Re: [sidr] bgpsec-spec S. 4.2 comments
Jakob Heitz <jakob.heitz@ericsson.com> Wed, 02 May 2012 15:06 UTC
Return-Path: <jakob.heitz@ericsson.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B57A21F8541 for <sidr@ietfa.amsl.com>; Wed, 2 May 2012 08:06:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.353
X-Spam-Level:
X-Spam-Status: No, score=-6.353 tagged_above=-999 required=5 tests=[AWL=0.246, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qkeAihC2dYv9 for <sidr@ietfa.amsl.com>; Wed, 2 May 2012 08:06:25 -0700 (PDT)
Received: from imr4.ericy.com (imr4.ericy.com [198.24.6.9]) by ietfa.amsl.com (Postfix) with ESMTP id F14E911E807F for <sidr@ietf.org>; Wed, 2 May 2012 08:06:16 -0700 (PDT)
Received: from eusaamw0706.eamcs.ericsson.se ([147.117.20.31]) by imr4.ericy.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id q42F6Fda004125; Wed, 2 May 2012 10:06:16 -0500
Received: from EUSAACMS0701.eamcs.ericsson.se ([169.254.1.6]) by eusaamw0706.eamcs.ericsson.se ([147.117.20.31]) with mapi; Wed, 2 May 2012 11:06:10 -0400
From: Jakob Heitz <jakob.heitz@ericsson.com>
To: "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>
Date: Wed, 02 May 2012 11:06:37 -0400
Thread-Topic: [sidr] bgpsec-spec S. 4.2 comments
Thread-Index: Ac0odRsrcoeHB3mOQ+e9bOwx5Ui5gw==
Message-ID: <01068404-27B5-42B6-B1BF-9F1CABA8B3AA@ericsson.com>
References: <D7A0423E5E193F40BE6E94126930C4930B98F86215@MBCLUSTER.xchange.nist.gov>
In-Reply-To: <D7A0423E5E193F40BE6E94126930C4930B98F86215@MBCLUSTER.xchange.nist.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "John Scudder (jgs@juniper.net)" <jgs@juniper.net>, "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>
Subject: Re: [sidr] bgpsec-spec S. 4.2 comments
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 May 2012 15:06:26 -0000
that's also flawed. You should be able to sign anything that you can. Suppose you receive it from an ibgp peer that sourced it but didn't sign it. -- Jakob Heitz. On May 2, 2012, at 7:21 AM, "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov> wrote: > John Scudder asked the following question in an email to the > authors of draft-ietf-sidr-bgpsec-protocol: > >> From: John G. Scudder <jgs@juniper.net> >> Date: Wed, Apr 18, 2012 at 8:00 PM >> Subject: bgpsec-spec S. 4.2 comments >> >> A few misc questions/comments I noticed while perusing S. 4.2: >> >> "A BGPSEC speaker MUST NOT generate an update message containing the >> BGPSEC_Path_Signatures attribute unless it has selected, as the best >> route to the given prefix, a route that it received in an update >> message containing the BGPSEC_Path_Signatures attribute." >> >> What's the rationale for this MUST NOT? Certainly it's an assumption of the base >> protocol, but I assume it wouldn't need to be called out here unless it bore on >> some BGPSEC-specific issue. This is relevant in the context of draft-ietf-idr-add- >> paths, which allows non-best paths to be sent in BGP. >> > > The authors have agreed that the above text in the bgpsec spec > document (quoted by John) certainly seems problematic. > The authors agreed to make the following text substitution: > (there was also consensus on this at the SIDR Interim meeting April 30, 2012): > > "If a BGPSEC router has received an _unsigned_ route from a peer and > if it chooses to propagate that route, then it MUST NOT attach any > BGPSEC_Path_Signatures attribute to the corresponding update being propagated." > > It was also agreed that we further add (if not already clearly stated > elsewhere in the spec): > > "If a BGPSEC router has received a _signed_ update, > and if it chooses to propagate that route, then the router SHOULD propagate > the corresponding update with BGPSEC_Path_Signatures attribute > (after adding its own signature)." > > These substitutions would help keep the text unambiguous, and > also inclusive of (or at least not conflicting with) draft-ietf-idr-add-paths. > > Sriram > _______________________________________________ > sidr mailing list > sidr@ietf.org > https://www.ietf.org/mailman/listinfo/sidr
- [sidr] bgpsec-spec S. 4.2 comments Sriram, Kotikalapudi
- Re: [sidr] bgpsec-spec S. 4.2 comments Jakob Heitz
- Re: [sidr] bgpsec-spec S. 4.2 comments Sriram, Kotikalapudi
- Re: [sidr] bgpsec-spec S. 4.2 comments Randy Bush