When compared to what is today I don't think folks are mandated by any RFC
to make a choice between two attributes which carry the same metric to
decide which one should win on a per AS basis.

they are not, and in the future the 'mandate' is I believe a 'SHOULD',
not a 'MUST' so not really a 'mandate', but a 'suggestion', eh?

It seems that the intent of the effort here is really just to provide
an informational blob to the operators which they can use as they see
fit... much like other optional transitive attributes today.

Ok that sounds very reasonable indeed.

However number of folks have stated that bgpsec protocol proposal calls for replacing AS-PATH and AS4_PATH attributes with BGPSEC_Path_Sig attribute. In particular this text from /draft-ietf-sidr-bgpsec-protocol-02 sort of suggests that:

   The other option is that the BGPSEC speaker
   discards anything in the AS_PATH attribute and reconstructs the
   AS_PATH from the data in the BGPSEC_Path_Signatures attribute.  I
   believe that there are no interoperability problems if the choice
   between these two options is left up to the BGPSEC speaker.

Also it says in the same section 5:

   One option the
   BGPSEC speaker checks the AS_PATH attribute against the information
   in the BGPSEC_Path_Signatures attribute and returns "Not Good" if the
   two do not match.

That means that if AS_PATH for example contains AS_SET that someone doing BGP multipath (across non identical paths) has correctly inserted into AS_PATH or as mentioned before did replace-as the update will be dropped as BGPSEC just can not handle those ....


Meta question:

Can optional attribute result in such drastic actions (nothing to do with operator's choice of local behavior) against mandatory attribute(s) ?

Best,
R.
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to