Re: [GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-04-02 Thread Sriram, Kotikalapudi (Fed)
Jakob,

Thanks. I was expecting this question. We will work on a recursive path 
analysis to answer it. Brian's suggestion also will be considered. The data 
crunching may take a week or so.

My hunch was that when the AS path length is 5 or 6 or more, the ASes at the 
far end (most recently added) are not likely the savvy ones to be doing EC/LC 
but more likely the earlier ASes added the EC/LC. We'll see what the more 
detailed data analysis reveals.   

Sriram 


From: Jakob Heitz (jheitz) 
Sent: Friday, April 2, 2021 2:38 AM
To: Sriram, Kotikalapudi (Fed)
Cc: Jeffrey Haas; Susan Hares; i...@ietf.org; draft-heitz-idr-w...@ietf.org; 
grow@ietf.org; a.e.azi...@gmail.com; Brian Dickson
Subject: Re: Choice of Large vs. Extended Community for Route Leaks Solution

When the collector sees a route with AS-PATH length 5 with a community on it, 
that does not imply that the community traveled through 5 AS hops. The 
community could have been added at any of the ASes in the path. Where does the 
data show that any communities transited any AS boundaries?

Regards,
Jakob.


> On Apr 1, 2021, at 2:06 PM, Sriram, Kotikalapudi (Fed) 
>  wrote:
>
> There may be a knob that AS operators have for permitting transitivity, but 
> we need to look at measurements to understand whether or not operators 
> actually allow transitivity to EC and LC.
>
> NIST BGP measurements (thanks to my colleague Lilia Hannachi) were shared on 
> the GROW list in May 2020:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fgrow%2FJPD1-hhSvVXIZbUlNQ_1hmzD6IA%2Fdata=04%7C01%7Ckotikalapudi.sriram%40nist.gov%7C7e0ddfc991ff4aa54f9308d8f5a1e8e7%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C637529423059320205%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000sdata=WPgxMhjSfAx%2FueDd487sVRqVWCAYY%2FMIF51gzbf%2Bm7Q%3Dreserved=0
>
> A portion is copied below. The AS path length (# unique ASes) distributions 
> for BGP updates with Communities (Regular, Large, and Extended) are shown 
> here. It is evident that both LC and EC propagate multiple AS hops. Mass 
> stripping of LC or EC at the first hop is not evident.  The peak happens at 
> AS path length 4 or 5 and that is good. That is the behavior that is helpful 
> for route leak solution. The solution can still function even if some ASes 
> strip. We can do some more detailed studies if needed.
>
> *
> RIPE-RIS: Community ANALYSIS (Collector : rrc03 From 2020-04-30 00:00 To 
> 2020-04-30 00:55)
> *
> # Updates = 1075583 (Total)
> # (Regular) COMMUNITY = 859239 (79.89%)
> AS path length distribution =1: 170 (0.02%)2: 44803 (5.21%)3: 
> 141072 (16.42%)4: 276271 (32.15%)5: 238325 (27.74%)6: 114158 
> (13.29%)7: 31365 (3.65%)8: 9018 (1.05%)9: 2690 (0.31%)10: 811 
> (0.09%)11: 358 (0.04%)12: 169 (0.02%)13: 22 (0%)14: 7 (0%)
>
> # LARGE_COMMUNITY = 152818 (14.21%)
> AS path length distribution =2: 5655 (3.7%)3: 17205 (11.26%)4: 
> 54372 (35.58%)5: 45492 (29.77%)6: 22065 (14.44%)7: 6422 (4.2%)
> 8: 1068 (0.7%)9: 397 (0.26%)10: 71 (0.05%)11: 35 (0.02%)12: 
> 26 (0.02%)13: 6 (0%)14: 4 (0%)
>
> # EXTENDED COMMUNITIES = 44606 (4.15%)
> AS path length distribution =2: 2269 (5.09%)3: 7435 (16.67%)4: 
> 17657 (39.58%)5: 11600 (26.01%)6: 3967 (8.89%)7: 1221 (2.74%)
> 8: 371 (0.83%)9: 57 (0.13%)10: 19 (0.04%)11: 8 (0.02%)12: 1 
> (0%)13: 1 (0%)
> *
>
> Sriram
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-04-02 Thread Jakob Heitz (jheitz)
When the collector sees a route with AS-PATH length 5 with a community on it, 
that does not imply that the community traveled through 5 AS hops. The 
community could have been added at any of the ASes in the path. Where does the 
data show that any communities transited any AS boundaries?

