[picking on this message to base my comments]

On Tue, May 13, 2014 at 09:48:32AM -0400, George, Wes wrote:
> If I were to define a route leak succinctly, I???d say something like:
> 
> A route leak occurs when a valid (in this document???s case, valid=
> validated by RPKI Origin Validation and BGPSec) route announcement is
> propagated beyond its intended AS boundary. The AS boundary can be one, or
> an arbitrary number of ASNs away, and may be different for different BGP
> Peer ASNs. These leaks can occur due to either misconfigurations or
> malicious intent (I.e. An attempt to perform a MITM attack), (and any
> solution should provide means to prevent both types of leak).

This to a large extent identifies the problem: BGP *as a protocol* has no
idea what these boundaries are.  Thus, "intent" is up to the perception of
the involved parties.

This thread has looped a few iterations with "this is a problem!" and SIDR
basically saying "there's nothing in BGP here to secure".  Both things are
still true.

I think documenting route-leaks and their potential negative (or malicious)
consequences is worth GROW doing.

I think this issue exists even without bgpsec being involved.  While it's
correct that bgpsec doesn't add anything here, until the underlying base
protocol has some idea of what we can do, picking on bgpsec doesn't help.
If anything, I'd probably take the route-leak document and say "here's the
problem" with a one or two sentence note that bgpsec doesn't do much. 

In it's current form, I don't think the document is ready to progress.  I'd
even suggest it needs to be rescoped.

The interesting work is resurrecting the thread on injecting routing policy
intent into some system we can secure. :-)

-- Jeff

_______________________________________________
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow

Reply via email to