On 18/11/2010, at 8:23 PM, Sandra Murphy wrote:

> (OK, so there *is* another one, making lucky 13.)
> 
> Randy Bush has requested a WG LC for draft "BGP Prefix Origin
> Validation"
> 
> The document and the draft version history are available at
> http://tools.ietf.org/wg/sidr/draft-ietf-sidr-pfx-validate.
> 
> The Last Call will end Thu, 2 Dec 2010 (AOE).
> 
> As usual, please address all comments to the WG mailing list, and
> please be clear in your comments to this last call if you are
> supporting the document's submission to the IESG or if you are
> opposed. If you are opposed, please indicate why.
> 

I don't think this document is ready to head to the IESG. 

By and large I agree with the observations and recommendations in this 
document, but I don;t believe that this is ready for the IESG. More 
wordsmithing for clarity and consistency is requires in my view (see below)

Also, one statement struck me as needing further commentary:

Section 5. Routing Policy

   Announcements with invalid origins MAY be used, but SHOULD be less
   preferred than those with valid or unknown.


Here I agree with the sentiment in terms of the relativity to valid or unknown, 
but I am worried about the MAY statement here, and I would like the document to 
explain this further.

For example, a simple reading of the document leads one to believe that all 
announcements MAY still be accepted according to the routing policy selection 
allowed in section 5, yet if that were the case then the ability of origin 
validation to "deal with inadvertent mis-advertisement" is questionable.

I would prefer the document to look at the implication of _why_ a party MAY 
accept a route that the origination validation framework is leading to a local 
judgement that the route is invalid. i.e. is it because of missing information 
in the relying party's local cache, which may bne resolved over time? Is is due 
to potential circularity of dependence, where parts of the RPKI distributed 
repository lie behind routes that can only be judged as valid using certs and 
ROAs found in that repository? 

I would also like to see the security considerations section include a 
statement to the effect that if a party were to use routes that have an invalid 
validity state then the ability to detect and filter certain forms of 
mis-advertisement would in effect be negated.

Back to the wordsmithing and consistency comment, the terminology of 
unvalidatable origins and unknown origin is used in different sentences - it 
would be better to use consistent terminology.

It would also be good if the terminology of validity state is consistent - are 
we talking about "announcements" or "routes"? Are we talking about "valid 
origin" or "routes that are validated by the RPKI ROA framework"?

So close, but not quite ready for shipping yet in my opinion.

(My apologies - I should've commented earlier on this, but its only a WGLC that 
leads to these reviews happening for me.)

  thanks,

    Geoff




_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to