I posed some questions about this in my WGLC review of bgpsec spec, but
haven't heard anything back. Current schedule has this being evaluated by
IESG prior to our next meeting. If we need to discuss during the meeting
in Dallas, we could certainly delay processing of the document. It has a
sounds like a good topic for the mic/front/preso in dallas... to me at least.
On Sat, Feb 7, 2015 at 9:34 AM, George, Wes wesley.geo...@twcable.com wrote:
I posed some questions about this in my WGLC review of bgpsec spec, but
haven't heard anything back. Current schedule has this being
It might be possible for an attacker to take a valid signature of data from
the structure in 4.2,
and present it as a valid signature of the same bytes interpreted with the
structure in 4.1.
If you have worked out a concrete example showing how the attack works,
it would be good to see that.