On Mar 21, 2012, at 3:33 PM, Russ White wrote:

> 
>> The current BGPSEC design, chooses to only focus on the protocol on the
>> wire, and starts with the attributes that had both an identified threat
>> and a existence proof of a reasonable mechanism to address that threat.
> 
> BGPSEC:
> 
> 1. Fails to actually protect the bits on the wire in a way that meets
> BGP's actual on the wire protocol semantics (see the addition of timers
> to prevent replay attacks).
> 2. Attempts to add policy to the mix (see the so-called "man in the
> middle attack") without actually calling it policy.
> 
> Given these failures, maybe it's time to start with requirements (rather
> than a solution) first, and see if we come to a better outcome.

+1

Eric
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to