[secdir] Secdir early review of draft-ietf-idr-bgp-optimal-route-reflection-21

Linda Dunbar via Datatracker <noreply@ietf.org> Tue, 15 December 2020 21:56 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C27273A0140; Tue, 15 Dec 2020 13:56:11 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Linda Dunbar via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: idr@ietf.org, draft-ietf-idr-bgp-optimal-route-reflection.all@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.23.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <160806937175.20796.7391460851134145603@ietfa.amsl.com>
Reply-To: Linda Dunbar <linda.dunbar@futurewei.com>
Date: Tue, 15 Dec 2020 13:56:11 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/g9lBnPoeNPuQE2jwvkyP6dtMsSQ>
Subject: [secdir] Secdir early review of draft-ietf-idr-bgp-optimal-route-reflection-21
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Dec 2020 21:56:12 -0000

Reviewer: Linda Dunbar
Review result: Has Nits

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
 Document editors and WG chairs should treat these comments just like any other
 last call comments.

This document alters how  BGP Route Reflector computes the optimal routes on
behalf of clients. Instead using its own IGP cost to the AS Exit points, the
document describes the steps for RR to compute the optimal route by using 
Clients' position to the AS Exit points. The described method is useful when RR
is centralized.  For deployment with distributed RR closer to the clients, the
described method doesn't have any benefits.

Security Concern:
If RR's information of its clients topology is compromised, then the optimal
paths selected by the RR might not be accurate anymore.

Minor nits:
Page 7: Section 3.2.

"If the routing routing optimization requires ..."
Is it a typo? duplicated word "routing"?

Last sentence: "This needed for use cases ..."
Do you mean "This is needed for use cases ..."

Cheers,
Linda Dunbar