On 12/19/12 3:33 PM, Pradosh Mohapatra (pmohapat) wrote:
>> [1] I'd also note there are legitimate cases where customers may be
...

> 
> In these use cases, what breaks if we allow two ROAs to co-exist in the
> system (one authorizing the customer AS and one authorizing the proxy AS
> to originate the prefix) _much before_ the attack (or storm) takes place?
> After all, this is a valid business relationship. Choose your pill wisely.

Is't this already allowed ? I don't think we need to change anything for
this to work.

> 
> - Pradosh

~Carlos

> 
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> 
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to