Hi Sriram,

Thanks for the email.

On Oct 21, 2012, at 9:40 PM, Sriram, Kotikalapudi wrote:

> Roque,
> 
> I took another look at Section 4.2.
> Can you please clarify if the method you describe in Sec. 4.2 is purely the 
> PKR method, 
> or if it has elements of both PKR and EKR in it?

(Roque) The proposal in section 4.2 is to use periodic, scheduled key rollovers 
of the "origin" certificate to limit the windows of exposure to replay attacks. 
This does not exempt the CA to rollover BGPSEC certificates/keys for any other 
reason.

> Do you roll the transit key when an event (peering discontinuation or policy 
> change) 
> happens at a router having transit prefixes?
> This is not clear from the wording in Section 4.2.

(Roque) No. Section 4.2 introduces the idea of two certificates and rolling 
over the "origin" certificate to limit the windows of exposure to replays 
attacks. Of course if there are topology changes inside that windows, replay 
attacks would be possible.

Section 3, is aimed to document a generic rollover process for both "origin" 
and "transit". In the transit case, we did not studied yet what should trigger 
rollover processes. My personal opinion is that transit certificates should 
have long lives and should not be, in general, be mandate to be rollover to 
enforce topology/policies changes. The origin AS by rolling over its "origin" 
certificate would control the exposure windows for its own BGP UPDATES.

BTW, I am planning to send a new version today adding the comments from Steve 
and you before WG adoption.

Regards,
Roque 


> 
> Thanks.
> Sriram 

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to