idnits 2.17.1 draft-ietf-idr-ix-bgp-route-server-04.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- No issues found here. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the IETF Trust and authors Copyright Line does not match the current year -- The document date (March 3, 2014) is 3699 days in the past. Is this intentional? Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) == Outdated reference: A later version (-15) exists of draft-ietf-idr-add-paths-09 Summary: 0 errors (**), 0 flaws (~~), 2 warnings (==), 1 comment (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 2 IDR Working Group E. Jasinska 3 Internet-Draft Netflix, Inc 4 Intended status: Standards Track N. Hilliard 5 Expires: September 4, 2014 INEX 6 R. Raszuk 7 NTT MCL Inc. 8 N. Bakker 9 Akamai Technologies B.V. 10 March 3, 2014 12 Internet Exchange Route Server 13 draft-ietf-idr-ix-bgp-route-server-04 15 Abstract 17 This document outlines a specification for multilateral 18 interconnections at Internet exchange points (IXPs). Multilateral 19 interconnection is a method of exchanging routing information between 20 three or more exterior BGP speakers using a single intermediate 21 broker system, referred to as a route server. Route servers are 22 typically used on shared access media networks, such as Internet 23 exchange points (IXPs), to facilitate simplified interconnection 24 between multiple Internet routers. 26 Status of This Memo 28 This Internet-Draft is submitted in full conformance with the 29 provisions of BCP 78 and BCP 79. 31 Internet-Drafts are working documents of the Internet Engineering 32 Task Force (IETF). Note that other groups may also distribute 33 working documents as Internet-Drafts. The list of current Internet- 34 Drafts is at http://datatracker.ietf.org/drafts/current/. 36 Internet-Drafts are draft documents valid for a maximum of six months 37 and may be updated, replaced, or obsoleted by other documents at any 38 time. It is inappropriate to use Internet-Drafts as reference 39 material or to cite them other than as "work in progress." 41 This Internet-Draft will expire on September 4, 2014. 43 Copyright Notice 45 Copyright (c) 2014 IETF Trust and the persons identified as the 46 document authors. All rights reserved. 48 This document is subject to BCP 78 and the IETF Trust's Legal 49 Provisions Relating to IETF Documents 50 (http://trustee.ietf.org/license-info) in effect on the date of 51 publication of this document. Please review these documents 52 carefully, as they describe your rights and restrictions with respect 53 to this document. Code Components extracted from this document must 54 include Simplified BSD License text as described in Section 4.e of 55 the Trust Legal Provisions and are provided without warranty as 56 described in the Simplified BSD License. 58 Table of Contents 60 1. Introduction to Multilateral Interconnection . . . . . . . . 2 61 1.1. Notational Conventions . . . . . . . . . . . . . . . . . 3 62 2. Technical Considerations for Route Server Implementations . . 3 63 2.1. Client UPDATE Messages . . . . . . . . . . . . . . . . . 3 64 2.2. Attribute Transparency . . . . . . . . . . . . . . . . . 4 65 2.2.1. NEXT_HOP Attribute . . . . . . . . . . . . . . . . . 4 66 2.2.2. AS_PATH Attribute . . . . . . . . . . . . . . . . . . 4 67 2.2.3. MULTI_EXIT_DISC Attribute . . . . . . . . . . . . . . 4 68 2.2.4. Communities Attributes . . . . . . . . . . . . . . . 5 69 2.3. Per-Client Policy Control in Multilateral Interconnection 5 70 2.3.1. Path Hiding on a Route Server . . . . . . . . . . . . 5 71 2.3.2. Mitigation of Path Hiding . . . . . . . . . . . . . . 6 72 2.3.2.1. Multiple Route Server RIBs . . . . . . . . . . . 6 73 2.3.2.2. Advertising Multiple Paths . . . . . . . . . . . 7 74 2.3.3. Implementation Recommendations . . . . . . . . . . . 8 75 3. Security Considerations . . . . . . . . . . . . . . . . . . . 8 76 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 77 5. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 8 78 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 79 6.1. Normative References . . . . . . . . . . . . . . . . . . 9 80 6.2. Informative References . . . . . . . . . . . . . . . . . 9 81 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 83 1. Introduction to Multilateral Interconnection 85 Internet exchange points (IXPs) provide IP data interconnection 86 facilities for their participants, typically using shared Layer-2 87 networking media such as Ethernet. The Border Gateway Protocol (BGP) 88 [RFC4271], an inter-Autonomous System routing protocol, is commonly 89 used to facilitate exchange of network reachability information over 90 such media. 92 While bilateral exterior BGP sessions between exchange participants 93 were previously the most common means of exchanging reachability 94 information, the overhead associated with dense interconnection has 95 caused substantial operational scaling problems for Internet exchange 96 point participants. 