Re: [sidr] I-D Action: draft-ietf-sidr-bgpsec-threats-07.txt

"George, Wes" <wesley.george@twcable.com> Wed, 09 October 2013 12:48 UTC

Return-Path: <wesley.george@twcable.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C235311E818B for <sidr@ietfa.amsl.com>; Wed, 9 Oct 2013 05:48:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.713
X-Spam-Level:
X-Spam-Status: No, score=-0.713 tagged_above=-999 required=5 tests=[AWL=-0.250, BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HLvEnz+q8UrY for <sidr@ietfa.amsl.com>; Wed, 9 Oct 2013 05:48:54 -0700 (PDT)
Received: from cdpipgw02.twcable.com (cdpipgw02.twcable.com [165.237.59.23]) by ietfa.amsl.com (Postfix) with ESMTP id 38E4311E8184 for <sidr@ietf.org>; Wed, 9 Oct 2013 05:48:51 -0700 (PDT)
X-SENDER-IP: 10.136.163.12
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.90,1063,1371096000"; d="scan'208";a="141414984"
Received: from unknown (HELO PRVPEXHUB03.corp.twcable.com) ([10.136.163.12]) by cdpipgw02.twcable.com with ESMTP/TLS/RC4-MD5; 09 Oct 2013 08:47:54 -0400
Received: from PRVPEXVS15.corp.twcable.com ([10.136.163.79]) by PRVPEXHUB03.corp.twcable.com ([10.136.163.12]) with mapi; Wed, 9 Oct 2013 08:48:50 -0400
From: "George, Wes" <wesley.george@twcable.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Date: Wed, 09 Oct 2013 08:48:49 -0400
Thread-Topic: [sidr] I-D Action: draft-ietf-sidr-bgpsec-threats-07.txt
Thread-Index: Ac7EZuDlAqgborrLQ22maojv3orRFAAhqYfg
Message-ID: <2671C6CDFBB59E47B64C10B3E0BD5923043C7556E1@PRVPEXVS15.corp.twcable.com>
References: <20131008204114.28645.53351.idtracker@ietfa.amsl.com>
In-Reply-To: <20131008204114.28645.53351.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] I-D Action: draft-ietf-sidr-bgpsec-threats-07.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Oct 2013 12:48:58 -0000

This update does not address any of my comments from my review (message sent on 9/12).

Thanks,

Wes


> -----Original Message-----
> From: sidr-bounces@ietf.org [mailto:sidr-bounces@ietf.org] On Behalf Of
> internet-drafts@ietf.org
> Sent: Tuesday, October 08, 2013 4:41 PM
> To: i-d-announce@ietf.org
> Cc: sidr@ietf.org
> Subject: [sidr] I-D Action: draft-ietf-sidr-bgpsec-threats-07.txt
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>  This draft is a work item of the Secure Inter-Domain Routing Working
> Group of the IETF.
>
>       Title           : Threat Model for BGP Path Security
>       Author(s)       : Stephen Kent
>                           Andrew Chi
>       Filename        : draft-ietf-sidr-bgpsec-threats-07.txt
>       Pages           : 19
>       Date            : 2013-10-08
>
> Abstract:
>    This document describes a threat model for the context in which
>    (E)BGP path security mechanisms will be developed.  The threat model
>    includes an analysis of the RPKI, and focuses on the ability of an AS
>    to verify the authenticity of the AS path info received in a BGP
>    update.  We use the term PATHSEC to refer to any BGP path security
>    technology that makes use of the RPKI.  PATHSEC will secure BGP
>    [RFC4271], consistent with the inter-AS security focus of the RPKI
>    [RFC6480].
>
>    The document characterizes classes of potential adversaries that are
>    considered to be threats, and examines classes of attacks that might
>    be launched against PATHSEC.  It does not revisit attacks against
>    unprotected BGP, as that topic has already been addressed in
>    [RFC4271].  It concludes with brief discussion of residual
>    vulnerabilities.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-threats
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-threats-07
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=draft-ietf-sidr-bgpsec-threats-07
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr

This E-mail and any of its attachments may contain Time Warner Cable proprietary information, which is privileged, confidential, or subject to copyright belonging to Time Warner Cable. This E-mail is intended solely for the use of the individual or entity to which it is addressed. If you are not the intended recipient of this E-mail, you are hereby notified that any dissemination, distribution, copying, or action taken in relation to the contents of and attachments to this E-mail is strictly prohibited and may be unlawful. If you have received this E-mail in error, please notify the sender immediately and permanently delete the original and any copy of this E-mail and any printout.