[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
comments about draft-ietf-v6ops-v6inixp-03.txt
Hi Roque and Fellows,
Here are some comments about draft-ietf-v6ops-v6inixp-03.txt:
+++++++++++++++++++++++++++++++++++++
2. Switch Fabric Configuration
...
However, some management
functions require explicit IPv6 support (such as switch management,
SNMP [RFC1157] support and flow analysis exportation)
...
These management tasks can still be done in IPv4.
...
If participants are using
untagged interconnections with the IXP switch and wish to
continue doing so, they will need to facilitate a separate
physical port to access the IPv6-specific LAN.
...
Suggestion to replace facilitate with provide.
+++++++++++++++++++++++++++++++++++++
3. Addressing Plan
...
Longer
prefixes (/65-/127), are technically feasible but are normally
discouraged because of operational practices.
...
Why?
...
When selecting the use of static Interface Identifiers (IIDs), there
are different options on how to "intelligently" fill its 64 bits
...
I suggest to remove "intelligently" from the sentence.
...
o IXPs may decide that LANs should not to be globally routed in
order to limit the possible origins of a Distributed Denial of
Service (DDoS) attack to its particpant' AS boundries.
...
Words participants and boundaries with typos.
...
In this
configuration participants may route these prefixes inside their
networks (e. g. using BGP no-export communities or routing the IXP
LANs within the participants' IGP) to perform fault management.
...
I recommend for AS to use next-hop-self on iBGP sessions, by doing
that there will be no need to redistribute IXP prefix into their IGP.
...
IXP may decide that LANs should be globally routed. In this case,
IXP LANs monitoring from outside its participants' AS boundaries
is possible but the IXP LANs will be vulnerable to DDoS from
outside of those broundries.
...
Words participants and boundaries with typos.
+++++++++++++++++++++++++++++++++++++
6. Route Server
...
The use of MD5 [RFC2385] or IPSEC [RFC4301] to
authenticate the BGP sessions and the use of GTSM (The Generalized
TTL Security Mechanism) [RFC3682] should be considered.
...
For sure that these mechanisms are important to help securing the BGP
session, but as they are related to the BGP session itself and not to
IPv6 address families they do not seem to fit well on this document.
...
Route Server
Router-Server
...
These terms may be confusing for the reader to identify from the ones
used for MLPA and for others tasks.
I recommend to highlight the idea that MLPA route servers should not
have external (Internet) access to them for security matters.
+++++++++++++++++++++++++++++++++++++
8. IXP Policies and IPv6
I strongly recommend to include IPv6 prefixes number
control/limitation (maximum-prefix) between neighbours.
I understand that this feature may be useful for some IPv4 BGP
sessions, but it is mandatory for IPv6 sessions, because of the huge
amount of prefixes that may be advertised per netblock (e.g. /32 le
/64).
+++++++++++++++++++++++++++++++++++++
Thanks,
--
Eduardo Ascenço Reis