Skip to content

Commit

Permalink
Security Considerations section
Browse files Browse the repository at this point in the history
Security Considerations, one typo.

Adding a section on Security Considerations.
Since we are still in discussions around security considerations for the API, I left this one somewhat ambiguous.  

This is by no means perfect, but now we have something.  Trying to get the draft into a minimal reasonable state before we submit for March.

from discussions in:
#6
#4
  • Loading branch information
jramseyer authored Jan 11, 2024
1 parent e38d8a0 commit 10b3a84
Showing 1 changed file with 7 additions and 2 deletions.
9 changes: 7 additions & 2 deletions draft-ramseyer-grow-peering-api.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ By using the Peering API, entities requesting and accepting peering can signific

* Reducing in person-hours spent configuring peering
* Reducing configuration mistakes by reducing human interaction
* And by peering, reducing network latency through expansion of interconneciton relationships
* And by peering, reducing network latency through expansion of interconnection relationships



Expand All @@ -71,7 +71,12 @@ All terms used in this document will be defined here:

# Security Considerations

PeeringDB OAuth will be the minimum requirement for authorization of API requests.
As peering connections exchange real internet traffic, this API requires a security component to verify that the requestor is allowed to request peering on behalf of that ASN.
In the initial proposal, this API intended to require PeeringDB-based authentication as the standard.
After further discussion, it was proposed to offer different authentication options, to accomodate the security concerns of different parties.
There are several possible extensions to the authentication model, including RPKI-based authentication, and additional OAuth providers.
For RPKI-based authentication, this document refers to RFC9323.
However, this document hopes that, through the RFC process, the Working Group can come to a consensus on a base "authentication standard," to ease adoption for peering partners.

# Protocol
(Jenny--this is not up-to-date, but I pasted in what we had in the google doc and will revise)
Expand Down

0 comments on commit 10b3a84

Please sign in to comment.