Regards,
Jakob.


> On Apr 1, 2021, at 2:06 PM, Sriram, Kotikalapudi (Fed) 
>  wrote:
> 
> There may be a knob that AS operators have for permitting transitivity, but 
> we need to look at measurements to understand whether or not operators 
> actually allow transitivity to EC and LC.
> 
> NIST BGP measurements (thanks to my colleague Lilia Hannachi) were shared on 
> the GROW list in May 2020:
> https://mailarchive.ietf.org/arch/msg/grow/JPD1-hhSvVXIZbUlNQ_1hmzD6IA/
> 
> A portion is copied below. The AS path length (# unique ASes) distributions 
> for BGP updates with Communities (Regular, Large, and Extended) are shown 
> here. It is evident that both LC and EC propagate multiple AS hops. Mass 
> stripping of LC or EC at the first hop is not evident.  The peak happens at 
> AS path length 4 or 5 and that is good. That is the behavior that is helpful 
> for route leak solution. The solution can still function even if some ASes 
> strip. We can do some more detailed studies if needed. 
> 
> *
> RIPE-RIS: Community ANALYSIS (Collector : rrc03 From 2020-04-30 00:00 To 
> 2020-04-30 00:55)
> *
> # Updates = 1075583 (Total)
> # (Regular) COMMUNITY = 859239 (79.89%)
> AS path length distribution =1: 170 (0.02%)2: 44803 (5.21%)3: 
> 141072 (16.42%)4: 276271 (32.15%)5: 238325 (27.74%)6: 114158 
> (13.29%)7: 31365 (3.65%)8: 9018 (1.05%)9: 2690 (0.31%)10: 811 
> (0.09%)11: 358 (0.04%)12: 169 (0.02%)13: 22 (0%)14: 7 (0%)
> 
> # LARGE_COMMUNITY = 152818 (14.21%)
> AS path length distribution =2: 5655 (3.7%)3: 17205 (11.26%)4: 
> 54372 (35.58%)5: 45492 (29.77%)6: 22065 (14.44%)7: 6422 (4.2%)
> 8: 1068 (0.7%)9: 397 (0.26%)10: 71 (0.05%)11: 35 (0.02%)12: 
> 26 (0.02%)13: 6 (0%)14: 4 (0%)
> 
> # EXTENDED COMMUNITIES = 44606 (4.15%)
> AS path length distribution =2: 2269 (5.09%)3: 7435 (16.67%)4: 
> 17657 (39.58%)5: 11600 (26.01%)6: 3967 (8.89%)7: 1221 (2.74%)
> 8: 371 (0.83%)9: 57 (0.13%)10: 19 (0.04%)11: 8 (0.02%)12: 1 
> (0%)13: 1 (0%)
> *
> 
> Sriram
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-04-01 Thread Brian Dickson
On Thu, Apr 1, 2021 at 2:06 PM Sriram, Kotikalapudi (Fed) <
kotikalapudi.sri...@nist.gov> wrote:

