David,

Even though your message did not include me in the salutation, it was a reply to my message, so I'll take the liberty of replying.

I think the techniques you proposed for generating Subject names that are unlikely to collide in a non-malicious context are good suggestions. If the Wg agrees, we could add these suggestions to one of the SIDR docs, as recommend (not mandated) name generation techniques.

However, as I have explained previously, we cannot assume that there will be no malicious name collisions, given the extent and the nature of the RPKI. Thus we need to adopt defensive strategies, based on crypto-validation of bindings, not just names. Because the RPKI requires each CA to directly issue CRLs, its not hard to verify this binding.

I agree that it is generally desirable to impose validation criteria that is well-supported by extant tools like OpenSSL. However, I would not make compatibility with that software dictate what we do. This is especially true given that we have seen OpenSSL deviate from PKIX standards in many ways over the years.

Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to