Hi all,

We have submitted a new draft to describe some unexpected scenarios where a CA 
allocates resources to
the sub-node caused by misoperation or malicious operation in RPKI. Some 
experimental results are also presented
to simulate these scenarios. In order to avoid the issues or reduce the related 
side- effects described in the draft, 
some solutions may be needed.

Your comments are appreciated.

BR
Yu


A new version of I-D, draft-fu-sidr-unexpected-scenarios-00.txt
has been successfully submitted by Yu Fu and posted to the IETF repository.

Name:           draft-fu-sidr-unexpected-scenarios
Revision:       00
Title:          Scenarios of unexpected resource assignment in RPKI
Document date:  2015-09-08
Group:          Individual Submission
Pages:          17
URL:            
https://www.ietf.org/internet-drafts/draft-fu-sidr-unexpected-scenarios-00.txt
Status:         
https://datatracker.ietf.org/doc/draft-fu-sidr-unexpected-scenarios/
Htmlized:       
https://tools.ietf.org/html/draft-fu-sidr-unexpected-scenarios-00


Abstract:
   There are some unexpected scenarios where a CA allocates resources to
   the sub-node caused by misoperation or malicious operation of CA in
   RPKI.  Then some mechanisms may be needed to avoid these scenarios to
   happen.  This document describes these scenarios and related
   experiments are presented.

                                                                                
  


_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to