[sidr] comments on draft-ietf-sidr-rfc6485bis

2014-04-14 Thread Sandra Murphy
Speaking as regular ol' member Some comments on draft-ietf-sidr-rfc6485bis-01.txt Most of my comments are related to the attempt to add a new OID to RFC6485, which previously had only one to specify. * The signature algorithm used in certificates, CRLs, and signed objects is RSA

Re: [sidr] comments on draft-ietf-sidr-rfc6485bis

2014-04-14 Thread Sandra Murphy
And one I forgot: CAs and RPs SHOULD be capable of supporting a transition to allow for the phased introduction of additional encryption algorithms and key specifications, Is this any different than the algorithm agility in RFC6916? If so, I'd think a reference would be good. If not,

Re: [sidr] WGLC: draft-ietf-sidr-bgpsec-reqs

2014-04-14 Thread Christopher Morrow
coming back to this discussion... On Fri, Feb 7, 2014 at 10:17 PM, Randy Bush ra...@psg.com wrote: perhaps people should use a dictionary and look up per se. (from dictionary.com, or wherever bing.com 'define per se' comes from) per se 1. by or in itself or themselves; intrinsically. so, as I

Re: [sidr] WGLC: draft-ietf-sidr-bgpsec-reqs

2014-04-14 Thread Randy Bush
I could easily replace per se with 'intrinsically' like: yes. do we need to play synonyms when, ab definito, they mean the same thing? i chose my words. as you point out, they are correct. Is there a reason to keep the mention of route-leaks in this document? i think it was shane who

Re: [sidr] WGLC: draft-ietf-sidr-bgpsec-reqs

2014-04-14 Thread Christopher Morrow
On Mon, Apr 14, 2014 at 11:00 AM, Randy Bush ra...@psg.com wrote: while checking the docco, i found 3.14 While the trust level of a route should be determined by the BGPsec protocol, local routing preference and policy MUST then be applied to best path and other routing

Re: [sidr] comments on draft-ietf-sidr-rfc6485bis

2014-04-14 Thread Stephen Kent
The CPS was written well before 6916 was finished. A reference to that RFC now makes sense. Steve On 4/14/14 10:43 AM, Sandra Murphy wrote: And one I forgot: CAs and RPs SHOULD be capable of supporting a transition to allow for the phased introduction of additional encryption