Skip to main content

8. Security Considerations

8. Security Considerations

Procedures and protocol extensions defined in this document do not

affect the BGP security model. See the Security Considerations

section of [RFC4271] for a discussion of BGP security. Also refer to

[RFC4272] and [RFC6952] for analysis of security issues for BGP.

In the context of the BGP peerings associated with this document, a

BGP speaker MUST NOT accept updates from a consumer peer. That is, a

participating BGP speaker should be aware of the nature of its

relationships for link-state relationships and should protect itself

from peers sending updates that either represent erroneous

information feedback loops or are false input. Such protection can

be achieved by manual configuration of consumer peers at the BGP

speaker.

An operator SHOULD employ a mechanism to protect a BGP speaker

against DDoS attacks from consumers. The principal attack a consumer

may apply is to attempt to start multiple sessions either

sequentially or simultaneously. Protection can be applied by

imposing rate limits.

Additionally, it may be considered that the export of link-state and

TE information as described in this document constitutes a risk to

confidentiality of mission-critical or commercially sensitive

information about the network. BGP peerings are not automatic and

require configuration; thus, it is the responsibility of the network

operator to ensure that only trusted consumers are configured to

receive such information.