” with “offending AS” in all places except where 
malicious intent involved.  

>Similarly, you've already said that most leaks are unintentional, so it might 
>be
>better to simplify that next sentence by saying "the leak often succeeds"
>and eliminate the parenthetical. 

Done.

>It is also unclear from the text exactly what you mean by U-Turn 
>(it's not going back the way it came, so actually hairpin might be a better 
>term), 
>so a few words to clarify might be useful.

Hairpin seems to have a connotation that the turn is tight/constricted. 
So now I use the phrase “U-shaped turn” instead of “U-turn”. 

>Type 2 - "Update is crafted by the attacker...success of the attack" -
>same comment here about attack vs leak vs offending AS

Done. Changes made in the new version per your suggestion.

>Type 4 - While often the increase in prefixes causes its own problems
>(dramatically increased routing table size, exceeded max prefix limit,
>etc) you may want to add some text to the effect of "these more specifics
>may cause the routes to be preferred over other aggregate announcements,
>thus redirecting traffic from its normal best path" as that makes it
>clearer what the impact of the leak is in this case.

Done. I have added the wording that you have suggested above. 

>Type 5 - I'm not sure that the terms "lateral" or "non-hierarchically
>peering" really add a lot to the explanation. The rest of your text sounds
>more like you're describing a non-transit relationship (typically only
>announce their customer routes to each other), which I think would be an
>easier term to define and more likely to be something readers would be
>familiar with. Either way, the explanation in this section could benefit
>from a good editing pass for clarity.

I have put in a definition of "lateral" and clarified that it means the same as 
"non-transit". 
I have used both names where relevant, like, "lateral (i.e. non-transit)".   

>Type 6/7- "its provider" - do you mean its transit provider? Otherwise
>it's unclear what distinguishes this from type 5, and again would be
>useful to use transit/non-transit to clarify.

I now use "transit provider" wherever I was using "provider" before. 

>Also, an editorial nit/personal preference: since there are so few
>sections to this document, it might be useful to take each of the subtypes
>and make it a subsection of section 3 (e.g. 3.1 3.2, 3.3...), so that it's
>easier to refer to it in text and reviews - subsections can have HTML
>anchors so that you can link right to them, and they show up in the table
>of contents as well.

Good idea. Done. I have also re-ordered the seven subsections (3.1 through 3.7) 
in accordance with a suggestion from Jeff.

Thanks again.
Sriram

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-09-29 Thread Jeffrey Haas
On Mon, Aug 10, 2015 at 01:29:41PM -0400, Christopher Morrow wrote:
> Howdy grow folk,
> please consider this a WGLC for:
>   draft-ietf-grow-route-leak-problem-definition

I'm late as usual. :-)

Please consider updating the "replaces-by" for the draft to the original
draft-sriram...

In general, this document is clear and very well written.  It does an
excellent job at summarizing the landscape for route-leaks and provides lots
of citations (which I haven't validated for correctness vs. the issues) for
study.  

The majority of my comments are minor terminology tweaks, some additional
explanations which might or might not be useful content and one discussion
point for re-organizing some of the types.

I'm supportive of this document moving forward even if my comments were not
immediately addressed. 



In your section on "type 2", where you use the term "aggregates", consider
normalizing your terminology on "more specific" and "less specific" routes.
While aggregate is semantically clear in this section, aggregation is often
considered in the context of taking multiple more-specific prefixes and
generating a new, less specific prefix.

Type 3 attacks may also be called a "re-origination" attack.  Consider
working that into the text, please.  

One potential source of type 3 attacks may occur when BGP routing
information is redistributed into a non-BGP protocol and then later
taken from that protocol and redistributed.  E.g. BGP->OSPF->BGP.  The
wisdom of ever redistributing BGP into other protocols is left for a
different rant.

Similar to my comment on type 2, Type 4 is treating the matter as a
"de-aggregation" rather than simply announcing internal more specific
routes.  Some of this is perspective, as seen by a receiver, but
understanding the issue is perhaps better done from the perspective of the
originator.

