At 3:39 PM +0100 11/27/08, Robert Kisteleki wrote:
Stephen Kent wrote:
However, I worry that we need to tightly restrict which RPSL data can be validated using an RPKI cert. My concern is that it would be easy for folks to misinterpret the extent of what an RPLI cert attests to, and thus accord signed RPSL data more trust than it deserves. I also worry that using RPKI certs for this purpose might cause folks to want to have Subject names be meaningful, not arbitrary, as now required by our specs. So, if Robert is comfortable with imposing these sorts of constraints, I think it appropriate to make this a work item.

Section (2) of the draft says:

"2.  Meaning of a signature

   By signing an RPSL object, the signer of the object expresses that:
   o  they have the right to use the resource that the object refers to
      (ie. found as the primary key or in some other field of the
      object);
   o ..."

So in fact I already restrict the usage to only those type of objects that have something to to with actual number resources (ie. this excludes person objects). I'd be less comfortable to state *in this document* that the certificate subject names should not be meaningful; I'd defer that to the higher level documents such as the certificate profile and architecture documents. However, since this is only redundancy, not a new requirement, I'm not specifically against this.

Robert

Robert,

Thanks for the clarification., but I still have some serious concerns that I think need to be addressed as we progress this as a WG item.

I looked at your document and I see that section 5 is a "Minimum set of Signed Attributes." To try to prevent the problem I cited, it really needs a definitive list of the objects and attributes that MAY be signed, with a prohibition on signing any other objects/attributes. This is the opposite of what your text says, as it allows the signer to include whatever other attributes the signer wishes.

The name of an AS is NOT something that can be validated using the RPKI, and this needs to made clear to folks using this mechanism. The same is true for net name, org, country and status. The simplest thing to do would be to exclude these as signed attributes. I am not very familiar with the attributes you listed for the four object types, but I suspect that a more of them will fall into this category.

Also, for each of these objects/attributes, you need to describe what constitutes validation based on an appropriate cert or ROA, i.e., what checks MUST be performed by the RP to ensure that the signed object/attributes are consistent with the ROKI objects used to verify the signature.

Steve

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to