On Mon, Nov 21, 2011 at 11:15 PM, Terry Manderson <te...@terrym.net> wrote: > > Speaking for myself on this one. > > On 22/11/2011, at 12:47 PM, Christopher Morrow wrote: >> >> ok, so if we step forward and ask for 'give me an attribute to >> indicate customer/peer/other', would we then trust that? it'd be >> (presumably) set per as-hop, is that anymore trustworthy than the >> communities supposed above? >> >> (I'd also ask what the rules are for setting this sort of thing, but I >> don't think that matters since we can't really trust the value in it) >> > > So lets say (hypothetically) we adopt a requirement of this system to allow a > relying party to parse a route and know if it is intended or not by some > construction of verifiable information. >
'if it is intended' ... means: a) "is intended to be seen at the vantage point it was observed at" (3 as-hops away) b) "with the as-path it shows up with" (isp1 - as1 - isp2 - me) c) something else? it's not clear what you meant, I'll assume b though... > I can't, for the life of me, see a transitive attribute _in_ BGP (signed or > otherwise) making a positive step in trying to secure intent of the local AS > as effected by a routing domain 2+ hops away. > err, this didn't parse for me :( You mean you don't see the possibility of adding a transitive attribute to BGP, which some AS adds to a path (and signs into the announcement, so it has to be kept along the path) and is replicated with each as-hop? Something like: isp1 - as1 - isp2 - me out:is-cust in:is-transit out:is-transit in:is-cust out:is-cust in:is-transit So, isp1 signs toward as1 "is-customer" as1 signs from isp1 "is-transit" as1 signs to isp2 "is-transit" isp2 signs from as1 "is-customer" isp2 signs to me "is-customer" me signs from isp2 "is-transit" Given that you'd have to configure (I suspect) each peering as 'peering' or 'transit' or 'customer' ...I don't see this flying either. :( I also don't see how to compute this on the local-router level either, given the information in the session, without an operator having to designate "this is a X" :( >>> >>> >> >> yup, I don't think we're going to get to the fully publicly exposed >> policy world though... are we? (we can't, I think, expect everyone to >> expose that sort of thing, never mind keep it updated) > > History tells us we are (for the most part) inept at doing so, even with > tools available. I had thought that RIPE had this licked in their region, no? they have policy-foo encoded in RPSL-stuff in the DB no? Is that NOT working for the cases in region? > But what we do know is that when policy is implemented, the results are > transparent and can be seen > (ris, routeviews, et al) by anyone who cares to look. > sure... but the data isn't exactly always 'accurate' there, and it's not accessible to the 'user' (router in the field) really, and I think the data includes lots of helter-skelter cruft that's not very helpful for this case :( >> >> yup... no-export/advertise were taken as 'advisory' communities that >> networks MAY heed, but certainly weren't bound to do so. >> >> So, back to the question: >> "Given BGP as it is today, how do you know if a route is a leak or not?" >> >> I suppose documenting: "One leak scenario is <see id name>" is a fine >> thing, does it help to actually fix the problem though? I think what I >> heard in the meeting and on the thread(s) here was: "Sure leaks are >> important, there's not a way devised so far that distinguishes a >> 'leak' route from a 'normal' route, more than 1 as-hop from the >> 'source' of the leak. >> >> In the id/draft: >> >> isp1 isp2 - me >> \ / >> AS1 >> >> I can't tell at 'me' that the route I see is a 'leak', just that I see >> an as-path that is isp1-as1-isp2. > > > The bit I think that is missing is some knowledge that isp1 asserts it has > valid routing through isp2, and any other potential 'true' paths. (noting AS1 > is considered the 'Serleena' here) > oh, I think danny's draft has a link between isp1/isp2 :( you probably meant here: "ISP1 and ISP2 directly connect, the path via AS1 is invalid/improper/a-leak" right? > From what I recall draft-huston-sidr-aao-profile takes a step in that > direction. (insert my reluctance about tightly binding routing operations to > allocation practice) in such that it only publicises the valid paths, through > subsequent AAO's by by other ASNs. Thus if an AAO (in my reading) is created > by isp1 with only an adjacency to isp2. It provides "me" with an ability to > say that the received route with AS1 on path is invalid. > > The AAO doesn't dive into local policy, and if isp1 has a private peering > with AS3, then it need not put that in an AAO and thus the business dealings > remain private - everything else ends up being seen in routeviews over time. > So this is one way... but not the only way. > > The killer problem here is that partial deployments will create path islands, > where only a number of the ASN hops have created AAO objects and thus a path > validity exercise will still fall into a potential leak trap until all ASNs > get there. The question then could then be, "is it o.k. for the answer to > route leaks to be near unusable until we have a significant deployment" > note sure, is that time also when we'd have full resource-certification and the tools mostly available to just filter people reliably/properly/everywhere? ('everywhere' for some value of all-customers-of-all-isps, and maybe including settlement-free-interconnects as well?) -chris > Cheers, > T. > > _______________________________________________ sidr mailing list sidr@ietf.org https://www.ietf.org/mailman/listinfo/sidr