Re: [sidr] route leaks message to IDR

Eric Osterweil <eosterweil@verisign.com> Wed, 21 March 2012 18:09 UTC

Return-Path: <eosterweil@verisign.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A18CF21E8085 for <sidr@ietfa.amsl.com>; Wed, 21 Mar 2012 11:09:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.523
X-Spam-Level:
X-Spam-Status: No, score=-6.523 tagged_above=-999 required=5 tests=[AWL=0.076, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QonZga1WrEf5 for <sidr@ietfa.amsl.com>; Wed, 21 Mar 2012 11:08:59 -0700 (PDT)
Received: from exprod6og117.obsmtp.com (exprod6og117.obsmtp.com [64.18.1.39]) by ietfa.amsl.com (Postfix) with ESMTP id E242821E8063 for <sidr@ietf.org>; Wed, 21 Mar 2012 11:08:52 -0700 (PDT)
Received: from osprey.verisign.com ([216.168.239.75]) (using TLSv1) by exprod6ob117.postini.com ([64.18.5.12]) with SMTP ID DSNKT2oZMRVtT9SpuGzr9ZlhnILd8IpRLDRu@postini.com; Wed, 21 Mar 2012 11:08:52 PDT
Received: from dul1wnexcn03.vcorp.ad.vrsn.com (dul1wnexcn03.vcorp.ad.vrsn.com [10.170.12.113]) by osprey.verisign.com (8.13.6/8.13.4) with ESMTP id q2LI8hjM023072; Wed, 21 Mar 2012 14:08:47 -0400
Received: from dul1eosterwe-m1.vcorp.ad.vrsn.com ([10.88.30.33]) by dul1wnexcn03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Wed, 21 Mar 2012 14:08:43 -0400
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Eric Osterweil <eosterweil@verisign.com>
In-Reply-To: <CAL9jLaahU0+qjp_fVHbwbTZFzHDiEB639Xt6AKyPKoqZn9n5AA@mail.gmail.com>
Date: Wed, 21 Mar 2012 14:08:42 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <275CDE7F-D5FA-4C7C-ABBD-00CC73D62832@verisign.com>
References: <4F69F033.7040207@riw.us> <CB8F6CA2.A21E6%dougm@nist.gov> <CAH1iCip5G+Qo9hWfPOdeWUvt2er8PDydoMsQxEUBiGTz5_3Kqg@mail.gmail.com> <CAL9jLaamtST810OwResez5rzqAZpzZe+B=LT9dxLJ=aF4B6JeA@mail.gmail.com> <CAH1iCirLgpQLir5+AX7pHusgGsyaiAqmZAS24mEyd5GNvtU41g@mail.gmail.com> <CAL9jLaahU0+qjp_fVHbwbTZFzHDiEB639Xt6AKyPKoqZn9n5AA@mail.gmail.com>
To: Christopher Morrow <morrowc.lists@gmail.com>
X-Mailer: Apple Mail (2.1084)
X-OriginalArrivalTime: 21 Mar 2012 18:08:43.0364 (UTC) FILETIME=[A6C9D240:01CD078D]
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] route leaks message to IDR
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Mar 2012 18:09:00 -0000

On Mar 21, 2012, at 12:45 PM, Christopher Morrow wrote:

> On Wed, Mar 21, 2012 at 12:36 PM, Brian Dickson
> <brian.peter.dickson@gmail.com> wrote:
>> 
>> 
>> On Wed, Mar 21, 2012 at 12:10 PM, Christopher Morrow
>> <morrowc.lists@gmail.com> wrote:
>>> 
>>> On Wed, Mar 21, 2012 at 11:50 AM, Brian Dickson
>>> <brian.peter.dickson@gmail.com> wrote:
>>>> 
>>>> 
>>>> On Wed, Mar 21, 2012 at 11:37 AM, Montgomery, Douglas <dougm@nist.gov>
>>>> wrote:
>>>>> 
>>>>> By "we" I assume you are asking the bigger question about what the
>>>>> broad
>>>>> requirements / objectives should be.
>>>>> 
>>>>> The current BGPSEC design, chooses to only focus on the protocol on the
>>>>> wire, and starts with the attributes that had both an identified threat
>>>>> and a existence proof of a reasonable mechanism to address that threat.
>>>>> 
>>>> 
>>>> If that statement were true, I think there would be much more support
>>>> and
>>>> progress
>>>> for the bgpsec-protocol component of the SIDR WG.
>>>> 
>>>> However, the current interpretation (by whom, is not clear) seems to be,
>>>> that only certain attributes (AS-path and nothing else?) are included in
>>>> what is protected.
>>>> 
>>>> Any attempt to discuss inclusion of other attributes, and reasonable
>>>> mechanisms
>>>> for including those in the protection regime, has been shouted down by a
>>>> small group
>>>> which includes a self-selected group of implementers.
>>>> 
>>> 
>>> you seem to want to read:
>>> http://tools.ietf.org/html/draft-sriram-bgpsec-design-choices-01
>>> 

Actually, with respect, I think the first stop really ought to be coming to consensus on a requirements document.  My experience has been that doing design work without solid requirements can lead to a great deal of rework.

Eric