Reviving a zombie thread...
So,
Where does this set of comments end us? Are the updates put in between
11/11 and 03/12 taking care of the discussion? or are there still
things to wrangle?

I think, given the length and breadth of discussion here we'd all do
to re-read and re-WGLC this doc once things are settled.

-chris
<cochair>

On Mon, Nov 14, 2011 at 5:57 PM, Danny McPherson <da...@tcb.net> wrote:
>
> On Nov 14, 2011, at 8:37 AM, Rob Austein wrote:
>
>> Ultimately, the problem is the same as distributing DNSSEC TAs, or any
>> other TA for that matter.  Pretty much by definition, these things
>> have to be configured outside the automated system, because they're
>> the bootstrap data.  Inclusion in distributions of software using the
>> system seems to be the most common way, but one could envision other
>> methods (T shirts handed out at IETF or *OG meetings, publication in
>> major newspapers, perhaps as QR codes, invent your own mechanism --
>> the key point is that grounds for believing the TAL come from outside
>> the system we're trying to bootstrap).
>
> However, in the interim (until we have a single RPKI root), the origin-ops
> draft should provide some guidance about how an RP should have the
> capability to verify "look-aside" (ugh) what resources an "INR" holds, and
> recommend that they only accept associated RPKI data for those
> resources.  The onus cannot be on the RP to resolve this themselves at
> on a global scale.
>
> The model where each of the TAs in the TAL can assert what it is they're
> authoritative for is even mode broken than the browser/SSL/CA issues
> that we're trying to fix with DANE (the attacker at least has to be on-path
> there, before they consult a compromised CA).
>
> Furthermore, pending the outcome of the discussion in the other thread
> I started related to this topic and local TAs, the origin-ops draft should 
> also
> include some discussion about multiple parties involved in LTA-esque
> functions (or extra TALs with "constraints") to preserve inter-domain
> connectivity during putative RPKI override/bypass functions for source,
> destination, and intermediate networks.
>
> -danny
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to