Skip to main content

BGP Operations and Security
draft-ietf-opsec-bgp-security-07

Revision differences

Document history

Date Rev. By Action
2015-01-30
07 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2015-01-14
07 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2015-01-09
07 (System) RFC Editor state changed to AUTH from EDIT
2014-12-08
07 Cindy Morgan IESG state changed to RFC Ed Queue from Approved-announcement sent
2014-12-08
07 (System) RFC Editor state changed to EDIT
2014-12-08
07 (System) Announcement was received by RFC Editor
2014-12-08
07 (System) IANA Action state changed to No IC from In Progress
2014-12-08
07 (System) IANA Action state changed to In Progress
2014-12-08
07 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2014-12-08
07 Amy Vezza IESG has approved the document
2014-12-08
07 Amy Vezza Closed "Approve" ballot
2014-12-08
07 Amy Vezza Ballot approval text was generated
2014-12-07
07 Joel Jaeggli th the discuss has been clear and the final edit pass to pick up comments has been done.
2014-12-07
07 Joel Jaeggli IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2014-12-01
07 Jerome Durand New version available: draft-ietf-opsec-bgp-security-07.txt
2014-11-18
06 Christer Holmberg Request for Telechat review by GENART Completed: Ready. Reviewer: Christer Holmberg.
2014-10-28
06 Adrian Farrel [Ballot comment]
Thanks for your work to address my Discuss and Comments
2014-10-28
06 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2014-10-27
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2014-10-27
06 Jerome Durand IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2014-10-27
06 Jerome Durand New version available: draft-ietf-opsec-bgp-security-06.txt
2014-10-16
05 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2014-10-16
05 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready. Reviewer: Alexey Melnikov.
2014-10-16
05 Alia Atlas [Ballot comment]
I support Adrian's DISCUSS concerns.
2014-10-16
05 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2014-10-16
05 Stephen Farrell
[Ballot comment]

- 5.1, last para: sorry but I don't see how that conclusion
follows from what's stated. Don't you need to assume that
all …
[Ballot comment]

- 5.1, last para: sorry but I don't see how that conclusion
follows from what's stated. Don't you need to assume that
all hosts that can talk to iBGP speakers are trusted as well?

- 6.1.1.2, 2nd para: Is that wise? Why is the simplified
current list so beneficial that its worth risking someone
hard codes that?

- 6.1.2.4 - there was a recent ANRP prize winner who had a
paper on some downsides of partial deployments of RPKI,
wouldn't it be good to reference that? And are there
no conclusions to be drawn from that? (Sorry in a rush,
can find ref later for ya if needed.)
2014-10-16
05 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2014-10-15
05 Richard Barnes [Ballot Position Update] New position, Yes, has been recorded for Richard Barnes
2014-10-15
05 Ted Lemon [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon
2014-10-15
05 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2014-10-15
05 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2014-10-15
05 Adrian Farrel
[Ballot discuss]
I support the idea of this document. It could provide useful guidance,
especially to newcomers to BGP operations. However, I have some issues …
[Ballot discuss]
I support the idea of this document. It could provide useful guidance,
especially to newcomers to BGP operations. However, I have some issues
I would like to see resolved or at least discussed before the document
advances.

The Routing Directorate review from Geoff Huston received a somewhat
peremptory response form the authors more concerned with the nature and
timing of the review than with the technical issues raised. The authors
specifically asked for ADs to tell them how to proceed and, since the
review came after the end of IETF last call so I am adopting those
issues that I consider important as part of this Discuss (although I
would be very happy if you addressed them all).

---

Section 5.1 talks about GTSM, but does not discuss what to do when there
is more than one IP hop between BGP speakers. It would be perfectly fine
to explicitly state that this mechanism can only apply to single-hop BGP
sessions such as those between adjacent ASBRs.

