On Apr 3, 2011, at 18:17 MDT, George, Wes E [NTK] wrote: > While we have an operational considerations document that covers origin > validation, it focuses mainly on policy and implementation > details of the validation machinery. We don't have anything that covers the > back-end of implementing a proper RPKI (from the cache > upward, rather than downward towards the router).
+1 > So I think that there is a need for a document that covers things like > identity and authority management, minimum levels of security > for key management, etc. +1 > I'm happy to help play the part of RPKI n00b to ensure that a draft written > to cover this answers the right questions, but for the > same reason, I cannot help much with actually writing it, and am hoping that > there are folks interested in picking up this work. +1 -shane _______________________________________________ sidr mailing list sidr@ietf.org https://www.ietf.org/mailman/listinfo/sidr