[secdir] Secdir last call review of draft-ietf-grow-bgp-session-culling-04

Paul Wouters <paul@nohats.ca> Mon, 25 September 2017 15:45 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E9157134307; Mon, 25 Sep 2017 08:45:49 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Paul Wouters <paul@nohats.ca>
To: secdir@ietf.org
Cc: grow@ietf.org, draft-ietf-grow-bgp-session-culling.all@ietf.org, ietf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.62.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150635434992.27366.574012206348474088@ietfa.amsl.com>
Date: Mon, 25 Sep 2017 08:45:49 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/_D76Fo5YvSBO4mr_pGRXG5ItSJw>
Subject: [secdir] Secdir last call review of draft-ietf-grow-bgp-session-culling-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Sep 2017 15:45:50 -0000

Reviewer: Paul Wouters
Review result: Ready

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written primarily for the benefit of the  security
area directors.  Document editors and WG chairs should treat  these
comments just like any other last call comments.

The summary of the review is Ready.

(note I am a tourist in the BGP area)

This document basically states that people doing network maintenance so often
make mistakes that leak into the global BGP table, that it would be a good idea
to just firewall all the BGP traffic going out of your network edge as a
preventive measure. It's a sad state of software/firmware that an external
firewalling process is deemed necessary to properly (re)configure BGP.

This document has an empty Security Considerations section. As this BCP
document is basically a "cut yourself off the internet while doing maintenance"
I agree that there is basically nothing worse that could happen other then not
doing this RFC BCP and then leaking faulty BGP information onto the public
internet. One could add something like "don't forget to delete the firewall
rules afterwards" or "be sure to use ipv4 and ipv6 rules to prevent BGP leaks",
but then again this whole band aid RFC is meant for people who apparently have
shown an inability of properly executing RFC's anyway, and this document just
tries to convince them to only cut themselves, and not everyone else.