On Mon, 2 Nov 2009, Larry Blunk wrote:

Sriram, Kotikalapudi wrote:
At the end of Section 4, you may consider adding a sentence to the effect: It is expected that the AGGREGATOR AS will have a ROA registered that permits the AGGREGATOR AS to originate the aggregate prefix. The following comments are similar to what I have observed for draft-ietf-sidr-roa-validation-03:

There is substantial commonality in the problem space addressed as well as the solution (algorithm) described between the two documents: draft-pmohapat-sidr-pfx-validate-03 and draft-ietf-sidr-roa-validation-03.

The algorithm in this ID and also that in draft-ietf-sidr-roa-validation-03 do not cover another case of partial deployment where suballocations legitimately originate from a different AS and while a parent prefix has a ROA with ISP's AS origin, the suballocation (customer's) has no ROA registered yet. Please see slide 4 in link below (I had emailed this to SIDR list soon after the SIDR WG meeting in Stockholm): http://www.antd.nist.gov/~ksriram/SIDR_ROA_BOA_Interpretation.pdf I must admit that I am a bit torn about how to cater to this type of partial deployment condition. One way out is to have a deadline prior to which the validation decisions would be soft ("not found") for this case and then the hard decision ("invalid") kicks in after the deadline (again see my slides; use of BOA or ROA with AS0 may be helpful but not essential as discussed in my slides 5 and 6). Sriram
K. Sriram
+1 301 975 3793
http://www.antd.nist.gov/~ksriram/ _______________________________________________


    I don't find the partial deployment scenario to be
particularly compelling.       I'm having difficulty
seeing many providers issuing EE Cert's to customers for
sub-allocations from the provider's address space.   The
common case will likely be providers creating ROA's themselves
for their sub-allocated multi-homing customer space.   If you are
creating a ROA for the aggregate, why would you not also
create ROA's for the more specifics at the same time?

I don't understand your comment.

The architecture talks about providers issuing CA-certs for its customers, not EE-certs. Is the EE-cert vs CA-cert distinction important to your point?

I ask, because depending on your view, one might say that a provider would *never* issue an EE-cert to its customer. If the customer is capable of doing RPKI things, the provider would issue the CA-cert to the customer then the customer would issue the EE-cert and sign the ROA. If the customer was not capable, then the provider is the one that would both issue the EE-cert and sign the ROA.

If a customer is multi-homed, then then there is a route through another provider. That route may appear with the customer's AS as the origin or with another provider's AS listed as the origin.

Are you suggesting that the clueless customer's provider would sign a ROA for just its own AS to originate the more specific prefix? For the customer's AS to originate the more specific prefix? For the other provider to originate the more specific prefix?




  In the few cases where a provider may issue an EE Cert to
the customer, it seems unlikely they would issue
one before a customer is ready to create ROA's.   This
is not like DNSSEC where there are existing delegation
chains to deal with -- it's greenfield.    Given the whole
point of EE Cert's is to create ROA's, why would you request
one if you were not prepared to create ROA's.


Again, if the customer is ready to create ROAs, then I'm not sure why you are saying that the provider would issue an EE-cert to the customer. Are you suggesting that the customer would be ready to sign ROAs but not issue its own EE-cert from a CA-cert issued by its provider?

If you mean CA-cert, then I agree that a provider may not issue a CA-cert for the more specific when the customer is not ready to sign ROAs. The provider can issue an EE-cert for the more specific under its own CA-cert. And if the customer is ready to sign ROAs then the provider will (if willing) issue a CA-cert for the customer.

Of course, the partial deployment issue is what we are going to do with the customer is not ready for RPKI activity.

Looking at this a couple of times, I'm still not sure what you mean here.




-Larry







_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to