Paul Wouters has entered the following ballot position for
draft-ietf-bess-bgp-sdwan-usage-20: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bess-bgp-sdwan-usage/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

I support John's and Roman's DISCUSSes.

I am also a bit confused about using BGP as a authorization protocol (as per
3.1.5). A compromised node an always make up its routes to try and break out.
BGP doesn't stop that if one is willing to violate the BGP protocol. I would
not call BGP "well suited" for this. I also do not understand the argument that
BGP can be used to simplify IPsec configuration ? The Security Considerations
then seem to flip this around, saying IPsec can be used to secure this solution
of using BGP ?





_______________________________________________
BESS mailing list
BESS@ietf.org
https://www.ietf.org/mailman/listinfo/bess

Reply via email to