►
From YouTube: IETF114-GROW-20220728-2130
Description
GROW meeting session at IETF114
2022/07/28 2130
https://datatracker.ietf.org/meeting/114/proceedings/
E
C
That
is
always
sunny
philadelphia.
Also
a
warm
welcome
to
our
remote
participants.
We
appreciate
you
taking
the
time
out
of
your
day
to
attend
this
session.
Even
if
this
time
zone
perhaps
is
not
optimal
for
you.
C
Today's
working
group
session
is
the
grow
session.
This
is
the
global
routing
operations
working
group
who
concern
themselves
with
the
stability
of
the
internet
routing
system,
as
deployed
across
this
planet,
a
phenomenal
achievement.
Despite
our
best
efforts
now
co-chair,
would
you
be
so
kind
to
jump
to
the
agenda.
E
C
A
note
while
applying
it
applies.
This
is
the
fine
print
that
outline
outlines
your
obligations
as
itf
participants
of
special
note
is
a
desire
for
everybody
to
interact
with
each
other
in
a
respectful
manner.
I
also
want
to
highlight
that
it's
mandatory
to
wear
masks
during
this
session
in
this
room.
C
I
see
at
least
one
person
not
wearing
a
mask,
so
I
would
kindly
ask
you
to
put
on
a
mask
much
appreciated
for
for
your
collaboration
and
let's
hope
that,
maybe
in
a
few
years
mass
or
not
a
requirement
anymore.
C
There's
various
links
that
apply
to
this
working
group
session
and
the
working
group
in
general.
Again,
the
materials
are
on
the
data
tracker.
So
if
you
want
to
read
all
of
this
in
more
detail,
please
download
the
materials
and
follow
all
these
links
to
resources.
C
Our
agenda
for
today
we
need
to
dive
through
some
administrative.
How
do
you
even
pronounce
that
word
administrivia
all
right.
C
If
you
whip
up
your
phone
scan
the
qr
code
and
then
log
in
with
your
data
tracker
uri,
the
system
will
register
your
presence
in
this
meeting,
which
has
purposes
in
in
mostly
the
legal
realm.
C
E
C
Any
plain
text
documents
is
fine,
excellent
agenda
bashing.
We
have
two
items
today,
actually
three,
because
we
also
should
discuss
the
state
of
various
working
group
documents.
C
But
after
that,
we'll
move
on
to
an
item
called
the
well-known
bgp,
anycast
community
or
well-known
any
kind
of
php
community
and
then
more
work
on
bmp
and
yang.
D
Ben
madison
work
online.
I'm
not
sure
that
the
thing
that
you
are
referring
to
is
quite
ready
to
be
discussed
here,
given
that
there
are
authors
who
I
probably
need
to
discuss
it
with.
First.
C
Then
we'll
see
more
of
this
at
itf
115,
hopefully
document
status.
Do
you
want
to
cover
that
chris
nope
nope
from
the
top
of
my
head,
the
bmp
tlv
ebit
draft,
was
approved
for
working
group
adoption
some
time
ago,
but
unfortunately
I
it
fell
off
my
radar
and
I
approved
it
as
recently
as
this
week.
So
that's
now
in
the
system,
as
working
group
document.
C
C
And
I
see
I
have
to
do
some
work.
The
grow
bmp
tov
document
needs
a
write-up
from
the
chairs
and
I
will
do
that
in
the
next
few
days
and
I'm
hoping
paolo
will
remind
me
to
actually
do
it
in
the
next
few
days.
Thank
you,
paulo
okay.
With
that
I
would
say.
Let's
move
on
to
a
remote
presentation
by
maximilian
wilhelm,
the
anycast
community.
C
So
maximiliam,
what
we're
now
doing
in
the
system
is
making
you
the
presenter
and
that
should
allow
you
to
click
through
the
slides.
C
It
was
us
my
apologies,
we
can
hear
you
loud
and
clear.
That's
good.
