On Fri, 10 Jan 2014, Randy Bush said:
There were four responses to this adoption call, all positive. But
four is not a strong indication of wg wishes here.
note that the wg meeting in berlin asked for a requirements draft
I hear you, and I heard the comments. But the wg is supposed to
I don't recall if I responded before, but I will now.
I support development of a requirements/use cases doc, so we might as
well begin
with this one.
Steve
___
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr
(Speaking as regular ol' member)
as some of you know, I'm writing my master thesis about RPKI at
Deutsche Telekom (RĂ¼diger Volk). Especially I try to identify the
problems (attack, misconfiguration, ...) of using RPKI as a relying
party/resource owner and try to find ways to identify if such a
Comments below.
Sriram
2.2 System related
2.2.1 Replay attack:A whole old dataset could replace a newer one and
could be still valid.
That's one reason for the manifests. If you manage to come up with a
scenario where replay occurred but was undetected by the manifest, it would
be very