[sidr] BGPSec RFC status

Stephen Kent <kent@bbn.com> Wed, 13 April 2016 18:17 UTC

Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63EEF12DE3A for <sidr@ietfa.amsl.com>; Wed, 13 Apr 2016 11:17:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.197
X-Spam-Level:
X-Spam-Status: No, score=-5.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2nGD0r-ZfX2O for <sidr@ietfa.amsl.com>; Wed, 13 Apr 2016 11:17:42 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F9F312DB60 for <sidr@ietf.org>; Wed, 13 Apr 2016 11:17:41 -0700 (PDT)
Received: from ssh.bbn.com ([192.1.122.15]:37572 helo=COMSEC.fios-router.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1aqPMC-000HIk-HW for sidr@ietf.org; Wed, 13 Apr 2016 14:17:40 -0400
To: sidr <sidr@ietf.org>
From: Stephen Kent <kent@bbn.com>
Message-ID: <570E8D44.1080208@bbn.com>
Date: Wed, 13 Apr 2016 14:17:40 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/f6f66uCE4DJZVrdPBXqT1uamod0>
Subject: [sidr] BGPSec RFC status
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 18:17:43 -0000

I didn't attend the IETF meeting, but I did listen to the Wednesday SIDR 
session, at
which the issue was raised as to whether the BGPSec RFC should be 
standards track
or experimental.

I believe standards track is the right approach here. This document has been
viewed as standards track since we began work on it long ago. It is the 
successor
to the origin validation standards, addressing the residual 
vulnerabilities that
persist based on that use of the RPKI. From the perspective of promoting 
adoption
it is critical that this remain a standards track document; router 
vendors will
be unlikely to devote resources to design and implementation if BGPsec 
is labeled
experimental. I agree that this is new technology, but I heard that we 
already have
a  couple of implementations already, and we may discourage others from 
continuing to
work on BGPSec implementations if we downgrade the status of the RFC. 
The design has
evolved to accommodate real-world routing deployment topics such as the 
role of IXPs
and AS migration. In my long experience in the IETF experience, the 
level of attention
to these an analogous details makes BGPsec a very solid candidate for 
standards track
publication.

Steve