Global Routing OperationsInternet Engineering Task Force (IETF) W. HargraveInternet-DraftRequest for Comments: 8327 LONAPIntended status:BCP: 214 M. Griswold Category: Best Current PracticeM. Griswold Expires: April 1, 201820C ISSN: 2070-1721 J. Snijders NTT N. Hilliard INEXSeptember 28, 2017February 2018 Mitigating the Negative Impact of Maintenance through BGP Session Cullingdraft-ietf-grow-bgp-session-culling-05Abstract This document outlines an approach to mitigate the negative impact on networks resulting from maintenance activities. It includes guidance for both IP networks and Internet Exchange Points (IXPs). The approach is to ensure BGP-4 sessions that will be affected bythemaintenance are forcefully torn down before the actual maintenance activities commence. Status of This Memo ThisInternet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are workingmemo documents an Internet Best Current Practice. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved fora maximumpublication by the Internet Engineering Steering Group (IESG). Further information on BCPs is available in Section 2 ofsix monthsRFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on April 1, 2018.https://www.rfc-editor.org/info/rfc8327. Copyright Notice Copyright (c)20172018 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3 3. BGP Session Culling . . . . . . . . . . . . . . . . . . . . . 3 3.1. Voluntary BGP Session Teardown Recommendations . . . . . 3 3.1.1. Maintenance Considerations . . . . . . . . . . . . . 4 3.2. Involuntary BGP Session Teardown Recommendations . . . . 4 3.2.1.Packet FilterPacket-Filter Considerations . . . . . . . . . . . . 4 3.2.2. Hardware Considerations . . . . . . . . . . . . . . . 5 3.3. Procedural Considerations . . . . . . . . . . . . . . . . 6 4.Acknowledgments . . . .Security Considerations . . . . . . . . . . . . . . . . . . . 6 5.SecurityIANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 6.IANA ConsiderationsReferences . . . . . . . . . . . . . . . . . . . . . . . . . 67.6.1. Normative References . . . . . . . . . . . . . . . . . . 6 6.2. Informative References . . . . . . .6 7.1. Normative References. . . . . . . . . . 6 Appendix A. Example Packet Filters . . . . . . . .6 7.2. Informative References. . . . . . . 7 A.1. Example Configuration for Cisco IOS, IOS XR, and Arista EOS . . . . . . . . . . . .7 Appendix A. Example packet filters. . . . . . . . . . . . . . . 7A.1. Cisco IOS, IOS XR & Arista EOS FirewallA.2. Example Configuration for Nokia SR OS . . . . . . . . . . 8 Acknowledgments . . . . . . . . . . . . . . . . .7 A.2. Nokia SR OS Filter Example Configuration. . . . . . . . 8 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .89 1. Introduction BGP Session Culling is the practice of ensuring BGP sessions are forcefully torn down before maintenance activities on alower layerlower-layer networkcommence, whichcommence -- activities that otherwise would affect the flow of data between the BGP speakers. BGP Session Cullingensures that lower layer networkis the practice of ensuring BGP sessions are forcefully torn down before commencing maintenance activitiescause(that otherwise would affect the flow of data between the BGP speakers) on a lower-layer network. BGP Session Culling minimizes theminimum possibleamount ofdisruption,disruption that lower- layer network maintenance activities cause, bycausingmaking BGP speakerstopreemptively converge onto alternative paths while thelower layerlower-layer network's forwarding plane remains fully operational. The grace period required for a successful application of BGP Session Culling is the sum of the time needed to detect the loss of the BGPsession,session plus the time required for the BGP speaker to converge onto alternative paths. The first value is often governed by the BGP Hold Timer(section(see Section 6.5 of [RFC4271]), which is commonly between 90 and 180 seconds. The second value is implementation specific, but it could be as much as 15 minutes when a router with a slowcontrol-planecontrol plane is receiving a full set of Internet routes. Throughout thisdocumentdocument, the "Caretaker" is defined to be in control of thelower layerlower-layer network, while "Operators" directly administrate the BGP speakers. Operators and Caretakers implementing BGP Session Culling are encouraged to avoid using a fixed grace period,butand instead to monitorforwarding planeforwarding-plane activity while the culling is taking place and to consider it complete once traffic levels have dropped to a minimum (Section 3.3). 2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described inRFC 2119 [RFC2119].BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. BGP Session Culling From the viewpoint of the Operator, there are two types of BGP Session Culling: Voluntary BGP Session Teardown: The Operator initiates thetear downteardown of the potentially affected BGP session by issuing an Administrative Shutdown. Involuntary BGP Session Teardown: The Caretaker of thelower layerlower-layer network disrupts(higher layer)(higher-layer) BGP control-plane traffic, causing the BGP Hold Timers of the affected BGP session to expire, subsequently triggering rerouting ofend userend-user traffic. 