Niranjan,

I'd be happy to discuss observations which are not the output from generative AI.

Nick


Niranjan Sharma wrote on 07/02/2026 00:23:

Hello, I reviewed draft-ietf-grow-bgpopsecupd-12 <https://datatracker.ietf.org/doc/draft-ietf-grow-bgpopsecupd/>(Updated BGP Operations and Security). To ensure this BCP serves as a durable reference for modern BGP security architecture, I submit the following comments regarding RPKI integration and session authentication:

*1. RPKI-ROV and ASPA Cross-Referencing*

RFC 7454 predates widespread RPKI-ROV deployment. Given that Route Origin Validation (RFC 6811) is now operationally deployed by major transit providers and IXPs, this BCP should include guidance on ROV deployment policy — specifically whether RPKI-Invalid routes should be dropped or deprioritized, and the operational tradeoffs of each approach.

Additionally, the relationship between IRR-based prefix filtering (which RFC 7454 relied on heavily) and RPKI should be clarified: are they complementary, or should RPKI supersede IRR where available?

The companion ASPA verification work (draft-ietf-sidrops-aspa-verification) should also be referenced, at minimum informatively, as an emerging mechanism for AS_PATH security that complements ROV.

A BGP security BCP published in 2025 that omits RPKI-ROV leaves a gap that will immediately date the document. Operators will look to this BCP as the authoritative reference — it should reflect the current state of the art.

*2. BGP Session Authentication: TCP-AO vs. MD5*

RFC 7454 recommended TCP MD5 (RFC 2385) for session authentication. TCP-AO (RFC 5925) was designed as its replacement, offering key rotation and algorithm agility. However, TCP-AO deployment remains limited due to inconsistent vendor support and complex key management in multi-vendor environments.

The updated BCP should take a clear position: recommend TCP-AO for new deployments where supported, acknowledge MD5 as legacy but still prevalent, and provide practical migration guidance for operators in mixed environments. The absence of clear guidance here has a real cost — operators default to the path of least resistance, which today means MD5 or no session authentication at all.

Sincerely, *Niranjan Kumar Sharma *Snowflake Inc

IEEE Senior| CCS|  IAENG| ISOC| OWASP https://www.linkedin.com/in/niranjan-kumar-sharma-bohra/ [email protected] <mailto:[email protected]>


_______________________________________________
GROW mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to