This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/routing-wg@ripe.net/
[routing-wg] What is going on with BGP
- Previous message (by thread): [routing-wg] Weekly Global IPv4 Routing Table Report
- Next message (by thread): [routing-wg] RPKI Quarterly Planning Q3 2023
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Ignas Bagdonas
ibagdona.ripe at gmail.com
Tue Jun 13 21:40:59 CEST 2023
This is a brief overview of developments happening in the IETF working groups related to BGP evolution. The view is current as of mid-2023, in the timeframe between IETF meetings 116 and 117, and looking back several years to cover the recently published documents. The overview is given from the perspective of development of the protocol mechanics and recommended operational considerations, and is not directly related to specific implementation aspects of specific platforms – for that you would need to consult your vendors’ documentation. It is not expected that all of the functionality described here will be universally productized, as well as there will be specific deviations and extensions to functionality implemented by different vendors as seen required by the market. This is not an end to end overview of BGP, instead it focuses on specific protocol changes and therefore it is assumed that a reader has a sufficient understanding of foundations of BGP and its supporting machinery. It is a high level overview and does not go deep into the specifics, pointers to documents are provided for further and more detailed view into the topics under the discussion. This part covers the core protocol part and mechanisms specific to IPv4 unicast and IPv6 unicast AFs. Deprecation of AS path aggregation sets (draft-ietf-idr-deprecate-as-set-confed-set). When aggregating multiple prefixes with different ASNs into a shorter covering prefix, besides other aggregation related path attributes, the ASN identifiers of component prefixes are contained in an unordered structure which has a different type than the ordered ASN sequence of the AS path attribute. The need for such a structure is to avoid possible propagation loops due to missing information on which ASNs the update has traversed previously. However such an approach obfuscates the real origin and prefix lengths of component prefixes and as a result is directly incompatible with the developments in global routing security mechanisms. Also it is yet another influencing aspect into possible attribute packing conflicts due to different interpretations of what an unordered set of ASNs in fact means. Therefore aggregation resulting in generation of ASN sets (AS_SET and AS_CONFED_SET segments in AS path attribute) is deprecated and should not be used. Receipt of an update carrying such segments should be treated as a withdraw due to a recoverable error (RFC7606), and no announcements carrying ASN set segments can be advertised. This does not deprecate the aggregation of component prefixes as such, but only the generation of ASN set segments. Both aggregation within an AS and proxy aggregation can be deployed as designed, and the fact of aggregation is indicated by the AGGREGATOR path attribute carrying the ASN and RID of the node that performed the aggregation – same as before, just omitting the addition of ASN set segment. The loop avoidance is ensured by controlling the advertisement of the resulting covering aggregate prefix – it must not be advertised to any of the origins of component prefixes. Overall this is not a new concept, RFC6472 recommended against advertising ASN sets but did not change the behaviour of the receiving side. The amount of ASN sets seen in the global routing system is small enough (such cases do exist, but they are a clear exception or simply a neglect to clean the configuration up) to justify a more strict set of rules that would remove the ambiguity of interpretation of prefix origin. Extended messages (RFC 8654). BGP message size is limited to 4096 octets (PDU size should not be confused with link and packet layer MTU sizes and transport window size), and that might not be enough in some cases. BGP PDUs do not have any mechanism for fragmentation, and therefore a set of path attributes that does not fit into the message cannot be advertised at all. In addition, attribute packing is an efficient way of speeding up the convergence of BGP, and the PDU size limitation puts an upper bound on the balance of how many NLRIs can be advertised together with the path attributes. New address families may carry larger NLRI elements and contain more or larger attributes, and therefore 4K octet limit may be not enough. BGP message encoding allows for a larger size, it is a historical limit that is now being lifted. Extended messages mechanism defines a new capability that needs to be configured and exchanged between the peers and if both sides agree, they can use messages up to 65535 octets for BGP signalling. Open message is excluded for backwards compatibility reasons, and a large keepalive message just does not make practical sense. Update, notification, refresh signalling, and potentially other newly defined messages may use this mechanism for exchanging both larger size objects and larger amounts of objects. Of particular note is the handling of notification message – while the overall size of the message now may be larger, so can be the size of notification data, and it cannot exceed the