Right, but you’re also taking a strong, cryptographically-authenticated system and making it sign non-authenticated data. Please don’t do that. If you want to add the data to RPKI, there should be a way to add the data to RPKI, not sign away control of your number resources to unauthenticated sources.
> On Dec 11, 2019, at 10:17, Christopher Morrow <morrowc.li...@gmail.com> wrote: > > On Wed, Dec 11, 2019 at 5:52 AM Rubens Kuhl <rube...@gmail.com> wrote: >> >> >>> >>>> Which brings me to my favorite possible RPKI-IRR integration: a ROA that >>>> says that IRR objects on IRR source x with maintainer Y are authoritative >>>> for a given number resource. Kinda like SPF for BGP. >>>> >>> >>> Is this required? or a crutch for use until a network can publish all >>> of their routing data in the RPKI? >>> >> >> It provides an adoption path based on the information already published in >> IRRs by operators for some years. It also covers for the fact that RPKI >> currently is only origin-validation. > > I would think that if you(royal you) already are publishing: > "these are the routes i'm going to originate (and here are my customer > lists)" > > and you (royal you) are accepting the effort to publish 1 'new' thing > in the RPKI. > > you could just as easily take the 'stuff I'm going to publish in IRR' > and 'also publish in RPKI'. > Right? So adoption path aside, because that seems like a weird > argument (since your automation to make IRR data appear can ALSO just > send rpki updates), your belief is that: "Hey, this irr object is > really, really me" is still useful/required/necessary/interesting? > > -chris