> There may be a knob that AS operators have for permitting transitivity,
> but we need to look at measurements to understand whether or not operators
> actually allow transitivity to EC and LC.
>
> NIST BGP measurements (thanks to my colleague Lilia Hannachi) were shared
> on the GROW list in May 2020:
> https://mailarchive.ietf.org/arch/msg/grow/JPD1-hhSvVXIZbUlNQ_1hmzD6IA/
>
> A portion is copied below. The AS path length (# unique ASes)
> distributions for BGP updates with Communities (Regular, Large, and
> Extended) are shown here. It is evident that both LC and EC propagate
> multiple AS hops. Mass stripping of LC or EC at the first hop is not
> evident.  The peak happens at AS path length 4 or 5 and that is good. That
> is the behavior that is helpful for route leak solution. The solution can
> still function even if some ASes strip. We can do some more detailed
> studies if needed.
>
> *
> RIPE-RIS: Community ANALYSIS (Collector : rrc03 From 2020-04-30 00:00 To
> 2020-04-30 00:55)
> *
> # Updates = 1075583 (Total)
> # (Regular) COMMUNITY = 859239 (79.89%)
> AS path length distribution =1: 170 (0.02%)2: 44803 (5.21%)3:
> 141072 (16.42%)4: 276271 (32.15%)5: 238325 (27.74%)6: 114158
> (13.29%)7: 31365 (3.65%)8: 9018 (1.05%)9: 2690 (0.31%)10:
> 811 (0.09%)11: 358 (0.04%)12: 169 (0.02%)13: 22 (0%)14: 7
> (0%)
>
> # LARGE_COMMUNITY = 152818 (14.21%)
> AS path length distribution =2: 5655 (3.7%)3: 17205 (11.26%)4:
> 54372 (35.58%)5: 45492 (29.77%)6: 22065 (14.44%)7: 6422 (4.2%)
>   8: 1068 (0.7%)9: 397 (0.26%)10: 71 (0.05%)11: 35 (0.02%)
> 12: 26 (0.02%)13: 6 (0%)14: 4 (0%)
>
> # EXTENDED COMMUNITIES = 44606 (4.15%)
> AS path length distribution =2: 2269 (5.09%)3: 7435 (16.67%)4:
> 17657 (39.58%)5: 11600 (26.01%)6: 3967 (8.89%)7: 1221 (2.74%)
>   8: 371 (0.83%)9: 57 (0.13%)10: 19 (0.04%)11: 8 (0.02%)12:
> 1 (0%)13: 1 (0%)
> *
>

One main issue will be the use of LC vs WC vs regular communities, among
the largest networks (e.g. networks nominally at the tier-1 designation).
Going from e.g. a wikipedia page with list of ASNs, that would be all or
most of these ASNs:
7018, 1299, 1239, 3320, 6453, 6461, 3356, 3549, 2914, 3257, 3491, 701,
6762, 3491.

Can you get a top-level summary of LCs with GA values from that list, and
whatever the corresponding thing would be for EC or WC?
E.g. How many unique LC values are there that match 3320:* ? Maybe a table
with ASN vs common LC count would help illustrate this.

If the majority (or vast majority) are already using LCs, and many fewer
are using WC/EC, this definitely should tilt the argument towards LCs.

Any of these networks which is using LCs extensively will very likely to be
unwilling to use anything other than a WKLC (and this use of LCs was to a
significant degree the result of requests from operators that use LCs to do
it with LCs.)

Brian
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-04-01 Thread Sriram, Kotikalapudi (Fed)
There may be a knob that AS operators have for permitting transitivity, but we 
need to look at measurements to understand whether or not operators actually 
allow transitivity to EC and LC.

NIST BGP measurements (thanks to my colleague Lilia Hannachi) were shared on 
the GROW list in May 2020:
https://mailarchive.ietf.org/arch/msg/grow/JPD1-hhSvVXIZbUlNQ_1hmzD6IA/

A portion is copied below. The AS path length (# unique ASes) distributions for 
BGP updates with Communities (Regular, Large, and Extended) are shown here. It 
is evident that both LC and EC propagate multiple AS hops. Mass stripping of LC 
or EC at the first hop is not evident.  The peak happens at AS path length 4 or 
5 and that is good. That is the behavior that is helpful for route leak 
solution. The solution can still function even if some ASes strip. We can do 
some more detailed studies if needed. 
 
*
RIPE-RIS: Community ANALYSIS (Collector : rrc03 From 2020-04-30 00:00 To 
2020-04-30 00:55)
*
# Updates = 1075583 (Total)
# (Regular) COMMUNITY = 859239 (79.89%)
AS path length distribution =1: 170 (0.02%)2: 44803 (5.21%)3: 
141072 (16.42%)4: 276271 (32.15%)5: 238325 (27.74%)6: 114158 
(13.29%)7: 31365 (3.65%)8: 9018 (1.05%)9: 2690 (0.31%)10: 811 
(0.09%)11: 358 (0.04%)12: 169 (0.02%)13: 22 (0%)14: 7 (0%)

# LARGE_COMMUNITY = 152818 (14.21%)
AS path length distribution =2: 5655 (3.7%)3: 17205 (11.26%)4: 
54372 (35.58%)5: 45492 (29.77%)6: 22065 (14.44%)7: 6422 (4.2%)
8: 1068 (0.7%)9: 397 (0.26%)10: 71 (0.05%)11: 35 (0.02%)12: 26 
(0.02%)13: 6 (0%)14: 4 (0%)

