Re: [RPSEC] Last Call for draft-ietf-rpsec-bgpsecrec-09
Joe Touch <touch@ISI.EDU> Tue, 11 March 2008 11:42 UTC
Return-Path: <rpsec-bounces@ietf.org>
X-Original-To: ietfarch-rpsec-archive@core3.amsl.com
Delivered-To: ietfarch-rpsec-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 715873A6DA8; Tue, 11 Mar 2008 04:42:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.64
X-Spam-Level:
X-Spam-Status: No, score=-100.64 tagged_above=-999 required=5 tests=[AWL=-0.203, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4GzDkbuQWAGs; Tue, 11 Mar 2008 04:42:24 -0700 (PDT)
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7A56A28C3B1; Tue, 11 Mar 2008 04:42:24 -0700 (PDT)
X-Original-To: rpsec@core3.amsl.com
Delivered-To: rpsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A44B13A6C6A for <rpsec@core3.amsl.com>; Tue, 11 Mar 2008 04:42:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lVOXP3ShLhUJ for <rpsec@core3.amsl.com>; Tue, 11 Mar 2008 04:42:22 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by core3.amsl.com (Postfix) with ESMTP id A8E6F3A688F for <rpsec@ietf.org>; Tue, 11 Mar 2008 04:42:22 -0700 (PDT)
Received: from [127.0.0.1] ([63.133.180.130]) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id m2BBcT5N001654 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 11 Mar 2008 04:38:30 -0700 (PDT)
Message-ID: <47D66F00.3090903@isi.edu>
Date: Tue, 11 Mar 2008 04:37:36 -0700
From: Joe Touch <touch@ISI.EDU>
User-Agent: Thunderbird 2.0.0.12 (Windows/20080213)
MIME-Version: 1.0
To: Russ White <riw@cisco.com>
References: <47C414C3.7010408@cisco.com>
In-Reply-To: <47C414C3.7010408@cisco.com>
X-Enigmail-Version: 0.95.6
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: rpsec@ietf.org
Subject: Re: [RPSEC] Last Call for draft-ietf-rpsec-bgpsecrec-09
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0272817021=="
Sender: rpsec-bounces@ietf.org
Errors-To: rpsec-bounces@ietf.org
Russ White wrote: > Y'all: > > I'd like to start the two week last call window for > draft-ietf-rpsec-bgpsecrec-09. IMO, the document needs to be more clear about the layers at which security is being described. The abstract makes a specific assertion about scope (direct manipulation of BGP and information contained within), but the doc repeatedly exceeds that scope by discussing issues of TCP integrity. The ONLY exception to this is the kind of "binding" issue of taking advantage of associations in IPsec or TCP/MD5 (and its potential successors) in pinning BGP. Issues of network or transport layer protection are out of scope, and need to be removed. Specific suggestions: Abstract - would benefit from explicitly stating whether this ifocuses net, transport, or routing layer requirements. It appears to focus on routing (as per the "Attacks that do not..." assertion), but this needs to be carried throughout the document. Abstract - If "attacks that do not involve direct manipulation of BGP, and the information contained within BGP, are outside the scope of this document", then the mention of TCP issues are outside the scope of this document. MUST/MAY/SHOULD - it's not clear that such terms should be used in an Informational document, IMO. sec 3., first bullet on peer comm: I disagree that TCP integrity is relevant, if the assertion in the abstract about scope is accurate. sec 11., the note about linked authentication is important - and should be carried down to the network layer potentially. However, this section should be retitled "linked protection layers"; it is not really about transport security. The sentence about transport security requirements ('a detaileed treatment') should be moved to the intro, where the scope of the doc should be reinforced, and should include pointers to Bellovin's doc and TCP-Auth-Opt, IMO. sec 12. since transport is out of scope, it's not clear why TCP-MD5 key management shortcomings are relevant; this first sentence can be omitted without loss of impact.
_______________________________________________ RPSEC mailing list RPSEC@ietf.org https://www.ietf.org/mailman/listinfo/rpsec