[sidr] Heads up: Last Call: <draft-ietf-opsec-bgp-security-05.txt> (BGP operations and security) to Best Current Practice

"Adrian Farrel" <adrian@olddog.co.uk> Mon, 08 September 2014 20:42 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EA0F1A0383 for <sidr@ietfa.amsl.com>; Mon, 8 Sep 2014 13:42:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OCGi6ffO2wWR for <sidr@ietfa.amsl.com>; Mon, 8 Sep 2014 13:42:01 -0700 (PDT)
Received: from asmtp5.iomartmail.com (asmtp5.iomartmail.com [62.128.201.176]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A8D31A037F for <sidr@ietf.org>; Mon, 8 Sep 2014 13:42:01 -0700 (PDT)
Received: from asmtp5.iomartmail.com (localhost.localdomain [127.0.0.1]) by asmtp5.iomartmail.com (8.13.8/8.13.8) with ESMTP id s88KZQ02026805 for <sidr@ietf.org>; Mon, 8 Sep 2014 21:35:26 +0100
Received: from 950129200 (host4-182-static.10-188-b.business.telecomitalia.it [188.10.182.4]) (authenticated bits=0) by asmtp5.iomartmail.com (8.13.8/8.13.8) with ESMTP id s88KZO0f026773 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <sidr@ietf.org>; Mon, 8 Sep 2014 21:35:25 +0100
From: Adrian Farrel <adrian@olddog.co.uk>
To: sidr@ietf.org
Date: Mon, 08 Sep 2014 21:41:59 +0100
Message-ID: <02be01cfcba5$570a7820$051f6860$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: Ac/LpVTdzIJAAcxsQzuIKhBFzuhZXQ==
Content-Language: en-gb
X-TM-AS-MML: disable
X-TM-AS-Product-Ver: IMSS-7.1.0.1576-7.5.0.1018-20938.002
X-TM-AS-Result: No--14.577-10.0-31-10
X-imss-scan-details: No--14.577-10.0-31-10
X-TMASE-MatchedRID: IuGQX3eS/ETZZ7BZ4UeyMAgKAWhuC2ojCckvlPjoBZErmF9M9Cpdo8Lm p4jPUF8tuenE8eLG9VRp6oZAI2DGjOyt+a9Mtf+eF6z9HGHKwNsk80hXoYXyazdnd59Af7CPs4t AEOEfosHYVph6DzTbB6EqQJ+9+hWw2DBKoUnK0AUdxBAG5/hkW17OZ6hrwwnzIdKvm2xilWAZmY UBcCKclec6r1u0yRCeA4OUKPk+wFgmfxOgBOFpInGBmLio+mJgifgN14P+4s3JyYU2J054Pbt6I p6ECVpCbYBtV6i2qU565rrWKXsbyBNj8dEIVpt0ngIgpj8eDcC063Wh9WVqgqbyPFGTn+O41GcR AJRT6POOhzOa6g8KrVjbiRFUE+ZvoAH2peRVB5pf5ykoVFbZN0fdg4Dhp/20KRpkOuxL+xc=
Archived-At: http://mailarchive.ietf.org/arch/msg/sidr/UqDipREl154-3PxMgMVxZUofrFI
Subject: [sidr] Heads up: Last Call: <draft-ietf-opsec-bgp-security-05.txt> (BGP operations and security) to Best Current Practice
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: adrian@olddog.co.uk
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Sep 2014 20:42:07 -0000


> -----Original Message-----
> From: IETF-Announce [mailto:ietf-announce-bounces@ietf.org] On Behalf Of The
> IESG
> Sent: 08 September 2014 16:42
> To: IETF-Announce
> Cc: opsec@ietf.org
> Subject: Last Call: <draft-ietf-opsec-bgp-security-05.txt> (BGP operations and
> security) to Best Current Practice
> 
> 
> The IESG has received a request from the Operational Security
> Capabilities for IP Network Infrastructure WG (opsec) to consider the
> following document:
> - 'BGP operations and security'
>   <draft-ietf-opsec-bgp-security-05.txt> as Best Current Practice
> 
> The IESG plans to make a decision in the next few weeks, and solicits
> final comments on this action. Please send substantive comments to the
> ietf@ietf.org mailing lists by 2014-09-22. Exceptionally, comments may be
> sent to iesg@ietf.org instead. In either case, please retain the
> beginning of the Subject line to allow automated sorting.
> 
> Abstract
> 
> 
>    BGP (Border Gateway Protocol) is the protocol almost exclusively used
>    in the Internet to exchange routing information between network
>    domains.  Due to this central nature, it is important to understand
>    the security measures that can and should be deployed to prevent
>    accidental or intentional routing disturbances.
> 
>    This document describes measures to protect the BGP sessions itself
>    (like TTL, TCP-AO, control plane filtering) and to better control the
>    flow of routing information, using prefix filtering and
>    automatization of prefix filters, max-prefix filtering, AS path
>    filtering, route flap dampening and BGP community scrubbing.
> 
> 
> 
> 
> 
> The file can be obtained via
> http://datatracker.ietf.org/doc/draft-ietf-opsec-bgp-security/
> 
> IESG discussion can be tracked via
> http://datatracker.ietf.org/doc/draft-ietf-opsec-bgp-security/ballot/
> 
> 
> No IPR declarations have been submitted directly on this I-D.