[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: draft-ietf-v6ops-v6inixp-04.txt WGLC



Hi Roque,

This is my last message to this thread just to conclude the
participation and enforce the go ahead to this document.

I was previously trying to highlight that globally routing (or not)
IXP IPv6 LAN is not only related to measurement and security (DoS)
points, but also with routing between IXP participants. And how they
deal with NEXT_HOP attribute on IPv6 prefixes learned from other
participants is an important matter.

But I also agree that this topic is out of scope to this document.

Considering that, I would like to suggest the following change to the text:

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
3.  Addressing Plan
(...)

 When considering the routing of the IXP LANs two options are identified:

   o  IXPs may decide that LANs should not to be globally routed in
      order to limit the possible origins of a Denial of Service (DoS)
      attack to its particpants' AS boundaries.

   o  IXP may decide that LANs should be globally routed.  In this case,
      IXP LANs monitoring from outside its participants' AS boundaries
      is possible but the IXP LANs will be vulnerable to DoS from
      outside of those boundaries.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

So, removing the following part:
"      In this configuration
      participants may route these prefixes inside their networks (e. g.
      using BGP no-export communities or routing the IXP LANs within the
      participants' IGP) to perform fault management.  Using this
      configuration, the monitoring of the IXP LANs from outside of its
      participants' AS boundaries is not possible."

Thanks,

-- 

Eduardo Ascenço Reis