Thanks. This is the part I was looking for:

> I would suggest one keep/use the locally computed validation state,
> not the signaled state.

Jakob.

> -----Original Message-----
> From: Montgomery, Douglas (Fed) [mailto:do...@nist.gov]
> Sent: Friday, March 03, 2017 1:56 PM
> To: Jakob Heitz (jheitz) <jhe...@cisco.com>; Alvaro Retana (aretana) 
> <aret...@cisco.com>; draft-ietf-sidr-origin-
> validation-signal...@ietf.org
> Cc: sa...@tislabs.com; sidr-cha...@ietf.org; sidr@ietf.org
> Subject: Re: [sidr] Protocol Action: 'BGP Prefix Origin Validation State 
> Extended Community' to Proposed Standard
> (draft-ietf-sidr-origin-validation-signaling-11.txt)
> Importance: Low
> 
> 
> On 3/3/17, 3:24 PM, "Jakob Heitz (jheitz)" <jhe...@cisco.com> wrote:
> 
> >The case is unlikely, but something we need to write code for.
> >Without an answer, then the validity will just be set by whichever
> >was set last. That would make it indeterminate.
> >
> >The case is for a single route. There is no suggestion of the validity
> >of one route being used to set validity of another.
> 
> By single route, do you mean an update from a specific iBGP peer?  Or do
> you mean updates from two or more iBGP peers?
> 
> >
> >A router may be doing local validation, using rpki-rtr protocol.
> >In additiion, it may receive a route with a validation state in
> >an extended-community.
> 
> In this case are you saying the router is doing origin validation on iBGP
> updates, even though they contain the extended-community?
> 
> If so, I would suggest one keep/use the locally computed validation state,
> not the signaled state.
> 
> >
> >The question is what to do if one validation method sasys "invalid"
> >and the other says "valid".
> >
> >The situation may arise if the router sending the extended-community
> >is using a different validation method, not RPKI.
> 
> It can also happen if all routers are doing RPKI, but there is transient
> RPKI state skew between multiple validating caches, local SLURM policies,
> etc.
> 
> 
> >
> >Thanks,
> >Jakob.
> >
> >> -----Original Message-----
> >> From: Montgomery, Douglas (Fed) [mailto:do...@nist.gov]
> >> Sent: Friday, March 03, 2017 11:36 AM
> >> To: Alvaro Retana (aretana) <aret...@cisco.com>; Jakob Heitz (jheitz)
> >><jhe...@cisco.com>; draft-ietf-sidr-origin-
> >> validation-signal...@ietf.org
> >> Cc: sa...@tislabs.com; sidr-cha...@ietf.org; sidr@ietf.org
> >> Subject: Re: [sidr] Protocol Action: 'BGP Prefix Origin Validation
> >>State Extended Community' to Proposed Standard
> >> (draft-ietf-sidr-origin-validation-signaling-11.txt)
> >> Importance: Low
> >>
> >> I am not sure I understand the original question/point and/or Alvaro's
> >> response.
> >>
> >> The spec in section 2 says:
> >>
> >> “...Similarly on the receiving IBGP speakers, the validation state of an
> >> IBGP route SHOULD be derived directly from the last octet of the
> >>extended
> >> community, if present.”
> >>
> >>
> >> That seems like a suggested receive logic … although it is a SHOULD.  Of
> >> course it is still up to local policy how this validation state effects
> >> the decision process.
> >>
> >> I think it would be a mistake to make some change that suggested that
> >>the
> >> received validation state on a iBGP update should somehow influence the
> >> computed origin validation state of other received updates.  In
> >>particular
> >> influencing the validation state of any locally validated updates.  The
> >> original question seems to suggest that a received INVALID or VALID
> >>might
> >> supersede a “NOT_FOUND”. (was that the suggestion?)  Such a situation
> >> represents an RPKI state skew between the two routers (might just be
> >> transitory) but it is impossible to tell if the I/V or the NF represents
> >> the more “up to date” result.  Also having the origin validation results
> >> of a router that is doing OV overwritten by some other router (possibly
> >> synced to a different validating cache) will make debugging OV results
> >> very difficult.
> >>
> >> In short, for now, I would not change the spec.  With some operational
> >> experience we might find some use for similar functionality (I wonder if
> >> by NOT_FOUND you meant not validated) but for now, I would not change
> >>it.
> >>
> >> dougm
> >> —
> >> Doug Montgomery, Mgr Internet & Scalable Systems Research at
> >>NIST/ITL/ANTD
