On Fri, Feb 18, 2011 at 11:35 AM, Russ White <r...@cisco.com> wrote:
>
>>    * Is an Autonomous System (AS) authorized to originate an IP prefix
>>    * Is the AS-Path represented in the route the same as the path
>>         through which the route update traveled
>
> As we've been discussing on the list --I don't think this is a good
> goal. The first goal should be to determine what it is we want to show

'this' refers to which of the two items above?

> about the AS Path in relation to other things, and then work on filling
> that goal.

I thought I covered this (a few times?) on the list discussion of the
reqs-00 draft, but I'd like to know if an update I see from a peer, if
selected, is one in which a party altered the as-path in order to draw
traffic to them. It's possible this happens for any number of reasons,
the simplest (and easiest to point to being 'bad') is:
  <http://www.wired.com/threatlevel/2008/08/how-to-intercep/>

In this case, with signing of the path at each path-hop you would be
able to determine if the route announcement should be used or not
(presuming a 'secure is better' policy, of course).

> Starting with the assumption that proving an update travels a specific
> path seems, to me, to be going about things the wrong way.

propose text then? dancing around the rosemary bush is tiring, given
the ideas expressed here and in the other thread you should have an
idea of what the goal is, propose some text that you think moves the
ball in the right direction, please.

-chris
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to