G
Again,
yes,
and
I
accept
what
what
do
I
do,
I
guess
this
one.
G
Cool,
thank
you
good
evening
to
philadelphia.
So
I
put
it
forward
or
we
freddie
is
also
present
in
the
audience,
put
a
draft
forward
to
define
a
well-known
bgp
community
to
denate
the
dote
prefixes
are
used
for
any
cast
and
we
want
to
say
what
we
saw
or
what
is
the
reason
behind
it.
G
G
A
swiss
isp,
who
has
international
network
intercontinental
network
and,
for
example,
wants
to
transform
transport
packets
to
the
us
directly
so
would
like
to
prefer
the
own
path
where
own
equipment
over
the
pond,
but
would
also
like
to
route
any
cast
prefixes
locally
because
of
the
nature
of
any
cast
for
a
lot
of
providers
having
different
pops
around
the
world.
Usually
the
hot
potato
path
would
be
best
and
given
many
providers
also
use
dns,
anycast
and
then
point
customers
or
clients
to
the
preferred
servers.
This
might
influence
some
user
latency
and
experience
in
general.
G
G
So
not
everyone
or
every
provider
has
to
define
a
different
one
and
t
gets
messy.
G
So
it
does
not
make
total
sense
to
only
specify
it
in
a
few
places,
and
the
idea
is
if
this
is
specified,
we
ask
people
to
use
hot
potato
routing
for
it,
but
that's
in
everyone's
best
judgment,
as
was
pointed
out
on
the
mailing
list.
This
might
have
influences
on
route
server
operators
which
may
introduce
an
option
to
filter
for
any
cast
prefixes
to
take
that
into
consideration
when
doing
te,
and
this
also
what
also
brought
up
on
the
mailing
list.
G
This
might
influence
your
network
when
doing
route
reflection.
Optimal
route
reflection
was
brought
into
the
mix
as
well
as
at
paths.
I
say
we
led
it
to
operators
to
define
the
best
path
forward
there.
I
think
it
would
not
be
good
to
prescribe
a
solution
and
that's
basically
the
idea.
The
draft
has
been
put
forward.
G
C
And
with
that,
we
open
up
the
floor
for
discussion
and
I
hope
there
will
be
some
some
sharing
of
perspectives
on
this
topic,
because.
H
Hey
keir
patel
arcus,
nice
draft
quick
question:
do
you
think
it
makes
sense
to
use
large
community
and
append
ess
also
to
talk
about
what
anycast
community,
if
any
you're
doing
or
you
rather
prefer
this
to
be
on
a
generic
community.
G
Just
broke,
okay
audio
seems
to
be
back.
I
think
I
got
most
of
the
question
we
thought
about
using
large
communities,
but
I
guess
people
in
this
audience
can't
answer
the
question.
If
it's
a
good
idea
to
use
them
today
better,
I
was
afraid
that
there
still
might
be
systems
out
there
which
do
not
implement
large
communities.
G
D
Ben
madison
work
online
thanks
for
the
draft,
I
think
it's
I
I
think
it's
an
interesting
problem
space.
I
think
that
there's
a,
I
think,
there's
a
kind
of
a
tension
between
the
engineering
problem,
you're
trying
to
solve
and
the
social
reality
that
it
exists.
D
In
speaking,
for
you
know,
for
myself
and
the
network
that
I
operate,
I
wouldn't
allow
any
third-party
network
that
to
send
me
hints
that
alters
my
local
routing
policy
without
a
substantial
degree
of
trust
in
the
person
who
is
sending
it,
and
it
seems
to
me
that,
because
that
mechanism
requires
some
degree
of
social
interaction,
whether
it's
kind
of
like
remotely
over
email
or
forums
like
this
or
nogs
or
peering
forums
or
whatever
it
kind.
D
The
fact
that
that
trust
needs
to
be
established
anyway
means
that
there's
plenty
of
opportunity
to
to
exchange
operator
specific
communities
during
those
conversations
and
those
relationships
anyway.
