Moin,

I just pushed a new version of this document (the extended version
describing things that can be done to secure BGP as an informational
that should never out-GROW the draft state) including one fix by Q
Misell and changes re: two suggestions on the description of handling
non-transitive (extended) communities and changing the prefix-limit
suggestions to recommendations on monitoring.

As always, feedback would be highly appreciated.

With best regards,
Tobias

On Wed, 2024-10-02 at 04:03 -0700, internet-dra...@ietf.org wrote:
> A new version of Internet-Draft
> draft-fiebig-grow-routing-ops-sec-inform-01.txt has been successfully
> submitted by Tobias Fiebig and posted to the
> IETF repository.
> 
> Name:     draft-fiebig-grow-routing-ops-sec-inform
> Revision: 01
> Title:    Current Options for Securing Global Routing
> Date:     2024-10-02
> Group:    Individual Submission
> Pages:    53
> URL:     
> https://www.ietf.org/archive/id/draft-fiebig-grow-routing-ops-sec-inform-01.txt
> Status:  
> https://datatracker.ietf.org/doc/draft-fiebig-grow-routing-ops-sec-inform/
> HTML:    
> https://www.ietf.org/archive/id/draft-fiebig-grow-routing-ops-sec-inform-01.html
> HTMLized:
> https://datatracker.ietf.org/doc/html/draft-fiebig-grow-routing-ops-sec-inform
> Diff:    
> https://author-tools.ietf.org/iddiff?url2=draft-fiebig-grow-routing-ops-sec-inform-01
> 
> Abstract:
> 
>    The Border Gateway Protocol (BGP) is the protocol is a critical
>    component in the Internet to exchange routing information between
>    network domains.  Due to this central nature, it is an accepted
> best
>    practice to ensure basic security properties for BGP and BGP
> speaking
>    routers.  While these general principles are outlined in BCP194,
> it
>    does not provide a list of technical and implementation options
> for
>    securing BGP.
> 
>    This document lists available options for securing BGP, serving as
> a
>    contemporary, non-exhaustive, repository of options and methods. 
> The
>    document explicitly does not make value statements on the efficacy
> of
>    individual techniques, not does it mandate or prescribe the use of
>    specific technique or implementations.
> 
>    Operators are advised to carefully consider whether the listed
>    methods are applicable for their use-case to ensure best current
>    practices are followed in terms of which security properties need
> to
>    be ensured when operating BGP speakers.  Furthermore, the listed
>    options in this document may change over time, and should not be
> used
>    as a timeless ground-truth of applicable or sufficient methods.
> 
> 
> 
> The IETF Secretariat
> 
> 

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

_______________________________________________
GROW mailing list -- grow@ietf.org
To unsubscribe send an email to grow-le...@ietf.org

Reply via email to