Re: [GROW] WGLC: draft-ietf-grow-bmp - ENDS: 7/8/2015 (aug 7 2015)

t.petch <ietfc@btconnect.com> Tue, 21 July 2015 08:45 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9ED801B2AFD; Tue, 21 Jul 2015 01:45:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rKPSVKuVhMV9; Tue, 21 Jul 2015 01:45:52 -0700 (PDT)
Received: from emea01-db3-obe.outbound.protection.outlook.com (mail-db3on0730.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe04::730]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 738471B2AEF; Tue, 21 Jul 2015 01:45:52 -0700 (PDT)
Received: from DBXPR07MB062.eurprd07.prod.outlook.com (10.242.147.20) by DBXPR07MB429.eurprd07.prod.outlook.com (10.141.15.13) with Microsoft SMTP Server (TLS) id 15.1.219.17; Tue, 21 Jul 2015 08:45:33 +0000
Authentication-Results: gmail.com; dkim=none (message not signed) header.d=none;
Received: from pc6 (81.151.167.91) by DBXPR07MB062.eurprd07.prod.outlook.com (10.242.147.20) with Microsoft SMTP Server (TLS) id 15.1.213.14; Tue, 21 Jul 2015 08:45:33 +0000
Message-ID: <01ed01d0c391$20fd74a0$4001a8c0@gateway.2wire.net>
From: "t.petch" <ietfc@btconnect.com>
To: Christopher Morrow <christopher.morrow@gmail.com>, grow-ads@tools.ietf.org, grow-chairs@ietf.org, grow@ietf.org, draft-ietf-grow-bmp@tools.ietf.org
References: <CAL9jLab+unxT9nGc0-sfop2EKm=VqZ7SLnCOMworbs73RYZ3Yw@mail.gmail.com>
Date: Tue, 21 Jul 2015 09:26:32 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
X-Originating-IP: [81.151.167.91]
X-ClientProxiedBy: DB5PR09CA0003.eurprd09.prod.outlook.com (25.161.191.13) To DBXPR07MB062.eurprd07.prod.outlook.com (10.242.147.20)
X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB062; 2:gyk++dRH0bCuRpi68qxjjgfKbEGeXWEv0pVz5VX0PPPjMHkkhxnF6H7+LcR9xJrY; 3:xyO3F5zqPC+G39o3llo2nQKjuqiqLDdyw46xnpvhZ0bdplWXQ8SuBTehkD3Su62WkyxZqxb9RuLjeAT756OpFovp1ppffqxIz5w+qXLHt+8uctM3oI1cYwKY10F8AO+Xwba5Jjiwe2+1JFGdxxwO9g==; 25:+K1u2NhzCBzu1hDmB/TdZf0y9gSFt6RDauGcWzh8DV3GNUp0onNcku2jypVk1vrkEenVNLJ+Dd2cJ1AODCkn0Or2N0U6hDyYi9bdxjVcdN1P9FeoiI23DyWcqhKs2qMdshQg/j7fak/nNpAVd0/YdzfctADGHvDililC1hDAqPngXQj9dSJCwFy0dlhQqjrD5d6nZz0E5gheenBocR2AbeZEt07jNJvhPJ9RKLME9VKJsM0noV9hvlgHe5DiD5Qp860zSTLRmUkwzEJHFfqt2A==; 4:kdQpm+Gjh96ohq5VLsR2s6wmE+ZVo0lR7Uk1PRQSVuvgYn4Ppt75oFkhkmlIv7RjorgOdKxiFT+GZCgVtw8zbbInyh3CULGpyIBZhraL6LrP89l4+qAP+TqJKsrbdm/Mh4pz/XLKbDvmWua5tdC2QfoZPyN4CFSw0YMqLsg8hhYLgLG7fkbM0yK/4YTHoYhAbjC1LeSRmgKGeF2mfwS/bAbrMsKPqIGFt0ilsIiAmnnoet3aUhxg1Ta0dwEkAzTbqpHg+pW3OZfaZrAiqpvdsv8JqAGLYcGi9Ck2Z+h3jps=
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:; SRVR:DBXPR07MB062; UriScan:; BCL:0; PCL:0; RULEID:; SRVR:DBXPR07MB429;
X-Microsoft-Antispam-PRVS: <DBXPR07MB0628BA2590ACF2AC2F12A9DA0840@DBXPR07MB062.eurprd07.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:;
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(5005006)(3002001); SRVR:DBXPR07MB062; BCL:0; PCL:0; RULEID:; SRVR:DBXPR07MB062;
X-Forefront-PRVS: 0644578634
