On 12/03/13 10:21 -0400, Christopher Morrow wrote:
> On Tue, Mar 12, 2013 at 9:38 AM, Matthew Lepinski
> <mlepinski.i...@gmail.com> wrote:
> > A quick clarification: The current BGPSEC protocol specification can easily
> > be modified to protect the ORIGIN attribute. (That is, prevent it from being
> > modified by intermediate ASes.)
> >
> > I can very quickly put out an update to the BGPSEC protocol specification if
> > the working group decides that there is a requirement to protect the ORIGIN
> > attribute.
> 
> I wonder if it's worth protecting it as an option?
> In other words protect origin at the origin's discretion.

Although I was skeptical of origin code validation, this seems like another
reasonable alternative.  As an operator, I wouldn't mind the option of only
optionally validating origin code, or conversely on sending side allow those
who choose to have it validated as you suggest take the risk that the only
path in some cases may be dropped by others doing validation (if the majority
of their transit providers are already doing origin code manipulation for
instance). I'm seeing origin manipulation already from certain peers and I
believe some in the same situation many have choosen to flatten origin
themselves (set to igp on incoming) as a result to prevent it from affecting
their BGP decision process.  Other stub AS may use origin code as a traffic
engineering knob internally.  For these reasons, I think origin code
validation should be optional at best (this threat is not high on my list
frankly).

Jon
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to