Hi,

As discussed in the meeting, it might make sense to scope the 
architecture document in such a manner that the document doesn't need 
to be in progress while the more specific secure routing work goes on.

I believe this recasting needs to start from the basics (preferably 
from the draft name but changing that isn't probably worth it), 
because the current Title and Abstract can be read to describe secure 
internet routing infrastructure, which it doesn't really do in the 
wider interpretation.

Replace title:

   An Infrastructure to Support Secure Internet Routing

with e.g.:

   A Public Key Infrastructure to Describe Route Origination
   Authorizations

I don't see a need to have Secure Internet Routing in the title at 
all; it is prone to mislead the user.

Similar recasting should be applied in Abstract and Introduction, e.g. 
with Abstract:

Abstract

    This document describes an architecture for an infrastructure to
    support secure Internet routing. The foundation of this architecture
    is a public key infrastructure (PKI) that represents the allocation
    hierarchy of IP address space and Autonomous System Numbers;
    certificates from this PKI are used to verify signed objects that
    authorize autonomous systems to originate routes for specified IP
    address prefixes. The data objects that comprise the PKI, as well as
    other signed objects necessary for secure routing, are stored and
    disseminated through a distributed repository system. This document
    also describes at a high level how this architecture can be used to
    add security features to common operations such as IP address space
    allocation and route filter construction.

Replace with (also summarizing it a bit):

    This document describes a public key infrastructure (PKI), the
    certificates of which could be used to verify signed objects that
    authorize autonomous systems to originate routes for specified IP
    address prefixes.  These and supporting data objects can be stored and
    disseminated through a distributed repository system.

Possibly also keep the last sentence, but this is a bit of can of 
worms because these mechanisms have already been described as 
incomplete (and to avoid this can of worms, some text in section 7.2 
and 7.3 could possibly be removed or reworded):

                                                         This document
    also describes at a high level how this architecture can be used to
    add security features to common operations such as IP address space
    allocation and route filter construction.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
_______________________________________________
Sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to