Re: [RPSEC] BGP Security Requirements v08

Russ White <riw@cisco.com> Wed, 18 July 2007 17:38 UTC

Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBDTU-0002IX-6s; Wed, 18 Jul 2007 13:38:08 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43) id 1IBDTT-0002CT-1j for rpsec-confirm+ok@megatron.ietf.org; Wed, 18 Jul 2007 13:38:07 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBDTS-00026R-GY for rpsec@ietf.org; Wed, 18 Jul 2007 13:38:06 -0400
Received: from xmail08.myhosting.com ([168.144.250.251]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IBDTP-0000qr-5L for rpsec@ietf.org; Wed, 18 Jul 2007 13:38:06 -0400
Received: (qmail 6158 invoked from network); 18 Jul 2007 17:38:00 -0000
Received: from unknown (HELO [192.168.100.205]) (Authenticated-user:_russ@riw.us@[65.190.218.139]) (envelope-sender <riw@cisco.com>) by xmail08.myhosting.com (qmail-ldap-1.03) with ESMTPA for <curtis@occnc.com>; 18 Jul 2007 17:38:00 -0000
Message-ID: <469E4FEB.4080307@cisco.com>
Date: Wed, 18 Jul 2007 13:37:47 -0400
From: Russ White <riw@cisco.com>
User-Agent: Thunderbird 2.0.0.4 (Windows/20070604)
MIME-Version: 1.0
To: curtis@occnc.com
Subject: Re: [RPSEC] BGP Security Requirements v08
References: <200707181634.l6IGY7h1026467@harbor.brookfield.occnc.com>
In-Reply-To: <200707181634.l6IGY7h1026467@harbor.brookfield.occnc.com>
X-Enigmail-Version: 0.95.2
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081
Cc: rpsec@ietf.org, Sandy Murphy <sandy@tislabs.com>
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>   The protocol MUST support a mechanism ... [to connect islands, sic]
> 
>   The protocol MUST keep authentication information reasonable small.
>   If that information needs to be large in order to be robust, then
>   the protocol SHOULD provide an alternate smaller digest that is less
>   likely to get tossed.
> 
>   ISPs SHOULD try to pass information to non-authenticating peers.
> 
>   ISPs SHOULD prefer information from a subset or trustworthy
>   non-authenticating peer AS with partial authentication covering all
>   less known AS over information where untrusted non-authenticating AS
>   are in the path.
> 
>   Non-authenticating AS should pass the authentication information
>   unchanged unless doing so is infeasible due to router memory
>   constraints.

Maybe this would work?

The protocol SHOULD either either be designed so:

o Non-authenticating implementations will pass the authentication
information without modification.

o The authentication information may be passed between authenticating
implementations outside the BGP protocol.

Would that cover what you're trying to get to?

:-)

Russ

- --
riw@cisco.com CCIE <>< Grace Alone

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGnk/rER27sUhU9OQRAhb+AJ0WPdWfJghpG0l/0pBxJ5E2UcOyXACeNV+G
sobdBs31dQmkGSMWEuQOLso=
=crZa
-----END PGP SIGNATURE-----


_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www1.ietf.org/mailman/listinfo/rpsec