Robert,
Jeff Haas said in his Jan 16 email (attached)
"John Scudder made most of the arguments I'd be supporting. This is optional,
and capabilities say you should be ignoring things you don't understand anyway.
Why force the implementation to hang up the session?"
Do you need BGP profile to achieve continuing the BGP session when receiving
the unrecognized "optional capability" in BGP Open message?
Linda
From: Robert Raszuk <[email protected]>
Sent: Monday, January 16, 2023 6:14 PM
To: Kausik Majumdar <[email protected]>
Cc: Linda Dunbar <[email protected]>; [email protected];
[email protected]; [email protected]
Subject: Re: [EXTERNAL] Re: [Idr] draft-ietf-rtgwg-net2cloud-problem-statement
description on BGP error valid? (was RE: WG adoption call for
draft-abraitis-bgp-version-capability-08, to end September 25
> Can we use our current Draft to update and describe the best practices for
> the mitigation?
I don't think that the Informational draft in RTGWG can be used to make any
modifications to any BGP Message Error Handling.
> As the scope of the document is to characterize the network-related problems
> that Enterprises
> face today when interconnecting their branch offices with dynamic workloads
> in the Cloud DCs
> and the mitigation practices, it might be useful to recommend /capture
> mitigation practices for the
> Section 3.1 BGP Errors Handling.
The problem is that we do not have a separate BGP "version/profile" for
interconnecting branch offices with Cloud DCs.
That means that we can not customize core BGP protocol operation to be optimal
to such deployment space.
- - -
I think that if we would go and define the notion of "BGP Profiles" - lot's of
useful customization could be made with
lowering the bar for each.
I could think of few obvious such profiles already:
* Internet BGP IPv4/IPv6 Profile
* Intradomain Routing Profile
* Data Center BGP Profile
* Private Overlay Transport BGP Profile
Now the obvious challenge is to maximize the code reuse while at the same time
achieve profile isolation/separation.
Regards,
Robert
On Tue, Jan 17, 2023 at 12:25 AM Kausik Majumdar
<[email protected]<mailto:[email protected]>> wrote:
Hi Robert, Sue, IDR Chairs, et. all,
Can we use our current Draft to update and describe the best practices for the
mitigation? As the scope of the document is to characterize the network-related
problems that Enterprises face today when interconnecting their branch offices
with dynamic workloads in the Cloud DCs and the mitigation practices, it might
be useful to recommend /capture mitigation practices for the Section 3.1 BGP
Errors Handling.
3.1<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-rtgwg-net2cloud-problem-statement-18%23section-3.1&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C938968be009a4538691708daf81fc400%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638095112586296054%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=JUI%2B2dMjbQKtkZhfXZyYSSmgYVfDuVS5uo7OydiIt8k%3D&reserved=0>.
Increased BGP errors and Mitigation Methods
-----------------------------------------------------------------------------------------------------
Abstract
This document describes the network-related problems enterprises
face today when interconnecting their branch offices with dynamic
workloads in third-party data centers (a.k.a. Cloud DCs) and some
mitigation practices.
-----------------------------------------------------------------------------------------------------
Regards,
Kausik
From: Idr <[email protected]<mailto:[email protected]>> On Behalf Of
Robert Raszuk
Sent: Monday, January 16, 2023 2:03 PM
To: Linda Dunbar <[email protected]<mailto:[email protected]>>
Cc: [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]>
Subject: [EXTERNAL] Re: [Idr] draft-ietf-rtgwg-net2cloud-problem-statement
description on BGP error valid? (was RE: WG adoption call for
draft-abraitis-bgp-version-capability-08, to end September 25
Any IDR WG member ... :)
On Mon, Jan 16, 2023 at 10:59 PM Linda Dunbar
<[email protected]<mailto:[email protected]>> wrote:
Robert,
Who are the "folks" responsible for making the change?
Linda
From: Robert Raszuk <[email protected]<mailto:[email protected]>>
Sent: Monday, January 16, 2023 2:32 PM
To: Linda Dunbar <[email protected]<mailto:[email protected]>>
Cc: Jeffrey Haas <[email protected]<mailto:[email protected]>>; Gyan Mishra
<[email protected]<mailto:[email protected]>>;
[email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]>
Subject: Re: draft-ietf-rtgwg-net2cloud-problem-statement description on BGP
error valid? (was RE: [Idr] WG adoption call for
draft-abraitis-bgp-version-capability-08, to end September 25
Hi Linda,
I see where you are going with this .. I was expecting so - thank you for
confirming.
So RFC7606 talks about BGP UPDATE Message error handling.
To the best of my knowledge we do not have revised Error Handling for BGP OPEN
Message. So I would propose you encourage folks to work on it before you
proceed with the below section 3.1.