Section 5.1. also talks about IPSEC, but as Geoff Huston observed, while
the use of IPSEC has been documented as a possible BGP transport there
is very little deployment experience and reasons have been suggested why
this would expose the router to further forms of denial of service
attack because of the workload in decrypting incoming IPSEC packets.
Maybe the thing to do is either strike the sentence or add a caveat that
further analysis might be needed.

---

Unless I missed it, the document doesn't talk about compromised routers
and bad actors (perhaps some slight discussion in the SIDR section?).
We normally talk about compromised IGP routers and how they are hard to
protect against, but the issues are somewhat different in BGP speakers
because of what they can do across the whole Internet, and how the
compromise can be in something like a Route Reflector that may be a
server rather than a dedicated hardware router. Furthermore, the actions
of a bad actor can be intended to do far more than simply break things.

I don't believe this would be a hard topic to address, but it also has
knock-on effects on the efficacy of some of the security mechanisms
suggested and (maybe) makes SIDR more pressing.

---

Section 6.1.4

  A network SHOULD filter its own prefixes on peerings with all its
  peers (inbound direction).

Geoff notes

  This requires a lot more
  thought, particularly relating to multi-homed
  networks that do not use a dedicated ASN. One
  party's leak is another party's form of traffic
  engineering.

I don't think this needs a lot of work, just a qualification of the type
of peering where this recommendation applies.

---

In Section 11

  In particular do not
  (generally) remove the no-export community as it is usually
  announced by your peer for a certain purpose.

As Geoff says, this seems in conflict with the normal processing rules
for a No-Export community.

---

And two final Discuss points from me...

I have no objection to the use of RFC 2119 language in a BCP and I think
it is OK to pitch this document as a BCP, but I am confused as to the
use of "MUST" in conjunction with the text in Section 2

  Nature of the Internet is such that Autonomous Systems
  can always agree on exceptions for relevant local needs, and
  therefore configure rules which may differ from the recommendations
  provided in this document.

So I think that the document is making recommendations, and that you
need to limit yourself to "SHOULD" although it would be more in keeping
to use "RECOMMENDED".

Although in section 9 you have "This section is listing rules that apply
to BGP AS-paths" followed by some uses of "SHOULD". Perhaps, "This section
lists the RECOMMENDED practices when processing BGP AS-paths"

---

6.1.2.4 makes the apparent statement that RFC 6480 includes BGPsec in
its infrastructure. I think it is fine to include BGPsec in this section
(or maybe a closely-related section), but you probably shouldn't say it
is directly derived from 6480.
2014-10-15
05 Adrian Farrel
[Ballot comment]
In addition to my Discuss, I have a number of Comments that I think the
authors should look to before publication.

---

idnits …
[Ballot comment]
In addition to my Discuss, I have a number of Comments that I think the
authors should look to before publication.

---

idnits shows a significant number of unused references and an
obsolete reference. This may be intentional as noted in the shepherd
write-up, but that doesn't get the authors off the hook. They need to
write text that points to the references, even if it is as simple as
"Additional background information can be found in [a], [b], ..."

---

No need to expand "BGP" as it is already listed at
http://www.rfc-editor.org/rfc-style-guide/abbrev.expansion.txt

---

Rather than stating intentions be definitive...

OLD
  This document
  intends to both summarize common existing rules and help network
  administrators apply coherent BGP policies.
NEW
  This document
  summarizes common existing rules and helps network
  administrators apply coherent BGP policies.
END

---

In Section 2

  If this is perfectly acceptable, one
  should note that every configured exception has an impact on the
  complete BGP security policy and requires special attention before
  implementation.

The English here is confusing. I suppose you "If an agreement is
made between two ASes to apply an exception..." Even then, we should
note Geoff Huston's comment that...

  The
  correct statement [is] that every BGP peer session
  has an impact on the inter-domain routing
  environment, and that all BGP session
  configurations should be managed with care
  and attention.

That is a supportive edit to your text, I think.

---

Section 4

  The BGP router needs to be protected from stray packets.

