On Nov 4, 2011, at 9:34 PM, Randy Bush wrote:

> o We can not know intent, should Mary have announced the prefix to Bob
> 
> o But Joe can formally validate that Mary did announce the prefix to Bob
> 
> o Policy on the global Internet changes every 36ms, new customers, new
>  peers, circuit moves, ...
> 
> o We already have a protocol to distribute policy or its effects, it is
>  called BGP 
> 
> o BGPsec validates that the protocol has not been violated, and is not
>  about intent or business policy

o And therefore, BGPsec does not mitigate the leak problem, agreed

o Not mitigating the leak problem could be an unacceptable residual
risk to many looking to better secure BGP, particularly given that it's a 
natural evolution to attackers in a world of "BGPSEC/SBGP", and can 
happen as a simple matter of misconfiguration, as Jared's leak page
illustrates: http://puck.nether.net/bgp/leakinfo.cgi

o BGPSEC is awfully heavy to not address this fundamental "business 
policy" vulnerability

o As for "bits on the wire" solutions, I don't recall seeing that as a hard 
requirement, although I will admit that BGPSEC certainly goes a long 
way to turn RPKI into "bits on the wire", which has _many implications

o I'm pretty sure I can configure static routes every 36ms with far less 
overhead

o By your definition, I'd prefer to solve the "business policy" problem.

-danny
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to