[sidr] Fwd: New Version Notification for draft-dickson-sidr-route-leak-def-01.txt

Brian Dickson <brian.peter.dickson@gmail.com> Tue, 06 March 2012 00:31 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E08C21E8028 for <sidr@ietfa.amsl.com>; Mon, 5 Mar 2012 16:31:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level:
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sGkcJsh-c+XN for <sidr@ietfa.amsl.com>; Mon, 5 Mar 2012 16:31:24 -0800 (PST)
Received: from mail-we0-f172.google.com (mail-we0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id 55EAD21E8017 for <sidr@ietf.org>; Mon, 5 Mar 2012 16:31:24 -0800 (PST)
Received: by werb10 with SMTP id b10so3564967wer.31 for <sidr@ietf.org>; Mon, 05 Mar 2012 16:31:23 -0800 (PST)
Received-SPF: pass (google.com: domain of brian.peter.dickson@gmail.com designates 10.216.133.93 as permitted sender) client-ip=10.216.133.93;
Authentication-Results: mr.google.com; spf=pass (google.com: domain of brian.peter.dickson@gmail.com designates 10.216.133.93 as permitted sender) smtp.mail=brian.peter.dickson@gmail.com; dkim=pass header.i=brian.peter.dickson@gmail.com
Received: from mr.google.com ([10.216.133.93]) by 10.216.133.93 with SMTP id p71mr7240800wei.10.1330993883590 (num_hops = 1); Mon, 05 Mar 2012 16:31:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=UgEC6YNAL8LMc1WCUfeylNBoJYM2vdqyNYMHIoKfUwg=; b=WM1pmaJ1KzicxEIaT98NGxc4f/rqHbTCGng3x9YabNpp7kIZ/VJpWzxQa44k4syHum Zs5CvJltfA/uqrSzCdjoLI5uIUnh1StuLWKgPc2aMsRKMbQPHl/tM3pPQK/zAn/MfEYC Y2N2ta9/FFdGLnkQgXjKoE2OrnzT8I5xKOG3lmgfTOrg4jRjbj26SuztLjod9M9tXNrf GY41pPQ0SKzDwb+BIsWdTFGkT7+bakAxv4op4tofT4zDRLTUcn+dQjssnXafjbBYxpoF Sbu1TXa4EANF1GnjDtqpVwWCh3mzNqZeN9pnd8VMosHpBe3KfVdw8K2Kq+EGDlNxxlbA JhUA==
MIME-Version: 1.0
Received: by 10.216.133.93 with SMTP id p71mr5778333wei.10.1330993883458; Mon, 05 Mar 2012 16:31:23 -0800 (PST)
Received: by 10.223.69.3 with HTTP; Mon, 5 Mar 2012 16:31:23 -0800 (PST)
In-Reply-To: <20120305180943.16641.16867.idtracker@ietfa.amsl.com>
References: <20120305180943.16641.16867.idtracker@ietfa.amsl.com>
Date: Mon, 05 Mar 2012 19:31:23 -0500
Message-ID: <CAH1iCiqvN2FhOhLGuZ44rm9BeUSM0UD9_qupt8eSD-nkX39cpg@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: sidr wg list <sidr@ietf.org>
Content-Type: multipart/alternative; boundary="0016e6dbde579f2d0c04ba88291d"
Subject: [sidr] Fwd: New Version Notification for draft-dickson-sidr-route-leak-def-01.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2012 00:31:25 -0000

Greetings, SIDR folks.

Here is the first of three IDs, concerning the definitions of "route leak".

Comments and feedback are encouraged.

Two sibling documents are also up (requirements and solutions), look for
similar messages in a minute.

Brian Dickson

---------- Forwarded message ----------
From: <internet-drafts@ietf.org>
Date: Mon, Mar 5, 2012 at 1:09 PM
Subject: New Version Notification for
draft-dickson-sidr-route-leak-def-01.txt
To: brian.peter.dickson@gmail.com


A new version of I-D, draft-dickson-sidr-route-leak-def-01.txt has been
successfully submitted by Brian Dickson and posted to the IETF repository.

Filename:        draft-dickson-sidr-route-leak-def
Revision:        01
Title:           Route Leaks -- Definitions
Creation date:   2012-03-05
WG ID:           Individual Submission
Number of pages: 9

Abstract:
  The Border Gateway Protocol, version 4, (BGP4) provides the means to
  advertise reachability for IP prefixes.  This reachability
  information is propagated in a peer-to-peer topology.  Sometimes
  routes are announced to peers for which the local peering policy does
  not permit.  And sometimes routes are propagated indiscriminantly,
  once they have been accepted.

  This document considers the situations that can lead to routes being
  leaked, and tries to find acceptable definitions for describing these
  scenarios.

  The purpose of these definitions is to facilitate analysis of what a
  route leak is, and what the scope of the problem space for route
  leaks is.

  This, in turn, is intended to inform a requirements document for
  detection of (and prevention of) route leaks.  And finally, the
  definitions and requirements are intended to allow proposed solutions
  which meet these criteria, and to facilitate evaluation of proposed
  solutions.

  The fundamental objective is to &quot;solve the route leaks problem&quot;.




The IETF Secretariat