Niranjan,
I'd be happy to discuss observations which are not the output from
generative AI.
Nick
Niranjan Sharma wrote on 07/02/2026 00:23:
Hello, I reviewed draft-ietf-grow-bgpopsecupd-12
<https://datatracker.ietf.org/doc/draft-ietf-grow-bgpopsecupd/>(Updated
BGP Operations and Security). To ensure this BCP serves as a durable
reference for modern BGP security architecture, I submit the following
comments regarding RPKI integration and session authentication:
*1. RPKI-ROV and ASPA Cross-Referencing*
RFC 7454 predates widespread RPKI-ROV deployment. Given that Route
Origin Validation (RFC 6811) is now operationally deployed by major
transit providers and IXPs, this BCP should include guidance on ROV
deployment policy — specifically whether RPKI-Invalid routes should be
dropped or deprioritized, and the operational tradeoffs of each approach.
Additionally, the relationship between IRR-based prefix filtering
(which RFC 7454 relied on heavily) and RPKI should be clarified: are
they complementary, or should RPKI supersede IRR where available?
The companion ASPA verification work
(draft-ietf-sidrops-aspa-verification) should also be referenced, at
minimum informatively, as an emerging mechanism for AS_PATH security
that complements ROV.
A BGP security BCP published in 2025 that omits RPKI-ROV leaves a gap
that will immediately date the document. Operators will look to this
BCP as the authoritative reference — it should reflect the current
state of the art.
*2. BGP Session Authentication: TCP-AO vs. MD5*
RFC 7454 recommended TCP MD5 (RFC 2385) for session authentication.
TCP-AO (RFC 5925) was designed as its replacement, offering key
rotation and algorithm agility. However, TCP-AO deployment remains
limited due to inconsistent vendor support and complex key management
in multi-vendor environments.
The updated BCP should take a clear position: recommend TCP-AO for new
deployments where supported, acknowledge MD5 as legacy but still
prevalent, and provide practical migration guidance for operators in
mixed environments. The absence of clear guidance here has a real cost
— operators default to the path of least resistance, which today means
MD5 or no session authentication at all.
Sincerely, *Niranjan Kumar Sharma *Snowflake Inc
IEEE Senior| CCS| IAENG| ISOC| OWASP
https://www.linkedin.com/in/niranjan-kumar-sharma-bohra/
[email protected] <mailto:[email protected]>
_______________________________________________
GROW mailing list -- [email protected]
To unsubscribe send an email to [email protected]