Hi all, We have submitted a new draft to describe some unexpected scenarios where a CA allocates resources to the sub-node caused by misoperation or malicious operation in RPKI. Some experimental results are also presented to simulate these scenarios. In order to avoid the issues or reduce the related side- effects described in the draft, some solutions may be needed.
Your comments are appreciated. BR Yu A new version of I-D, draft-fu-sidr-unexpected-scenarios-00.txt has been successfully submitted by Yu Fu and posted to the IETF repository. Name: draft-fu-sidr-unexpected-scenarios Revision: 00 Title: Scenarios of unexpected resource assignment in RPKI Document date: 2015-09-08 Group: Individual Submission Pages: 17 URL: https://www.ietf.org/internet-drafts/draft-fu-sidr-unexpected-scenarios-00.txt Status: https://datatracker.ietf.org/doc/draft-fu-sidr-unexpected-scenarios/ Htmlized: https://tools.ietf.org/html/draft-fu-sidr-unexpected-scenarios-00 Abstract: There are some unexpected scenarios where a CA allocates resources to the sub-node caused by misoperation or malicious operation of CA in RPKI. Then some mechanisms may be needed to avoid these scenarios to happen. This document describes these scenarios and related experiments are presented. _______________________________________________ sidr mailing list sidr@ietf.org https://www.ietf.org/mailman/listinfo/sidr