Configuring BGP to Block Denial-of-Service Attacks
Draft of message to be sent after approval:
From: The IESG <firstname.lastname@example.org> To: RFC Editor <email@example.com> Cc: The IESG <firstname.lastname@example.org>, <email@example.com>, firstname.lastname@example.org Subject: Re: Informational RFC to be: draft-turk-bgp-dos-07.txt The IESG has no problem with the publication of 'Configuring BGP to Block Denial-of-Service Attacks' <draft-turk-bgp-dos-07.txt> as an Informational RFC. The IESG would also like the IRSG or RFC-Editor to review the comments in the datatracker (https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&dTag=9145&rfc_flag=0) related to this document and determine whether or not they merit incorporation into the document. Comments may exist in both the ballot and the comment log. The IESG contact person is Alex Zinin. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-turk-bgp-dos-07.txt The process for such documents is described at http://www.rfc-editor.org/indsubs.html. Thank you, The IESG Secretary
Technical Summary This document describes an operational technique that uses BGP communities to remotely trigger black-holing of a particular destination network to block denial-of-service attacks. Black- holing can be applied on a selection of routers rather than all BGP- speaking routers in the network. The document also describes a sinkhole tunnel technique using BGP communities and tunnels to pull traffic into a sinkhole router for analysis. Working Group Summary The document is NOT a WG submission. However, comments have been solicited from the Routing Area mailing list and the Routing Area directorate members The draft has received adequate review and support within the community. Protocol Quality The document has been reviewed for the IESG by Alex Zinin.