Thanks Sandy, yours is actually the first in this very long and
sometimes a bit... strange thread that actually provides an answer to my
original question.

>From your email I identify a subtly different use case from the one that
SIDR seems to be about.

#1 - Certify the rightful holder of a prefix
#2 - Help routers validate prefixes when deciding how to build their
routing tables

RFC 3779 validation rules are probably the best suited rules for #1. It
seems clear now that whether RFC 3779 validation rules are adequate or
well suited to #2 has not been discussed here in depth.

It seems to me that this is a good time to do so.

Have a great weekend.

-Carlos

On 8/8/14, 3:04 PM, Sandra Murphy wrote:
> speaking as regular ol' member
> 
> On Aug 8, 2014, at 11:39 AM, Andy Newton <a...@arin.net> wrote:
> 
>>
>> On Aug 6, 2014, at 11:44 AM, Stephen Kent <k...@bbn.com> wrote:
>>
>>
>> The question was about why, in this effort, we are using 3779 validation 
>> rules, and the answer appears to be because a past, failed effort used them. 
>> Is there really no technical justification?
>> \
> 
> and previously
> 
> On Aug 5, 2014, at 1:49 PM, Carlos M. Martinez <carlosm3...@gmail.com> wrote:
> 
>> Hello,
>>
>> I think what we need to discuss is which certificate validation rules
>> apply to our problem domain, basically securing origin and/or securing path.
>>
>> Current specs refer that RFC 3779 validation rules should be applied to
>> SIDR's problem domain. I couldnĀ“t find any justification for this, other
>> than 'RFC 3779 was already there by the time SIDR started'. 
> 
> 
> The RPKI was intended to certify the rightful holder of a prefix.  So it was 
> designed to follow the current prefix allocation system.  In the current 
> prefix allocation system, you can only allocate prefixes that you hold.  So 
> the RPKI validation rules were designed to ensure that you can only certify 
> allocations from what you are certified to hold.
> 
> RFC3779 was also intended to follow the current prefix allocation system.  No 
> surprise, its validation rules ensure that you can only certify allocations 
> from what you hold.  That made RFC3779 useful for the purposes of providing a 
> RPKI certification of prefix allocation.  Reuse of existing technology that 
> provides the features you want is generally considered wisdom.
> 
> This prefix allocation system is encapsulated in the RPSL authorization model 
> that is used in some RIRs.  In those systems, you can only create an inetnum 
> if you hold the rights to a parent inetnum.
> 
> That's the authorization model people have been using in some regions for 
> decades.   I have always found the fact that the RPKI authorization model was 
> a good match to the IRR authorization model in long use to be reassuring.  It 
> meant the RPKI followed what people had already long accepted, and it meant 
> that operators should find the semantics familiar.
> 
> 
> --Sandy, speaking as regular ol' member
> 
> 
> 
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> 

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to