> >>
> >>
> >>
> >>
> >>
> >> On 2/23/17, 4:55 PM, "sidr on behalf of Alvaro Retana (aretana)"
> >> <sidr-boun...@ietf.org on behalf of aret...@cisco.com> wrote:
> >>
> >> >[Took the IESG, ietf-announce and rfc-editor lists off.]
> >> >
> >> >Jakob:
> >> >
> >> >Hi!
> >> >
> >> >This document is already in AUTH48.  I don’t think we need to make any
> >> >changes to the document, but if we do, we need to decide very soon.
> >> >
> >> >The document doesn’t say anything about what should be done with this
> >> >extended community, except to say that “speakers that receive this
> >> >validation state can configure local policies allowing it to influence
> >> >their decision process.”  IOW, there is no expected default processing
> >>of
> >> >the validation state.
> >> >
> >> >If the community is received and the router also has validation
> >> >information, then I agree that the extended community is not
> >>needed…but I
> >> >think that action is outside the scope of this document.
> >> >
> >> >Thanks!
> >> >
> >> >Alvaro.
> >> >
> >> >
> >> >
> >> >
> >> >On 2/23/17, 4:26 PM, "iesg on behalf of Jakob Heitz (jheitz)"
> >> ><iesg-boun...@ietf.org on behalf of jhe...@cisco.com> wrote:
> >> >
> >> >    What happens if a BGP speaker validates a route in its own RPKI
> >> >database
> >> >    and finds it to be either Valid or Invalid (not NotFound) and also
> >> >receives
> >> >    the extended community that specifies a different validation state?
> >> >
> >> >    I don't see that condition covered in the draft.
> >> >    I would say to ignore the extended community.
> >> >
> >> >    Thanks,
> >> >    Jakob.
> >> >
> >> >    > -----Original Message-----
> >> >    > From: sidr [mailto:sidr-boun...@ietf.org] On Behalf Of The IESG
> >> >    > Sent: Wednesday, January 11, 2017 7:25 AM
> >> >    > To: IETF-Announce <ietf-annou...@ietf.org>
> >> >    > Cc: draft-ietf-sidr-origin-validation-signal...@ietf.org;
> >> >sidr@ietf.org; sidr-cha...@ietf.org; The IESG
> >> >    > <i...@ietf.org>; sa...@tislabs.com; rfc-edi...@rfc-editor.org
> >> >    > Subject: [sidr] Protocol Action: 'BGP Prefix Origin Validation
> >> >State Extended Community' to Proposed Standard
> >> >    > (draft-ietf-sidr-origin-validation-signaling-11.txt)
> >> >    >
> >> >    > The IESG has approved the following document:
> >> >    > - 'BGP Prefix Origin Validation State Extended Community'
> >> >    >   (draft-ietf-sidr-origin-validation-signaling-11.txt) as
> >>Proposed
> >> >    > Standard
> >> >    >
> >> >    > This document is the product of the Secure Inter-Domain Routing
> >> >Working
> >> >    > Group.
> >> >    >
> >> >    > The IESG contact persons are Alvaro Retana, Alia Atlas and
> >>Deborah
> >> >    > Brungard.
> >> >    >
> >> >    > A URL of this Internet Draft is:
> >> >    >
> >>
> >>>https://datatracker.ietf.org/doc/draft-ietf-sidr-origin-validation-signa
> >>>li
> >> >ng/
> >> >    >
> >> >    >
> >> >    >
> >> >    >
> >> >    >
> >> >    > Technical Summary
> >> >    >
> >> >    >    This document defines a new BGP opaque extended community to
> >> >carry
> >> >    >    the origination AS validation state inside an autonomous
> >>system.
> >> >    >    IBGP speakers that receive this validation state can configure
> >> >local
> >> >    >    policies allowing it to influence their decision process.
> >> >    >
> >> >    > Working Group Summary
> >> >    >
> >> >    >   This document has had consistent interest from the working
> >>group.
> >> >    >   Because it defines a new BGP community, it was reviewed by the
> >>idr
> >> >    >   working group as well.
> >> >    >
> >> >    > Document Quality
> >> >    >
> >> >    >   The document has been implemented by major router vendors.
> >> >    >   It is known to be in use in two large IXPs, AMS-IX and DE-CIX.
> >> >    >
> >> >    > Personnel
> >> >    >
> >> >    >   Document Shepherd: Sandra Murphy
> >> >    >   Responsible Area Director: Alvaro Retana
> >> >    >
> >> >    > _______________________________________________
> >> >    > sidr mailing list
> >> >    > sidr@ietf.org
> >> >    > https://www.ietf.org/mailman/listinfo/sidr
> >> >
> >> >
> >> >
> >> >_______________________________________________
> >> >sidr mailing list
> >> >sidr@ietf.org
> >> >https://www.ietf.org/mailman/listinfo/sidr
> >

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to