On Nov 3, 2011, at 11:33 AM, George, Wes wrote:
>> From: sidr-boun...@ietf.org [mailto:sidr-boun...@ietf.org] On Behalf Of
>> Paul Hoffman
> 
>> the charter limits the topics that are meant to be
>> fully covered by the protocols.
>> 
>> Personally, I would prefer to see the threat model document say in the
>> introduction "the following topics are considered to be BGP security
>> threats but are not dealt with in this document:" followed by a list
> 
> [WEG]
> +1, or even have the document deal with them at least briefly, but be clear 
> that the current scope (or other limitations) makes it difficult to solve 
> them.

Another +1.


> Not to put words in Danny's mouth, but I think that there are two general 
> concerns being raised about this document and the -reqs document.
> The first, which is far easier to deal with, is that a document(s) that 
> should be relatively solution-agnostic is being tailored to preselect/justify 
> an existing (though still nascent) solution based on the current charter 
> scope. It should be a full discussion of the problem space that leads to 
> selection and prioritization of the important problems to solve, acceptable 
> risks, etc. This then serves as a method to (design and) evaluate a solution, 
> whether there's only one, or whether there are multiples.
> I too find it a bit strange that we're doing things in the reverse order (or 
> in parallel), as usually these sorts of docs are written because the solution 
> doesn't exist yet, and this helps to clearly articulate the problem space, 
> rather than retroactively defining it.

+1


> Am I missing something regarding the intent of these documents?
> 
> The second is more a question of charter, and scope for the solution, which 
> is definitely limited by charter. However, having a more comprehensive 
> document on threats and design requirements may indeed drive a review of the 
> scope and charter, either because it brings to light additional 
> considerations, or because those who actually need to implement the solution 
> on their networks have provided feedback that leads to a different conclusion.
> I'm not recommending that we analyze the problem forever, because a partial 
> solution that is deployable may indeed be better than a theoretical one that 
> solves more problems, but never materializes (or at the very least takes 
> longer). But there is a balance point between those, and I'm not totally 
> certain we're at that equilibrium yet, regardless of the current charter. 
> There have now been multiple folks expressing concerns over the costs (be 
> they operational, capital, expense, etc) to implement vs the benefit based on 
> what risks are mitigated by the solution vs which are not and the exposure 
> that represents to one's chosen line of business, so there's some value in 
> having an eyes-wide-open discussion about it.

+1

-shane


> Thanks
> Wes George
> 
> 
> This E-mail and any of its attachments may contain Time Warner Cable 
> proprietary information, which is privileged, confidential, or subject to 
> copyright belonging to Time Warner Cable. This E-mail is intended solely for 
> the use of the individual or entity to which it is addressed. If you are not 
> the intended recipient of this E-mail, you are hereby notified that any 
> dissemination, distribution, copying, or action taken in relation to the 
> contents of and attachments to this E-mail is strictly prohibited and may be 
> unlawful. If you have received this E-mail in error, please notify the sender 
> immediately and permanently delete the original and any copy of this E-mail 
> and any printout.
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to