[144185] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Do Not Complicate Routing Security with Voodoo Economics

daemon@ATHENA.MIT.EDU (Jennifer Rexford)
Sun Sep 4 15:31:05 2011

From: Jennifer Rexford <jrex@CS.Princeton.EDU>
In-Reply-To: <305E552C-B38C-477A-A1C0-91CF59BEA262@domino.org>
Date: Sun, 4 Sep 2011 15:30:32 -0400
To: "Neil J. McRae" <neil@domino.org>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Neil,

> maybe volunteers from the nanog community should contact you?

Thanks for the suggestion!  Yes, I would encourage interested people to =
contact me.  We won't be able to put everyone on the working group (in =
the interest of having a small enough group to make progress), but we =
are very interested in having people who can offer their expertise, =
feedback, and advice throughout the process...

-- Jen


>=20
> On 4 Sep 2011, at 16:45, "Jennifer Rexford" <jrex@CS.Princeton.EDU> =
wrote:
>=20
>> Neil,
>>=20
>> The group is being assembled right now, so we don't have a list as of =
yet.=20
>>=20
>> -- Jen
>>=20
>>=20
>> Sent from my iPhone
>>=20
>> On Sep 4, 2011, at 11:32 AM, "Neil J. McRae" <neil@domino.org> wrote:
>>=20
>>> Jen,
>>> What operators are involved? And who represents them specifically?
>>>=20
>>> Neil.
>>>=20
>>> On 04/09/2011 16:07, "Jennifer Rexford" <jrex@CS.Princeton.EDU> =
wrote:
>>>>=20
>>>>=20
>>>> As one of the co-chairs of this working group, I'd like to chime in =
to
>>>> clarify the purpose of this group.  Our goal is to assemble a group =
of
>>>> vendors and operators (not "publish or perish" academics) to =
discuss and
>>>> recommend effective strategies for incremental deployment of =
security
>>>> solutions for BGP (e.g., such as the ongoing RPKI and BGP-SEC =
work).  It
>>>> is not to design new security protocols or to "write policy and
>>>> procedures for operators" -- that would of course be over-reaching =
and
>>>> presumptuous.  The goal is specifically to identify strategies for
>>>> incremental deployment of the solutions designed and evaluated by =
the
>>>> appropriate technical groups (e.g., IETF working groups).  And, =
while the
>>>> SIGCOMM paper you mention is an example of such a strategy, it is =
just
>>>> one single example -- and is by no means the recommendation of a =
group
>>>> that is not yet even fully assembled yet.  The working group will =
debate
>>>> and discuss a great many issues before suggesting any strategies, =
and
>>>> those strategies would be the output of the entire working group.
>>>>=20
>>>> <tongue in cheek> As for "publish or perish" academics, I doubt =
you'll
>>>> find that the small set of academics who choose to go knee deep =
into
>>>> operational issues do so because they are trying to optimize their
>>>> academic careers... ;) </tongue in cheek>
>>>>=20
>>>> -- Jen
>>>>=20
>>>=20
>>>=20
>>=20
>=20



home help back first fref pref prev next nref lref last post