This is an odd way to put it. Do you mean in general? Probably not
because the router's job is to, erm, route. So I think you mean a bit
more...

The "packets" are probably "BGP packets". And "stray" sounds like
"randomly adrift in the sea of the Internet" but you probably mean
something far more specific.

The final paragraph of this section gives some clues, so I suggest
expanding the first sentence into a paragraph that explains the meaning
and then the rest of the section can focus on BGP as the text currently
does.

Furthermore, Geoff Huston's comment is valid:

  At present an incoming
  "stray" packet addresses to port 179 on the
  local BGP speaker would be discarded by the
  TCP control process on the BGP speaking
  module as there is no active session matching
  the TCP 5-tuple of the incoming packet. The
  need to offload this discard function to an ACL
  is not motivated here, and the reviewer is left
  wondering why this is stated as a “need”. The
  security risk is incoming packets that use TCP
  with the same TCP 5-tuple as an active session
  is left to the next session.

Additionally...

  This
  protection should be achieved by an access control list (ACL) which
  would discard all packets directed to TCP port 179 on the local
  device and sourced from an address not known or permitted to become a
  BGP neighbor

...Why is this a lowercase "should"?
There are a number of similar case issues surrounding advisory language.

And lastly in this section, you should try to define "rate limit" as
Geoff commented...

  in particular “rate limiting” is not defined. If
  what is meant here is conventional TCP window
  control where, when the receiving BGP process
  cannot process the incoming data at the same
  rate as the sender in sending data then the
  conventional TCP response is advertise a
  window size of 0 and only reopen the
  advertised window once the receiving BGP
  process has processed additional data and
  opened space in the receive window buffer.
  From this respect, given that TCP is a rate
  controlled protocol in the first place This
  paragraph

---

Section 5.1

  The drawback of TCP session protection is additional configuration
  and management overhead for authentication information (ex: MD5
  password) maintenance.  Protection of TCP sessions used by BGP is
  thus RECOMMENDED when peerings are established over shared networks
  where spoofing can be done (like IXPs).

There does not appear to be a connection between these two sentences and
the use of "thus" is confusing.

---

6.1.1.1

  Only prefixes with value
  "False" in column "Global" MUST be discarded on Internet BGP
  peerings.

The use of "Only" is confusing me. I think you have a MUST here, as...

  On Internet BGP peerings prefixes with value "False" in column
  "Global" MUST be discarded.

Do you also have a MUST NOT?

  Other prefixes MUST NOT be discarded.


similar text in 6.1.1.2

---

6.1.1.2

  At the time of the writing of this document, the list of IPv6
  prefixes that MUST NOT cross network boundaries can be simplified as
  IANA allocates at the time being prefixes to RIR's only in 2000::/3
  prefix [35].

This "MUST NOT" is different from guidance to operators, isn't it? It
is a statement of fact, but not a specific direction to the operator.

---

6.1.2

s/One SHOULD probably NOT/One probably SHOULD NOT/

---

6.1.2.4 has "INVALID". Not a 2119 word.

---

s/internet/Internet/

---

6.2

  It is RECOMMENDED that each autonomous system configures
  rules for advertised and received routes at all its borders as this
  will protect the network and its peer even in case of
  misconfiguration.

I *think* you mean "the same rule at each of its border routers".
This is not what you have said (you allow a different rule, so long as
*some* rule exists).

---

Barry has already observed instance of stating what the authors think
(e.g., section 7, "Authors of this document propose.."). You need to
tighten this up as it is an IETF consensus BCP, not just a statement of
your opinions.

---

Section 8

  Following rules are generally RECOMMENDED:

Recommended or not?

---

Section 9 has two bullets on private AS numbers where the reference is
to "customers". This possibly stretches a point, and Geoff's suggestion
to include "BGP peers that are party to the agreement" seems far more
sensible.

