On Wed, May 14, 2014 at 08:05:51AM -0400, Danny McPherson wrote: > On May 13, 2014, at 2:22 PM, Jeffrey Haas <[email protected]> wrote: > > Wes covered most of the points I would raise - missing security > > considerations in particular. Basically, if you filter using IRR and the > > IRR has issues (perhaps maliciously induced), you'll have routing issues. > > The entire first part of the document does very well at outlining where the > > issues are and some of the paths for fixing them. > > That makes sense to me, there are external dependencies and if you use them > you better have some sort of buffer or things could be really ugly. Are > there other things you?d like to see included here?
I suspect volumes could be written there, but the answer to most of them is RPKI and some form of bgpsec. It's good enough for this particular document. -- Jeff _______________________________________________ GROW mailing list [email protected] https://www.ietf.org/mailman/listinfo/grow
