On Apr 2, 2013, at 9:53 AM, Danny McPherson <da...@tcb.net> wrote:
> 
> Speaking of inconsistencies in the RPKI, what's ARIN and the NRO's status on 
> getting to a single trust anchor?

I believe that ICANN and the RIR technical staffs are busy trying to 
document a proposed structure and operation to bring to the IETF (e.g.
how does one provide for transfers between regions without having an 
an impact at 0/0 each time...)

However, that's somewhat independent of your question... Do you see
inconsistent data right now from following the RIR CA trees? A single
trust anchor is going to point to the same data, so if you see any
issues, please speak up.

> Yeah, they were nonsensical in the past and present role of ARIN, not in an 
> RPKI-enabled world where revocation or transfer or inaccessibility will have 
> some impacted on the routability of the address block in question.

You keep repeating that assertion, but note that even in today's world
we could be ordered to reclaim and reassign a block with similar effect.
It may not be "real time" but there are plenty of folks who follow both
the daily issued files as well as derivative filter lists.  It is also
true of various routing registries.  Even after deployment of RPKI, there
will be some fairly long period where loss of the covering ROA _alone_ is 
likely to have little impact since the routing is still there, and we don't 
seem to have any documentation suggesting to _only_ listen to routes that 
are known valid.  Loss of ROA coverage exposes one to further exploits, 
but per existing guidance it should not result in connectivity impacts 
(just as leaving one's seatbelt off doesn't generate an auto accident...)

> Actually, does ARIN have a public statement on this "message" you're talking 
> about - i.e., apparently why DNS takedowns are a good idea and effective and 
> LEOs should go that route v. contacting ISPs or hosting providers, etc..?  
> I'd like to pass that along to our compliance and abuse office for inclusive 
> in their LEO package (and selfishly, understand the logic)?


Danny, I never said "DNS takedowns are a good idea"; I said we "educate 
law enforcement about the difficulty of attempting granular actions on 
an IP address block basis."  To the extent that one accepts that LEA folks
are going to sometimes impact the network for their purposes, it is better 
if they use the most focused tools available.  If that turns out to be the
DNS system, then I imagine that's where they turn next; the fact that one
can impact connectivity via orders against the DNS infrastructure does not
automatically mean we shouldn't deploy DNS, only that we should do so with 
understanding of that potential (and the same could be said for RPKI...)

Thanks!
/John

John Curran
President and CEO
ARIN

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to