At the Sidr meeting at IETF 69, the following issue was raised in regards to matching ROAs with NLRI in a BGP update.

Consider an ISP that receives an allocation of a /20 prefix from source A, and an allocation of an adajecnt /20 prefix from source B, but wants to issue an advertisement for the aggregate /19 prefix.

Note that since the allocations are received from different sources, the ISP will have one certificate for each alloation and the certificates will have different validation paths. Therefore, the ISP cannot create a single end-entity certificate the encompasses the entire /19 prefix (i.e. any certificate encompassing the entire /19 prefix would fail validation according to RFC 3779 rules). This means that under the current one-to-one correspondence between ROAs and end-entity certificates, the ISP would have to create 2 separate ROAs, one for each of the /20 prefixes.

Similarly, one can imagine a scenario where an ISP receives adjacent allocations from three sources and wants to announce an aggregate prefix (e.g. the ISP receives a /19, a /20 and a second /20 and wants to announce a /18). This would currently require issuing three separate ROAs.

Thus, if we continue to mandate a one-to-one correspondence between ROAs and end-entity certificates, we place the burden on the recipient of a BGP Update to determine if there is any collection of valid ROAs that could be aggregated to form the NLRI in the Update message. That is, upon receiving an advertisement for a /18 prefix originated by AS 123, one must example all of the ROAs containing AS 123 and determine if any subset of them can be aggregated to form the /18 prefix in question. No one in the room at the Sidr meeting indicated that they believed this was a good idea.

An alternative approach is to break the one-to-one correspondence between ROAs and end-entity certificates by allowing two signatures on a single ROA. Returning to our original example, the ISP would now create two end-entity certificates, one containing the /20 prefix from source A and the other containing the /20 prefix from source B. The ISP would then issue a single ROA for the aggregate /19 prefix and attach two signatures, one that could be verified using the first end-entity certificate and one that could be verified using the second end-entity certificate. Several people in the room at the Sidr meeting indicated that they believed this was a good idea.

Therefore, I was wondering if there was consensus that the ROA format should be changed to allow multiple signatures? Or if the working group felt there was a better approach for matching ROAs against the NLRI in a BGP Update?

If we are going to allow two signatures on a ROA, I'd like to begin revising the ROA format draft at some point next week so that we have time to go through two versions of the ROA draft (if needed) before the next IETF meeting. Therefore, if you do not believe that allowing multiple signatures on a ROA is a good approach, please let me know before August 8.

Thanks,
- Matt Lepinski :->



_______________________________________________
Sidr mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/sidr

Reply via email to