negotiated total limit of 4096 or 65535 octets. Extended optional parameters (RFC9072). BGP Open message carries capabilities – a set of parameters that are exchanged between peers for finding out common operational modes and their corresponding parameters. The encoding used historically had a single octet length field for both total length of all parameters and for a length of each individual parameter, and therefore practically limited the amount of capabilities and their parameters that can be exchanged. Given the trends in increasing the amount of address families and their configuration parameters, the usability features carrying human readable information such as host names and version information, and supported BGP feature indicators, a mechanism that would allow for a larger capability size is needed. The overall approach of this extension is by defining a new optional parameter having a specific length which acts as an indicator that a new format of container is used for encoding individual optional parameters (BGP capability is a type of optional parameter). No changes are made to the actual optional parameters carried, it is just a container that is larger. This change is unambiguous to a speaker that does not understand the new encoding – it will result in an error indicating a presence of an unsupported optional parameter. This mechanism allows for slightly above 4K octets of usable space for optional open parameters – should be enough for everyone. Dynamic capabilities (draft-ietf-idr-dynamic-cap). Capabilities provide an ability for parametrizing a set of BGP operational parameters during initial session startup. Once negotiated, capabilities and their corresponding parameters stay constant for the duration of the BGP session without any protocol-level ability to adjust it if needed. Dynamic capabilities introduce a two-way capability parameter synchronization mechanism without requiring a session bringdown. This is implemented by means of a new protocol message that carries a list of potentially negotiable capabilities and a request-response type of negotiation between the peers. While this mechanism by itself allows for renegotiation of any BGP capabilities after the initial session establishment, not all of such negotiations would be practical or even technically feasible. Enabling a new address family without bringing down an already established session might be both practical and easy to implement, while disabling an already established address family may result in logical dependency conflicts that would render the remaining address families unusable. Changing already negotiated timer parameters is easy, while enabling functionality such as additional paths may not be technically feasible – those all are implementation dependent aspects and would limit the practical breadth of applicability of dynamic capabilities. Send hold timer (draft-ietf-idr-bgp-sendholdtimer). BGP transport session termination results in withdrawal of all received updates – which is a practical way of clearing out the state that has become stale. However, transport session liveness is controlled by the operation of the receive side of the connection – a timeout in receiving of any message from the remote peer is treated as transport failure. It is not the case for the transmit side of the connection though, and a scenario where a remote peer happily sends out periodic keepalives but fails to process any incoming messages from the local peer would result in keeping the potentially stale received information on a local peer. The concept of a send hold timer tracks the local transport endpoint activity on the transmit side and if no locally generated messages can be sent for a timer interval, local peer will initiate a session teardown and clear out all the state received from the remote peer. Optimal route reflection (RFC 9107). Reflectors represent a universally used mechanism for reducing the amount of state to be transferred throughout the AS, their usage patterns are well understood, as well as some limitations. This proposal addresses one of them – the path selection as performed by the reflector is not necessarily an optimal one if that same selection were to be performed by the reflector client itself. If BGP and forwarding topologies are not congruent (which is the case in many reflector deployments), the path selection will be influenced by the metrics relevant and observed by the reflector itself and not by the reflector client. Given that the number of paths to be selected from is limited by a reflector, a client has no means for choosing what would have been a more optimal path from its own perspective. From the perspective of a reflector the differences would lie in the per-client path selection (which may be different due to different policies being used for different clients), and interpretation of IGP metric from the perspective of a particular client and not of a reflector itself. There are no changes required to be performed on the client side for this mechanism to work, while a reflector would need to have a more detailed visibility into the IGP topology for deriving a proper next hop cost for a prefix from a perspective of a reflector client. In addition a path selection process on a reflector would need to be performed individually per client or per group of clients sharing the same reflection policy. Wide BGP communities (draft-ietf-idr-wide-bgp-communities). Standard communities, extended communities, large communities – haven’t we got enough of different flavours of communities for expressing the policy constructs? It appears that we in fact haven’t. The limiting factor appears to be the ability to express actions and parameters for those actions in a reasonably scalable and extensible way. Standard and large communities form a functionally equivalent pair, with large communities primarily addressing the 32 bit ASN clean signalling; extended communities mostly deal with address families other than global unicast and also lack sufficient flexibility for carrying information elements that have semantic interpretation differing from a single plain 32 bit field. The underlying base for wide communities is a new BGP path attribute that acts as a container for community sub-objects, and wide communities are the first actual user of this container infrastructure. Container attribute itself is optional transitive, and individual sub-objects may have a finer level of transitivity control, thus allowing for more controllable attribute propagation. The overall format of wide communities is <Community>:<Source ASN>:<Target ASN>:<variable length parameters>, with Community being the actual community value, Source ASN indicating the AS that is originating this community, Target ASN indicating the AS that is supposed to interpret and react on the community, and then followed by a variable length and format set of parameters that are interpreted in the context of a community and target ASN namespaces. Wide communities also define a parameterized matching mechanism for indicating whether the community should or should not be acted upon based on a set of criteria matching or not matching upon the specific parameters. The actual parameters used for wide community policy include ASN lists, IPv4 and IPv6 prefix lists, uint32 and IEEE 754 fp32 number lists, neighbour class list, an UTF-8 string, and also a user-defined binary object having a free interpretation. Extended admin shutdown communication (RFC 9003). RFC8302 defined a mechanism for sending a human-readable message for several Notification Cease subcodes, for a form of “in-band” message channel for BGP session shutdown. The initial message length of 128 octets appears to be too limited in the context of multibyte encodings, therefore this extension lifts the limitation to 255 octets (but not necessarily characters!). The message must be carried in a valid UTF-8 encoding, and it is not for the receiving router to try to make sense of it – it is to be presented to the operator as is. Cease notification due to BFD session going down (RFC9384). BFD is a universally deployed mechanism for tracking data plane liveness, and BFD session state can also be propagated into control plane protocols for speeding up their reaction to data plane failures. BGP is not an exception to this mechanism, and it just works. When a BGP session goes down for some reason, peer sends out a Cease message that provides some information on the reason why the session is going down. This extension defines a subcode indicating that the session was brought down due to the underlying BFD session going down too. It may well be the case that a remote peer will not be able to receive this notification, but the local peer will contain an indication that the session was brought down due to BFD failure. BGP graceful restart for notification messages (RFC 8538). BGP graceful restart (RFC4724) allows for retaining the forwarding state while the actual BGP session is restarting – except for when the session was brought down due to a notification. Having an ability to retain the state in case of protocol errors that are recoverable in some way appears to be of value for maintaining the stability and reducing the amount of state that needs to be propagated around. The core of this extension is exactly this – for some error scenarios GR retains the forwarding state while BGP sessions recover after the error that resulted in notification being sent. Not all errors can be treated this way – only those that are of a temporary nature, such as a remote peer running out of resources or transport having intermittent problems. Long-lived BGP graceful restart (draft-ietf-idr-long-lived-gr). BGP graceful restart functionality (RFC4724) has been around for a while and is widely deployed. There is a limit of time for which the stale routing information can be retained by the BGP speaker, and that limit has the upper bound of 4K seconds – for a simple reason that a field used for signalling that value has got 12 bits. While an interval of more than an hour for a remote peer to come back up might seem reasonably long, there are use cases where it would be beneficial to retain a stale routing information for a longer time, and primarily to avoid propagating the withdrawals for the prefixes affected by the GR, at a cost and risk of potential blackholing of a traffic destined to those prefixes. Extending the timer value namespace is trivial, and that is precisely what is done by this specification. Keeping stale routing information for extended periods of time might be a bit more dangerous, therefore prefixes covered by the long lived GR are also marked by a specific community value indicating that they should be treated as a last resort for best path selection and also can be propagated only to peers that also support long lived GR. Peer roles (RFC9234). BGP does not define a semantic relationship between peers – that is just a session over which prefixes can be advertised. What is the relationship of those peers and whether they in fact are allowed to exchange any routes learned from various sources historically was not tied to the actual BGP session and was left to the domain of policy implementation. This extension defines a set of mechanisms for specifying and validating the roles of BGP peers and the prefixes they are allowed to announce. Peers have roles defined based on their type and place in the network (a customer, a provider, a route server, a generic peer among the others) which get exchanged during the session establishment. If roles disagree the session is not allowed to come up in the first place; if roles allow for session to be established then depending on the actual role routes advertised get an additional path attribute that indicates the class of an advertising peer. Quite a similar mechanism for route leak detection can be implemented by using community tagging – and while the overall logic of peer roles is the same, the implementation is different: community needs to be acted upon by the policy, and if the policy is not configured properly or simply does not exist at all then such method will not work at all. A dedicated path attribute can be advertised and acted upon by the implementation not based on a user configurable policy and be active all the time regardless of the policy configuration. Policy can be applied on top of what is allowed in based on the peer roles, but peer roles have priority. This mechanism is implemented as a capability for session establishment with a set of role pairs that are allowed, and also as an additional path attribute that gets added to advertised routes and can be acted upon by the policy of the receiving peer. Well-known large communities (draft-heitz-idr-wklc). Large communities enjoy a wide deployment, and that same wide deployment starts to bring in some requirements for an additional functionality, specifically limiting propagation scope and avoiding conflicts in assigning function identifiers. Large communities are a direct replacement of standard BGP communities and as a result they do not have any structure of interpretation of the values carried – it is just an AS number in the Global Administrator field. The proposal is to reserve a set of ASNs for the purpose of being used as well-known large community identifiers and also for control of propagation scope, leaving a total of 10 octets for use within a context of a particular WKLC. This appears to be quite controversial, both on the aspect of reserving a significant portion of 32 bit ASN space, and also trying to control the propagation of a transitive path attribute based on a value of that same attribute. However, the functionality appears to be needed, and it might be a right time to restart a discussion on defining an equivalent of extended communities for 32 bit ASN clean operation. AS path prepending (draft-ietf-grow-as-path-prepending). More does not necessarily mean better. AS path prepending as a policy mechanism to influence path selection is well known and is universally deployed. Increasing the length of AS path by prepending ASN more than once decreases the probability of such path being selected as best. The whole question is how much to prepend in order to achieve the intended depreference of a path, especially in the conditions of everyone else effectively doing the same, and not to become too vulnerable to intentionally crafted shorter AS paths. It is not uncommon to see paths with multiples of tens of prepends in the global routing table – that is not surprising as AS path is a transitive attribute and it is strictly not allowed to remove ASNs from the received path. This can lead to a situation when any other – including intentionally crafted – AS path is seen as more preferred due to having a shorter length, and prepending yet more times only makes such types of attacks easier. Signalling of the policy intent to the remote peers is recommended to be implemented via specifically allocated communities or other path attributes, and prepending should be used only when there are no other alternatives available. Maximum prefix limits (draft-sas-idr-maxprefix-inbound, draft-sas-idr-maxprefix-outbound). The number of prefixes received by the peer and advertised to other peers depends on the role and the place in the network of a particular BGP speaker. Generally those numbers are quite specifically bounded – a leaf site is not supposed to advertise a full global table, and a peer in the exchange should not advertise substantially larger amounts or prefixes than what it originates. A counter based mechanism for controlling the number of received prefixes is supported by virtually all BGP implementations. There are some deficiencies though – it may be that the large amount of prefixes received from the remote peer will be rejected by the inbound policy, and while keeping such rejected prefixes is a handy optimization for speeding up the convergence in case of inbound policy changes, the storage and processing of such rejected prefixes does not come for free. In addition, refresh signalling could be used for requesting only a specific set of prefixes to be readvertised if needed. Another aspect is the number