---

Geoff Huston also provided a raft of minor editorial comments that would
significantly improve the readability of the document.
2014-10-15
05 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded for Adrian Farrel
2014-10-15
05 Barry Leiba
[Ballot comment]
-- Section 2 --

  If this is perfectly acceptable, one
  should note that every configured exception has an impact on the …
[Ballot comment]
-- Section 2 --

  If this is perfectly acceptable, one
  should note that every configured exception has an impact on the
  complete BGP security policy and requires special attention before
  implementation.

I don't understand what "If this is perfectly acceptable" is meant to say.  Can you re-phrase this sentence so that what you mean is clearer?  Maybe, "While it is acceptable to accommodate local needs, ..." ?

-- Sections 6.1.1.1 and 6.1.1.2 --

The English in these sections is a bit off, but it's mostly missing articles and will be fixed by the RFC Editor.  But...

  Only prefixes with value
  "False" in column "Global" MUST be discarded on Internet BGP
  peerings.

The "only" here makes this read very oddly, and opens up an uncertainty.  I think you are stating, as a best practice, that all prefixes with "False" in the "Global" column MUST be discarded.  But is anything being stated about prefixes that do not have "False" in the "Global" column?  Which is correct about those prefixes?:

1. They MUST NOT be discarded.
2. They MAY be discarded.
3. Nothing at all is being said about them.

It's funny how adding a single word, "only", raises this issue, but I think it does.

-- Section 6.1.2 --

  One SHOULD probably NOT consider solutions described
  in this section if they are not capable of maintaining updated prefix
  filters: the damage would probably be worse than the intended
  security policy.

This is very poor use of 2119 language.  I don't know whether you mean "SHOULD" or "SHOULD NOT".  I don't know what "SHOULD probably" means, from a 2119 standpoint.  I suspect the best way out of this would be to just give a recommendation and a reason, without using 2119 key words, although Brian's comment might have the right fix.  But whatever you decide, this really needs to be fixed in some way.

-- Sections 6.1.2.1, 6.1.2.3, 6.1.2.4, 7 --

In several places in these sections, you talk about what "authors recommend".  A small point, but this is a working group document, with IETF consensus.  The recommendation is from the IETF, not from the authors.  It would be nice if this was changed.
2014-10-15
05 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2014-10-14
05 Benoît Claise
[Ballot comment]

- Section 4, paragraph 3:

  In addition to strict filtering, rate-limiting MAY be configured for
  accepted BGP traffic.  This protects the …
[Ballot comment]

- Section 4, paragraph 3:

  In addition to strict filtering, rate-limiting MAY be configured for
  accepted BGP traffic.  This protects the BGP router control plane in
  case the amount of BGP traffic overcomes platform capabilities.

You use MAY, but the paragraph 1 and 2 use "should". This is not consistent

- Section 5.2 BGP TTL security (GTSM)

OLD:
  BGP sessions can be made harder to spoof with the Generalized TTL
  Security Mechanisms (aka TTL security)

NEW:
  BGP sessions can be made harder to spoof with the Generalized TTL
  Security Mechanisms (GTSM, aka TTL security)

-
  You SHOULD block spoofed packets (packets with a source IP address
  belonging to your IP address space) at all edges

versus

  Network administrators
  SHOULD implement TTL security on directly connected BGP peerings.

Be consistent between you and network administrators.
Same remark for section 9 btw.

- Section 6.1.2.1
  Therefore there is
  no reason why one would keep checking prefixes are in the IANA
  allocated IPv4 address space [38].

Missing "that" after checking?

-
To
  partially mitigate this risk, administrators would need to make sure
  BGP advertisements correspond to information located in the existing
  registries.

SHOULD?
That's a generic comment on this draft.
I'm not sure the RFC 2119 keywords are used consistently.
For example, I don't understand if SIDR (section 6.1.2.4) is a MAY/SHOULD/MUST in this BCP.
It says: "If route origin validation is implemented".
This document is a BCP, so I'm expecting instructions... which I don't find in some sections.

