Hi again,

> COMMENT:
> ----------------------------------------------------------------
>
> The -12 does address the discuss point that I raised, thank you!
>
> In re-reading the draft so as to clear my discuss position, one thing
> that occurred to me is that a reader might wonder what mechanisms are in
> place to prevent an attacker outside of a site from spoofing an
> auto-discovery route with a given site's site identifier.  (The security
> considerations already dutifully considers the case of a node in the
> site that is not a gateway being able to falsify an auto-discovery
> route.)  As far as I can tell this is not an issue because nodes in the
> site will not accept auto-discovery routes that initiate from outside
> the site, based on configured knowledge of whether a given BGP peering
> is internal or external.  The document already makes some allusions to
> this by specifying that the actual tunnel encapsulation with the union
> of all GWs' data is only included in "every route advertised externally
> to that site", implying that the auto-discovery routes are on the
> non-external (i.e., internal) advertisements.  It might (or might not)
> be worth being more explicit about auto-discovery only occuring
> internally within a site, to clarify this mechanism of action.

Per other email. Since I have suggested text I'll make the change.

> NITS
>
> Section 1
>
>   Data centers (DCs) are critical components of the infrastructure used
>   by network operators to provide services to their customers.  DCs
>   (sites) are interconnected by a backbone network, which consists of
>   any number of private networks and/or the Internet, by gateway
>   routers (GWs).  [...]
>
> This currently looks like "interconnected by <X> (...), by <Y>" which
> doesn't seem right.  Maybe end the sentence after "and/or the Internet"
> and finish with "Each DC is connected to the backbone by one or more
> gateway routers (GWs)"?

Yeh, that was garbled.

>   The solution described in this document is agnostic as to whether the
>   transit ASes do or do not have SR capabilities.  the solution uses SR
>   to stitch together path segments between GWs and through the ASBRs.
>
> Start the sentence with a majuscule 'T'.

Ack

>   technique will experience scaling issues.  This all means that the
>   Add-Paths approach is limited to sites connected over a single AS.
>
> I'd consider "effectively limited"; we know that some groups/individuals
> have a high capacity for hitting themselves in the way that recursive
> Add-Path would entail.

Hmmm. Yes.

New version when I'm allowed to post it.

Cheers,
Adrian

_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org/mailman/listinfo/bess

Reply via email to