[Idr] Fw: New Version Notification for draft-ietf-idr-route-leak-detection-mitigation-04.txt

"Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov> Sat, 09 July 2016 00:45 UTC

Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14B1F12B051 for <idr@ietfa.amsl.com>; Fri, 8 Jul 2016 17:45:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8qck49sWumFK for <idr@ietfa.amsl.com>; Fri, 8 Jul 2016 17:45:53 -0700 (PDT)
Received: from gcc01-CY1-obe.outbound.protection.outlook.com (mail-cy1gcc01on0126.outbound.protection.outlook.com [23.103.200.126]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64D6912B040 for <idr@ietf.org>; Fri, 8 Jul 2016 17:45:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=lihC5fZyBNWSRjhst7u8ifuulVg3fZf956vfS+R3Q1Y=; b=qIuQfzDUYoDpr70dRHd+xC195Icoo0F1DsIjEISRRzQzFzwg7ZseGVv9R7t23KsTWDRLZ6qWeBiawKh/Rf0QwdxqG+h2oQkfF3I96ca0XeTwMNhTi1N4gnx5ApF/w3FCvLCheTv+0Xwq/hSYkJrs7JJOrRzkpeZ/NARdVZ/GC9s=
Received: from DM2PR09MB0446.namprd09.prod.outlook.com (10.161.252.145) by DM2PR09MB0446.namprd09.prod.outlook.com (10.161.252.145) with Microsoft SMTP Server (TLS) id 15.1.534.14; Sat, 9 Jul 2016 00:45:51 +0000
Received: from DM2PR09MB0446.namprd09.prod.outlook.com ([10.161.252.145]) by DM2PR09MB0446.namprd09.prod.outlook.com ([10.161.252.145]) with mapi id 15.01.0534.020; Sat, 9 Jul 2016 00:45:51 +0000
From: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
To: "idr@ietf.org" <idr@ietf.org>
Thread-Topic: New Version Notification for draft-ietf-idr-route-leak-detection-mitigation-04.txt
Thread-Index: AQHR2WCrrrbulJtx4EiHTxiW5uF0mKAO+eVj
Date: Sat, 9 Jul 2016 00:45:51 +0000
Message-ID: <DM2PR09MB04460A32DA1666EA54837F5F843D0@DM2PR09MB0446.namprd09.prod.outlook.com>
References: <20160708213534.32176.45760.idtracker@ietfa.amsl.com>
In-Reply-To: <20160708213534.32176.45760.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=kotikalapudi.sriram@nist.gov;
x-originating-ip: [129.6.219.4]
x-ms-office365-filtering-correlation-id: 21e7e9d2-4b68-4b0c-2565-08d3a79260b9
x-microsoft-exchange-diagnostics: 1; DM2PR09MB0446; 6:Ufnw5J/4L5/9GEH2Dqyku/9rG+jvDX6JlO4VlKK1gl1+RaezBMTSEybOIiWb4LL7m9MVVDDLfceikZsLlReZEgq4dW/fDO9ZOySjThA+nIK8tTlH8faJjpHmYLwNccMTXj4mJEvjq7UjaYdCVYYJQqNUc3ta2KQN2NgIz/ZfpYi+heUYA2r2vdSwwRPNvWUY7f5aloxhAGKV9nbw2q+7ZP8k3NFFUJfEqjSkul4+0LrnBqrMcr3TodNhBlxSn46rsM8cdDr7Z40gdteWWu43bdFXTm9EiDChJKENMu5SyNRLSvVOLyIPmFeSO6Am7mRLmOD//5rmrC6EhOgsQ3tB+g==; 5:ppy7ONDYJoYBA0Du29kyxWASktI9t1vyLdpV3olCNAZkNLnhwIAL2v2EFN9KmnEDdRoGiQjI0o4Pxt7BUS2hk0Q9ojlNov5gUKIQE7V/qLiBJQKfYDa5BW35W0YZBHBxW2aECENJIxh6PhBrWMjzPg==; 24:ZbNT7fOq0n1bf0CWbZ2j9U7jx9Dj03iyiJLtaEC/1DoAiSwQJ0c5cWldPagkntIhEsLT1VUcMnS2ffNzcz+vFht+cXgMZhlE2YBvgQ6TCDE=; 7:kzO7TjfwXgXvizA1oKCuRviYXkXDnBmP2WVRoSITABepx4HAQ63f6x8pRQBZscdElhaqwsX8ZUih8mE/r1WeqRL3z/Tufyrxi7VnuGnrA6k8XBTKCO0pRk/7JZpwrGN6QIT7QPCrzgQEvLpdIJ9JcQedRev3fj0EyYfnwhclX+Sb+TnODg5ahegZV6uh5ggbazw3AYHcN0mJGDMU1A/VHlUBPlkBA2WCOFtWfm5IhROKkwbP+UnPeUjXl6tEUZyS
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DM2PR09MB0446;
x-microsoft-antispam-prvs: <DM2PR09MB0446B882A3887CD26307B294843D0@DM2PR09MB0446.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026); SRVR:DM2PR09MB0446; BCL:0; PCL:0; RULEID:; SRVR:DM2PR09MB0446;
x-forefront-prvs: 0998671D02
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(7916002)(377454003)(189002)(199003)(377424004)(106356001)(10400500002)(106116001)(97736004)(15650500001)(76576001)(2900100001)(3280700002)(189998001)(66066001)(105586002)(86362001)(9686002)(8936002)(33656002)(2351001)(7736002)(7696003)(3846002)(99286002)(87936001)(50986999)(3660700001)(101416001)(305945005)(2906002)(6116002)(102836003)(7846002)(68736007)(5003600100003)(54356999)(586003)(5002640100001)(92566002)(450100001)(74316002)(122556002)(76176999)(15975445007)(19580405001)(77096005)(19580395003)(230783001)(2501003)(1730700003)(107886002)(3900700001)(110136002)(81166006)(5640700001)(8676002)(2950100001)(11100500001)(81156014); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR09MB0446; H:DM2PR09MB0446.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Jul 2016 00:45:51.4338 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR09MB0446
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/MLvQE_VbJCi3rQmeAqX6wbY8q4k>
Subject: [Idr] Fw: New Version Notification for draft-ietf-idr-route-leak-detection-mitigation-04.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jul 2016 00:45:56 -0000