-
  Let's take as an example an IXP in the RIPE region for IPv4.  It
  would be allocated a /22 by RIPE NCC (X.Y.0.0/22 in our example) and
  use a /23 of this /22 for the IXP LAN (let say X.Y.0.0/23).

See http://tools.ietf.org/html/rfc5737.

-
There are also some text improvement exchanged between Lionel Morand (OPS DIR) and the authors. Not copied here, as I understand from the email exchange that the changes will be integrated in the next draft version.
2014-10-14
05 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2014-10-13
05 Brian Haberman
[Ballot comment]
I have no problems with the publication of this document, but do have some comments for consideration...

1. I am surprised that the …
[Ballot comment]
I have no problems with the publication of this document, but do have some comments for consideration...

1. I am surprised that the first 2 paragraphs of section 4 do not use capitalized 2119 keywords like the rest of the recommendations in this document.

2. In section 6.1.1.2, do you want to include filtering out ::1/128?

3. The 2119 keyword construct in section 6.1.2 ("One SHOULD probably NOT..."). I think "One SHOULD NOT consider solutions..." is what is meant.

4. I think it would be useful to point out that the mechanisms described in 6.1.2.3 and 6.1.2.4 will have data duplicated between them.  That duplicate data needs to be kept consistent since some operators will only do IRR and others will only do SIDR.

5. The guidance in section 7 is ill-worded.  I would suggest the following change:

OLD:
  Authors of this document propose to
  follow IETF and RIPE recommendations and only use BGP route flap
  dampening with adjusted configured thresholds.

NEW:
  This document RECOMMENDS following IETF and RIPE recommendations
  and only use BGP route flap dampening with the adjusted configured thresholds.
2014-10-13
05 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2014-10-10
05 Jonathan Hardwick Request for Last Call review by RTGDIR Completed: Not Ready. Reviewer: Geoff Huston.
2014-10-10
05 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2014-10-09
05 Kathleen Moriarty
[Ballot comment]
The draft looks good and matched my previous operational security practices for BGP.  I just found some nits and the RFC editor pass …
[Ballot comment]
The draft looks good and matched my previous operational security practices for BGP.  I just found some nits and the RFC editor pass should catch more, so I'll just list a few in an effort to be helpful.

Nit: Second sentence of the introduction is awkward.
Section 6, AS abbreviation is used, but prior expansion of the acronym, didn't include the acronym.  I think it was in the introduction.

Traffic is spelled trafic in one place. 

Security considerations - the last sentence should match the tense of the previous sentence.

Suggest changing from: "It will not detail...."
To: "It does not detail…."

Thanks for your work on this draft!
2014-10-09
05 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2014-10-08
05 Jean Mahoney Request for Telechat review by GENART is assigned to Christer Holmberg
2014-10-08
05 Jean Mahoney Request for Telechat review by GENART is assigned to Christer Holmberg
2014-10-05
05 Joel Jaeggli a revision should be immediately forthcoming.
2014-10-05
05 Joel Jaeggli IESG state changed to IESG Evaluation from Waiting for Writeup
2014-10-05
05 Joel Jaeggli Changed consensus to Yes from Unknown
2014-10-05
05 Joel Jaeggli Placed on agenda for telechat - 2014-10-16
2014-10-05
05 Joel Jaeggli Ballot has been issued
2014-10-05
05 Joel Jaeggli [Ballot Position Update] New position, Yes, has been recorded for Joel Jaeggli
2014-10-05
05 Joel Jaeggli Created "Approve" ballot
2014-10-05
05 Joel Jaeggli Ballot writeup was changed
2014-10-02
05 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Lionel Morand.
2014-10-01
05 Deborah Brungard Request for Last Call review by RTGDIR is assigned to Geoff Huston
2014-10-01
05 Deborah Brungard Request for Last Call review by RTGDIR is assigned to Geoff Huston
2014-09-22
05 (System) IESG state changed to Waiting for Writeup from In Last Call
2014-09-16
05 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2014-09-16
05 Amanda Baber
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-opsec-bgp-security-05, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-opsec-bgp-security-05, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

While it is helpful for the IANA Considerations section of the document to remain in place upon publication, if the authors prefer to remove it, IANA doesn't object.