One source of type 4 issues have included how some older vendor implementations
handled its configuration, leading to a trasient announcement of the more
specifics.  A related one may be related to intentional generation of less
specifics from internal more specifics.  In this case, routes contributing
to the aggregate are configured with policy that is intended to suppress
contributing routes, but such policy is only effective after the less
specific aggregate route is created; this creation may lag for various
implementation reasons.

Consider s/prefix-routes/routes/.  The prefix- seems a bit redundant, at
least in a BGP routing context.

Types 5,6 and 7 are effectively forms of type 1.  The only thing varying is
the *context* of the leaked route source AS and destination AS roles.
Perhaps it's worth considering re-grouping the four sections in a way that
highlights that?


-- Jeff

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-08-26 Thread Sriram, Kotikalapudi
Sue,

Thank you. I welcome the cross-review, assuming GROW WG chairs are OK with it.

Sriram


>-Original Message-
>From: Susan Hares [mailto:sha...@ndzh.com]
>Sent: Tuesday, August 25, 2015 5:07 PM
>To: Sriram, Kotikalapudi ; 'George, Wes'
>; 'Christopher Morrow'
>; grow-cha...@ietf.org; grow-
>a...@tools.ietf.org; grow@ietf.org
>Cc: 'John G. Scudder' 
>Subject: RE: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
>(ends: 8/24/2015 - Aug 24)
>
>Siram:
>
>Do you want me to post this for a cross-review in IDR?
>
>Sue Hares
>
>-Original Message-
>From: GROW [mailto:grow-boun...@ietf.org] On Behalf Of Sriram, Kotikalapudi
>Sent: Tuesday, August 18, 2015 8:18 AM
>To: George, Wes; Christopher Morrow; grow-cha...@ietf.org;
>grow-...@tools.ietf.org; grow@ietf.org grow@ietf.org
>Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
>(ends: 8/24/2015 - Aug 24)
>
>Thank you, Wes.
>The comments you've offered are greatly helpful for improving accuracy as
>well as clarity in what is being said.
>I plan to incorporate them in the next revision (v. -03) soon.
>
>Sriram
>
>From: GROW  on behalf of George, Wes
>
>Sent: Monday, August 17, 2015 2:45 PM
>To: Christopher Morrow; grow-cha...@ietf.org; grow-...@tools.ietf.org;
>grow@ietf.org grow@ietf.org
>Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
>(ends: 8/24/2015 - Aug 24)
>
>I've reviewed the latest version, and generally think that it is ready to
>proceed once the below comments are addressed. A cross-review from IDR
>might
>also be useful before it goes to IETF LC.
>
>There are several areas in Section 3 where you use attack and leak
>interchangeably in a way that adds a bit of confusion. I think it'd be
>better to pick one and stick with it, probably leak rather than attack, and
>only use attack if you are describing something that is almost always
>malicious rather than accidental.
>I.e.
>attack type 1 - "The update basically makes a
>  U-turn at the attacker's multi-homed AS.  The attack (accidental
>  or deliberate) often succeeds"
>Previously, you say that you refer to the leaking AS as the "offending AS".
>I'd suggest using that here instead of "the attacker's". Similarly, you've
>already said that most leaks are unintentional, so it might be better to
>simplify that next sentence by saying "the leak often succeeds"
>and eliminate the parenthetical. It is also unclear from the text exactly
>what you mean by U-Turn (it's not going back the way it came, so actually
>hairpin might be a better term), so a few words to clarify might be useful.
>Type 2 - "Update is crafted by the attacker...success of the attack" - same
>comment here about attack vs leak vs offending AS
>
>Type 4 - While often the increase in prefixes causes its own problems
>(dramatically increased routing table size, exceeded max prefix limit,
>etc) you may want to add some text to the effect of "these more specifics
>may cause the routes to be preferred over other aggregate announcements,
>thus redirecting traffic from its normal best path" as that makes it clearer
>what the impact of the leak is in this case.
>
>Type 5 - I'm not sure that the terms "lateral" or "non-hierarchically
>peering" really add a lot to the explanation. The rest of your text sounds
>more like you're describing a non-transit relationship (typically only
>announce their customer routes to each other), which I think would be an
>easier term to define and more likely to be something readers would be
>familiar with. Either way, the explanation in this section could benefit
>from a good editing pass for clarity.
>
>Type 6/7- "its provider" - do you mean its transit provider? Otherwise it's
>unclear what distinguishes this from type 5, and again would be useful to
>use transit/non-transit to clarify.
>
>Also, an editorial nit/personal preference: since there are so few sections
>to this document, it might be useful to take each of the subtypes and make
>it a subsection of section 3 (e.g. 3.1 3.2, 3.3...), so that it's easier to
>refer to it in text and reviews - subsections can have HTML anchors so that
>you can link right to them, and they show up in the table of contents as
>well.
>
>Thanks,
>
>Wes
>
>___
>GROW mailing list
>GROW@ietf.org
>https://www.ietf.org/mailman/listinfo/grow

