On 5/12/14, 11:35 PM, "Christopher Morrow" <christopher.mor...@gmail.com>
wrote:


>possibly the authors are aiming at just defining what a leak is (one
>example type) so discussions can progress beyond 'what is a route leak
>again? can you point me at an RFC/definition of same?'

Well, not to be pedantic here, but since this has been adopted as a WG
document, the question is no longer what the authors’ intent was. The
question is what is the WG’s consensus of what this document is meant to
accomplish, and does it do so?

My view is that this document doesn’t define a route leak. It provides an
example of a route leak, but otherwise it mainly seems to follow that old
(and mostly useless) test for obscenity, “I’ll know it when I see it…”

In the interest of “send text”:

If I were to define a route leak succinctly, I’d say something like:

A route leak occurs when a valid (in this document’s case, valid=
validated by RPKI Origin Validation and BGPSec) route announcement is
propagated beyond its intended AS boundary. The AS boundary can be one, or
an arbitrary number of ASNs away, and may be different for different BGP
Peer ASNs. These leaks can occur due to either misconfigurations or
malicious intent (I.e. An attempt to perform a MITM attack), (and any
solution should provide means to prevent both types of leak).

But getting away from succinct toward complete requires defining what
route policy is and what intent means in this context, which should
include a discussion about how much info about policy or intent can be
derived from available data and tools today (perhaps with references to
the IRR data and other analysis tools) and whether there is enough
information there to distinguish an intentional route leak (i.e. A
conscious deviation from standard routing policy to allow a subset of
routes or ASNs to be propagated to a type of peer that normally wouldn’t
see them) from an unintentional one.

Thanks,
Wes


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
_______________________________________________
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow

Reply via email to