So
I
think
that
you
end
up
kind
of
losing
the
benefits
of
having
a
single,
well-known
community
with
universal
semantics,
because
you've
got
to
do
all
of
that
social
networking
work
to
make
it
useful
anyway
to
make
it
trustworthy.
G
Fair
point:
the
security
side
of
this
or
the
aspect
has
been
brought
up
on
the
mailing
list,
also
I'd
say
in
combination
with
rpki.
It
should
be
okay
to
filter
on
community
and
is
our
community
and
prefix
list
potentially.
D
I
would
like
to
live
in
a
world
in
which
rpk
could
help
with
this,
but
that's
not
a
world
that
we
live
in
currently
trying
to
make
secu
trying
to
secure
communities
is
a
hard
problem.
I
Hi
there,
tom
hill
from
bt,
the
all
or
nothing
solution
as
a
proposal
is
interesting,
even
as
a
should,
rather
than
a
must.
I
can
see
that
going
very
wrong
on
the
basis
that
either
there
are
transient
issues
or
perhaps
even
folks
who
aren't
paying
enough
attention.
Maybe
so
is
there
a
way
in
which
you
envision?
We
may
track
hygiene
of
prefixes
announced
with
this
particular
community,
and
you
know,
make
make
make
the
owners
of
the
prefix
aware
that
they've
perhaps
not
done
this
in
a
all
or
nothing
fashion.
G
I
see
your
point
given
that
I
got
shamed
on
twitter
a
while
back
for
doing
a
route
leak.
I
know
these
solutions
exist
and
can
be
built,
so
I
guess
going
on
route,
information,
services,
etc.
This
should
be
possible.
G
I
J
H
Well,
arc
is
here
again
one
for
one
more
time
I
that
was
precisely
what
I
was
trying
to
indicate
that
while
there
is
not
one,
you
could
probably
define
one
and
get
away.
I
I
have
a
feeling
that
you
do
want
to
tell
your
neighbor
asses,
even
when
you
are
sending
out
the
well-known
communities
to
tag
at
least
and
say,
which
is
that
these
are
propagating
from
or
originating
from,
and
you
are
appending
it
and
so
forth,
and
so
on.
C
So
it
would
be
good
to
have
a
discussion
on
the
mailing
list,
whether
a
extended
community
that
has
room
for
the
sender,
asn
or
setter
of
the
community.
C
But
opinions
differ
on
on
whether
extended
communities
are
useful
in
this
type
of
work
environment.
So
that's
why
I
would
discuss
it
on
the
mailing
list
to
to
see
what
comes
out
of
the
woodworks
rudiger
you're
actually
last
in
line.
First,
we're
going
to
go
to
linda
dunbar,
linda.
K
Yes,
maybe
this
question
is
for
the
group,
so
I'm
wondering
like
since
then
anik
has
used
so
widely.
Can
any
cast
being
treated
like
a
multicast
like
all
the
ports
belong
to
that
anycast
register
for
that,
so
that
the
network
know
how
to
forward
instead
of
putting
to
the
extended
community
just
the
question.
C
K
F
As
an
implementer
with
a
little
clue,
I
have
a
question
about
the
trust
relationship
brought
up
earlier.
F
Isn't
this
really
two
separate
things,
one
being
the
advertisement
in
a
permissive
way
and
informative
way
about
tagging,
something
as
an
anycast
prefix
versus
having
an
expectation
of
something
happening
due
to
that,
like?
I
understand
that
the
latter
is
something
that
will
rely
on
relationships
like
that,
but
I
don't
need
a
relationship
to
make
use
of
this
to
just
flag
things
that
I'm
advertising.
D
Sorry,
yeah,
that's
that's
totally
true
and
from
reading
the
draft
it
doesn't
sound
like
there
was
an
expectation
that
this
would
be
useful
just
as
an
fyi,
but
if
it
is
useful,
just
as
an
fyi,
then
sure
there's
that
then
it's
then
it's
absolutely
fine.
