At 6:59 AM +1100 12/2/08, Geoff Huston wrote:
WG Hair hat OFF

Hi Steve,

What I _think_ you describes as the "ROA use convention" is the use of a ROA with an AS of 0 to act as an explicit denial in terms of saying "these prefixes are bogons". I could be wrong in my understanding of course.

I would not use the term "bogons" right now, given the debate about the meaning. The intent of the AS 0 ROA convention is to make an assertion that can be verified within the RPKI and which gives a relying party a basis for rejecting unverified assertions about routes for the prefix(es) in question.

I must admit that right now I don't think I understand your proposed "ROA use convention" clearly enough to agree with your assertion

The BOA Approach:

The BOA document is coupled with the ROA validation document so that the ROA interpretation and the BOA interpretation are explicitly described. in this context the ROA does NOT act with a double meaning - it is an explicit authority without any implicit negation connotations.

While it is fair to say that issuing an AS 0 ROA is intended to convey a special meaning, the processing of such a ROA is exactly the same as for any other ROA. So I hesitate to use the phrase "double meaning" even though I am sympathetic with your use of that term.

The presence of a ROA does not act as a form of negation of any other form of route origination. The BOA has no max length attribute - any more specific of any prefix described in the BOA is encompassed in the BOA.

The "ROA use convention":

This "ROA use convention" has me confused. In particular my confusion lies in the following areas:

1. Does a 'convention ROA' has any implicit denial associated with it, or is it a simple positive assertion as described above?

An AS 0 ROA is a positive assertion about the prefixes expressed in it, as far as RP software is concerned. The "feature" of this assertion is that, any unauthenticated assertions about the prefixes should be rejected in favor of this verifiable ROA (assuming that the ROA was signed by an entity that holds the prefixes in question). In saying that I am making some assumptions about how ROs use ROAs, and Danny has argued that we need to be more precise about such assumptions.

I see the AS 0 ROA as a valuable tool to deal with unallocated and reserved address space, during the very long period when relying parties will see a mix of verifiable and unverifiable assertions about route origination. I have not thought so much about the utility of this capability in a fully deployed system. I also did not consider assertions about AS numbers, a feature of BOAs.

2. How should a ROA with a AS value of 0 and a maxlength attribute be interpreted. Does a ROA for prefix=10.0.0.0/8 maxlength=8, AS=0 say anything at all about 10.0.0.0/9?

To prevent unauthenticated assertions about all more specific prefixes from being accepted, the max length would have to be 32. Otherwise, an unauthenticated assertion about a longer prefix would not be "trumped" by the AS 0 ROA.

So if you don't mind I'll reserve judgement on your question and observe that while the BOA adds a further object to the repertoire of 'recognised' RPKI signed objects, it does so in a manner that makes negation explicit, does not rely on variable interpretation of ROAs, does not stretch the ROA semantics beyond the simple positive authority to as AS to originate a route and allows for incremental piecemeal deployment in the network.

I admit that the AS 0 convention is a way of expressing a negative assertion about resources under the control of the ROA signer. However, I think the fact that this mechanism does not create a new type of sighed object, and requires no new processing, makes it worthwhile to consider.

Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to