ok, so after some considerable discussion (and correction of my non-optimally-phrased questions) it seems there's some energy in discussing this in GROW...
It seems that the draft: draft-foo-sidr-simple-leak-attack-bgpsec-no-help looks like a good starting point for this discussion, could we re-spin this as a GROW draft (re-title and submit) and perhaps send along updates according to the comments received (if any?). Once that appears it'd be grand if the list folks could discuss it a bit more so we can see where the discussion leads. -chris On Wed, Nov 14, 2012 at 5:18 PM, Christopher Morrow <[email protected]> wrote: > GROW Folks, > The SIDR working group is working on security for origination and path > data related to BGP routes. There has been a note (a few) about SIDR's > effect(s) or not on 'route leaks'. There have even been a few notes on > 'what is a route leak'. To date there is a draft which discusses route > leaks: > > <http://tools.ietf.org/html/draft-foo-sidr-simple-leak-attack-bgpsec-no-help-02> > > where the authors have attempted to describe one (or many possible) > situations which are called 'route leaks'. They also attempt to > outline security issues which are follow-on effects of the situation > described. > > SIDR attempted to look at route-leaks and came up a bit stymied, they > asked IDR for some assistance with the issue, IDR pushed back to GROW > to decide: > 1) What is a 'route leak' (perhaps the above draft identifies one > examplar to be used in that definition) > 2) Are 'route leaks' a problem that Operations folks care about > 3) Should IDR (or the IETF proper) address 'route leaks' with some > form(s) of fix action. > > The end result of the above 3 steps is to push back into IDR one of > two action requests: > 1) "Yes, route leaks are a problem, please fix them." > or > 2) "No, route leaks are not a problem, take no action." > > If #1 above is the answer, and IDR decides that changes to the BGP > protocol are warranted (or are a possible solution to the problem) > then SIDR has agreed to do what they can to 'secure' the bits > added/changed/used in that endeavor. > > Could we have some discussion on-list about this problem, and some > discussion about whether or not the draft referenced above fits the > definition we would like to use for 'route leak'? I would also like > the authors of the draft to decide where they would like to take their > draft: > 1) SIDR > 2) IDR > 3) GROW > 4) other > > Thanks! > -Chris > (co-chair 1:2 of grow, and 1:3 in sidr) _______________________________________________ GROW mailing list [email protected] https://www.ietf.org/mailman/listinfo/grow