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-08-25 Thread Christopher Morrow
that seems like a good idea, thanks!

On Tue, Aug 25, 2015 at 5:06 PM, Susan Hares  wrote:
> Siram:
>
> Do you want me to post this for a cross-review in IDR?
>
> Sue Hares
>
> -Original Message-
> From: GROW [mailto:grow-boun...@ietf.org] On Behalf Of Sriram, Kotikalapudi
> Sent: Tuesday, August 18, 2015 8:18 AM
> To: George, Wes; Christopher Morrow; grow-cha...@ietf.org;
> grow-...@tools.ietf.org; grow@ietf.org grow@ietf.org
> Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
> (ends: 8/24/2015 - Aug 24)
>
> Thank you, Wes.
> The comments you've offered are greatly helpful for improving accuracy as
> well as clarity in what is being said.
> I plan to incorporate them in the next revision (v. -03) soon.
>
> Sriram
> 
> From: GROW  on behalf of George, Wes
> 
> Sent: Monday, August 17, 2015 2:45 PM
> To: Christopher Morrow; grow-cha...@ietf.org; grow-...@tools.ietf.org;
> grow@ietf.org grow@ietf.org
> Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
> (ends: 8/24/2015 - Aug 24)
>
> I've reviewed the latest version, and generally think that it is ready to
> proceed once the below comments are addressed. A cross-review from IDR might
> also be useful before it goes to IETF LC.
>
> There are several areas in Section 3 where you use attack and leak
> interchangeably in a way that adds a bit of confusion. I think it'd be
> better to pick one and stick with it, probably leak rather than attack, and
> only use attack if you are describing something that is almost always
> malicious rather than accidental.
> I.e.
> attack type 1 - "The update basically makes a
>   U-turn at the attacker's multi-homed AS.  The attack (accidental
>   or deliberate) often succeeds"
> Previously, you say that you refer to the leaking AS as the "offending AS".
> I'd suggest using that here instead of "the attacker's". Similarly, you've
> already said that most leaks are unintentional, so it might be better to
> simplify that next sentence by saying "the leak often succeeds"
> and eliminate the parenthetical. It is also unclear from the text exactly
> what you mean by U-Turn (it's not going back the way it came, so actually
> hairpin might be a better term), so a few words to clarify might be useful.
> Type 2 - "Update is crafted by the attacker...success of the attack" - same
> comment here about attack vs leak vs offending AS
>
> Type 4 - While often the increase in prefixes causes its own problems
> (dramatically increased routing table size, exceeded max prefix limit,
> etc) you may want to add some text to the effect of "these more specifics
> may cause the routes to be preferred over other aggregate announcements,
> thus redirecting traffic from its normal best path" as that makes it clearer
> what the impact of the leak is in this case.
>
> Type 5 - I'm not sure that the terms "lateral" or "non-hierarchically
> peering" really add a lot to the explanation. The rest of your text sounds
> more like you're describing a non-transit relationship (typically only
> announce their customer routes to each other), which I think would be an
> easier term to define and more likely to be something readers would be
> familiar with. Either way, the explanation in this section could benefit
> from a good editing pass for clarity.
>
> Type 6/7- "its provider" - do you mean its transit provider? Otherwise it's
> unclear what distinguishes this from type 5, and again would be useful to
> use transit/non-transit to clarify.
>
> Also, an editorial nit/personal preference: since there are so few sections
> to this document, it might be useful to take each of the subtypes and make
> it a subsection of section 3 (e.g. 3.1 3.2, 3.3...), so that it's easier to
> refer to it in text and reviews - subsections can have HTML anchors so that
> you can link right to them, and they show up in the table of contents as
> well.
>
> Thanks,
>
> Wes
>
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
>

