On 2014-05-14 07:58, Jeffrey Haas wrote:

This to a large extent identifies the problem: BGP *as a protocol* has no idea what these boundaries are. Thus, "intent" is up to the perception of
the involved parties.

Ans therefore, the solve need not necessarily be IN BGP itself.

This thread has looped a few iterations with "this is a problem!" and SIDR basically saying "there's nothing in BGP here to secure". Both things are
still true.

Heh, perhaps.

I think documenting route-leaks and their potential negative (or malicious)
consequences is worth GROW doing.

Concur, especially since it's a global routing operations related issue that happens all the time, and persists whether BGPSEC is deployed fully or not.

I think this issue exists even without bgpsec being involved. While it's correct that bgpsec doesn't add anything here, until the underlying base protocol has some idea of what we can do, picking on bgpsec doesn't help. If anything, I'd probably take the route-leak document and say "here's the
problem" with a one or two sentence note that bgpsec doesn't do much.

I don't agree, and I don't believe this problem needs to be solved IN BGP. And I do believe it's extremely important to provide a stable reference to these attacks in order for folks to realize it doesn't solve this very basic problem.

In it's current form, I don't think the document is ready to progress.

What specifically would you change in the document, given that it's intent is to highlight how BGPSEC does not address the route leak issue, and that it's a real operational issue that at least the authors are concerned with?

I'd even suggest it needs to be rescoped.

If folks are interested in doing work more broadly than this then they're certainly welcome to. If they're not interested in doing the work then it's disingenuous to suggest it be rescoped as such, particularly at this stage.

The interesting work is resurrecting the thread on injecting routing policy
intent into some system we can secure. :-)

I suppose degrees of "interesting" is a matter of perspective, and the notion of strict linear thinking that suggests "injecting" it into the active routing system is the only way to solve the problem is perhaps why we keep dancing around this (and other adjacent topics such as anti-spoofing in the datapath). Quite frankly, I prefer inter-domain static routing or SDN over what I see BGPSEC-enabled RPKI bringing to the table - and I seriously mean that -- and they might well beat BGPSEC off the launchpad :-)

-danny

_______________________________________________
GROW mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/grow

Reply via email to