Global Routing Operations (grow) Internet Drafts


      
 Methods for Detection and Mitigation of BGP Route Leaks
 
 draft-ietf-grow-route-leak-detection-mitigation-12.txt
 Date: 25/02/2025
 Authors: Kotikalapudi Sriram, Alexander Azimov
 Working Group: Global Routing Operations (grow)
Problem definition for route leaks and enumeration of types of route leaks are provided in RFC 7908. This document describes a new well- known Large Community that provides a way for route-leak prevention, detection, and mitigation. The configuration process for this Community can be automated with the methodology for setting BGP roles that is described in RFC 9234.
 BMP v4: TLV Support for BGP Monitoring Prtoocol (BMP) Route Monitoring and Peer Down Messages
 
 draft-ietf-grow-bmp-tlv-16.txt
 Date: 24/02/2025
 Authors: Paolo Lucente, Yunan Gu
 Working Group: Global Routing Operations (grow)
Most of the BGP Monitoring Protocol (BMP) message types make provision for data in Type, Length, Value (TLV) format. However, Route Monitoring messages (which provide a snapshot of the monitored Routing Information Base) and Peer Down messages (which indicate that a peering session was terminated) do not. Supporting (optional) data in TLV format across all BMP message types provides consistent and extensible structures that would be useful among the various use- cases where conveying additional data to a monitoring station is required. This document updates RFC 7854 [RFC7854] to support TLV data in all message types.
 AS Path Prepending
 
 draft-ietf-grow-as-path-prepending-14.txt
 Date: 03/03/2025
 Authors: Mike McBride, Doug Madory, Jeff Tantsura, Robert Raszuk, Hongwei Li, Jakob Heitz, Gyan Mishra
 Working Group: Global Routing Operations (grow)
AS Path Prepending provides a tool to manipulate the BGP AS_PATH attribute through prepending multiple entries of an ASN. AS Path Prepending is used to deprioritize a route or alternate path. By prepending the local ASN multiple times, ASs can make advertised AS paths appear artificially longer. Excessive AS Path Prepending has caused routing issues in the Internet. This document provides guidance for the use of AS Path Prepending, including alternative solutions, in order to avoid negatively affecting the Internet.
 Support for Enterprise-specific TLVs in the BGP Monitoring Protocol
 
 draft-ietf-grow-bmp-tlv-ebit-06.txt
 Date: 17/01/2025
 Authors: Paolo Lucente, Yunan Gu
 Working Group: Global Routing Operations (grow)
Message types defined by the BGP Monitoring Protocol (BMP) do provision for data in TLV - Type, Length, Value - format, either in the shape of a TLV message body, ie. Route Mirroring and Stats Reports, or optional TLVs at the end of a BMP message, ie. Peer Up and Peer Down. However the space for Type value is unique and governed by IANA. To allow the usage of vendor-specific TLVs, a mechanism to define per-vendor Type values is required. In this document we introduce an Enterprise Bit, or E-bit, for such purpose.
 Near Real Time Mirroring (NRTM) version 4
 
 draft-ietf-grow-nrtm-v4-05.txt
 Date: 13/11/2024
 Authors: Sasha Romijn, Job Snijders, Edward Shryane, Stavros Konstantaras
 Working Group: Global Routing Operations (grow)
This document specifies a one-way synchronization protocol for Internet Routing Registry (IRR) records. The protocol allows instances of IRR database servers to mirror IRR records, specified in the Routing Policy Specification Language (RPSL), between each other.
 Logging of routing events in BGP Monitoring Protocol (BMP)
 
 draft-ietf-grow-bmp-rel-03.txt
 Date: 03/03/2025
 Authors: Paolo Lucente, Camilo Cardona
 Working Group: Global Routing Operations (grow)
The BGP Monitoring Protocol (BMP) does provision for BGP session event logging (Peer Up, Peer Down), state synchronization (Route Monitoring), debugging (Route Mirroring) and Statistics messages, among the others. This document defines a new Route Event Logging (REL) message type for BMP with the aim of covering use-cases with affinity to alerting, reporting and on-change analysis.
 A YANG Data Model for BGP Communities
 
 draft-ietf-grow-yang-bgp-communities-04.txt
 Date: 24/03/2025
 Authors: Martin Pels
 Working Group: Global Routing Operations (grow)
This document defines a YANG data model for the structured specification of BGP communities. The model provides operators with a way to publish their locally defined BGP communities in a standardized format.
 Definition For New BGP Monitoring Protocol (BMP) Statistics Types
 
 draft-ietf-grow-bmp-bgp-rib-stats-07.txt
 Date: 21/02/2025
 Authors: Mukul Srivastava, Yisong Liu, Changwang Lin, Jinming Li
 Working Group: Global Routing Operations (grow)
RFC 7854 defines different BGP Monitoring Protocol (BMP) statistics message types to observe events that occur on a monitored router. This document defines new statistics type to monitor BMP Adj-RIB-In and Adj-RIB-Out Routing Information Bases (RIBs).
 Updated BGP Operations and Security
 
 draft-ietf-grow-bgpopsecupd-05.txt
 Date: 24/03/2025
 Authors: Tobias Fiebig, Nick Hilliard
 Working Group: Global Routing Operations (grow)
The Border Gateway Protocol (BGP) is a critical component in the Internet to exchange routing information between network domains. Due to this central nature, it is important to understand the security and reliability requirements that can and should be ensured to prevent accidental or intentional routing disturbances. Previously, security considerations for BGP have been described in RFC7454 / BCP194. Since the publications of RFC7454 / BCP194, several developments and changes in operational practice took place that warrant an update of these best current practices. This document replaces RFC7454 / BCP194, focusing on the overall goals, and providing a less implementation centric set of best practices. To this end, the document describes the security requirements and goals when operating BGP for exchanging routing information with other networks. The document explicitly does not focus on specific technical implementations and requirements. Operators are advised to consult documentation and contemporary informational documents concerning methods to ensure that these properties are sufficiently ensured in their network.
 Recommendation to avoid use of BGP Extended Communities at Internet Exchange Route Servers
 
 draft-ietf-grow-ixp-ext-comms-01.txt
 Date: 07/12/2024
 Authors: Job Snijders, Stavros Konstantaras, Mo Shivji
 Working Group: Global Routing Operations (grow)
This document outlines a recommendation to the Internet operational community to avoid the use of BGP Extended Communities at Internet Exchange Point (IXP) Route Servers. It includes guidance for both the Internet Service Provider side peering with Route Servers and IXPs operating Route Servers. This recommendation aims to help the global Internet routing system's performance and help protect Route Server participants against misconfigurations.
 TCP-AO Protection for BGP Monitoring Protocol (BMP)
 
 draft-ietf-grow-bmp-tcp-ao-01.txt
 Date: 23/02/2025
 Authors: Hemant Sharma, Jeffrey Haas
 Working Group: Global Routing Operations (grow)
This document outlines the utilization of the TCP Authentication Option (TCP-AO), as specified in [RFC5925], for the authentication of BGP Monitoring Protocol (BMP) sessions, as specified in [RFC7854]. TCP-AO provides for the authentication of BMP sessions established between routers and BMP stations at the TCP layer. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/hmntsharma/draft-hmntsharma-bmp-tcp-ao.
 Peering API
 
 draft-ietf-grow-peering-api-00.txt
 Date: 07/12/2024
 Authors: Carlos Aguado, Matt Griswold, Jenny Ramseyer, Arturo Servin, Tom Strickx
 Working Group: Global Routing Operations (grow)
We propose an API standard for BGP Peering, also known as interdomain interconnection through global Internet Routing. This API offers a standard way to request public (settlement-free) peering, verify the status of a request or BGP session, and list potential connection locations. The API is backed by PeeringDB OIDC, the industry standard for peering authentication. We also propose future work to cover private peering, and alternative authentication methods.
 BMP Loc-RIB: Peer address
 
 draft-ietf-grow-bmp-loc-peer-01.txt
 Date: 16/03/2025
 Authors: Pierre Francois, Maxence Younsi, Paolo Lucente
 Working Group: Global Routing Operations (grow)
BMP Loc-RIB [RFC9069] enforces that the BMP router sets the Peer Address value of a path information to zero. This document introduces the option to communicate the actual peer from which a path was received when advertising that path with BMP Loc-RIB.