# EXTENDED COMMUNITIES = 44606 (4.15%)
AS path length distribution =2: 2269 (5.09%)3: 7435 (16.67%)4: 
17657 (39.58%)5: 11600 (26.01%)6: 3967 (8.89%)7: 1221 (2.74%)8: 
371 (0.83%)9: 57 (0.13%)10: 19 (0.04%)11: 8 (0.02%)12: 1 (0%)   
 13: 1 (0%)
*

Sriram
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-04-01 Thread Brian Dickson
On Thu, Apr 1, 2021 at 6:11 AM Jeffrey Haas  wrote:

> [Note, commenting as an individual contributor...]
>
> On Wed, Mar 31, 2021 at 03:10:08PM -0700, Brian Dickson wrote:
> > On Wed, Mar 31, 2021 at 7:57 AM Sriram, Kotikalapudi (Fed) <
> > kotikalapudi.sri...@nist.gov> wrote:
> > > We (authors of the WKLC draft) can continue working on creating an IANA
> > > WKLC registry for the future but I think the route leaks solution
> draft can
> > > switch to using Transitive Extended Community. Especially, if that
> could
> > > help expedite the route leaks draft and its deployment? I would like to
> > > seek advice regarding that (I'm cc'ing GROW also here).
> >
> >
> > Sorry to argue in public, but I disagree very strongly on the second part
> > here.
> >
> > We would like to continue proceeding with use of a LC range for
> > implementation, using a single (or small number) of Global Administrator
> > values.
> >
> > I think we should request that a small block of GAs surrounding the
> initial
> > assignments be tentatively marked something like Reserved for IANA
> > assignment.
> > That is different from actually establishing a registry or assigning them
> > specifically for WKLCs, but would be compatible with subsequent WKLC
> work.
>
> The issue being faced here for WKLC is a few related items:
> - There needs to be some number of global admin (AS) reserved for generic
> use.
> - Since this was not done at the time the feature was shipped, there is no
>   support in anyone's code to treat subsequently allocated ranges as
>   "special".
>


This is correct. However, I am making the claim that lack of special
handling in anyone's code is NOT a blocker to use by operators.
Specifically, the proposed route-leak-detection-mitigation LC range
(assuming a very small number of fixed GA values) would be able
to be used by operators for arbitrary LC matching, which would be
sufficient to implement the detection/mitigation mechanisms.

While code would facilitate automatically doing the mitigation stuff, it is
not the only way mitigation can be achieved.

Having GA values assigned for this is necessary. Having code is not
necessary, but would be desirable (and should be a long-term goal).

The code side of things is true regardless of mechanism used, BTW -- it
could be LC, EC, WC, new attribute, or anything like that.


>
> The two larger criticisms of the WKLC draft to date is that it wanted a LOT
> of the AS space to be used, and that its transitivity functionality would
> not fit well into an incremental deployment of the feature.  If the
> transitivity requirements are removed and the space is narrowed, that at
> least moves it closer to existing community operational practices.  E.g. a
> single AS allocated for the purpose that leaves two unstructured fields, or
> a small number of ASes.
>
> This then would require implementations that want to treat the new
> well-known fields as "special" to have code to do so.  So, we're already
> looking at some level of new code.
>

It is not necessary that this be done in code.

In fact, that is the precise motivation for using LC: no code is strictly
required.

Existing code for matching LC values is sufficient for operators to both
mark prefixes, and match LC values for implementing policy.

E.g. In vendor-agnostic pseudo-code:
IF(PEER_GROUP == MY_CUSTOMER && LC.GA == TBD1 && LC.VALUE1 == TBD2) THEN
DROP # Customer is sending us a marked prefix -- marked prefixes can only
be sent provider->customer
IF(PEER_GROUP == MY_PEER || PEER_GROUP == MY_TRANSIT) THEN ADD LC{LC.GA =
TBD1, LC.VALUE1 = TBD2, LC.VALUE2 = MY_ASN}


>
> Absent that new code, what we have is generic policy, along with the
> implementation's normal propagation behavior - which is behind a knob for
> some implementations.
>

This is correct.