My
my
concern
was
that,
if
there's
an
expectation
that
people
will
actually
you
know
blindly
or
semi-blindly
act
on
this
in
the
routine
policies,
I
think
that's
a
mistaken
assumption.
G
A
Just
comment:
yes,
large
community
space
has
not
yet
assigned
any
parts
of
the
of
the
name
space
for
special
purposes,
but
the
space
is
large
and
interesting.
Things
could
be
done
and,
in
my
not
so
humble
opinion,
probably
should
the
yeah
well,
okay.
It
is
quite
clear
that
the
attachment
of
communities
can
be
manipulated
by
any
as
on
the
path,
no
question
about
that.
A
But
my
guess
is
that
the
assumption
for
any
caste
tagging
would
be
that
every
time
exactly
the
originating,
as
would
would
do
the
tagging
kind
of
that
some
intermediate,
as
has
the
knowledge
that
yes
well,
okay,
this
transiting
announcement
is
anycast
and
not
getting.
The
signal
from
the
first
place
looks
a
little
bit
strange.
B
Excellent,
so
warren,
so
warren
kumari
with
no
hats,
so
I
mean
networks
kind
of
generally
decide
if
they
want
to
do
hot
potato
or
not,
and
that's
the
decision
that
they
make.
There's
nothing
here
that
actually
stops
me
from
just
applying
this
to
any
old
route
that
I
feel
like.
So,
if
I
send
you
500
routes,
I
can
tag
499
of
them
with
this,
or
I
could
tag
one
and
it
seems
like
I
can
choose
whatever
routing
policy
I
would
like
with
this.
B
G
D
Ben
madison,
again
just
on
the
subject
of
whether
it's
helpful
for
there
to
be
a
for
the
for
the
sort,
the
the
attack,
the
the
as
that's,
attaching
the
community
to
the
prefix,
which
is
probably
the
origin
being
encoded
in
the
community.
I
think
that
that
kind
of
assumes
that
this
is
useful
more
than
one
hop
away
and
my
already
limited
inclination
to
change
routing
policy
based
on
this
kind
of
a
community
would
fall
off
an
exponential
cliff
with
every
additional
as
hop
in
the
path.
D
So
I
think
that
if
this
is
useful
at
all,
I'd
be
amazed
if
it's
useful
more
than
a
single
hop
away.
Personally,
so
I
think
that
rather
loses
its
utility
again,
if
it's
not
just
you
being
used
for
informational
purposes,
if
it's
purely
informational,
then
sure
that's
additional
signal
and
signal
is
good.
C
L
Well,
sort
of
it's
actually
clear,
but
that's
okay,
good
afternoon
good
evening
good
morning,
I'm
one
of
the
proposal
and
actually
maximilian
wrote
everything,
but
I
could
probably
give
and
I
the
idea
why
it
came
up,
we
being
the
swiss
isp.
Maximilian
was
talking
about
and
some
years
back
we
were
selling
transit.
L
I
think
it
was
in
frankfurt
to
a
network
which
was
selling
transits
somewhere
to
network
somewhere
in
the
middle
east.
I
think
it
was
iran
and
they
were
transiting
quite
a
lot
of
announcing
quite
a
lot
of
prefixes,
and
one
was
actually
one
of
these
dns
anycast
servers.
I've
got
which
one.
L
But
what
happened
then,
when
you,
when
you
sell
transit,
you
usually
do
them
higher
local
craft
and
then
peering
or
or
for
upstream
so
our
users,
our
broadband
customers
in
switzerland,
they
were
actually
then
using
the
dns
anycast
server
in
the
middle
east,
somewhere
with
high
latency,
etc,
etc.
If
we
would
have
known
that
that
specific
prefix
is
actually
in
any
cost
prefix,
we
would
have
filtered
that
away
from
the
transit,
and
so
we
we
learned
it
the
hard
way.
