Understanding the "real" threats, and worked, real-world examples, is important.

I cannot believe anyone in this WG would be ignorant of things like this:

http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-pilosov-kapela.pdf

Does this illustrate the importance of not only validating origins,
but also only using signed prefixes if you are participating in
BGPsec?

And the importance of minimizing or eliminating the ability of someone
currently off-axis, from becoming on-axis?

Preferably eliminating exploitation of lack of proper trust boundaries
WRT leakage (reannouncement permissions)?

(It is difficult to change from off-axis to on-axis without "leaking"
- the only time "leaking" isn't strictly required, is when already
on-axis.)

Jakob, please view the whole presentation above. It was more than 3
years ago... You should have heard of it by now.

Brian
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to