>
> > The move to using LC values was precipitated by the observation that the
> > path for getting attributes deployed would be very long, and that
> operators
> > (actual network operators) are looking for a solution which can be
> deployed
> > *now*.
>
> If the state can fit into an extended community, that similarly can be done
> NOW.  A significant portion of the extended community space is available on
> first-come, first-serve basis.
>
>
> https://www.iana.org/assignments/bgp-extended-communities/bgp-extended-communities.xhtml
>
> But it doesn't change the above issues.
>
> > Nothing has changed in this regard; the WKLC draft is IMHO still the
> right
> > path, and only the size of the initial allocation is problematic.
> >
> > Having 1-4 GA values (from the 32-bit range of potential values) is not
> > burdensome IMNSHO, and is a lot less of a concern than the 1/64 (or 1/16)
> > of the range of 32-bit ASNs originally requested/suggested.
> >
> > If we can all agree that 1-4 GA values assigned for this is acceptable, I
> > suggest a revised version of the draft and assessment of consensus on the
> > revised draft for adoption and last call.
> >
> > LC is the ONLY 

Re: [GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-04-01 Thread Sriram, Kotikalapudi (Fed)
Brian,

>We would like to continue proceeding with use of a LC range for 
>implementation, using a single (or small number) of Global Administrator 
>values.

I should have clarified. I am not opposed to staying on course with a WKLC 
based solution. I only thought transitivity readily came with Transitive 
Extended Community. Your proposal about one or a very small number of WKLC GA 
values seems fine and it is consistent with Sue’s advice.  Please see my next 
post (in this thread) which is about transitivity measurements of EC and LC 
that should be helpful in this discussion.

Sriram 

From: Brian Dickson 
Sent: Wednesday, March 31, 2021 6:10 PM
To: Sriram, Kotikalapudi (Fed)
Cc: Susan Hares; i...@ietf.org; draft-heitz-idr-w...@ietf.org; grow@ietf.org; 
a.e.azi...@gmail.com
Subject: Re: Choice of Large vs. Extended Community for Route Leaks Solution

On Wed, Mar 31, 2021 at 7:57 AM Sriram, Kotikalapudi (Fed) 
mailto:kotikalapudi.sri...@nist.gov>> wrote:
Hi Sue,

Thanks for the detailed thoughts you have shared on the IDR list about the WKLC 
draft and route leaks solution draft (while also responding to Brian’s post).

At one point in the past, the route leaks solution needed 8 bytes of user data 
space to accommodate two ASNs but then there was a design change (more than a 
year ago) and the current draft [1] requires only 4 bytes of user data space 
(one ASN). So, it seems possible to use a Transitive Extended Community instead 
of WKLC.

We (authors of the WKLC draft) can continue working on creating an IANA WKLC 
registry for the future but I think the route leaks solution draft can switch 
to using Transitive Extended Community. Especially, if that could help expedite 
the route leaks draft and its deployment? I would like to seek advice regarding 
that (I'm cc'ing GROW also here).

[Brian] Sorry to argue in public, but I disagree very strongly on the second 
part here.

[Brian] We would like to continue proceeding with use of a LC range for 
implementation, using a single (or small number) of Global Administrator values.

[Brian] I think we should request that a small block of GAs surrounding the 
initial assignments be tentatively marked something like Reserved for IANA 
assignment.
That is different from actually establishing a registry or assigning them 
specifically for WKLCs, but would be compatible with subsequent WKLC work.

[Brian] The move to using LC values was precipitated by the observation that 
the path for getting attributes deployed would be very long, and that operators 
(actual network operators) are looking for a solution which can be deployed 
*now*.

[Brian] Nothing has changed in this regard; the WKLC draft is IMHO still the 
right path, and only the size of the initial allocation is problematic.

[Brian] Having 1-4 GA values (from the 32-bit range of potential values) is not 
burdensome IMNSHO, and is a lot less of a concern than the 1/64 (or 1/16) of 
the range of 32-bit ASNs originally requested/suggested.

[Brian] If we can all agree that 1-4 GA values assigned for this is acceptable, 
I suggest a revised version of the draft and assessment of consensus on the 
revised draft for adoption and last call.

[Brian] LC is the ONLY viable path, given the nebulous state of implementation 
and use for EC/WC or attributes. LC is already deployed, and assigning a few 
GAs by IDR is the only roadblock to the draft in GROW getting approved.

