[karp] Fwd: I-D Action: draft-ietf-opsec-bgp-security-00.txt

"Joel M. Halpern" <jmh@joelhalpern.com> Fri, 18 January 2013 19:03 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: karp@ietfa.amsl.com
Delivered-To: karp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A36121F86EF for <karp@ietfa.amsl.com>; Fri, 18 Jan 2013 11:03:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.265
X-Spam-Level:
X-Spam-Status: No, score=-102.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YNzNoqRE7i9k for <karp@ietfa.amsl.com>; Fri, 18 Jan 2013 11:03:26 -0800 (PST)
Received: from morbo.mail.tigertech.net (morbo.mail.tigertech.net [67.131.251.54]) by ietfa.amsl.com (Postfix) with ESMTP id C807621F863A for <karp@ietf.org>; Fri, 18 Jan 2013 11:03:25 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) by morbo.tigertech.net (Postfix) with ESMTP id 527A5A63D8 for <karp@ietf.org>; Fri, 18 Jan 2013 11:03:25 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 674121CC9A0 for <karp@ietf.org>; Fri, 18 Jan 2013 11:03:24 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from [10.10.10.104] (pool-70-106-134-125.clppva.east.verizon.net [70.106.134.125]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 068A81CC99F for <karp@ietf.org>; Fri, 18 Jan 2013 11:03:21 -0800 (PST)
Message-ID: <50F99C6A.4070600@joelhalpern.com>
Date: Fri, 18 Jan 2013 14:03:06 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: "karp@ietf.org" <karp@ietf.org>
References: <20130118144835.18337.67362.idtracker@ietfa.amsl.com>
In-Reply-To: <20130118144835.18337.67362.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20130118144835.18337.67362.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [karp] Fwd: I-D Action: draft-ietf-opsec-bgp-security-00.txt
X-BeenThere: karp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion list for key management for routing and transport protocols <karp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/karp>, <mailto:karp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/karp>
List-Post: <mailto:karp@ietf.org>
List-Help: <mailto:karp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/karp>, <mailto:karp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Jan 2013 19:03:28 -0000

In case this did not arrive in your in-box...
Yours,
Joel


-------- Original Message --------
Subject: I-D Action: draft-ietf-opsec-bgp-security-00.txt
Date: Fri, 18 Jan 2013 06:48:35 -0800
From: internet-drafts@ietf.org
Reply-To: internet-drafts@ietf.org
To: i-d-announce@ietf.org
CC: opsec@ietf.org


A New Internet-Draft is available from the on-line Internet-Drafts 
directories.
  This draft is a work item of the Operational Security Capabilities for 
IP Network Infrastructure Working Group of the IETF.

	Title           : BGP operations and security
	Author(s)       : Jerome Durand
                           Ivan Pepelnjak
                           Gert Doering
	Filename        : draft-ietf-opsec-bgp-security-00.txt
	Pages           : 24
	Date            : 2013-01-18

Abstract:
    BGP (Border Gateway Protocol) is the protocol almost exclusively used
    in the Internet to exchange routing information between network
    domains.  Due to this central nature, it's important to understand
    the security measures that can and should be deployed to prevent
    accidental or intentional routing disturbances.

    This document describes measures to protect the BGP sessions itself
    (like TTL, MD5, control plane filtering) and to better control the
    flow of routing information, using prefix filtering and
    automatization of prefix filters, max-prefix filtering, AS path
    filtering, route flap dampening and BGP community scrubbing.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-opsec-bgp-security

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-opsec-bgp-security-00


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
I-D-Announce mailing list
I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt