Ryan Shea wrote:
An RIR may not have the same incentives to verify that me and my public
key are truly associated with AS702 - so as an RP I need to think about
how much I trust that the public key associated with a ROA that comes
from this RIR.  Further, as a provider I do not have the same ability to
take my business elsewhere with regards to an RIR and allocated
resources.  As a corporation I can choose to end all associations with
CyberTrust, both as a signer of our certificates and as a trusted CA
much easier than cutting all ties with an RIR in a region I operate.
The survival of an RIR is not as intricately tied to its vigilance as
with the SSL model - that is the gist of what I am saying.

Ryan,

You are stating that only an RIR can certify a resource (which is allocated through that RIR). This is not true. On the contrary, _anyone_ can certify your resources. The question is, who will the third parties (ie. not you and not the certifier(s)!) trust -- the entity whose business is to _know_ who has those resources, or someone else?

As Steve have already explained numerous times, anyone can nominate themselves to be a Trust Anchor for RPKI (or any other PKI), but that's just a self-proclamation. Again, third parties (people who will verify stuff) will choose TAs, based on who they trust.

So you're absolutely free to go talk to for example Bert, and ask him to certify your allocation. He actually might, as he's a respected pers^H^H^H^H individual, everyone knows him, and he has been signing the DNS root for years, so he also has a good track record. I for one would trust the guys whose business is to manage resources, to certify those resources (no offense, Bert :-)

Robert
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to