Last Call Review of draft-ietf-opsec-bgp-security-05
review-ietf-opsec-bgp-security-05-secdir-lc-melnikov-2014-10-16-00

Request Review of draft-ietf-opsec-bgp-security
Requested rev. no specific revision (document currently at 07)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2014-10-14
Requested 2014-09-11
Draft last updated 2014-10-16
Completed reviews Genart Last Call review of -05 by Christer Holmberg (diff)
Genart Telechat review of -06 by Christer Holmberg (diff)
Secdir Last Call review of -05 by Alexey Melnikov (diff)
Opsdir Last Call review of -05 by Lionel Morand (diff)
Rtgdir Last Call review of -05 by Geoff Huston (diff)
Assignment Reviewer Alexey Melnikov
State Completed
Review review-ietf-opsec-bgp-security-05-secdir-lc-melnikov-2014-10-16
Reviewed rev. 05 (document currently at 07)
Review result Ready
Review completed: 2014-10-16

Review
review-ietf-opsec-bgp-security-05-secdir-lc-melnikov-2014-10-16

Hi,



I have reviewed this document as part of the security directorate's 


ongoing effort to review all IETF documents being processed by the IESG. 


 These comments were written primarily for the benefit of the security 


area directors.  Document editors and WG chairs should treat these 


comments just like any other last call comments.






BGP (Border Gateway Protocol) is the protocol almost exclusively used in 


the Internet to exchange routing information between network domains. 


This document describes measures to protect the BGP sessions itself 


(like TTL, TCP-AO, control plane filtering) and to better control the 


flow of routing information, using prefix filtering and automatization 


of prefix filters, max-prefix filtering, AS path filtering, route flap 


dampening and BGP community scrubbing.






This document is entirely about BGP operational security. As the 


security consideration points out it doesn't talk about existing BGP 


implementations and their vulnerabilities. I think the document is 


covering operational security of BGP well.