Brian


___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-04-01 Thread Jeffrey Haas
[Note, commenting as an individual contributor...]

On Wed, Mar 31, 2021 at 03:10:08PM -0700, Brian Dickson wrote:
> On Wed, Mar 31, 2021 at 7:57 AM Sriram, Kotikalapudi (Fed) <
> kotikalapudi.sri...@nist.gov> wrote:
> > We (authors of the WKLC draft) can continue working on creating an IANA
> > WKLC registry for the future but I think the route leaks solution draft can
> > switch to using Transitive Extended Community. Especially, if that could
> > help expedite the route leaks draft and its deployment? I would like to
> > seek advice regarding that (I'm cc'ing GROW also here).
> 
> 
> Sorry to argue in public, but I disagree very strongly on the second part
> here.
> 
> We would like to continue proceeding with use of a LC range for
> implementation, using a single (or small number) of Global Administrator
> values.
> 
> I think we should request that a small block of GAs surrounding the initial
> assignments be tentatively marked something like Reserved for IANA
> assignment.
> That is different from actually establishing a registry or assigning them
> specifically for WKLCs, but would be compatible with subsequent WKLC work.

The issue being faced here for WKLC is a few related items:
- There needs to be some number of global admin (AS) reserved for generic use.
- Since this was not done at the time the feature was shipped, there is no
  support in anyone's code to treat subsequently allocated ranges as
  "special".

The two larger criticisms of the WKLC draft to date is that it wanted a LOT
of the AS space to be used, and that its transitivity functionality would
not fit well into an incremental deployment of the feature.  If the
transitivity requirements are removed and the space is narrowed, that at
least moves it closer to existing community operational practices.  E.g. a
single AS allocated for the purpose that leaves two unstructured fields, or
a small number of ASes.

This then would require implementations that want to treat the new
well-known fields as "special" to have code to do so.  So, we're already
looking at some level of new code.

Absent that new code, what we have is generic policy, along with the
implementation's normal propagation behavior - which is behind a knob for
some implementations.

> The move to using LC values was precipitated by the observation that the
> path for getting attributes deployed would be very long, and that operators
> (actual network operators) are looking for a solution which can be deployed
> *now*.

If the state can fit into an extended community, that similarly can be done
NOW.  A significant portion of the extended community space is available on
first-come, first-serve basis.

https://www.iana.org/assignments/bgp-extended-communities/bgp-extended-communities.xhtml

But it doesn't change the above issues.

> Nothing has changed in this regard; the WKLC draft is IMHO still the right
> path, and only the size of the initial allocation is problematic.
> 
> Having 1-4 GA values (from the 32-bit range of potential values) is not
> burdensome IMNSHO, and is a lot less of a concern than the 1/64 (or 1/16)
> of the range of 32-bit ASNs originally requested/suggested.
> 
> If we can all agree that 1-4 GA values assigned for this is acceptable, I
> suggest a revised version of the draft and assessment of consensus on the
> revised draft for adoption and last call.
> 
> LC is the ONLY viable path, given the nebulous state of implementation and
> use for EC/WC or attributes. LC is already deployed, and assigning a few
> GAs by IDR is the only roadblock to the draft in GROW getting approved.

I question your conclusion.

The desire is to have an attribute that is used for route leak mitigation
purposes.

This thread illustrates that it's very easy for such a control community in
any flavor (regular, extended, large) to be stripped because the service
provider hasn't proactively acted to permit it.

Does this really solve the problem?

-- Jeff

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-03-31 Thread Brian Dickson
On Wed, Mar 31, 2021 at 7:57 AM Sriram, Kotikalapudi (Fed) <
kotikalapudi.sri...@nist.gov> wrote:

> Hi Sue,
>
> Thanks for the detailed thoughts you have shared on the IDR list about the
> WKLC draft and route leaks solution draft (while also responding to Brian’s
> post).
>
> At one point in the past, the route leaks solution needed 8 bytes of user
> data space to accommodate two ASNs but then there was a design change (more
> than a year ago) and the current draft [1] requires only 4 bytes of user
> data space (one ASN). So, it seems possible to use a Transitive Extended
> Community instead of WKLC.
>
> We (authors of the WKLC draft) can continue working on creating an IANA
> WKLC registry for the future but I think the route leaks solution draft can
> switch to using Transitive Extended Community. Especially, if that could
> help expedite the route leaks draft and its deployment? I would like to
> seek advice regarding that (I'm cc'ing GROW also here).