98 Multilateral interconnection is a method of interconnecting BGP 99 speaking routers using a third party brokering system, commonly 100 referred to as a route server and typically managed by the IXP 101 operator. Each of the multilateral interconnection participants 102 (usually referred to as route server clients) announces network 103 reachability information to the route server using exterior BGP, and 104 the route server in turn forwards this information to each other 105 route server client connected to it, according to its configuration. 106 Although a route server uses BGP to exchange reachability information 107 with each of its clients, it does not forward traffic itself and is 108 therefore not a router. 110 A route server can be viewed as similar in function to an [RFC4456] 111 route reflector, except that it operates using EBGP instead of iBGP. 112 Certain adaptions to [RFC4271] are required to enable an EBGP router 113 to operate as a route server; these are outlined in Section 2 of this 114 document. 116 The term "route server" is often in a different context used to 117 describe a BGP node whose purpose is to accept BGP feeds from 118 multiple clients for the purpose of operational analysis and 119 troubleshooting. A system of this form may alternatively be known as 120 a "route collector" or a "route-views server". This document uses 121 the term "route server" exclusively to describe multilateral peering 122 brokerage systems. 124 1.1. Notational Conventions 126 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 127 "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and 128 "OPTIONAL" in this document are to be interpreted as described in 129 [RFC2119]. 131 2. Technical Considerations for Route Server Implementations 133 2.1. Client UPDATE Messages 135 A route server MUST accept all UPDATE messages received from each of 136 its clients for inclusion in its Adj-RIB-In. These UPDATE messages 137 MAY be omitted from the route server's Loc-RIB or Loc-RIBs, due to 138 filters configured for the purposes of implementing routing policy. 139 The route server SHOULD perform one or more BGP Decision Processes to 140 select routes for subsequent advertisement to its clients, taking 141 into account possible configuration to provide multiple NLRI paths to 142 a particular client as described in Section 2.3.2.2 or multiple Loc- 143 RIBs as described in Section 2.3.2.1. The route server SHOULD 144 forward UPDATE messages where appropriate from its Loc-RIB or Loc- 145 RIBs to its clients. 147 2.2. Attribute Transparency 149 As a route server primarily performs a brokering service, 150 modification of attributes could cause route server clients to alter 151 their BGP best path selection process for received prefix 152 reachability information, thereby changing the intended routing 153 policies of exchange participants. Therefore, contrary to what is 154 specified in section 5. of [RFC4271], route servers SHOULD NOT by 155 default (unless explicitly configured) update well-known BGP 156 attributes received from route server clients before redistributing 157 them to their other route server clients. Optional recognized and 158 unrecognized BGP attributes, whether transitive or non-transitive, 159 SHOULD NOT be updated by the route server (unless enforced by local 160 IX operator configuration) and SHOULD be passed on to other route 161 server clients. 163 2.2.1. NEXT_HOP Attribute 165 The NEXT_HOP is a well-known mandatory BGP attribute which defines 166 the IP address of the router used as the next hop to the destinations 167 listed in the Network Layer Reachability Information field of the 168 UPDATE message. As the route server does not participate in the 169 actual routing of traffic, the NEXT_HOP attribute MUST be passed 170 unmodified to the route server clients, similar to the "third party" 171 next hop feature described in section 5.1.3. of [RFC4271]. 173 2.2.2. AS_PATH Attribute 175 AS_PATH is a well-known mandatory attribute which identifies the 176 autonomous systems through which routing information carried in the 177 UPDATE message has passed. 179 As a route server does not participate in the process of forwarding 180 data between client routers, and because modification of the AS_PATH 181 attribute could affect route server client best path calculations, 182 the route server SHOULD NOT prepend its own AS number to the AS_PATH 183 segment nor modify the AS_PATH segment in any other way. 185 2.2.3. MULTI_EXIT_DISC Attribute 187 MULTI_EXIT_DISC is an optional non-transitive attribute intended to 188 be used on external (inter-AS) links to discriminate among multiple 189 exit or entry points to the same neighboring AS. Contrary to section 190 5.1.4 of [RFC4271], if applied to an NLRI UPDATE sent to a route 191 server, this attribute SHOULD be propagated to other route server 192 clients and the route server SHOULD NOT modify its value. 194 2.2.4. Communities Attributes 196 The BGP COMMUNITIES ([RFC1997]) and Extended Communities ([RFC4360]) 197 attributes are attributes intended for labeling information carried 198 in BGP UPDATE messages. Transitive as well as non-transitive 199 Communities attributes applied to an NLRI UPDATE sent to a route 200 server SHOULD NOT be modified, processed or removed. However, if 201 such an attribute is intended for processing by the route server 202 itself, it MAY be modified or removed. 204 2.3. Per-Client Policy Control in Multilateral Interconnection 206 While IXP participants often use route servers with the intention of 207 interconnecting with as many other route server participants as 208 possible, there are circumstances where control of path distribution 209 on a per-client basis is important to ensure that desired 210 interconnection policies are met. 212 The control of path distribution on a per-client basis can lead to a 213 path being hidden from the route server client. We refer to this as 214 "path hiding". 216 2.3.1. Path Hiding on a Route Server 218 ___ ___ 219 / \ / \ 220 ..| AS1 |..| AS2 |.. 221 : \___/ \___/ : 222 : \ / | : 223 : \ / | : 224 : IXP \/ | : 225 : /\ | : 226 : / \ | : 227 : ___/____\_|_ : 228 : / \ / \ : 229 ..| AS3 |..| AS4 |.. 230 \___/ \___/ 232 Figure 1: Per-Client Policy Controlled Interconnection at an IXP 234 Using the example in Figure 1, AS1 does not directly exchange prefix 235 information with either AS2 or AS3 at the IXP, but only interconnects 236 with AS4. 238 In the traditional bilateral interconnection model, per-client policy 239 control to a third party exchange participant is accomplished either 240 by not engaging in a bilateral interconnection with that participant 241 or else by implementing outbound filtering on the BGP session towards 242 that participant. However, in a multilateral interconnection 243 environment, only the route server can perform outbound filtering in 244 the direction of the route server client; route server clients depend 245 on the route server to perform their outbound filtering for them. 247 Assuming a traditional best path selection, when the same prefix is 248 advertised to a route server from multiple route server clients, the 249 route server will select a single best path for propagation to all 250 connected clients. If, however, the route server has been configured 251 to filter the calculated best path from reaching a particular route 252 server client, then that client will not receive a path for that 253 prefix, although alternate paths received by the route server might 254 have been policy compliant for that client. This phenomenon is 255 referred to as "path hiding". 257 For example, in Figure 1, if the same prefix were sent to the route 258 server via AS2 and AS4, and the route via AS2 was preferred according 259 to BGP's traditional best path selection, but AS1's policy prevents 260 AS2's path from being accepted, then AS1 would never receive a path 261 to this prefix, even though the route server had previously received 262 a valid alternative path via AS4. This happens because the best path 263 selection is performed only once on the route server for all clients. 265 Path hiding will only occur on route servers which employ per-client 266 policy control; if an IXP operator deploys a route server without 267 implementing a per-client routing policy control system, then path 268 hiding does not occur as all paths are considered equally valid from 269 the point of view of the route server. 271 2.3.2. Mitigation of Path Hiding 273 There are several approaches which can be taken to mitigate against 274 path hiding. 276 2.3.2.1. Multiple Route Server RIBs 278 The most portable method to allow for per-client policy control 279 without the occurrence of path hiding, is by using a route server BGP 280 implementation which performs the per-client best path calculation 281 for each set of paths to a prefix, which results after the route 282 server's client policies have been taken into consideration. This 283 can be implemented by using per-client Loc-RIBs, with path filtering 284 implemented between the Adj-RIB-In and the per-client Loc-RIB. 285 Implementations MAY optimize this by maintaining paths not subject to 286 filtering policies in a global Loc-RIB, with per-client Loc-RIBs 287 stored as deltas. 289 This implementation is highly portable, as it makes no assumptions 290 about the feature capabilities of the route server clients. 292 2.3.2.2. Advertising Multiple Paths 294 The path distribution model described above assumes standard BGP 295 session encoding where the route server sends a single path to its 296 client for any given prefix. This path is selected using the BGP 297 path selection decision process described in [RFC4271]. If, however, 298 it were possible for the route server to send more than a single path 299 to a route server client, then route server clients would no longer 300 depend on receiving a single best path to a particular prefix; 301 consequently, the path hiding problem described in Section 2.3.1 302 would disappear. 