On Wed, May 14, 2014 at 08:05:51AM -0400, Danny McPherson wrote:
> On May 13, 2014, at 2:22 PM, Jeffrey Haas <[email protected]> wrote:
> > Wes covered most of the points I would raise - missing security
> > considerations in particular.  Basically, if you filter using IRR and the
> > IRR has issues (perhaps maliciously induced), you'll have routing issues.
> > The entire first part of the document does very well at outlining where the
> > issues are and some of the paths for fixing them.
> 
> That makes sense to me, there are external dependencies and if you use them 
> you better have some sort of buffer or things could be really ugly.  Are 
> there other things you?d like to see included here?

I suspect volumes could be written there, but the answer to most of them is
RPKI and some form of bgpsec.  It's good enough for this particular
document.

-- Jeff

_______________________________________________
GROW mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/grow

Reply via email to