[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Evaluation: draft-savola-bcp38-multihoming-update - Ingress Filtering for Multihomed Networks



this is not on the agenda!

> Last Call to expire on: 2003-08-06
> 
>         Please return the full line with your position.
> 
>                       Yes  No-Objection  Discuss  Abstain
> Harald Alvestrand    [   ]     [   ]     [   ]     [   ]
> Steve Bellovin       [   ]     [   ]     [   ]     [   ]
> Randy Bush           [ X ]     [   ]     [   ]     [   ]
> Bill Fenner          [   ]     [   ]     [   ]     [   ]
> Ned Freed            [   ]     [   ]     [   ]     [   ]
> Ted Hardie           [   ]     [   ]     [   ]     [   ]
> Russ Housley         [   ]     [   ]     [   ]     [   ]
> Allison Mankin       [   ]     [   ]     [   ]     [   ]
> Thomas Narten        [   ]     [   ]     [   ]     [   ]
> Jon Peterson         [   ]     [   ]     [   ]     [   ]
> Margaret Wasserman   [   ]     [   ]     [   ]     [   ]
> Bert Wijnen          [   ]     [   ]     [   ]     [   ]
> Alex Zinin           [   ]     [   ]     [   ]     [   ]
> 
> 2/3 (9) Yes or No-Objection opinions needed to pass.
> 
> DISCUSSES AND COMMENTS:
> ======================
> 
> 
> 
> ^L 
> ---- following is a DRAFT of message to be sent AFTER approval ---
> From: The IESG <iesg-secretary@ietf.org>
> To: IETF-Announce:;
> Cc: Internet Architecture Board <iab@iab.org>,
>     RFC Editor <rfc-editor@rfc-editor.org>
> Subject: Protocol Action: 'Ingress Filtering for Multihomed 
>          Networks' to BCP 
> 
> The IESG has approved the Internet-Draft 'Ingress Filtering for Multihomed 
> Networks' <draft-savola-bcp38-multihoming-update-00.txt> as a BCP. This 
> document has been reviewed in the IETF but is not the product of an IETF 
> Working Group. 
> The IESG contact person is Randy Bush.
> 
> 
> Technical Summary
>  
>       RFC 2827 recommends that ISPs police their customers' traffic by
>       dropping traffic entering their networks that is coming from a
>       source address not legitimately in use by the customer network.
>       In the predecessor document, RFC 2267 [1], it was recommended
>       that operators filter out traffic whose sources address is a
>       so-called "Martian Address" - an address that is reserved,
>       including any address within 0.0.0.0/8, 10.0.0.0/8, 127.0.0.0/8,
>       172.16.0.0/12, 192.168.0.0/16, 224.0.0.0/4, or 240.0.0.0/4.
> 
>       This document discusses known technical issues and problems when
>       implementing RFC 2827 using
>           o Ingress Access Lists,
>           o Strict Reverse Path Forwarding,,
>           o Loose Reverse Path Forwarding, and
>           o Loose Reverse Path Forwarding ignoring default routes
>       and discusses trade-offs and work-arounds available to the
>       prudent operator.
>  
> Working Group Summary
>  
>   As this document is not the product of a working group, there was
>   no working group last call. But it was reviewed in various WGs,
>   namely multi6 and v6ops.
>  
> Protocol Quality
>  
>   This document was reviewd for the IESG by Randy Bush and the
>   Operations Directorate.
> 
> 
> 
> 
> 
>