Please note that, for the specific case above, I did not mention "complicated"&  
"burdensome" prefix-list filtering … just AS_PATH sanity check filtering, i.e.: if you see AS 
(FOO|BAR|BAZ) in the path, drop (don't learn) the route.  Also, I would note that this type of 
configuration re-emphasizes what Russ White has said, specifically that (this) policy is local to each 
AS and is _not_ 'shared' with any other ASN.

understood, don't disagree... and yes, Russ's point about the local
policy not being exposed publicly means ... we can't today figure this
out easily.

Unless you're willing to expose your policy publicly, or at least within the realm of partners you expect to help you enforce it. One of the problems with SIDR has been the constant insistence that "policy not be exposed publicly."

I'll say it again.

1. All security is about exposing and enforcing intent.

2. You can only secure intent you know and understand. You can't expect someone who doesn't know what you mean to do what you want, no matter how nicely you ask.

3a. We can decide that those who want to secure anything must publicly (or semi-publicly) declare what it is they want secured.

3b. We can decide that we "only want to secure the BGP spec," which opens another wormhole (though if that's the wormhole you'd like to go down, I'd be happy to transfer this work to IDR, where the experts on that spec live).

3c. We can continue down the path of, "we can't tell anyone what we want them to do, we just expect them to read our minds and do what we intended."

SIDR seems determined to do 3c, no matter how unwise or how unrealistic.

:-)

Russ

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to