[RPSEC] Re: Using IPSec for Routing Protocols

Stephane Bortzmeyer <bortzmeyer@nic.fr> Fri, 05 May 2006 08:56 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1Fbw6U-0006zN-5h; Fri, 05 May 2006 04:56:02 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Fbw6S-0006zI-KK for rpsec@ietf.org; Fri, 05 May 2006 04:56:00 -0400
Received: from mx2.nic.fr ([192.134.4.11]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Fbw6R-0001VR-Bh for rpsec@ietf.org; Fri, 05 May 2006 04:56:00 -0400
Received: from localhost (localhost.localdomain [127.0.0.1]) by mx2.nic.fr (Postfix) with ESMTP id 810E826C245; Fri, 5 May 2006 10:55:58 +0200 (CEST)
Received: from relay2.nic.fr (relay2.nic.fr [192.134.4.163]) by mx2.nic.fr (Postfix) with ESMTP id 72CFC26C242; Fri, 5 May 2006 10:55:57 +0200 (CEST)
Received: from batilda.nic.fr (batilda.nic.fr [192.134.4.69]) by relay2.nic.fr (Postfix) with ESMTP id 6CE0E58ED19; Fri, 5 May 2006 10:55:57 +0200 (CEST)
Received: by batilda.nic.fr (Postfix, from userid 1000) id 656C816A97B; Fri, 5 May 2006 10:55:57 +0200 (CEST)
Date: Fri, 05 May 2006 10:55:57 +0200
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: Lakshminath Dondeti <ldondeti@qualcomm.com>
Message-ID: <20060505085557.GA9540@nic.fr>
References: <20060504075906.GA14631@nic.fr> <20060504082605.60358.qmail@web8513.mail.in.yahoo.com> <6.2.5.6.2.20060504114213.03e90eb8@qualcomm.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <6.2.5.6.2.20060504114213.03e90eb8@qualcomm.com>
X-Operating-System: Debian GNU/Linux 3.1
X-Kernel: Linux 2.6.8-2-686 i686
Organization: NIC France
X-URL: http://www.nic.fr/
User-Agent: Mutt/1.5.9i
X-Virus-Scanned: by amavisd-new at mx2.nic.fr
X-Spam-Score: 0.0 (/)
X-Scan-Signature: cf4fa59384e76e63313391b70cd0dd25
Cc: rpsec@ietf.org
Subject: [RPSEC] Re: Using IPSec for Routing Protocols
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org

On Thu, May 04, 2006 at 11:50:50AM -0700,
 Lakshminath Dondeti <ldondeti@qualcomm.com> wrote 
 a message of 77 lines which said:

> So, Sandhya, are you saying that integrity protection in transit is
> the only requirement?  And, are you saying that there is no need for
> the recipient to be able to verify whether the claimed route or
> reachability information is in fact correct?

The charter of the WG does not mention it but the ID
draft-ietf-rpsec-routing-threats-07.txt is very clear that
falsification of routes by a router, even authentified, is a
problem. Therefore, IPsec cannot be the only approach in this WG.

See section 4.5


_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www1.ietf.org/mailman/listinfo/rpsec