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6009001)(13464003)(5423002)(51444003)(377454003)(23756003)(15975445007)(77096005)(62236002)(14496001)(42186005)(50466002)(84392001)(61296003)(19580395003)(81816999)(81686999)(76176999)(5001770100001)(50986999)(19580405001)(2201001)(86362001)(116806002)(87976001)(44716002)(46102003)(47776003)(107886002)(5001960100002)(44736004)(77156002)(66066001)(62966003)(40100003)(230783001)(92566002)(33646002)(50226001)(189998001)(122386002)(74416001)(7726001)(2101003); DIR:OUT; SFP:1102; SCL:1; SRVR:DBXPR07MB062; H:pc6; FPR:; SPF:None; MLV:sfv; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB062; 23:Y4l3ZpH6PgkszfVbD48B7HR3Fd5dwtBf21FNVERq0Ulje0lm+rI8mgMWZriLf2guZ6J7wu2NqCGbJGnkbBVusNKt3U4cC8cI4epAShjYf27Uuh8wRenSL/U+w6ZzwzVkrFDk3bICYXQPGmnzRyP5QOoT5OcEGZ7EWYx54UO4QuFGQ2fp3MLwn3ZtNshi6sH7I8+v0d+NSuX+oZu13HhbGQbYPSbDeWoWWNL0oUNH/B4Wa7PXmXqYmL3VMXGFlLekg4MPWW2ILFyfRfmVkd7Zsj8QtYE+KxgfuYv4SyWLjZGLVz8Zlds9blm1dg0z2siGpsQ1h5fKNFsYTpMXQUAkL5EjfPMzan+30UA3xOfH3V7PpDmwb3UMTKqNHujaEQhgc1yBKmvyOGGebw40n+CY9muw4SyPk9LVnqz+t7ti/SwwsR3lkJ26JyIHEi/ZSr5mJMn2NgbyrrolUHLXvgS3y8uiINSsjUjFlVpX0dMQm9sbc8wLFPhYPPEFQBPOW9Vj/uxUGx1NvoNxtZU66XdQ6crV9t7YGvB3yFOPa2dIKELkqGyZgiHaESEwICSB4KbHcNFmzqKbbDBP0ZZjA6dt0lDEukJrr/M7UdkJS7tL0TX9ei4bbNdgdpmLPd8sqNQh5hk5b6PF3QJq9vBcKy3kB2lslHuYayW9B/X2VKfKkeOppkikZCP6LudPuOMFHPjgQxkRLS7uui/eVvsqILtfOYP0YEcSI7K4CkyDEOCN9P+ycq5gPhHM9671LmfnTPdO+sJqp2wYpv96AeF+ZTGa5LvvNNKN4cMpEO4d1uxSr3nHqV4A2U7P0LK+G/P7SeYZDt+fc1jLyzHTtwr0Ff/XRc6jV8kevT2TKc/vOfIlLeT12wNToWtEJGtruAyRwvGDtMhTlq4VX+m7J2XrHFNbwJHNSFNH1H22IWosJ8nIE/eTzrLFIHovua7ikEFGJPFe2ZHp66qixR0xrGAUG4NEgJjlx3Tbl0CyOpIZeJ3UHliPz/NFVbrMJjV9mPEm5M9mHXJr4RVwj9NNWS3FBiTTTEwTFgR/MV9QEvtzXm4192lkJarRj5u1DRtGEu69cz83XMhgxTG0yvm/vZ9khi63xyiZRDZKx0k3YiJiN3VsxUk=
X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB062; 5:F3vTZKC0ZuXplcOYNdYPl1wMNGdnK+WDeV/2dhNamzD0Lio8ILSP1um1lGr3fSHF8sdAxYqFbl5JMYf8SVOyGePABOw9K7TzkMiOPFAge5xORFJXYbS5h1we+CJ3DLigmi1QA3a9tgl5+qBTJlTmKg==; 24:Nq1e1zjo2yeVgIBynPPmD1j0X/+rx7qXM+LzgDoAMpkIFXvOIMPN7Kqd2aw4ubmLdGOjPHyXX6n2CiqiKFBH7YIdfi/tunz+Mdn/N1vqnvw=; 20:3tn5Ys5FuF/usL+UnCYIqgWfZs34+RY+0vdSqMaqo9ocsbRqP/HqJcd55ld3XExv22p9CiWC9t8g4i6QIBqAWA==
SpamDiagnosticOutput: 1:23
SpamDiagnosticMetadata: NSPM
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jul 2015 08:45:33.3429 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBXPR07MB062
X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB429; 2:3MUWPj3U1XRQeyvjwwItjAiqyDLkANQ+O3+NYG0JEIUHrJDnS1CwzsfxHGP9Mnv4; 3:wwxdtWX/22D09qXwpNGF+SbtiDToZTlarJ09xiMWCtbehwxqlHHVE+ZNePr9dGhJtucOFw4ks/7e3HrhKTPAQpCM586f/3MJ+hJbge6JkR1cRswYIXd+zPJ4BhOky9HrEO8pj/CYKSSceWm/cTATGw==; 25:J7/nSRzoeIwo0Oecb1/MmFWdfMF1yGWdmEer7nTwfC3IAoezDR0JpVM1u5cpFxR6EKktLZyhozzc6GeWV9GZHMv6vM1+vL/8xUuQIVT4KpC0O+ZehHccedNqoVVSOT5gFIt1TPdRnsCVgOYiyQ1DS4Loaro5lR4Iba2Z1mWWB4UVF0gqIfV+us19vjsE9kgdEnpXjydPN2Sm7Z10mqc/A+QMr7vsarOZn16yTRtoEkRBlEwHgBPkEZjlx7wy02yGaZ/vcSuv40nBFOEXq01iTQ==; 23:jR6K3OzGdVyzZUNoRETDbMPq7bNrbStrOxRhfVOyAgtHcYLRklsWSfEpy90+F1sPy/Vl2FWn5pBx1wPsrpgdJY97sojD4rulNiwNjv/DKHuyZoS1z1VQNLUtuW+0ID4R7hPu9MAVYRGyyUxXVqH1MM49YDkGcTuq6VwxuuPQ+60=
X-OriginatorOrg: btconnect.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/grow/m6ifIfOuOc3sEvRtVjv2p8GOD94>
Subject: Re: [GROW] WGLC: draft-ietf-grow-bmp - ENDS: 7/8/2015 (aug 7 2015)
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jul 2015 08:45:54 -0000

