Hi Warren,

Not seeing the problem/error does not mean it is not there.

I would in fact encourage in the initial years of deployment to use both to easily detect bugs and inconsistency issues.

In my view we should do all BGP processing based on "legacy" attributes and BGPSEC should be a hint to the local operator on how to treat the update.

Actually I am of the opinion (I think similar to some research voices in US) that secured BGP (or for that matter even origin validation) should be handled by few BGP Route Controllers providing AS based overlay certificate processing rather then by each individual BGP speaker in the network. BGP should be able to transport it as purely opaque information which could after automatic detection be used as best path decision/preference factor in a given AS.

Regards,
R.


On Apr 10, 2012, at 12:52 PM, Christopher Morrow wrote:

On Tue, Apr 10, 2012 at 12:34 PM, Robert Raszuk<[email protected]>  wrote:
Anyhow my doubt has been answered and I stay by my opinion that not sending
AS_PATH and AS4_PATH is a terrible idea.

So... we can send the data along, but in the case of BGPSEC speakers
the data isn't used (it's replicated in the BGPSEC_SIGNED_PATH).
Carrying extra bits isn't actually helpful is it? (the implementers
drove the design decision here I believe)

I think that sone of the biggest issues to keep in mind with carrying the 
"same" data in two places is what to do when you suddenly discover that they 
are not actually the same?

There has been much good work in IDR to better handle bugs / implementations 
issues, and these considerations probably had much to do with this...

For example, I'm a BGPSEC speaker. In the BGPSEC bits I see:

AS1 AS2 AS3 AS4 AS5  All this checks out, the magic crypto says all is happy, 
etc.
but, in the AS_PATH I see:
AS1 AS 100 AS17 AS6

What do I do here? Do I a: drop the update or b: ignore the issue or c: reset 
the session or d: prefer the singed or unsigned or e: nasal demons?
Someone who's opinion I really respect once said: Never test for an error 
condition you don't know how to handle.

This idea extends this by simply not allowing the error condition to occur.

You have all of the information to recreate the AS_PATH / AS4_PATH when you 
leave a BGPSEC domain, and because it is only in one place, you sidestep all 
sorts of weird error corner cases...

W



Perhaps one could depreciate it in 20 years when world is upgraded to
BGPSEC, but recommending this in BGPSEC protocol draft now is IMHO not
helpful for any even potential BGPSEC deployment model.

is it helpful for the folks that write bgp code though? "Hey, you will
need to re-synthesize the as-path at sec->non-sec boundaries. you need
to also create sec-path at none->sec boundaries."

-chris
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr


_______________________________________________
Idr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/idr



_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to