Understanding the "real" threats, and worked, real-world examples, is important.
I cannot believe anyone in this WG would be ignorant of things like this: http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-pilosov-kapela.pdf Does this illustrate the importance of not only validating origins, but also only using signed prefixes if you are participating in BGPsec? And the importance of minimizing or eliminating the ability of someone currently off-axis, from becoming on-axis? Preferably eliminating exploitation of lack of proper trust boundaries WRT leakage (reannouncement permissions)? (It is difficult to change from off-axis to on-axis without "leaking" - the only time "leaking" isn't strictly required, is when already on-axis.) Jakob, please view the whole presentation above. It was more than 3 years ago... You should have heard of it by now. Brian _______________________________________________ sidr mailing list [email protected] https://www.ietf.org/mailman/listinfo/sidr
