Hi Tobias, WG,

Diff from rfc7454 as follows:

https://author-tools.ietf.org/iddiff?url1=rfc7454&url2=draft-ietf-grow-bgpopsecupd-01&difftype=--html

There are quite a lot of changes there and I'm going to make a bunch of specific comments about the text changes in this ID in separate emails, but want to say some more general things first.

First and foremost, bcp194 needs an update, so thanks for taking up the gauntlet on this - it's very welcome.

The main concern I have is that BCP194 is a document which is already referenced in national telecommunications security policies, and which will become more widely referenced in future, as the world moves towards risk-management based approaches to telecoms security.

From this point of view, the IETF needs to be careful about what's put into the document, and more importantly, what's not put in the document. There are plenty of potentially useful additions in the current round of updates, but for a document update of this type, future amendments need to be added sparingly, and should be conservative and principle-based in approach, rather than getting too detailed about implementation specifics.

In other words, I'd be in favour of the approach that the best outcome will be not when there's nothing left to add, but when there's nothing more that can be taken away.

In terms of the draft as it currently stands, I have concerns about the following areas of principal (in no particular order):

- scope creep: the abstract has moved from "describes measures to protect" to "This document provides a comprehensive list". I don't think that this is a wise move either to claim this or to aim in this direction.

- there are experimental / development ideas in there which are not widely used on production networks, and therefore inappropriate for BCP status, e.g. ASPA (still undergoing protocol behavioral change at the ietf in SIDROPS), RFC5549, etc. There's a mention of TCP-MD5 but using SHA1/SHA512 instead of MD5, which I'm not sure even exists.

- stuff which is bgp stack implementation dependent: e.g. Idempotency for Prefix filter Changes, prefix ruleset optimisation, etc.

- defining / redefining well known terms (most of section 3).

- being overly prescriptive, e.g. "9.2.1.1. Inbound Filtering" or "9.1.2. Order of Prefixfilters". All this is too detailed.

- things which don't really need to be mentioned, or if they do, then by reference only. e.g. "7.1.3. Recursively Computing Filters", or using BGP communities to signal ROV state (should reference draft-rpki-communities-harmful instead).

- things which seem like they're a good idea on first glance, e.g. "operators SHOULD NOT set a higher local preference for NLRI received via an IXP RS": no document is going to stop people from using localpref at IXPs, and other operators are going to drain traffic via RSs by draining prefixes from RSs, not by increasing the as-path length. Or e.g. recommending route flap dampening: we need extensive production telemetry to ensure that this is actually a good idea. The last time it was turned on globally, a lot of damage was done.

- things which are ephemeral. This is a document where everything that's written in it should be relevant in 10-20 years time. E.g. "Recently, an attack was observed", or section 6.3. notes "at the time of writing of this document" and suggests /24 + /48 for ipv4 / ipv6 prefixes lengths for interdomain routing. But for example, a well-known CDN has been announcing more specific prefixes over interdomain bgp sessions for several years.

- less is more.

These are general principles which should be kept in mind when writing text, i.e. the above isn't intended to be an exhaustive list of issues with the document.

I'll take up specific items in separate email threads.

Nick

_______________________________________________
GROW mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/grow

Reply via email to