If this assessment is not accurate, please respond as soon as possible.
2014-09-12
05 Christer Holmberg Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Christer Holmberg.
2014-09-12
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Lionel Morand
2014-09-12
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Lionel Morand
2014-09-11
05 Jean Mahoney Request for Last Call review by GENART is assigned to Christer Holmberg
2014-09-11
05 Jean Mahoney Request for Last Call review by GENART is assigned to Christer Holmberg
2014-09-11
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Alexey Melnikov
2014-09-11
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Alexey Melnikov
2014-09-08
05 Cindy Morgan IANA Review state changed to IANA - Review Needed
2014-09-08
05 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (BGP operations and security) to …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (BGP operations and security) to Best Current Practice


The IESG has received a request from the Operational Security
Capabilities for IP Network Infrastructure WG (opsec) to consider the
following document:
- 'BGP operations and security'
  as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2014-09-22. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  BGP (Border Gateway Protocol) is the protocol almost exclusively used
  in the Internet to exchange routing information between network
  domains.  Due to this central nature, it is important to understand
  the security measures that can and should be deployed to prevent
  accidental or intentional routing disturbances.

  This document describes measures to protect the BGP sessions itself
  (like TTL, TCP-AO, control plane filtering) and to better control the
  flow of routing information, using prefix filtering and
  automatization of prefix filters, max-prefix filtering, AS path
  filtering, route flap dampening and BGP community scrubbing.





The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-opsec-bgp-security/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-opsec-bgp-security/ballot/


No IPR declarations have been submitted directly on this I-D.


2014-09-08
05 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2014-09-08
05 Joel Jaeggli Last call was requested
2014-09-08
05 Joel Jaeggli Last call announcement was generated
2014-09-08
05 Joel Jaeggli Ballot approval text was generated
2014-09-08
05 Joel Jaeggli Ballot writeup was generated
2014-09-08
05 Joel Jaeggli IESG state changed to Last Call Requested from AD Evaluation
2014-09-01
05 Joel Jaeggli IESG state changed to AD Evaluation from Publication Requested
2014-08-20
05 Gunter Van de Velde
Document Writeup for Working Group Documents
As required by RFC 4858, this is the current template for the Document Shepherd Write-Up.
Changes are expected …
Document Writeup for Working Group Documents
As required by RFC 4858, this is the current template for the Document Shepherd Write-Up.
Changes are expected over time. This version is dated 24 February 2012.
(1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header?

Answer:

<>Start<>
Type of RFC requested: BCP
Why proper type: The procedures and technologies suggested are already very widely use by various ISP’s, and are considered to be best practices by successful BGP implementations
Is it indicated in the title page: Yes
<>end<>

(2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections:
Technical Summary:
Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction.

Answer:
<>start<>
  BGP (Border Gateway Protocol) is the protocol almost exclusively used
  in the Internet to exchange routing information between network
  domains.  Due to this central nature, it is important to understand
  the security measures that can and should be deployed to prevent
  accidental or intentional routing disturbances.

  This document describes measures to protect the BGP sessions itself
  (like TTL, TCP-AO, control plane filtering) and to better control the
  flow of routing information, using prefix filtering and
  automatization of prefix filters, max-prefix filtering, AS path
  filtering, route flap dampening and BGP community scrubbing.
<>end<>

Working Group Summary:
Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough?

Answer:
<>start<>
Nothing particular to point out. The document and work contribution went smooth without hick-ups.
<>end<>

Document Quality:
Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted?

Answer:
<>start<>
This Is an operational document describing best practices. The baseline of the document is the writing down of what successful BGP network implementations have deployed.
<>end<>

Personnel:
Who is the Document Shepherd? Who is the Responsible Area Director?

