[secdir] SecDir review of draft-ietf-opsec-bgp-security-05

Alexey Melnikov <alexey.melnikov@isode.com> Mon, 13 October 2014 09:34 UTC

Return-Path: <alexey.melnikov@isode.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com []) by ietfa.amsl.com (Postfix) with ESMTP id 02F1F1A1B4D for <secdir@ietfa.amsl.com>; Mon, 13 Oct 2014 02:34:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.386
X-Spam-Status: No, score=-1.386 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.786] autolearn=ham
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id mIZ3l-CX4o2X for <secdir@ietfa.amsl.com>; Mon, 13 Oct 2014 02:34:08 -0700 (PDT)
Received: from statler.isode.com (ext-bt.isode.com []) by ietfa.amsl.com (Postfix) with ESMTP id 55BA01A00D8 for <secdir@ietf.org>; Mon, 13 Oct 2014 02:34:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1413192844; d=isode.com; s=selector; i=@isode.com; bh=8s894aKrIsTDXsyTcsBDTG6E9mls+gHFH+SZiuPSyVE=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=pr87RGYbL1t6tp1f4nyNAT3dhzNOORJKQ49qS1cgWGfLl1tAKk+kkbn7h7VBHXzC7oUp1X 1EdZFirHG+MfIsM2lwg9L04ycgR+7cypVRO8c0ULtiweAKfu38p05EBpEu205UeE+OkFQl FixdZLkSz26qCLd0+5OUW6BmQGNc7BA=;
Received: from [] (dhcp-47.isode.net []) by statler.isode.com (submission channel) via TCP with ESMTPA id <VDuchwAycKSe@statler.isode.com>; Mon, 13 Oct 2014 10:34:03 +0100
Message-ID: <543B9C9B.7050100@isode.com>
Date: Mon, 13 Oct 2014 10:34:19 +0100
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
To: secdir@ietf.org
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/secdir/6HpC4njjOvWRPOUnUNXZnKC0Chs
Cc: draft-ietf-opsec-bgp-security.all@tools.ietf.org
Subject: [secdir] SecDir review of draft-ietf-opsec-bgp-security-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Oct 2014 09:34:09 -0000


I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the IESG. 
  These comments were written primarily for the benefit of the security 
area directors.  Document editors and WG chairs should treat these 
comments just like any other last call comments.

BGP (Border Gateway Protocol) is the protocol almost exclusively used in 
the Internet to exchange routing information between network domains. 
This document describes measures to protect the BGP sessions itself 
(like TTL, TCP-AO, control plane filtering) and to better control the 
flow of routing information, using prefix filtering and automatization 
of prefix filters, max-prefix filtering, AS path filtering, route flap 
dampening and BGP community scrubbing.

This document is entirely about BGP operational security. As the 
security consideration points out it doesn't talk about existing BGP 
implementations and their vulnerabilities. I think the document is 
covering operational security of BGP well.