Terry,

On Jun 8, 2012, at 2:30 AM, Terry Manderson wrote:

Hey Roque,

On 7/06/12 5:53 PM, "Roque Gagliano (rogaglia)" 
<rogag...@cisco.com<mailto:rogag...@cisco.com>> wrote:

On Jun 7, 2012, at 7:54 AM, Terry Manderson wrote:


I had the same reaction as you. I looked at the CP document and the Cert.
Profile. The best reference to this use-case is the second paragraph of the
Security Section on RFC 6487:
"   A resource certificate PKI cannot in and of itself resolve any forms
  of ambiguity relating to uniqueness of assertions of rights of use in
  the event that two or more valid certificates encompass the same
  resource.  If the issuance of resource certificates is aligned to the
  status of resource allocations and assignments, then the information
  conveyed in a certificate is no better than the information in the
  allocation and assignment databases."

Thanks for that. But aren't we ultimately talking about _who_ issues the
ROAs and what their contents are in relation to the intent of the resource
user?

This is more a question for Randy.

IMHO, his text says both:
"A may certify G's resources, or issue one or more EE certificates and ROAs for 
G's resources. Which is done is a local matter between A and G."

BTW, My understanding of that paragraph was about situations where you have
trust anchors that overlap.

Your english is definitely better than mine, but I do not find any reference to 
trust anchors. I think it applies generally to any registry database.


My understanding of Randy's proposal is that both C and G will have for a
period of time the "right of use" for the 10.42.2.0/23 address space.

The idealistic stance might be that the RPKI and associated drafts should
not recommend a situation of ambiguity. Being able to have two different
ROAs (with different ASNs) for the same prefix issued by EE certs from
different res certs (thus different private keys) seems like it is making
life tough for the relying party.

How would a RP check this? (think particularly on bottom-up fetch + validation)
What the RFC 6487 security section is basically saying is that you should be at 
least as good as your registration back-end.


Your
proposal on the first paragraph is an alternative but I would say that it will
be much harder to "make before break".

Is it?

So step wise since G is moving ISPs from C to A (and they originate the
route on G's behalf):

1) "C" has the 10.42.0.0/16, presumably ROA issued for 10.42.2.0/23, AS-'C'
(10.42.2.0/23 AS-"C" route VALID)
1.5) Worst case of "A" is slow between revoking/reissuing C's cert (all
routes UNKNOWN, but still routable)

Here you break. UNKNOWN/NOT FOUND may have a different policy (loc. pref. 
,etc.).

2) "C" gets new cert from "A" for
10.42.0.0/23,10.42.4.0/22,10.42.8.0/21,10.42.16.0/20,10.42.32.0/19,10.42.64.
0/18,10.42.128.0/17. And recreates it's own ROAs (10.42.2.0/23 AS-"A" route
UNKNOWN)
3) "A" (on G's behalf) issues ROA for 10.42.2.0/23, AS-'A' (10.42.2.0/23
route VALID)

I think this is a very easy for a relying party to interpret, and 'get it
right'

If a recommendation comes forth that says:

step wise:
1) "C" has the 10.42.0.0/16, presumably ROA issued for 10.42.2.0/23, AS-'C'
(10.42.2.0/23 route VALID)
2) "A" on behalf of "G" issues ROA for 10.42.2.0/23, AS-'A' while ROA issued
for 10.42.2.0/23, AS-'C' exists (10.42.2.0/23 originated by both AS-"C" and
AS-"A" valid)
3) C removes the ROA 10.42.2.0/23, AS-'C' (10.42.2.0/23 originated by
AS-"G")

Keeping in mind that the example highlights that "C" is moving away from
provider "A", but keeping its address space. So at the point 2 is it clear
what is the intention of the IP address user "G"? Who it seems has no skin
in the game as "G" doesn't have a RPKI private key nor certificate.
I'm not sure (right now) that allowing multiple 'resource holders' to create
valid MOAS scenarios is a good idea. I accept MOAS do naturally exist, but
generally at the desire of one single resource holder or at least one would
hope.
Is my interpretation wrong here? Is this really just harmless? or does this
also then tease out political[*] aspects where an RIR can or might
'responsibly' issue RPKI objects from their own resource cert?

I have not written RP software, but I believe it will be harmless as it would 
validate.  I do not believe iit breaks the CP document as the only reference to 
"unique holder" that I found was in the abstract section.

All in all, I think it is good that Randy raised this issue. I wonder if we 
need another document or add it to the "Use Case" document as it has not yet 
been ship to the IESG.

Roque


[*] yes, yes, the IETF is not a politically focused organisation. ;)

Terry

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to