On Apr 29, 2010, at 12:16 PM, Sriram, Kotikalapudi wrote:

May be we could include a BCP statement or warning within the
algorithm document for the (very few) users of AS sets.
If they use, for example, [AS42] or [AS42, AS42] type of AS set
for whatever reason (i.e., with singleton AS in the AS set
or the same ASN repeated multiple times) and also register a ROA for their
prefix with that ASN (AS42 in the example) --
the BCP statement would warn them that
their ROA would thwart a potential hijacker of their prefix but
they should not expect to receive a positive ("Valid") assertion for their
own update which contains that AS set as origin.

I am not following you here -- can you please explain what you mean by "should not expect to receive a positive ("Valid") assertion for their own update which contains that AS set as origin."?

Also, the same applies for cases when they actually do a genuine proxy
aggregation such as using an AS set [AS42, AS43, AS44] for example
and  register three ROAs for their aggregate prefix for each
of the  three ASNs. Again, they should not expect a positive ("Valid")
assertion for their own update which contains that AS set as origin.

Sriram

> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf Of Geoff Huston
> Sent: Thursday, April 29, 2010 2:06 AM
> To: Chris Morrow
> Cc: Sandra Murphy; sidr wg
> Subject: Re: [sidr] SIDR Charter Question
>
>
> On 29/04/2010, at 5:24 AM, Chris Morrow wrote:
>
> >
> >
> > Sandra Murphy wrote:
> >> The relative frequency of use of AS_SETs is interesting, but not really
> >> germane to the point here.

Well, I sort of think it is -- if 95% of routes contained AS_SETs in the origin then saying that you just cannot validate routes with AS_SETs in the origin is a non-starter.

> >>
> >> If we were trying to develop a protection for AS_SETs then we might want > >> to ask the engineering question of where and how often they were used.
> >>
> >> But for the purpose of validating received updates, we need a rule for > >> what is done with AS_SETs that appear in the AS_PATH origin. Lack of
> >> rules leaves opportunities for deliberate or accidental mischief.

Yes -- because their occurrence is not huge, we can make the call that these routs just do not get the win...

W

> >>
> >> AS_SETs might not be used very often, but that doesn't stop someone from
> >> using AS_SETs deliberately with malicious intent.
> >
> > right so as a starting point:
> > "AS_SET in an origin is unvalidatable."
> >
> > how about that? (I think this is fine since:
> > 1) they aren't used in production very much anymore
> > 2) where used, they seem to be mis-used
> > 3) the rules for how you do verification/validation of an AS_SET are at
> > best murky.
> >
> > -chris
> > (regular user)
> >
>
>
> You ask: "how about that?"
>
> That still works for me. Ironically (or any other adjective that matches - I can think of quite > a few more extreme ones that I could substitute) this is _precisely_ where all this started > when I proposed using the following definition of an "origin AS" (in my note from 4 April):
>
> "A route's "origin AS" is the final element of the route object's
>  AS_PATH attribute.  If the final AS_PATH element is an AS Set,
>  indicating that the route is an aggregate, then the origin AS
>  cannot be determined."
>
>
>
>   Geoff
>
>
> _______________________________________________
> sidr mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

--
"Build a man a fire, and he'll be warm for a day. Set a man on fire, and he'll be warm for the rest of his life." -- Terry Pratchett


_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to