Looking at the Security Considerations, I would like to see more.

An SNMP MIB module calls out which objects might be sensitive to a GET
(or SET) while this just has a blanket warning. The Internet only exists
because this kind of information is propagated to all and sundry so if
this introduces a threat, then I think more detail is needed, especially
as the I-D goes on to say 'MAY use some type of secure transport' which
is somewhat open!  If, for example, this is more sensitive because it is
exposing Adj-RIB-in pre the application of policy, then I think that
that needs saying; or whatever.

I think that the last paragaph makes a good point, identifying a threat,
but weakens it by calling for mutual authentication, which can be a pig
to
achieve.  If the threat is masquerade of a monitored router, then only
the router needs authentication which is much easier, and so more likely
to happen.

/IPSec/IPsec/

Tom Petch


----- Original Message -----
From: "Christopher Morrow" <christopher.morrow@gmail.com>
To: <grow-ads@tools.ietf.org>; <grow-chairs@ietf.org>; <grow@ietf.org>;
<draft-ietf-grow-bmp@tools.ietf.org>
Sent: Sunday, July 19, 2015 12:05 AM

> Howdy Grow folk,
> I think at the meeting in 48hrs time Jon Scudder plans to ask (again)
> for WGLC for: draft-ietf-grow-bmp
> (https://www.ietf.org/internet-drafts/draft-ietf-grow-bmp-09.txt)
>
> Let's all have  read through ,decide if we're happy and get this
> pushed along to the IESG for review/pulication. This is the abstract
> of the document:
>
> "This document defines a protocol, BMP, that can be used to monitor
>    BGP sessions.  BMP is intended to provide a more convenient
interface
>    for obtaining route views for research purpose than the screen-
>    scraping approach in common use today.  The design goals are to
keep
>    BMP simple, useful, easily implemented, and minimally service-
>    affecting.  BMP is not suitable for use as a routing protocol."
>
> Thanks!
> -chris morrow
> (co-chair 1 or 2)