Sorry to argue in public, but I disagree very strongly on the second part
here.

We would like to continue proceeding with use of a LC range for
implementation, using a single (or small number) of Global Administrator
values.

I think we should request that a small block of GAs surrounding the initial
assignments be tentatively marked something like Reserved for IANA
assignment.
That is different from actually establishing a registry or assigning them
specifically for WKLCs, but would be compatible with subsequent WKLC work.

The move to using LC values was precipitated by the observation that the
path for getting attributes deployed would be very long, and that operators
(actual network operators) are looking for a solution which can be deployed
*now*.

Nothing has changed in this regard; the WKLC draft is IMHO still the right
path, and only the size of the initial allocation is problematic.

Having 1-4 GA values (from the 32-bit range of potential values) is not
burdensome IMNSHO, and is a lot less of a concern than the 1/64 (or 1/16)
of the range of 32-bit ASNs originally requested/suggested.

If we can all agree that 1-4 GA values assigned for this is acceptable, I
suggest a revised version of the draft and assessment of consensus on the
revised draft for adoption and last call.

LC is the ONLY viable path, given the nebulous state of implementation and
use for EC/WC or attributes. LC is already deployed, and assigning a few
GAs by IDR is the only roadblock to the draft in GROW getting approved.

Brian


>
>
> One question is… even after IANA allocation of a Transitive Extended
> Community for route leaks, there may still be additional effort needed to
> get the operators to truly treat the EC as *transitive* so that it
> propagates at least a few hops. How do we accomplish that? Write a BCP in
> GROW strongly recommending operators to implement default policy to ensure
> transitivity? We would like to hear people's thoughts about that?
>
> Thank you.
>
> Sriram
>
> [1] Route leaks solution draft (in GROW):
> https://datatracker.ietf.org/doc/html/draft-ietf-grow-route-leak-detection-mitigation-04
>
>
> ---
>
> Susan Hares  Fri, 26 March 2021 21:28 UTCShow header
> Re: [Idr] Adoption call for draft-heitz-idr-wklc-02 (3/9 to 3/23) - no
> consensus for adoption
>
> Brian and co-authors:
>
> As I typed my response to Brian’s questions, I found it was turning into a
> copy of my chair’s response to the WG adoption call.   Therefore, I have
> just included my review as the shepherd to Brian’s request.
>
> Cheers, Sue
>
> 
>
> Summary:
>
> There is no consensus on adoption this draft in its current form.   The
> IDR co-chairs remain committed to the route-leak mitigation work and large
> communities.
>
> 
>
> Would 255 ASNs instead of  original request:
>
> Even requesting 255 ASNs needs substantial justification.  For the route
> leaks, we  anticipated 2-8 would be sufficient.  As you recall when we
> started this approach,  I talked with Alvaro (our AD) and IANA to determine
> if IDR could request these special ASNs.
>
> However, asking for 255 ASNs you would need:
>
> a) a draft indicating the request for the ASNs,
>
> b) support of the draft from grow (WG adoption, WG LC)
>
> c) support of the draft from IDR (WG adoption, WG LC)
>
> 255 ASNs should be vetted IDR, grow, and operator community.  If you go
> this way, I would suggest the Grow chairs also ask the *NOGs (NANOG, RIPE,
> JANOG..) if allocating 255 ASNs is ok.
>
> Route leaks:
>
> As you indicated, the route-leaks needs a small amount of ASNs.  As you
> recall from our discussion the IDR chairs at the time (John Scudder and
> myself) felt would could use the drafts in IDR and Grow to push for 2-4
> special purpose ASNs.   My current co-chairs agree to support this initial
> allocation.
>
> Large community changes:
>
> I quietly listened to the WG adoption call on this draft because it
> mattered what the ISPs 

[GROW] Choice of Large vs. Extended Community for Route Leaks Solution

2021-03-31 Thread Sriram, Kotikalapudi (Fed)
Hi Sue,

Thanks for the detailed thoughts you have shared on the IDR list about the WKLC 
draft and route leaks solution draft (while also responding to Brian’s post).