3.1. Voluntary BGP Session Teardown Recommendations Before an Operator commences activitieswhichthat can cause disruption to the flow of data through thelower layerlower-layer network, an Operator can reduce loss of traffic by issuing an administrative shutdown to all BGP sessions running across thelower layerlower-layer network and wait a few minutes for data-plane traffic to subside. While architectures exist to facilitate quick network reconvergence (such as BGPPIC [I-D.ietf-rtgwg-bgp-pic]),Prefix Independent Convergence (PIC) [BGP_PIC]), an Operator cannot assume the remote side has such capabilities. As such, a grace period between the Administrative Shutdown and the impacting maintenance activities is warranted. After the maintenance activities have concluded, the Operator is expected to restore the BGP sessions to their original Administrative state. 3.1.1. Maintenance Considerations Initiators of theadministrative shutdownAdministrative Shutdown MAY consider using Graceful Shutdown[I-D.ietf-grow-bgp-gshut][RFC8326] to facilitate smooth drainage of traffic prior to session tear down, and the Shutdown Communication [RFC8203] to inform the remote side on the nature and duration of the maintenance activities. 3.2. Involuntary BGP Session Teardown Recommendations In the case where multilateral interconnection between BGP speakers is facilitated through a switchedlayer-2Layer 2 fabric, such as commonly seen at Internet Exchange Points (IXPs), different operational considerations can apply. Operational experience shows that many Operators are unable to carry out the Voluntary BGP Session Teardown recommendations, because of the operational cost and risk of coordinating the two configuration changes required. This has an adverse affect on Internet performance. In the absence of notifications from the lower layer(e.g.(e.g., Ethernet link down) consistent with the planned maintenance activities in a switchedlayer-2Layer 2 fabric, the Caretaker of the fabric could choose to cull BGP sessions on behalf of the Operators connected to the fabric. Such culling of control-plane traffic will preempt the loss of end- usertraffic,traffic by causing the expiration of BGP Hold Timers ahead of the moment where the expiration would occur without intervention from the fabric's Caretaker. In this scenario, BGP Session Culling is accomplished as described in the nextsub-section,subsection, through the application of a combinedlayer-3Layer 3 andlayer-4Layer 4 (Layer 3/4) packet filter deployed in the Caretaker's switched fabric. 3.2.1.Packet FilterPacket-Filter Considerations The peering LAN prefixes used by the IXP form the control plane, and the following considerations apply to thepacket filterpacket-filter design: o The packet filter MUST only affect BGP traffic specific to thelayer-2Layer 2 fabric,i.e.i.e., traffic forming part of the control plane of the system described, rather than multihop BGP trafficwhichthat merely transits. o The packet filter MUST only affect BGP,i.e. TCP/179.i.e., TCP port 179. o The packet filter SHOULD make provision for the bidirectional nature of BGP,i.e. thati.e., sessions may be established in either direction. o The packet filter MUST affect all Address Family Identifiers. Appendix A contains examples of correct packet filters for various platforms. 3.2.2. Hardware Considerations Not all hardware is capable of deploying combined Layer3 / Layer 43/4 filters on Layer 2ports, andports; even on platformswhichthat claim support for such a feature, limitations may exist or hardware resource allocation failures may occur during filterdeploymentdeployment, which may cause unexpected results. These problems may include: o Platform inability to applylayerLayer 3/4 filters on portswhichthat already havelayerLayer 2 filters applied. o Layer 3/4 filters supported for IPv4 but not for IPv6. o Layer 3/4 filters supported on physical ports, but not on802.3adIEEE 802.1AX Link Aggregateports.ports [IEEE802.1AX]. o Failure of the Caretaker to apply filters to all802.3adIEEE 802.1AX Link Aggregateports.ports [IEEE802.1AX]. o Limitations inACLAccess Control List (ACL) hardware mechanisms causing filters not to be applied. o Fragmentation of ACL lookup memory causing transient ACL application problemswhichthat are resolved after ACLremoval /removal/ reapplication. o Temporary service loss during hardwareprogrammingprogramming. o Reduction in hardware ACL capacity if the platform enables lossless ACL application. It is advisable for the Caretaker to be aware of the limitations of theirhardware,hardware and to thoroughly test all complicated configurations in advance to ensure that problems don't occur during production deployments. 