Speaking as regular ol' member

Some comments on the rollover draft.

The title says "an alternative to beaconing" - the protocol doc no longer talks 
about beaconing, so this is an alternative to a behavior that no longer exists.

I am not certain about the scope of this rollover discussion.  The draft intro 
says the scope is changing the key pair and talks the need to reissue updates 
because old signatures will be invalid.  But  section 3 also says the rollover 
process includes cases where you "generate a new certificate without changing 
the key pair".  And the end of 3.1 says "When a new BGPSEC certificate is 
generated without changing its key"

Section 2 mentions control of the replay window as a primary motivation.  But 
Section 3 does not list that as one of the causes.

Section 3.1 mentions that the details of pre-publishing a new cert will vary 
with circumstances.  Should the possible differences be mentioned?  For 
example, one mentioned circumstance is whether the repository is "locally or 
externally hosted" - I'm not sure what differences that particular circumstance 
would make.  I presume the difference is control of timing, but I'm not sure.

Section 3.1 - "in which case routing information may be lost" - why?  (I figure 
I know why, but I'm not so sure I'm thinking what the authors are thinking.)

"typical operation of refreshing out-bound BGP policies" - you mean typical as 
is currently possible in current routers, right?

"probably in the order of minutes to avoid reaching any expiration time" - are 
the authors presuming a order of magnitude for cert expiration times?

Are steps 1-5 intended to be sequential?  I would expect, but later text takes 
care to point out that steps 1-2 "could happen ahead of time", which raises the 
question of timing of the process.

Step 2 is not deterministic - there's a good enough staging time but no way to 
choose a certain maximum staging time.  If step 3 reaches a router that has the 
new key but has not yet been informed that the old key is no longer valid, then 
the new update will implicitly withdraw the old update.  (Right?)  If the new 
key has not reached a router, it will not be able to validate the new update 
and will (likely?) not propagate the new update.  Any thoughts of what that 
will mean to overall bgp behavior?

Section 4 refers to beaconing - which is no longer part of the protocol.  
"Currently BGPSEC offers a timestamp (expiration time)" - not in the current 
protocol spec that I could see.  Can you be more specific?

section 4.2 maybe should list the convergence churn resulting for a new key.

section 4.2 says:

   this reason, it is recommended that routers in this scenario been
   provisioned with two certificates: one to sign BGP UPDATES in transit
   and a second one to sign BGP UPDATE for prefixes originated in its
   AS.  

This was a strategy suggested by Sriram, IIRC.  We should be sure that the 
protocol draft supports this strategy.  (Is this the right draft to make this 
keying suggestion?)

--Sandy, speaking as regular ol' member
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to