On 5/12/14, 11:35 PM, "Christopher Morrow" <christopher.mor...@gmail.com> wrote:
>possibly the authors are aiming at just defining what a leak is (one >example type) so discussions can progress beyond 'what is a route leak >again? can you point me at an RFC/definition of same?' Well, not to be pedantic here, but since this has been adopted as a WG document, the question is no longer what the authors’ intent was. The question is what is the WG’s consensus of what this document is meant to accomplish, and does it do so? My view is that this document doesn’t define a route leak. It provides an example of a route leak, but otherwise it mainly seems to follow that old (and mostly useless) test for obscenity, “I’ll know it when I see it…” In the interest of “send text”: If I were to define a route leak succinctly, I’d say something like: A route leak occurs when a valid (in this document’s case, valid= validated by RPKI Origin Validation and BGPSec) route announcement is propagated beyond its intended AS boundary. The AS boundary can be one, or an arbitrary number of ASNs away, and may be different for different BGP Peer ASNs. These leaks can occur due to either misconfigurations or malicious intent (I.e. An attempt to perform a MITM attack), (and any solution should provide means to prevent both types of leak). But getting away from succinct toward complete requires defining what route policy is and what intent means in this context, which should include a discussion about how much info about policy or intent can be derived from available data and tools today (perhaps with references to the IRR data and other analysis tools) and whether there is enough information there to distinguish an intentional route leak (i.e. A conscious deviation from standard routing policy to allow a subset of routes or ASNs to be propagated to a type of peer that normally wouldn’t see them) from an unintentional one. Thanks, Wes This E-mail and any of its attachments may contain Time Warner Cable proprietary information, which is privileged, confidential, or subject to copyright belonging to Time Warner Cable. This E-mail is intended solely for the use of the individual or entity to which it is addressed. If you are not the intended recipient of this E-mail, you are hereby notified that any dissemination, distribution, copying, or action taken in relation to the contents of and attachments to this E-mail is strictly prohibited and may be unlawful. If you have received this E-mail in error, please notify the sender immediately and permanently delete the original and any copy of this E-mail and any printout. _______________________________________________ GROW mailing list GROW@ietf.org https://www.ietf.org/mailman/listinfo/grow