of prefixes accepted by the inbound policy – for various reasons, including operator errors, the number of such prefixes may end up being larger than it should be. On the sending side, there is also a need for a mechanism to limit the number of prefixes past the outbound policy that will get advertised to a remote peer. This results in three separate counters – inbound pre-policy, inbound post-policy, and outbound post-policy - that together can control the tolerable amount of prefixes at various points of the BGP speaker processing. A twin set of documents defines a recommended session shutdown and notification of the remote side with an appropriate cease error to indicate the specific reason. BMP support for local RIB monitoring (draft-ietf-grow-bmp-local-rib). BMP provides a view into input and output BGP RIBs but lacks a mechanism to transport all local RIB routes (all local routes meaning the full view of the local RIB after the path selection process, not only the routes imported into BGP context from other sources). Portions of such view can be derived from the information available via input RIB monitoring (likely requiring a coordinated monitoring of multiple nodes), however that may result in a notable amount of data to be filtered through, would require access to entities and state outside of BGP context, and still may lack to provide a specific sequence of events that happened during topology convergence. A dedicated mechanism for exporting information about all the prefixes contained in the local RIB is defined by means of a new type of BMP peer logically representing the contents of a local RIB. From the perspective of BMP protocol processing there are no logical changes to the usual operation of BMP route monitoring functionality – local RIB routes would be represented as being received from an emulated peer bound to a specific instance of a local RIB on a node. More BMP TLVs (draft-ietf-grow-bmp-tlv). This is a framework document for defining an extensibility mechanism for BMP route monitoring messages in order to be able to carry additional and structured information within BMP. Initially BMP defined a fixed packet format for route monitoring messages, and deployment experience and evolving uses of BMP have indicated a need to convey additional information elements that were not thought of at the initial design time of BMP or may be specific to a particular implementation. BMP has a TLV based encoding mechanism from the start for most of its messages, but not for route monitoring. Therefore this simple extension mechanism allows for a TLV based encoding to be used for all BMP messages. Autonomous System Provider Authorization (draft-ietf-sidrops-aspa-profile, draft-ietf-sidrops-aspa-verification). Origin validation provides a practical and reasonable level of verification of origination of prefixes, but the propagation path of those prefixes once originated is difficult to validate and protect from both unintended errors and malicious attacks. The tree-like nature of BGP peerings may be used for building sets of adjacency lists, treating one AS as a customer, and its peers as providers. This provides a 1:n relationship between a particular AS and its peers, and a distributed collection of such relationships forms a foundation for AS path validation in terms of checking whether adjacent pairs of AS numbers in fact have a customer-provider relationship. ASPA object is yet another object type in the RPKI infrastructure, and therefore existing mechanisms of RPKI used for origin validation would require only modest extensions in order to distribute path validation information. The validation outcome from the perspective of routing policy would result in already familiar states of “valid”, “invalid”, and “unknown” related to AS path attributes contained in received announcements. RTR extensions (draft-ietf-sidrops-8210bis). RTR is a protocol used between a router and a cache for distribution of RPKI data objects. ASPA brings in a requirement for distributing AS path attestation objects to routers, and it is a simple extension to RTR for carrying yet another object type – and this set of extensions defines RTR protocol version 2. The overall protocol mechanics is equivalent to the lower versions (version 0 is specified in RFC6810, and version 1 is specified in RFC8210), and is based on the concept of a router controlling the pull in of the validation information instead of a cache pushing it out towards the router. Operation starts with a maximum supported version and can negotiate a lower backwards compatible protocol version if required during the session startup, and stays at the negotiated version for a lifetime of a session. Deployment experience has also identified several synchronization corner cases in the cache content transfer in the presence of dynamic changes of that content. ROAs for longer prefixes should be advertised before ROAs for corresponding shorter covering prefixes, and multiple ROAs for the same prefix should be advertised consecutively. -------------- next part -------------- An HTML attachment was scrubbed... URL: </ripe/mail/archives/routing-wg/attachments/20230613/7f2222ae/attachment-0001.html>
- Previous message (by thread): [routing-wg] Weekly Global IPv4 Routing Table Report
- Next message (by thread): [routing-wg] RPKI Quarterly Planning Q3 2023
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]