Many thx,
Robert
On Mon, Jan 16, 2023 at 9:22 PM Linda Dunbar
<[email protected]<mailto:[email protected]>> wrote:
Robert, Jeffrey, Gyan,
The reason for my question is to validate the description of the Section 3.1
(Increased BGP error) in the
https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-problem-statement/<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-rtgwg-net2cloud-problem-statement%2F&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C938968be009a4538691708daf81fc400%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638095112586296054%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=cAnaj7s3crPbUCREIDjjd23Zb0cAGmDxF5Sm0Te4Y%2Fw%3D&reserved=0>
Love to hear your comments to this description
--------------------------------------------------
3.1. Increased BGP errors and Mitigation Methods
Many network service providers have limited number of BGP peers and usually
have prior negotiated peering policies with their BGP peers. Cloud GWs need to
peer with many more parties, via private circuits or IPsec over public
internet. Many of those peering parties may not be traditional network service
providers. Their BGP configurations practices might not be consistent, and some
are done by less experienced personnel. All those can contribute to increased
BGP peering errors, such as capability mismatch, BGP ceasing notification,
unwanted route leaks, missing Keepalives, etc. Capability mismatch can cause
BGP sessions not established properly.
If a BGP speaker receives a BGP OPEN message with the unrecognized Optional
Parameters, an error message should be generated per RFC 4271, although the BGP
session can be established. When receiving a BGP UPDATE with a malformed
attribute, the revised BGP error handling procedure [RFC7606] should be
followed instead of session resetting.
Many Cloud DCs don't support multi hop eBGP peering with external devices. To
get around this limitation, it is necessary for enterprises GWs to establish IP
tunnels to the Cloud GWs to form IP adjacency.
Some Cloud DC eBGP peering only supports limited number of routes from external
entities. To get around this limitation, on-premises DCs need to set up default
routes to be exchanged with the Cloud DC eBGP peers.
-----------
Thank you very much
Linda Dunbar
-----Original Message-----
From: Jeffrey Haas <[email protected]<mailto:[email protected]>>
Sent: Monday, January 16, 2023 1:45 PM
To: Robert Raszuk <[email protected]<mailto:[email protected]>>
Cc: Linda Dunbar
<[email protected]<mailto:[email protected]>>; Gyan Mishra
<[email protected]<mailto:[email protected]>>;
[email protected]<mailto:[email protected]>
Subject: Re: [Idr] WG adoption call for
draft-abraitis-bgp-version-capability-08, to end September 25
Robert,
On Mon, Jan 16, 2023 at 08:28:27PM +0100, Robert Raszuk wrote:
> I am afraid you are talking about BGP version while Linda is asking
> about the subject draft bgp version ... Both are completely unrelated
> "versions".
I'm answering Linda's literal question. In the cited text, she is not asking
about the new version capability. If her intent was to ask about that, her
text wasn't stating what she wanted to ask.
> While we are here I did reread RFC4271 and I am not sure either if
> there is text to mandate closing the session when new BGP OPEN
> Optional Parameter is not recognized. Neither does FSM. Generating
> NOTIFICATION and continue should be allowed by the spec unless I
> missed some embedded mandate to close it.
RFC 4271, §6.2:
: If one of the Optional Parameters in the OPEN message is not
: recognized, then the Error Subcode MUST be set to Unsupported
: Optional Parameters.
:
: If one of the Optional Parameters in the OPEN message is recognized,
: but is malformed, then the Error Subcode MUST be set to 0
: (Unspecific).
-- Jeff
_______________________________________________
Idr mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/idr<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fidr&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C938968be009a4538691708daf81fc400%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638095112586296054%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=RrjOaqOVuegtCj5bkyFKAUrmBfyl2YxQEv3sKn9RcTU%3D&reserved=0>
--- Begin Message ---
On Sun, Jan 15, 2023 at 07:28:33PM +0000, Jakob Heitz (jheitz) wrote:
> I can agree to using a new BGP OPEN Optional Parameter.
>
> I would add that if after receiving the OPEN message, the BGP neighbor closes
> the session
> with “Unsupported Optional Parameters”, that the sender of that OPEN message
> try
> opening the session again without the version parameter.
>
> Graceful restart is affected. When a restarted session is restarted a second
> time,
> stale markings are removed. To prevent that, when a neighbor has previously
> restarted a session
> due to not supporting the new version parameter, a session that is restarted
> due to GR should not
> include the version parameter.
Whereas for exactly these reasons, I wouldn't want it in the optional
parameter.
John Scudder made most of the arguments I'd be supporting. This is
optional, and capabilities say you should be ignoring things you don't
understand anyway. Why force the implementation to hang up the session?
-- Jeff
_______________________________________________
Idr mailing list
[email protected]
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fidr&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C525b05620f8d4eeb4b9108daf7f75e14%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638094939070062949%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5vzNoGSMtnUYuDNeLkA63CplQ2fzEp%2BG80rwciAvyUU%3D&reserved=0
--- End Message ---
_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg