Internet DRAFT - draft-anup-idr-bgp-duplicate-rt

draft-anup-idr-bgp-duplicate-rt







Inter-Domain Routing                                            T. Kumar
Internet-Draft                                                  Ericsson
Intended status: Standards Track                            May 23, 2017
Expires: November 24, 2017


  Procedures to handle duplicate Route Targets (RT) received by a BGP
                                Speaker
                   draft-anup-idr-bgp-duplicate-rt-00

Abstract

   This document describes why duplicate suppression should not be
   applied to BGP Route Target (RT) Address Family.  It also explains
   the problems incurred if duplicate suppression is applied to BGP
   route constraints AF

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119] .

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 24, 2017.

Copyright Notice

   Copyright (c) 2017 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of



Kumar                   Expires November 24, 2017               [Page 1]

Internet-Draft         BGP Duplicate Route Targets              May 2017


   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Problem . . . . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.1.  Summary of the Problem  . . . . . . . . . . . . . . . . .   3
   3.  Problem scenario - An Example . . . . . . . . . . . . . . . .   3
   4.  Existing workaround for the above problem . . . . . . . . . .   4
   5.  Solution to the Problem . . . . . . . . . . . . . . . . . . .   4
   6.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .   4
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .   4
   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   9.  Contributors  . . . . . . . . . . . . . . . . . . . . . . . .   5
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .   5
     10.1.  Normative References . . . . . . . . . . . . . . . . . .   5
     10.2.  Informative References . . . . . . . . . . . . . . . . .   5
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   Address families like ipv4 unicast are used for exchange of routing
   or reachability information.  Receipt of an ipv4 unicast update by
   router R means that the peer has the ipv4 route and hence, has sent
   it to R, while the receiving router R computes bestpath and uses the
   route for forwarding.

   With respect to receiving ipv4 unicast update, we have two
   possibilities:

      1) The receiving router does not have the original route in its
      database.  It treats the update as fresh update.  So, the received
      ipv4 unicast update is processed and downloaded for forwarding.

      2) The receiving router already has the route in its database. It
      treats the update as duplicate and drops it.  It is guaranteed by
      BGP base protocol that the receiver had processed and
      installed the route when the earlier update was seen, and hence it
      can drop the duplicate ipv4 unicast update.  Even if the duplicate
      is processed again and installed again, there is no problem with
      duplicate processing and installation.




Kumar                   Expires November 24, 2017               [Page 2]

Internet-Draft         BGP Duplicate Route Targets              May 2017


2.  Problem

   This section explains the problem when duplicate suppression is
   applied to BGP updates carrying Route Targets (RT) Address Family
   information.

   RT address family is used to exchange VPN subscription information.
   Receipt of an RT update means that the sender is interested in
   getting vpn routes from this router.  This router is expected to send
   matching vpn routes in response.  Which means, receipt of an RT
   update, unlike ipv4 unicast update, does not end with local
   installation of route, but also necessarily entails sending vpn
   routes in response.

   Like before, we have two cases to analyze with respect to receiving
   duplicate RT updates:

      1) The receiving router does not have earlier RT in its database.
      It treats the RT as fresh update, and it sends vpn routes in
      response.

      2) The receiving router already has the RT in its database.  It
      treats the incoming RT as duplicate and drops it.  But, when the 
      receiver gets the duplicate RT, whether the sender has vpn routes
      or not, is not known at the receiver side.  So, dropping the
      duplicate RT without sending vpn routes in response, is a problem.

2.1.  Summary of the Problem

   When a duplicate RT is received, it is not guaranteed that the sender
   of the RT has the required vpn routes.  So the receiver cannot choose
   to ignore an RT as duplicate, because unlike Ipv4 unicast route, an
   RT indicates a subscription or a want of vpn routes and the receiver
   does not know whether the sender has the vpn routes or not.

3.  Problem scenario - An Example

      First time when the import RT is configured the sender will not
      have vpn routes, and it sends the RT to its peers, thereby
      conveying its want of vpn routes.

      The receiver also sees this RT coming from the sender for the
      first time, and It sends vpn routes in response to the sender of
      the RT.

      Now, certain Destructive operations can lead to cleanup of vpn
      routes.  Example: Remove and add of vpn configurations, 'without'
      affecting bgp peer session state.



Kumar                   Expires November 24, 2017               [Page 3]

Internet-Draft         BGP Duplicate Route Targets              May 2017


      Here, due to removal of vpn config, the sender will cleanup the
      vpn routes.

      Then, due to quick addition of vpn config, the sender will request
      for vpn routes by sending all the configured RTs.

      But, the receiver still has the earlier RTs that was sent by the
      peer.  So, the receiver treats the RTs as duplicate and drops
      them.

      Thus no vpn routes are sent to the sender

4.  Existing workaround for the above problem

   Implementations solve this problem at the sender side by sending a
   request for Route refresh (known as a bgp soft in request), after any
   modification to vpn configuration.  But, this is only a workaround.
   The real problem is in the way bgp treats received RT.  The
   corrective measure should be at the receiver's side, by sending out
   vpn routes in response, though the RT might be a duplicate.  Further,
   when the receiver has the ability to use RTs to walk only the
   required VPN tables with an objective to avoid full walk, sending a
   request for full route refresh will prevent the receiver from
   utilizing its ability to walk required VPN tables for the RT.  So,
   sending a request for route refresh not only masks the problem in
   2.1, but also leads to inefficient vpn walks at the sender capable of
   selective vpn update generation per received RT.

5.  Solution to the Problem

   When the received RT is a duplicate, the receiver should respond with
   vpn routes, rather than simply dropping the duplicate RT.

6.  Acknowledgments

   The author would like to thank P. Muthu and team for their
   comments and review.

7.  Security Considerations

   There are no additional security considerations than the base BGP
   RFC.

8.  IANA Considerations

   This document has no actions for IANA.






Kumar                   Expires November 24, 2017               [Page 4]

Internet-Draft         BGP Duplicate Route Targets              May 2017


9.  Contributors

10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC4271]  Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
              Border Gateway Protocol 4 (BGP-4)", RFC 4271,
              DOI 10.17487/RFC4271, January 2006,
              <http://www.rfc-editor.org/info/rfc4271>.

10.2.  Informative References

   [RFC4684]  Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk,
              R., Patel, K., and J. Guichard, "Constrained Route
              Distribution for Border Gateway Protocol/MultiProtocol
              Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual
              Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684,
              November 2006, <http://www.rfc-editor.org/info/rfc4684>.

Author's Address

   Anup Kumar T
   Ericsson India Pvt Ltd
   Ferns Icon, Doddanakkundi, Mahadevapura
   Bengaluru  560037
   India

   Email: anupkumar.t@ericsson.com












Kumar                   Expires November 24, 2017               [Page 5]