I think that is more or less right.

--John

On Feb 25, 2011, at 4:29 PM, Joel M. Halpern wrote:

> Let me try phrasing the issue differently.  I may still be missing the point, 
> from all sides.
> 
> I believe that what is actually wanted is primarily:
> o To prevent any advertiser from sending an advertisement that would cause 
> other properly behaving parties to send traffic iin a way that they are not 
> "entitled" to cause
> 
> As secondary matter
> o We want such attempted subversion to be visible at more than one hop 
> because experience tells us that not everyone deploys the tools properly, and 
> thus we can not count on every honest player doing their job well.
> 
> (Colluding subverting players is addressed only to the degree that it is 
> covered by what we are after, not explicitly.  We are staying away from 
> Byzantine Generals.)
> 
> The above probably needs more wordsmithing, but is a problem statement that 
> does not assume that packets follow their advertisements, nor that any party 
> can control what any other party actually does.  It also avoids getting into 
> the question of the accuracy of the reflection of the path of the 
> advertisement, the AS path in the advertisement, and the actual packet flow.  
> Instead, it focuses on an attack we are trying to prevent.
> I believe that the primary solutions on the table are all solutions that can 
> be reasonably considered to address the problem as stated.  (I.e. I am not 
> trying to change the solutions pace, only to clarify the problem space.)
> 
> Apologies if I am still completely confused.
> Yours,
> Joel
> 
> On 2/25/2011 9:14 AM, John Scudder wrote:
>> On Feb 25, 2011, at 4:10 PM, Russ White wrote:
>>>>> Can you explain the difference in some other way that doesn't mix the
>>>>> two ideas?
>>>> 
>>>> Since after reading your message carefully three times I don't understand 
>>>> your question, I'm unable to answer it. Sorry.
>>> 
>>> You're apparently trying to separate the idea of proving an update
>>> traveled a specific path from the idea of using this information to
>>> actually filter or determine any other policy. I don't see how you can
>>> separate the two --can you explain how you can?
>> 
>> If you can establish the former (that the route did travel across the path 
>> it said it did), that outcome can be used as input to policy.  This is 
>> exactly analogous to draft-ietf-sidr-pfx-validate-01, BTW.
>> 
>> Divide, conquer.  A commonly used trick in computing. :-)
>> 
>> --John
>> _______________________________________________
>> sidr mailing list
>> sidr@ietf.org
>> https://www.ietf.org/mailman/listinfo/sidr
>> 
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to