data-group-menu-data-url="/group/groupmenu.json">

Skip to main content

Global Routing Operations (grow)

WG Name Global Routing Operations
Acronym grow
Area Operations and Management Area (ops)
State Active
Charter charter-ietf-grow-04-00 Draft Charter
Document dependencies
Additional resources Issue tracker, Wiki, Zulip stream
Personnel Chairs Job Snijders, Paolo Lucente
Area Director Mohamed Boucadair
Tech Advisor Jeffrey Haas
Mailing list Address grow@ietf.org
To subscribe https://www.ietf.org/mailman/listinfo/grow
Archive https://mailarchive.ietf.org/arch/browse/grow/
Chat Room address https://zulip.ietf.org/#narrow/stream/grow

Charter for Working Group

The Border Gateway Protocol (BGP) is fundamental to the operation
of the Internet. In recent years, occurrences of BGP related
operational issues have increased, and while overall
understanding of the default-free routing system has improved,
there is still a long and growing list of concerns. Among these
are routing table growth rates, interaction of interior and
exterior routing protocols, dynamic properties of the routing
system, and the effects of routing policy on both the size and
dynamic nature of the routing table. In addition, new and
innovative uses of BGP, such as the use of BGP as a signaling
protocol for some types of Virtual Private Networks, have created
new and unexpected operational issues.

The purpose of the GROW is to consider the operational problems
associated with the IPv4 and IPv6 global routing systems,
including but not limited to routing table growth, the effects of
the interactions between interior and exterior routing protocols,
and the effect of address allocation policies and practices on
the global routing system. Finally, where appropriate, the GROW
documents the operational aspects of measurement, policy,
security, and VPN infrastructures.

GROW will also advise various working groups, including the IDR
and RPSEC working groups, with respect to whether it is
addressing the relevant operational needs, and where appropriate,
suggest course corrections. Finally, operational requirements
developed in GROW can also be used by any new working group
charged with standardizing a next generation inter-domain routing
protocol.

GOALS:


(i). Evaluate and develop various methodologies of controlling
policy information in order to reduce the effect of
prefix sub-aggregates beyond the necessary diameter, so
as to reduce the Network Layer Reachability Information
(or NLRI; see e.g.,draft-ietf-idr-bgp4-23.txt) load on
network infrastructure.

(ii). Document and suggest operational solutions to problematic
aspects of the currently deployed routing
system. Examples include instability caused by
oscillation of MULTI_EXIT_DISC (or MED; see RFC 3345)
values.

(iii). Analyze aspects of supporting new applications, including
extending existing routing protocols and creating new
ones. This includes risk, interference and application
fit.

(iv). Determine the effect of IGP extensions on the stability of
the Internet routing system.

(v). Document the operational aspects of securing the Internet
routing system, and provide recommendations to
other
WGs.

Some Relevant References:


http://www.routeviews.org
http://bgp.potaroo.net
http://www.cidr-report.org
http://www.pch.net/routing/BGP_table_size.ital
http://moat.nlanr.net/AS
http://www.apnic.net/stats/bgp
http://www.merit.edu/ipma
http://www.caida.org/projects/routing/atoms

Done milestones

Date Milestone Associated documents
Done Submit MED Considerations to IESG for Info
Done Submit Embedding Globally ...Considered Harmful to IESG for Info
Done Submit Collection Communities to IESG for BCP
Done Publish Collection Communities as WG I-D
Done Publish MED Considerations Draft as WG I-D
Done Publish Embedding Globally ...Considered Harmful as WG I-D
Done Publish Risk, Interference and Fit (RIFT) document as WG I-D