Giter VIP home page Giter VIP logo

draft-routing-operations-security's Introduction

Current Options for Securing Global Routing

This is the working area for the individual Internet-Draft, "Current Options for Securing Global Routing".

Contributing

See the guidelines for contributions.

Contributions can be made by creating pull requests. The GitHub interface supports creating pull requests using the Edit (โœ) button.

Command Line Usage

Formatted text and HTML versions of the draft can be built using make.

$ make

Command line usage requires that you have the necessary software installed. See the instructions.

draft-routing-operations-security's People

Contributors

ichdasich avatar theenbyperor avatar

Watchers

 avatar

Forkers

theenbyperor

draft-routing-operations-security's Issues

Some terms need additional unification

There is still a pending comment saying:

Some terms should be unified, e.g., "upstream" "upstream provider"; "Internet peer" "lateral peer" "peer"; etc.

Additionally, terms like NLRI etc need a full clean-run.

However, this should be postponed until the document is feature-complete.

Adjust suggestions for 8.2.2 as per comment on ML to focus on monitoring

On 26/10/2023 15:10, Tobias Fiebig wrote:
 > [..]
 >
>> The global limits seem to offer no real benefit in addition to
>> per-session limits. The referenced paper mentions Per-Origin AS
>> limits, not the per-Neighbor AS limits mentioned in the draft. This
>> also seems to be unimplementable, given that routers act
>> independently on prefixes they receive.
>
> I think there are two points in here:
> - The paper mentions per-origin, which i consider even more un-
>    implementable than per-neighbor, which is why I restricted it to
>    direct neighbors (similar to the idea of BCP38, that things 'should'
>    be fine if everyone filters their downstreams.)
> - Your implementability point is very valid.
>
> To address both points, it might make sense to move this to a softer
> recommendation to "Monitoring the global number of prefixes ingested
> from each peer/downstream, and alerting if that number increases too
> quickly" or something similar;

I think a recommendation for prefix limit monitoring and alerting for
all peers would be a good replacement of section 8.2.2.

Section 8.2.1 already mentions placing a prefix limit on upstreams, so
this should limit the risk of the attack described in 8.2.2 somewhat.
But it will have to be combined with monitoring, so that a customer AS
does not cut itself off if the BGP table on all of their upstreams
eventually grows too large.

Kind regards,
Martin

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.