Answer:
<>start<>
Document Shepherd: Gunter Van de Velde
Responsible Area director: Joel Jaeggli
<>end<>

(3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG.

Answer:
<>start<>
The document is complete and ready for publication
<>end<>

(4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed?

Answer:
<>start<>
No concerns
<>end<>

(5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place.

Answer:
<>start<>
No need, document is well under control and reviewed
<>end<>

(6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here.

Answer:
<>start<>
The document is well written and there are no specific conserns
<>end<>

(7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why?

Answer:
<>start<>
No IPR: Jerome Durand, Ivan Pepelnjak & Gerd Doering
<>end<>

(8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures.

Answer:
<>start<>
No disclosure
<>end<>

(9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it?

Answer:
<>start<>
The WG agreed that this is good work and is the output of a general good WG effort
<>end<>

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.)

Answer:
<>start<>
No threats or other demonstration of extreme discontent
<>end<>

(11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough.

Answer:
<>start<>
Idnits are checked.
Authors mentioned that he Unused references are intentional to to provide extra pointers for information to the reader of the document.
<>end<>

(12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews.

Answer:
<>start<>
Not applicable
<>end<>

(13) Have all references within this document been identified as either normative or informative?

Answer:
<>start<>
Yes, they have been identified and classified like that
<>end<>

(14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion?

Answer:
<>start<>
All Normative references are ready
<>end<>

(15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure.

Answer:
<>start<>
All Normative references are ready
<>end<>

(16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary.

Answer:
<>start<>
This document will not change the state of any existing RFC
<>end<>

(17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226).

Answer:
<>start<>
No IANA considerations for this document
<>end<>

(18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries.

Answer:
<>start<>
No IANA considerations for this document
<>end<>

(19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc.

Answer:
<>start<>
Only idnits check, no other tools
<>end<>


2014-08-20
05 Gunter Van de Velde State Change Notice email list changed to opsec-chairs@tools.ietf.org, draft-ietf-opsec-bgp-security@tools.ietf.org
2014-08-20
05 Gunter Van de Velde Responsible AD changed to Joel Jaeggli
2014-08-20
05 Gunter Van de Velde IETF WG state changed to Submitted to IESG for Publication from Waiting for WG Chair Go-Ahead
2014-08-20
05 Gunter Van de Velde IESG state changed to Publication Requested
2014-08-20
05 Gunter Van de Velde IESG process started in state Publication Requested
2014-08-20
05 Gunter Van de Velde Tag Doc Shepherd Follow-up Underway cleared.
2014-08-20
05 Gunter Van de Velde IETF WG state changed to Waiting for WG Chair Go-Ahead from WG Consensus: Waiting for Write-Up
2014-08-20
05 Gunter Van de Velde Changed document writeup
2014-08-19
05 Jerome Durand New version available: draft-ietf-opsec-bgp-security-05.txt
2014-07-24
04 Jerome Durand New version available: draft-ietf-opsec-bgp-security-04.txt
2014-07-16
03 Gunter Van de Velde Tag Doc Shepherd Follow-up Underway set.
2014-07-16
03 Gunter Van de Velde IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2014-07-16
03 Gunter Van de Velde Document shepherd changed to Gunter Van de Velde
2014-07-16
03 Gunter Van de Velde Intended Status changed to Best Current Practice from None
2014-04-27
03 Jerome Durand New version available: draft-ietf-opsec-bgp-security-03.txt
2014-01-13
02 Jerome Durand New version available: draft-ietf-opsec-bgp-security-02.txt
2013-07-14
01 Jerome Durand New version available: draft-ietf-opsec-bgp-security-01.txt
2013-03-27
00 Chittimaneni Kk IETF WG state changed to In WG Last Call from WG Document
2013-01-18
00 Jerome Durand New version available: draft-ietf-opsec-bgp-security-00.txt