At one point in the past, the route leaks solution needed 8 bytes of user data 
space to accommodate two ASNs but then there was a design change (more than a 
year ago) and the current draft [1] requires only 4 bytes of user data space 
(one ASN). So, it seems possible to use a Transitive Extended Community instead 
of WKLC.

We (authors of the WKLC draft) can continue working on creating an IANA WKLC 
registry for the future but I think the route leaks solution draft can switch 
to using Transitive Extended Community. Especially, if that could help expedite 
the route leaks draft and its deployment? I would like to seek advice regarding 
that (I'm cc'ing GROW also here). 

One question is… even after IANA allocation of a Transitive Extended Community 
for route leaks, there may still be additional effort needed to get the 
operators to truly treat the EC as *transitive* so that it propagates at least 
a few hops. How do we accomplish that? Write a BCP in GROW strongly 
recommending operators to implement default policy to ensure transitivity? We 
would like to hear people's thoughts about that? 

Thank you.

Sriram

[1] Route leaks solution draft (in GROW): 
https://datatracker.ietf.org/doc/html/draft-ietf-grow-route-leak-detection-mitigation-04
 

---

Susan Hares  Fri, 26 March 2021 21:28 UTCShow header
Re: [Idr] Adoption call for draft-heitz-idr-wklc-02 (3/9 to 3/23) - no 
consensus for adoption

Brian and co-authors: 

As I typed my response to Brian’s questions, I found it was turning into a copy 
of my chair’s response to the WG adoption call.   Therefore, I have just 
included my review as the shepherd to Brian’s request. 

Cheers, Sue 

 

Summary: 

There is no consensus on adoption this draft in its current form.   The IDR 
co-chairs remain committed to the route-leak mitigation work and large 
communities. 

 

Would 255 ASNs instead of  original request:

Even requesting 255 ASNs needs substantial justification.  For the route leaks, 
we  anticipated 2-8 would be sufficient.  As you recall when we started this 
approach,  I talked with Alvaro (our AD) and IANA to determine if IDR could 
request these special ASNs. 

However, asking for 255 ASNs you would need: 

a) a draft indicating the request for the ASNs, 

b) support of the draft from grow (WG adoption, WG LC) 

c) support of the draft from IDR (WG adoption, WG LC) 

255 ASNs should be vetted IDR, grow, and operator community.  If you go this 
way, I would suggest the Grow chairs also ask the *NOGs (NANOG, RIPE, JANOG..) 
if allocating 255 ASNs is ok. 

Route leaks: 

As you indicated, the route-leaks needs a small amount of ASNs.  As you recall 
from our discussion the IDR chairs at the time (John Scudder and myself) felt 
would could use the drafts in IDR and Grow to push for 2-4 special purpose 
ASNs.   My current co-chairs agree to support this initial allocation. 

Large community changes: 

I quietly listened to the WG adoption call on this draft because it mattered 
what the ISPs and implementers said.  The Large communities (RFC8092) had 
overwhelming support from the operation community for 12 octet value with 
simple encoding.  

The RFC8092 encoding does not have support for transitive nature because the 
operator community wished to have a simple encoding.  After placing the WG LC 
during IETF and immediately after I did not hear an outcry from the operations 
community to change the simple nature of Large communities.  

Well know community registry: 

The original large community (RFC8092) creation did not take the time to create 
a “well-known community” registry.  My reading of the community effort that 
time was a “well-known community” registry was acceptable to the community, but 
not at the cost of slowing down deployment of large communities.  The hard work 
of getting consensus on the size and range for large communities needs to 
happen prior to asking IANA to create the registry. 

Possible next steps: 

1. Break the -4 ASNs away from the draft and append the request to existing 
grow drafts.   Section 6 of (draft-grow-route-leak-detection-mitigation-04.txt) 
could request specific ASNs.  

2.  Working with IDR/Grow to create a well-known Large Community registry 
discussing whether well-known community are just values registered or a range.  
 

3.  Work to get 255 ASNs approved through IDR/GROW

4.  Use a BGP attribute to solve the transitivity. 

The authors can contact the idr co-chairs as a group or grab one of the IDR 
co-chairs for a chat.   The IDR co-chairs meet weekly.   Let us know what we 
can do to help you. 

  

 

In my personal opinion, GROW is a good place to discuss the large community 
registry as operations people know the