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-08-25 Thread Susan Hares
Siram: 

Do you want me to post this for a cross-review in IDR? 

Sue Hares 

-Original Message-
From: GROW [mailto:grow-boun...@ietf.org] On Behalf Of Sriram, Kotikalapudi
Sent: Tuesday, August 18, 2015 8:18 AM
To: George, Wes; Christopher Morrow; grow-cha...@ietf.org;
grow-...@tools.ietf.org; grow@ietf.org grow@ietf.org
Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
(ends: 8/24/2015 - Aug 24)

Thank you, Wes.
The comments you've offered are greatly helpful for improving accuracy as
well as clarity in what is being said. 
I plan to incorporate them in the next revision (v. -03) soon.

Sriram   

From: GROW  on behalf of George, Wes

Sent: Monday, August 17, 2015 2:45 PM
To: Christopher Morrow; grow-cha...@ietf.org; grow-...@tools.ietf.org;
grow@ietf.org grow@ietf.org
Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition
(ends: 8/24/2015 - Aug 24)

I've reviewed the latest version, and generally think that it is ready to
proceed once the below comments are addressed. A cross-review from IDR might
also be useful before it goes to IETF LC.

There are several areas in Section 3 where you use attack and leak
interchangeably in a way that adds a bit of confusion. I think it'd be
better to pick one and stick with it, probably leak rather than attack, and
only use attack if you are describing something that is almost always
malicious rather than accidental.
I.e.
attack type 1 - "The update basically makes a
  U-turn at the attacker's multi-homed AS.  The attack (accidental
  or deliberate) often succeeds"
Previously, you say that you refer to the leaking AS as the "offending AS".
I'd suggest using that here instead of "the attacker's". Similarly, you've
already said that most leaks are unintentional, so it might be better to
simplify that next sentence by saying "the leak often succeeds"
and eliminate the parenthetical. It is also unclear from the text exactly
what you mean by U-Turn (it's not going back the way it came, so actually
hairpin might be a better term), so a few words to clarify might be useful.
Type 2 - "Update is crafted by the attacker...success of the attack" - same
comment here about attack vs leak vs offending AS

Type 4 - While often the increase in prefixes causes its own problems
(dramatically increased routing table size, exceeded max prefix limit,
etc) you may want to add some text to the effect of "these more specifics
may cause the routes to be preferred over other aggregate announcements,
thus redirecting traffic from its normal best path" as that makes it clearer
what the impact of the leak is in this case.

Type 5 - I'm not sure that the terms "lateral" or "non-hierarchically
peering" really add a lot to the explanation. The rest of your text sounds
more like you're describing a non-transit relationship (typically only
announce their customer routes to each other), which I think would be an
easier term to define and more likely to be something readers would be
familiar with. Either way, the explanation in this section could benefit
from a good editing pass for clarity.

Type 6/7- "its provider" - do you mean its transit provider? Otherwise it's
unclear what distinguishes this from type 5, and again would be useful to
use transit/non-transit to clarify.

Also, an editorial nit/personal preference: since there are so few sections
to this document, it might be useful to take each of the subtypes and make
it a subsection of section 3 (e.g. 3.1 3.2, 3.3...), so that it's easier to
refer to it in text and reviews - subsections can have HTML anchors so that
you can link right to them, and they show up in the table of contents as
well.

Thanks,

Wes

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-08-18 Thread Sriram, Kotikalapudi
Thank you, Wes.
The comments you've offered are greatly helpful for improving accuracy 
as well as clarity in what is being said. 
I plan to incorporate them in the next revision (v. -03) soon.

Sriram   

From: GROW  on behalf of George, Wes 

Sent: Monday, August 17, 2015 2:45 PM
To: Christopher Morrow; grow-cha...@ietf.org; grow-...@tools.ietf.org; 
grow@ietf.org grow@ietf.org
Subject: Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 
8/24/2015 - Aug 24)

I've reviewed the latest version, and generally think that it is ready to
proceed once the below comments are addressed. A cross-review from IDR
might also be useful before it goes to IETF LC.

There are several areas in Section 3 where you use attack and leak
interchangeably in a way that adds a bit of confusion. I think it'd be
better to pick one and stick with it, probably leak rather than attack,
and only use attack if you are describing something that is almost always
malicious rather than accidental.
I.e.
attack type 1 - "The update basically makes a
  U-turn at the attacker's multi-homed AS.  The attack (accidental
  or deliberate) often succeeds"
Previously, you say that you refer to the leaking AS as the "offending
AS". I'd suggest using that here instead of "the attacker's". Similarly,
you've already said that most leaks are unintentional, so it might be
better to simplify that next sentence by saying "the leak often succeeds"
and eliminate the parenthetical. It is also unclear from the text exactly
what you mean by U-Turn (it's not going back the way it came, so actually
hairpin might be a better term), so a few words to clarify might be
useful.
Type 2 - "Update is crafted by the attacker...success of the attack" -
same comment here about attack vs leak vs offending AS

Type 4 - While often the increase in prefixes causes its own problems
(dramatically increased routing table size, exceeded max prefix limit,
etc) you may want to add some text to the effect of "these more specifics
may cause the routes to be preferred over other aggregate announcements,
thus redirecting traffic from its normal best path" as that makes it
clearer what the impact of the leak is in this case.

Type 5 - I'm not sure that the terms "lateral" or "non-hierarchically
peering" really add a lot to the explanation. The rest of your text sounds
more like you're describing a non-transit relationship (typically only
announce their customer routes to each other), which I think would be an
easier term to define and more likely to be something readers would be
familiar with. Either way, the explanation in this section could benefit
from a good editing pass for clarity.

Type 6/7- "its provider" - do you mean its transit provider? Otherwise
it's unclear what distinguishes this from type 5, and again would be
useful to use transit/non-transit to clarify.

Also, an editorial nit/personal preference: since there are so few
sections to this document, it might be useful to take each of the subtypes
and make it a subsection of section 3 (e.g. 3.1 3.2, 3.3...), so that it's
easier to refer to it in text and reviews - subsections can have HTML
anchors so that you can link right to them, and they show up in the table
of contents as well.

Thanks,

Wes

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-08-17 Thread George, Wes
I've reviewed the latest version, and generally think that it is ready to
proceed once the below comments are addressed. A cross-review from IDR
might also be useful before it goes to IETF LC.

There are several areas in Section 3 where you use attack and leak
interchangeably in a way that adds a bit of confusion. I think it'd be
better to pick one and stick with it, probably leak rather than attack,
and only use attack if you are describing something that is almost always
malicious rather than accidental.
I.e.
attack type 1 - "The update basically makes a
  U-turn at the attacker's multi-homed AS.  The attack (accidental
  or deliberate) often succeeds"
Previously, you say that you refer to the leaking AS as the "offending
AS". I'd suggest using that here instead of "the attacker's". Similarly,
you've already said that most leaks are unintentional, so it might be
better to simplify that next sentence by saying "the leak often succeeds"
and eliminate the parenthetical. It is also unclear from the text exactly
what you mean by U-Turn (it's not going back the way it came, so actually
hairpin might be a better term), so a few words to clarify might be
useful.
Type 2 - "Update is crafted by the attacker...success of the attack" -
same comment here about attack vs leak vs offending AS

Type 4 - While often the increase in prefixes causes its own problems
(dramatically increased routing table size, exceeded max prefix limit,
etc) you may want to add some text to the effect of "these more specifics
may cause the routes to be preferred over other aggregate announcements,
thus redirecting traffic from its normal best path" as that makes it
clearer what the impact of the leak is in this case.

Type 5 - I'm not sure that the terms "lateral" or "non-hierarchically
peering" really add a lot to the explanation. The rest of your text sounds
more like you're describing a non-transit relationship (typically only
announce their customer routes to each other), which I think would be an
easier term to define and more likely to be something readers would be
familiar with. Either way, the explanation in this section could benefit
from a good editing pass for clarity.

Type 6/7- "its provider" - do you mean its transit provider? Otherwise
it's unclear what distinguishes this from type 5, and again would be
useful to use transit/non-transit to clarify.

Also, an editorial nit/personal preference: since there are so few
sections to this document, it might be useful to take each of the subtypes
and make it a subsection of section 3 (e.g. 3.1 3.2, 3.3...), so that it's
easier to refer to it in text and reviews - subsections can have HTML
anchors so that you can link right to them, and they show up in the table
of contents as well.

Thanks,

Wes



On 8/10/15, 1:29 PM, "GROW on behalf of Christopher Morrow"
 wrote:

>Howdy grow folk,
>please consider this a WGLC for:
>  draft-ietf-grow-route-leak-problem-definition
>
>Abstract:
>  "A systemic vulnerability of the Border Gateway Protocol routing
>   system, known as 'route leaks', has received significant attention in
>   recent years.  Frequent incidents that result in significant
>   disruptions to Internet routing are labeled "route leaks", but to
>   date we have lacked a common definition of the term.  In this
>   document, we provide a working definition of route leaks, keeping in
>   mind the real occurrences that have received significant attention.
>   Further, we attempt to enumerate (though not exhaustively) different
>   types of route leaks based on observed events on the Internet.  We
>   aim to provide a taxonomy that covers several forms of route leaks
>   that have been observed and are of concern to Internet user community
>   as well as the network operator community."
>
>there have been 3 revisions of this document in the WG, along with 2
>prior to adoption. A new read-through of the document and comments
>prior to sending this along to the IESG would be great!
>
>Let's get that done in the next 14 days and pass this up the chain for
>further review/comment/process.
>
>thanks!
>-chris
>(grow-co-chair)
>
>___
>GROW mailing list
>GROW@ietf.org
>https://www.ietf.org/mailman/listinfo/grow


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
_

[GROW] WGLC: draft-ietf-grow-route-leak-problem-definition (ends: 8/24/2015 - Aug 24)

2015-08-10 Thread Christopher Morrow
Howdy grow folk,
please consider this a WGLC for:
  draft-ietf-grow-route-leak-problem-definition

Abstract:
  "A systemic vulnerability of the Border Gateway Protocol routing
   system, known as 'route leaks', has received significant attention in
   recent years.  Frequent incidents that result in significant
   disruptions to Internet routing are labeled "route leaks", but to
   date we have lacked a common definition of the term.  In this
   document, we provide a working definition of route leaks, keeping in
   mind the real occurrences that have received significant attention.
   Further, we attempt to enumerate (though not exhaustively) different
   types of route leaks based on observed events on the Internet.  We
   aim to provide a taxonomy that covers several forms of route leaks
   that have been observed and are of concern to Internet user community
   as well as the network operator community."

there have been 3 revisions of this document in the WG, along with 2
prior to adoption. A new read-through of the document and comments
prior to sending this along to the IESG would be great!

Let's get that done in the next 14 days and pass this up the chain for
further review/comment/process.

thanks!
-chris
(grow-co-chair)

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow