| < draft-ietf-grow-route-leak-detection-mitigation-06.txt | draft-ietf-grow-route-leak-detection-mitigation-07.txt > | |||
|---|---|---|---|---|
| IDR and SIDR K. Sriram, Ed. | IDR and SIDR K. Sriram, Ed. | |||
| Internet-Draft USA NIST | Internet-Draft USA NIST | |||
| Intended status: Standards Track A. Azimov, Ed. | Intended status: Standards Track A. Azimov, Ed. | |||
| Expires: 27 April 2022 Yandex | Expires: 28 October 2022 Yandex | |||
| 24 October 2021 | 26 April 2022 | |||
| Methods for Detection and Mitigation of BGP Route Leaks | Methods for Detection and Mitigation of BGP Route Leaks | |||
| draft-ietf-grow-route-leak-detection-mitigation-06 | draft-ietf-grow-route-leak-detection-mitigation-07 | |||
| Abstract | Abstract | |||
| Problem definition for route leaks and enumeration of types of route | Problem definition for route leaks and enumeration of types of route | |||
| leaks are provided in RFC 7908. This document describes a new well- | leaks are provided in RFC 7908. This document describes a new well- | |||
| known Large Community that provides a way for route-leak prevention, | known Large Community that provides a way for route-leak prevention, | |||
| detection, and mitigation. The configuration process for this | detection, and mitigation. The configuration process for this | |||
| Community can be automated with the methodology for setting BGP roles | Community can be automated with the methodology for setting BGP roles | |||
| that is described in ietf-idr-bgp-open-policy draft. | that is described in ietf-idr-bgp-open-policy draft. | |||
| skipping to change at page 1, line 36 ¶ | skipping to change at page 1, line 36 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 27 April 2022. | This Internet-Draft will expire on 28 October 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| and restrictions with respect to this document. Code Components | and restrictions with respect to this document. Code Components | |||
| extracted from this document must include Simplified BSD License text | extracted from this document must include Revised BSD License text as | |||
| as described in Section 4.e of the Trust Legal Provisions and are | described in Section 4.e of the Trust Legal Provisions and are | |||
| provided without warranty as described in the Simplified BSD License. | provided without warranty as described in the Revised BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 | 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Peering Relationships . . . . . . . . . . . . . . . . . . . . 3 | 2. Peering Relationships . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Community vs Attribute . . . . . . . . . . . . . . . . . . . 4 | 3. Community vs Attribute . . . . . . . . . . . . . . . . . . . 4 | |||
| 4. Down Only Community . . . . . . . . . . . . . . . . . . . . . 4 | 4. Down Only Community . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 4.1. Route-Leak Mitigation . . . . . . . . . . . . . . . . . . 5 | 4.1. Route-Leak Mitigation . . . . . . . . . . . . . . . . . . 5 | |||
| 4.2. Only Marking . . . . . . . . . . . . . . . . . . . . . . 6 | 4.2. Only Marking . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| skipping to change at page 8, line 49 ¶ | skipping to change at page 8, line 49 ¶ | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| 8.2. Informative References | 8.2. Informative References | |||
| [I-D.ietf-idr-bgp-open-policy] | [I-D.ietf-idr-bgp-open-policy] | |||
| Azimov, A., Bogomazov, E., Bush, R., Patel, K., and K. | Azimov, A., Bogomazov, E., Bush, R., Patel, K., and K. | |||
| Sriram, "Route Leak Prevention and Detection using Roles | Sriram, "Route Leak Prevention and Detection using Roles | |||
| in UPDATE and OPEN Messages", Work in Progress, Internet- | in UPDATE and OPEN Messages", Work in Progress, Internet- | |||
| Draft, draft-ietf-idr-bgp-open-policy-17, 13 October 2021, | Draft, draft-ietf-idr-bgp-open-policy-24, 1 April 2022, | |||
| <https://www.ietf.org/archive/id/draft-ietf-idr-bgp-open- | <https://www.ietf.org/archive/id/draft-ietf-idr-bgp-open- | |||
| policy-17.txt>. | policy-24.txt>. | |||
| [RFC4264] Griffin, T. and G. Huston, "BGP Wedgies", RFC 4264, | [RFC4264] Griffin, T. and G. Huston, "BGP Wedgies", RFC 4264, | |||
| DOI 10.17487/RFC4264, November 2005, | DOI 10.17487/RFC4264, November 2005, | |||
| <https://www.rfc-editor.org/info/rfc4264>. | <https://www.rfc-editor.org/info/rfc4264>. | |||
| [RFC7908] Sriram, K., Montgomery, D., McPherson, D., Osterweil, E., | [RFC7908] Sriram, K., Montgomery, D., McPherson, D., Osterweil, E., | |||
| and B. Dickson, "Problem Definition and Classification of | and B. Dickson, "Problem Definition and Classification of | |||
| BGP Route Leaks", RFC 7908, DOI 10.17487/RFC7908, June | BGP Route Leaks", RFC 7908, DOI 10.17487/RFC7908, June | |||
| 2016, <https://www.rfc-editor.org/info/rfc7908>. | 2016, <https://www.rfc-editor.org/info/rfc7908>. | |||
| End of changes. 7 change blocks. | ||||
| 10 lines changed or deleted | 10 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||