L
But
if
those
any
cost
operators
would
actually
denote
their
any
cost
prefixes
it
just
would
make
my
life
a
lot
easier
and
the
quality
of
of
the
service
we
provide
to
the
end
customer
would
increase.
Of
course
it
could
be
abused,
but
usually
the
any
card
operators
they
know
what
they're
doing
so.
We
could
expect
some
more
clue
of
any
cast
operators
than
sort
of
normal
operators,
and
that
is
basically
why
I
ask
everyone
to
support
this
proposal.
E
C
C
That's
what
I
meant
and
a
final
comment.
I
think
the
current
draft
doesn't
really
define
what
any
cast
means
in
this
context.
So
it
would
be
good
to
add
a
paragraph
clarifying
a
term
that,
amongst
network
operators
is
pretty
well
understood,
but
for
the
purpose
of
the
itf
internet
draft,
it
would
be
helpful
to
to
explain
what
anycast
means
in
this
context.
E
M
M
One
of
them
was,
we
specifically
had
a
choice
now
to
connect
to
the
station,
be
active
or
passive,
so
I
do
not
know
how
many
people
use
passive
in
real
life,
but
but
it's
included
in
the
bmp
specifications.
So
we
added
that
it
does
add
to
the
complexity
of
the
model,
but
it
is
what
it
is.
We
are
at
maximum
segment
size,
keep
a
lives
and
session
security
session
security.
We
basically
copy
it
from
the
bgp
draft
model.
M
Jeff
pointed
us
out
some
hits,
so
we
will
probably
take
a
look
at
that
again
and
see
if
it
fits
on
the
vmp
one
and
how
to
do
it.
I
keep
allies,
we
copied
it
from
the
tcpm
module
too.
I
don't
know
if
it's
going
to
fit
perfectly
so
we'll
take
a
look
at
that
again
and
there
it
is
so.
We
also
added
network
instance
to
the
bmp
sources.
M
So
jeff
jeff
always
points
out
these
things,
so
he
pointed
out
that
we
were
missing
that
and
now
we
added
them
and
I'll
talk
about
that
in
a
second
again
in
the
draft
per
se,
we
basically
change
a
few
sentences
and
add
an
example.
We
probably
need
to
add
more
examples
in
the
future.
I
I
really
like
examples
in
when,
when
you're
reading
models,
but
that's
for
the
future
okay,
so
I
wanted
to
explain
this
again,
so
it
would
be
nice.
M
I'm
awesome
that
we
could
get
all
the
information
in
the
world
from
from
these
routers,
but
it
is
bad
for
the
wire.
It
is
bad
for
the
collection
and
for
analyzing.
We
don't
have
process
for
that.
So
the
idea
that
we
have
on
this
draft
is
that
you
as
an
operator,
can
specify
clearly
what
information
you
want
and
that
we
do
it
flexibly,
but
also
with
no
ambiguity,
and
I
mean
in
a
precise
way,
so
right
now
we
have
four
sorry
four
areas
that
we
we
use
to
specify
the
data.
M
One
of
them
is
network
instances
that
we
didn't
have
previously.
So
the
idea
here
is
that
you
specify
which
network
is
from
which
network
instance
you
want
to
get
data
from,
and
we
added
an
an
identity
called
vmpn
and
types
on
the
idti
that
allows
you
to
specify
that
you
want
the
data
from
all
network
instances
remotes
well.
The
typical
remotes
from
bmp
has
been
in
pre
and
post
has
been
out,
pre
and
post
and
local
rip.
Here
there
are
no
shortcuts.
M
You
have
to
be
explicit
on
what
you
want
the
same
for
address
families.
We
take
the
adverse
families
values
from
the
bgp
jan
module,
so
we'll
see
how
the
two
interplay
but
we're
taking
it
from
there
annum
peers,
which
is
well.
M
This
one
is
a
bit
more
complicated,
so
you
can
specify,
of
course,
prc
individually
when
you're
based
on
their
ip
address
and
using
the
bgp
module,
but
you
can
also
specify
the
type
of
peers
that
you
want
your
data
from
and
we
are,
we
are
doing
it
right
now
with
the
vtp
module.