304 We present two methods which describe how such increased path 305 diversity could be implemented. 307 2.3.2.2.1. Diverse BGP Path Approach 309 The Diverse BGP Path proposal as defined in 310 [I-D.ietf-grow-diverse-bgp-path-dist] is a simple way to distribute 311 multiple prefix paths from a route server to a route server client by 312 using a separate BGP session from the route server to a client for 313 each different path. 315 The number of paths which may be distributed to a client is 316 constrained by the number of BGP sessions which the server and the 317 client are willing to establish with each other. The distributed 318 paths may be established from the global BGP Loc-RIB on the route 319 server in addition to any per-client Loc-RIB. As there may be more 320 potential paths to a given prefix than configured BGP sessions, this 321 method is not guaranteed to eliminate the path hiding problem in all 322 situations. Furthermore, this method may significantly increase the 323 number of BGP sessions handled by the route server, which may 324 negatively impact its performance. 326 2.3.2.2.2. BGP ADD-PATH Approach 328 The [I-D.ietf-idr-add-paths] Internet draft proposes a different 329 approach to multiple path propagation, by allowing a BGP speaker to 330 forward multiple paths for the same prefix on a single BGP session. 331 As [RFC4271] specifies that a BGP listener must implement an implicit 332 withdraw when it receives an UPDATE message for a prefix which 333 already exists in its Adj-RIB-In, this approach requires explicit 334 support for the feature both on the route server and on its clients. 336 If the ADD-PATH capability is negotiated bidirectionally between the 337 route server and a route server client, and the route server client 338 propagates multiple paths for the same prefix to the route server, 339 then this could potentially cause the propagation of inactive, 340 invalid or suboptimal paths to the route server, thereby causing loss 341 of reachability to other route server clients. For this reason, ADD- 342 PATH implementations on a route server SHOULD enforce send-only mode 343 with the route server clients, which would result in negotiating 344 receive-only mode from the client to the route server. 346 2.3.3. Implementation Recommendations 348 A route server SHOULD implement one of the methods described in 349 Section 2.3.2 to allow per-client routing policy control without 350 "path hiding". 352 3. Security Considerations 354 The path hiding problem outlined in section Section 2.3.1 can be used 355 in certain circumstances to proactively block third party path 356 announcements from other route server clients. Route server 357 operators should be aware that security issues may arise unless steps 358 are taken to mitigate against path hiding. 360 4. IANA Considerations 362 The new set of mechanisms for route servers does not require any new 363 allocations from IANA. 365 5. Acknowledgments 367 The authors would like to thank Ryan Bickhart, Steven Bakker, Martin 368 Pels, Chris Hall, Aleksi Suhonen, Bruno Decraene, Pierre Francois and 369 Eduardo Ascenco Reis for their valuable input. 371 In addition, the authors would like to acknowledge the developers of 372 BIRD, OpenBGPD and Quagga, whose open source BGP implementations 373 include route server capabilities which are compliant with this 374 document. 376 6. References 377 6.1. Normative References 379 [RFC1997] Chandrasekeran, R., Traina, P., and T. Li, "BGP 380 Communities Attribute", RFC 1997, August 1996. 382 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 383 Requirement Levels", BCP 14, RFC 2119, March 1997. 385 [RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway 386 Protocol 4 (BGP-4)", RFC 4271, January 2006. 388 [RFC4360] Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended 389 Communities Attribute", RFC 4360, February 2006. 391 6.2. Informative References 393 [I-D.ietf-grow-diverse-bgp-path-dist] 394 Raszuk, R., Fernando, R., Patel, K., McPherson, D., and K. 395 Kumaki, "Distribution of diverse BGP paths.", draft-ietf- 396 grow-diverse-bgp-path-dist-08 (work in progress), July 397 2012. 399 [I-D.ietf-idr-add-paths] 400 Walton, D., Retana, A., Chen, E., and J. Scudder, 401 "Advertisement of Multiple Paths in BGP", draft-ietf-idr- 402 add-paths-09 (work in progress), October 2013. 404 [RFC4456] Bates, T., Chen, E., and R. Chandra, "BGP Route 405 Reflection: An Alternative to Full Mesh Internal BGP 406 (IBGP)", RFC 4456, April 2006. 408 Authors' Addresses 410 Elisa Jasinska 411 Netflix, Inc 412 100 Winchester Circle 413 Los Gatos, CA 95032 414 USA 416 Email: elisa@netflix.com 417 Nick Hilliard 418 INEX 419 4027 Kingswood Road 420 Dublin 24 421 IE 423 Email: nick@inex.ie 425 Robert Raszuk 426 NTT MCL Inc. 427 101 S Ellsworth Avenue Suite 350 428 San Mateo, CA 94401 429 US 431 Email: robert@raszuk.net 433 Niels Bakker 434 Akamai Technologies B.V. 435 Kingsfordweg 151 436 Amsterdam 1043 GR 437 NL 439 Email: nbakker@akamai.com