Minor updates done in this new version:

1. Added a reference to the discussions from the NANOG list in June 2016
 which provide support for the material on "Intra-AS Messaging for Route Leak Prevention" in Section 3.2.

2. The last paragraph in Section 4 is new. 
This paragraph actually belongs more suitably at the end of Section 5.4.  Will make that move in the next revision.

Sriram
________________________________________
From: internet-drafts@ietf.org <internet-drafts@ietf.org>;
Sent: Friday, July 8, 2016 5:35 PM
To: Brian Dickson; Montgomery, Douglas (Fed); Keyur Patel; Andrei Robachevsky; Sriram, Kotikalapudi (Fed)
Subject: New Version Notification for draft-ietf-idr-route-leak-detection-mitigation-04.txt

A new version of I-D, draft-ietf-idr-route-leak-detection-mitigation-04.txt
has been successfully submitted by Kotikalapudi Sriram and posted to the
IETF repository.

Name:           draft-ietf-idr-route-leak-detection-mitigation
Revision:       04
Title:          Methods for Detection and Mitigation of BGP Route Leaks
Document date:  2016-07-08
Group:          idr
Pages:          22
URL:            https://www.ietf.org/internet-drafts/draft-ietf-idr-route-leak-detection-mitigation-04.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-idr-route-leak-detection-mitigation/
Htmlized:       https://tools.ietf.org/html/draft-ietf-idr-route-leak-detection-mitigation-04
Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-idr-route-leak-detection-mitigation-04

Abstract:
   [I-D.ietf-grow-route-leak-problem-definition] provides a definition
   of the route leak problem, and also enumerates several types of route
   leaks.  This document first examines which of those route-leak types
   are detected and mitigated by the existing origin validation (OV)
   [RFC 6811].  It is recognized that OV offers a limited detection and
   mitigation capability against route leaks.  This document specifies
   enhancements that significantly extend the route-leak prevention,
   detection, and mitigation capabilities of BGP.  One solution
   component involves carrying a per-hop route-leak protection (RLP)
   field in BGP updates.  The RLP field is proposed be carried in a new
   optional transitive attribute, called BGP RLP attribute.  The
   solution is meant to be initially implemented as an enhancement of
   BGP without requiring BGPsec [I-D.ietf-sidr-bgpsec-protocol].
   However, when BGPsec is deployed in the future, the solution can be
   incorporated in BGPsec, enabling cryptographic protection for the RLP
   field.  That would be one way of implementing the proposed solution
   in a secure way.  The document also includes a stopgap method for
   detection and mitigation of route leaks for an intermediate phase
   when OV is deployed but BGP protocol on the wire is unchanged.