Hi Roque,

On 8/06/12 11:10 PM, "Roque Gagliano (rogaglia)" <rogag...@cisco.com> wrote:

> 
> This is more a question for Randy.
> 
> IMHO, his text says both:
> "A may certify G's resources, or issue one or more EE certificates and ROAs
> for G's resources. Which is done is a local matter between A and G."

Fair enough, although I'm not so sure that it makes sense to

> 
>> BTW, My understanding of that paragraph was about situations where you have
>> trust anchors that overlap.
> 
> Your english is definitely better than mine, but I do not find any reference
> to trust anchors. I think it applies generally to any registry database.
> 

My understanding comes from probably a bad memory of the early discussions
relating to such 'uniqness' issues.

>> 
>>> My understanding of Randy's proposal is that both C and G will have for a
>>> period of time the "right of use" for the 10.42.2.0/23 address space.
>> 
>> The idealistic stance might be that the RPKI and associated drafts should
>> not recommend a situation of ambiguity. Being able to have two different
>> ROAs (with different ASNs) for the same prefix issued by EE certs from
>> different res certs (thus different private keys) seems like it is making
>> life tough for the relying party.
> 
> How would a RP check this? (think particularly on bottom-up fetch +
> validation)

As far as I can tell, without experimentation, is that any match would work.

So if both AS 'C' and AS 'G' originate the 10.42.2.0/23 route and both ROAs
may exist, then you have a MOAS event.


> What the RFC 6487 security section is basically saying is that you should be
> at least as good as your registration back-end.
> 

I think you are trying say "we know that G has the resource, but are going
to pretend they don't so we can cut a ROA for G, so that their routing works
but we can be lazy on changing certs to C."

That might not be a bad thing, if there was some way to inhibit C from
creating a ROA, that might mess with G. The idea that securing routing is
based on 'a legitimate holder' [rfc6480] being able to authorize one or more
ASes of its choosing appears to be relaxed in this text. Is that a slippery
slope?


>> 
>> Is it?
>> 
>> So step wise since G is moving ISPs from C to A (and they originate the
>> route on G's behalf):
>> 
>> 1) "C" has the 10.42.0.0/16, presumably ROA issued for 10.42.2.0/23, AS-'C'
>> (10.42.2.0/23 AS-"C" route VALID)
>> 1.5) Worst case of "A" is slow between revoking/reissuing C's cert (all
>> routes UNKNOWN, but still routable)
> 
> Here you break. UNKNOWN/NOT FOUND may have a different policy (loc. pref.
> ,etc.).

OK. lets just say "UNKNOWN". I feel more comfortable in knowing that a RP
can make decision based on unambiguous information. Be that implemented in
local policy application (local pref etc) or otherwise.


> 
> I have not written RP software, but I believe it will be harmless as it would
> validate.  I do not believe iit breaks the CP document as the only reference
> to "unique holder" that I found was in the abstract section.

Indeed. I always considered the holder to be very singular in nature.

> 
> All in all, I think it is good that Randy raised this issue. I wonder if we
> need another document or add it to the "Use Case" document as it has not yet
> been ship to the IESG.

Good question.

T.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to