We
might
change
that
later.
So
you
can
say,
for
instance,
give
me
all
the
data
from
our
external
peers,
which
is
something
that
we
see
very
often
that
you
don't
want
to
specify.
M
You
don't
want
to
get
internal
peers,
you
want
their
external,
but
you
want
to
take
them
one
by
one.
So
we
added
that,
of
course,
if
you
want
all
peers-
and
we
also
have
an
identity
for
that,
we
change
that
from
the
previous
draft
and
jeff
mentioned
that,
oh
okay,
next
one
please
so
here's
a
brief
example
of
how
you
can
you
configure
these
bmp
sources?
So,
for
instance,
here
we
want
the
data
from
the
global
network
instance
as
repeating
pre
from
the
ipv4
address
family,
and
we
want
that
for
all
external
peers.
M
So
in
red
is
those
points
I
apologize
for
the
xml.
This
is
what
it
is.
Okay,
so
some
gaps
we
have
we
haven't.
We
haven't
introduced
initial
initiation
delay
and
back
of
times,
which
was
an
observation
from
from
team
evans.
We
just
haven't
done
it,
but
we
are
not.
We
haven't
forgotten
it
yet,
and
I'd
first
like
to
thank
jimmy
chen,
I'm
sorry,
I
mispronounced
his
name.
M
We
had
a
very
nice
discussion
about
how
to
about
all
of
this
that
we
just
discussed
about
bmp
sources
and
being
able
to
filter
the
information,
the
data
they
really
want
to
send
to
the
collector.
M
He
actually
went
a
bit
further
and
he
he
told
us
that
he
actually
needed
to
filter
prefixes
per
prefixes
and
he
actually
told
us
we
could
use
a
specific
model
that
allows
you
to
basically
specify
a
a
simple
router
routing
policy
for
that.
So
we
we
still
we're
still
processing
that,
but
it
was
an
amazing
conversation
and
but
right
now
we
can
just
thank
him.
M
We
better.
We
were
a
bit
ambiguous
last
time
we
had
some
discussion
in
the
mailing
list
and
it
was
not
clear
so
now
I
mean
we'll
just
like
to
make
it
clear.
Is
this
good
for
work
working
group
adoption?
M
M
D
Ben
madison,
thank
you
for
doing
this.
I
think
this
is
really
useful.
I
think
this
is
one
of
those
areas
where
interacting
via
a
mailing
list
or
providing
useful
comments
in
a
meeting
like
this
is
is,
is
difficult.
D
M
Yeah,
we
don't
have
it,
we
have
the
public,
but
we
will
do
it
and
and
of
course
there
as
us,
other
itf
models
have
been
discussed.
We
can,
we
can
make
them,
we
can
make
them
public.
Yet.
Thank.
E
B
B
I
Hello,
tom
hill,
I
believe
that
there
has
been
a
suggestion
within
netmod
to
collate,
to
try
and
group
together
and
bring
together
all
of
the
distributed
young
models
that
are
developed
in
different
working
groups
into
the
same
netmod
working
group.
Github
repository
it's
worth
having
a
chat
with
the
chairs
of
netmod
slash
the
ad
for
netmod
rob
wilton
about
that.
M
And
we
will
be
also
very
happy
to
do
it
after
it
gets
working
group
adoption,
because
I
guess
that
officializes
the
whole
thing
right
more
than
just
make
it
like
personal
contribution.
C
All
right,
we'll
launch
a
mill
thread
to
discuss
working
group
adoption
of
this
work
and
then
assess
consensus
on
how
to
proceed.
C
I
see
the
queue
is
empty,
both
virtually
and
physically,
so
I
think
you
are
done.
Thank
you
for
your
presentation.
Much
appreciative.
C
C
All
right,
thank
you
all
for
attending
this
meeting
and
until
next
time
have
a
good
day.