Hello,

On 28/06/2024 09:28, Geoff Huston wrote:
Rather than attempt to spoon-feed a reader with a long list of detailed tasks that is most likely incomplete and will be quickly overtaken by subsequent changes in the operational environment, it's more useful to elevate the level of the document and describe what these operational security measures are trying to achieve and just leave it at that. This seems like a far more useful approach to me.

I think it could be useful to publish the detailed version somewhere. The new version is very generic, which makes it hard for operators to check if they've covered all the specifics. In level of detail I see similarities with ripe-823 (DNS Resolver Recommendations), so perhaps the RIPE routing-wg would be a good forum for this.

As a replacement of RFC7454, I agree the new approach is a good way forward.

Some comments on the 02 draft:

3.1

Add: "Ensure that unstable sessions do not threaten the availability of BGP speakers within the network."

"Ensure that the volume of ingested messages does not threaten the availability of BGP speakers within the network." - I think this is point would be better placed under section 4.1 (see below)

4.1

Add: "The number of NLRI received from a neighbor MUST NOT exceed the resources of the local router."

4.2

Add: "When redistributing NLRI from downstream networks, the local AS MUST be authorized to be an upstream for the routes."

In general, it may improve readability to have a separate sections for originating NLRI and re-distributing received NLRI (upstream/downstream).

4.3

"filter that specific attribute." -> "filter that specific attribute or the NRLI".

Kind regards,
Martin

_______________________________________________
GROW mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to