Greetings again. This document updates the error handling of a bunch of BGP protocol documents to deal with the fact that they (inadvertently) allow a remote attacker to cause BGP sessions to be reset when they probably shouldn't be. The problem being solved is that BGP says that if an UPDATE message with a malformed attribute is received, the current spec says the entire session in which that message was received is reset, even parts that are valid. However, UPDATE messages might be propagated through intermediate routers that don't check the attribute validity, so that an attacker can possibly make a hard-to-trace and expanding attack. The draft says, in essence, "limit the damage of the malformed attribute to only the part of the session that are directly related to it". It also updates the similar error handing for a bunch of other BGP attributes. Overall, the draft is clear, and the Security Considerations section is concise and easy to understand. --Paul Hoffman