3.3. Procedural Considerations The Caretaker of thelower layerlower-layer network can monitor data-plane traffic(e.g.(e.g., interface counters) and carry out the maintenance without impact to traffic once session culling is complete. It is recommended that the packet filtersare onlybe deployed for the duration of the maintenance only andimmediatelybe removed immediately after themaintenance.maintenance is completed. To preventunnecessarilyunnecessary troubleshooting, it is RECOMMENDED that Caretakers notify the affected Operators before the maintenance takesplace,place and make it explicit that the Involuntary BGP Session Culling methodology will be applied. 4.Acknowledgments The authors would like to thank the following people for their contributions to this document: Saku Ytti, Greg Hankins, James Bensley, Wolfgang Tremmel, Daniel Roesen, Bruno Decraene, Tore Anderson, John Heasley, Warren Kumari, Stig Venaas, and Brian Carpenter. 5.Security Considerations There are no security considerations.6.5. IANA Considerations This document has no actions for IANA.7.6. References7.1.6.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <https://www.rfc-editor.org/info/rfc2119>. [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, DOI 10.17487/RFC4271, January 2006, <https://www.rfc-editor.org/info/rfc4271>.7.2. Informative References [I-D.ietf-grow-bgp-gshut] Francois, P., Decraene,[RFC8174] Leiba, B.,Pelsser, C., Patel, K., and C. Filsfils, "Graceful BGP session shutdown", draft-ietf- grow-bgp-gshut-11 (work"Ambiguity of Uppercase vs Lowercase inprogress), September 2017. [I-D.ietf-rtgwg-bgp-pic]RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <https://www.rfc-editor.org/info/rfc8174>. 6.2. Informative References [BGP_PIC] Bashandy, A., Ed., Filsfils, C., and P. Mohapatra, "BGP Prefix Independent Convergence",draft-ietf-rtgwg-bgp-pic-05 (workWork inprogress), MayProgress, draft- ietf-rtgwg-bgp-pic-06, November 2017. [IEEE802.1AX] IEEE, "IEEE Standard for Local and metropolitan area networks -- Link Aggregation", IEEE Std 802.1AX-2014, DOI 10.1109/IEEESTD.2014.7055197, December 2014, <http://ieeexplore.ieee.org/servlet/ opac?punumber=6997981>. [RFC8203] Snijders, J., Heitz, J., and J. Scudder, "BGP Administrative Shutdown Communication", RFC 8203, DOI 10.17487/RFC8203, July 2017, <https://www.rfc-editor.org/info/rfc8203>.7.3. URIs [1] https://github.com/bgp/bgp-session-culling-config-examples[RFC8326] Francois, P., Ed., Decraene, B., Ed., Pelsser, C., Patel, K., and C. Filsfils, "Graceful BGP Session Shutdown", RFC 8326, DOI 10.17487/8326, February 2018, <https://www.rfc-editor.org/info/rfc8326>. Appendix A. Example Packet Filters This section includes examples of packet filtersExample packet filters for "Involuntaryperforming Involuntary BGP SessionTeardown"Teardown at an IXP using peering LAN prefixes 192.0.2.0/24 and 2001:db8:2::/64 as its control plane. A repository of configuration examples for a number of assorted platforms can be found athttps://github.com/bgp/bgp-session-culling- config-examples [1].<https://github.com/bgp/bgp-session-culling-config-examples>. A.1. Example Configuration for Cisco IOS, IOSXR &XR, and Arista EOSFirewall Example Configurationipv6 access-list acl-ipv6-permit-all-except-bgp 10 deny tcp 2001:db8:2::/64 eq bgp 2001:db8:2::/64 20 deny tcp 2001:db8:2::/64 2001:db8:2::/64 eq bgp 30 permit ipv6 any any ! ip access-list acl-ipv4-permit-all-except-bgp 10 deny tcp 192.0.2.0/24 eq bgp 192.0.2.0/24 20 deny tcp 192.0.2.0/24 192.0.2.0/24 eq bgp 30 permit ip any any ! interface Ethernet33 description IXP Participant Affected by Maintenance ip access-group acl-ipv4-permit-all-except-bgp in ipv6 access-group acl-ipv6-permit-all-except-bgp in ! A.2. Example Configuration for Nokia SR OSFilter Example Configurationip-filter 10 create filter-name "ACL IPv4 Permit All Except BGP" default-action forward entry 10 create match protocol tcp dst-ip 192.0.2.0/24 src-ip 192.0.2.0/24 port eq 179 exit action drop exit exit exit ipv6-filter 10 create filter-name "ACL IPv6 Permit All Except BGP" default-action forward entry 10 create match next-header tcp dst-ip 2001:db8:2::/64 src-ip 2001:db8:2::/64 port eq 179 exit action drop exit exit exit interface "port-1/1/1" description "IXP Participant Affected by Maintenance" ingress filter ip 10 filter ipv6 10 exit exit Acknowledgments The authors would like to thank the following people for their contributions to this document: Saku Ytti, Greg Hankins, James Bensley, Wolfgang Tremmel, Daniel Roesen, Bruno Decraene, Tore Anderson, John Heasley, Warren Kumari, Stig Venaas, and Brian Carpenter. Authors' Addresses Will Hargrave LONAP Ltd 5 Fleet Place London EC4M 7RD United Kingdom Email: will@lonap.net Matt Griswold 20C 1658 Milwaukee Ave # 100-4506 Chicago, IL 60647 United States of America Email: grizz@20c.com Job Snijders NTT Communications Theodorus Majofskistraat 100 Amsterdam 1065 SZ The Netherlands Email: job@ntt.net Nick Hilliard INEX 4027 Kingswood Road Dublin 24 Ireland Email: nick@inex.ie