Re: Routing Insecurity (Re: BGP in the Washington Post)

2015-06-04 Thread David Mandelberg
On 06/03/2015 04:27 AM, Roland Dobbins wrote: > (not to mention the > enumeration and enhanced DDoS impact of packeting routers doing crypto > for their BGP sessions and which aren't protected via iACLs/GTSM). Could you elaborate on your enumeration and DDoS concerns? If you're concerned about the

Re: Routing Insecurity (Re: BGP in the Washington Post)

2015-06-04 Thread David Mandelberg
On 06/02/2015 10:04 PM, Ethan Katz-Bassett wrote: > The same folks also followed up that workshop paper with a longer paper on > the topic: > https://www.cs.bu.edu/~goldbe/papers/sigRPKI.pdf And a different set of folks (including me) are working on a different mechanism to protect against attacks

Re: Routing Insecurity (Re: BGP in the Washington Post)

2015-06-09 Thread David Mandelberg
On 2015-06-05 02:40, Roland Dobbins wrote: On 5 Jun 2015, at 10:56, David Mandelberg wrote: Could you elaborate on your enumeration and DDoS concerns? Crypto = more overhead. Less priority to crypto plus DDoS = routing update issues. I don't think there's an update issue here.

RE: Routing Insecurity (Re: BGP in the Washington Post)

2015-06-11 Thread David Mandelberg
On 2015-06-11 07:30, Russ White wrote: There have been suggestions that a key-per-AS is easier to manage than a key-per-router, like in provisioning. Two points -- First, if a single person with console access leaves the company, I must roll the key for all my BGP routes, with the attendant