[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
SIDR Charter
Hi,
please ignore my last posting - my mailbook and I are suffering from mutual
confusion and I misdirected this note!!
:-)
Geoff
-----------
Hi,
Alex and Bill have reported back on the IESG's consideration of the
proposed SIDR Charter.
They've asked us to see if we can submit a revised charter early next
week that addresses the following comments:
1. Para that says:
> Both strict hierarchical and distributed non-
> hierarchical trust systems are intended to be supported within
> this framework.
should also say that the reason for this is that they are both needed,
each for a different deployment model.
2. The charter speaks about authentication, but not about authorization,
and it should.
For reference the proposed charter is attached to this note
The next note will detail suggested changes to the proposed charter to
address these comments, for your consideration.
Regards,
Geoff
===========================================================================
Secure Inter-Domain Routing (sidr)
Last Modified: 2005-11-28 (V4)
Chair(s):
TBD
Routing Area Director(s):
Bill Fenner <fenner at research.att.com>
Alex Zinin <zinin at psg.com>
Routing Area Advisor:
TBD
Other Advisors:
? Security: TBD
? Routing: TBD
Mailing Lists:
General Discussion: sidr at ietf.org
To Subscribe: sidr-request at ietf.org
In Body: (un)subscribe
Archive: http://www.ietf.org/mail-archive/web/sidr/index.html
Description of Working Group:
One of the areas of vulnerability for large scale Internet
environments lies in the area of inter-domain routing. The basic
security questions that can be posed regarding routing information
is that of the validity of the address prefix being advertised, the
validity of the originating Autonomous System Number, and the
existence of an explicit permission from the address prefix holder
to allow the prefix to be advertised from this origin. A related
question concerns the level of trust than can be ascribed to
attributes of a route object in terms of their authenticity,
including consideration of the AS Path attribute..
The Routing Protocol Security Group (RPSEC) has been chartered to
document the security requirements for routing systems, and, in
particular, to produce a document on BGP security requirements.
The scope of work in the SIDR working group is to formulate an
extensible architecture for an interdomain routing security
framework. This framework must be capable of supporting incremental
additions of functional components. As and when interdomain routing
security requirements are completed within the RPSEC Working Group,
these requirements will be defined within the SIDR framework as
functional components of a secure interdomain routing system.
The scope of work will include describing the use of certification
objects for supporting the distribution of authentication
information. Both strict hierarchical and distributed non-
hierarchical trust systems are intended to be supported within
this framework.
The scope of work is limited to inter-domain router-to-router
protocols only, for both unicast and multicast systems.
The SIDR working group is charged with the following tasks:
- Document an extensible interdomain routing security architecture
- Document the use of certification objects within this secure
routing architecture
- Document specific routing functionality modules within this
architecture that are designed to address specific secure routing
requirements as they are determined by the RPSEC Working Group
Goals and Milestones:
April-06 Submit initial draft on inter-domain routing security
architecture
May-06 Submit initial draft on certificate objects to be used
within this architecture
May-06 Submit initial draft on securing origination of routing
information
Sept-06 Submit routing security architecture for publication as an
Informational RFC
Nov-06 Submit description of use certificate objects by this
architecture as an Informational RFC
Dec-06 Submit secure origination mechanism as a Proposed Standard
Jan-07 Evaluate progress, recharter with new goals or shutdown.