Hi Danny,

Thanks for the comments.

In general, I don't like the idea of using an extcomm community to convey a prefixes validation state, I think we should deal with this problem natively (e.g., as BGPSEC inter-domain) if we're going to address the problem, in particular if we're not going to address the AS Confederations problem.

Can you describe specific concerns you have with using extended community?
It does work with confederations.

Furthermore, I don't like the deployment considerations, in particular because of "privilege escalation attacks" which could easily occur through misconfiguration across multiple attribute mapping functions, or simply because the extcomm was received from an BGP peer that isn't "upgraded to support the extensions
defined in this document":

  "In deployment scenarios where not all the speakers in an autonomous
  system are upgraded to support the extensions defined in this
document, it is necessary to define policies that match on the origin
  validation extended community and set another BGP attribute
  [I-D.ietf-sidr-pfx-validate] that influences the best path selection
  the same way as what would have been enabled by an implementation of
  this extension."

Do you have alternatives in mind for incremental deployment case?

Finally, this should certainly a normative reference in the pfx- validate draft.

Ack.

- Pradosh
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to