Re: [sidr] bgpsec-spec S. 4.2 comments

Randy Bush <randy@psg.com> Wed, 02 May 2012 17:58 UTC

Return-Path: <randy@psg.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51C0611E8081 for <sidr@ietfa.amsl.com>; Wed, 2 May 2012 10:58:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yPOS4nHSuJpG for <sidr@ietfa.amsl.com>; Wed, 2 May 2012 10:58:51 -0700 (PDT)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:1::36]) by ietfa.amsl.com (Postfix) with ESMTP id C8FB221F8552 for <sidr@ietf.org>; Wed, 2 May 2012 10:58:51 -0700 (PDT)
Received: from localhost ([127.0.0.1] helo=rair.psg.com.psg.com) by ran.psg.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <randy@psg.com>) id 1SPdp8-000LJj-4B; Wed, 02 May 2012 17:58:46 +0000
Date: Wed, 02 May 2012 07:58:45 -1000
Message-ID: <m2aa1qqxbe.wl%randy@psg.com>
From: Randy Bush <randy@psg.com>
To: "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>
In-Reply-To: <D7A0423E5E193F40BE6E94126930C4930B98F8632E@MBCLUSTER.xchange.nist.gov>
References: <D7A0423E5E193F40BE6E94126930C4930B98F86215@MBCLUSTER.xchange.nist.gov> <01068404-27B5-42B6-B1BF-9F1CABA8B3AA@ericsson.com> <D7A0423E5E193F40BE6E94126930C4930B98F8632E@MBCLUSTER.xchange.nist.gov>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset="US-ASCII"
Cc: "John Scudder (jgs@juniper.net)" <jgs@juniper.net>, "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>
Subject: Re: [sidr] bgpsec-spec S. 4.2 comments
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 May 2012 17:58:52 -0000

> The discussion here (and John's comment) is related to text in Section
> 4.2, where we discuss what a BGPSEC router does when "propagating" a
> route advertisement.  "Propagating" connotes here that the update (or
> route) was received from an eBGP peer.

not exactly.  4.0 says

   Sections 4.1 and 4.2 cover two cases in which a BGPSEC speaker may
   generate an update message containing the BGPSEC_Path_Signatures
   attribute.  The first case is that in which the BGPSEC speaker
   originates a new route advertisement (Section 4.1).  That is, the
   BGPSEC speaker is constructing an update message in which the only AS
   to appear in the AS_PATH attribute is the speaker's own AS (normally
   appears once but may appear multiple times if AS prepending is
   applied).  The second case is that in which the BGPSEC speaker
   receives a route advertisement from a peer and then decides to
   propagate the route advertisement to an external (eBGP) peer (Section
   4.2).  That is, the BGPSEC speaker has received a BGPSEC update
   message and is constructing a new update message for the same NLRI in
   which the AS_PATH attribute will contain AS number(s) other than the
   speaker's own AS.