> The penny finally dropped and I realized there is a better reason why
> SSH isn't desirable, and neither is TLS or any other solution layered
> on top of TCP: they don't protect the transport.  Recall why TCP-MD5
> was introduced (from RFC 2385):
> 
>    The primary motivation for this option is to allow BGP to protect
>    itself against the introduction of spoofed TCP segments into the
>    connection stream.  Of particular concern are TCP resets.
> 
> Any protocol layered over TCP can't address this concern.  
> 
> While authentication of peer identity and integrity of the transported
> data are even more important than transport protection per se for
> RPKI-RTR, it would seem prudent to assume that any threats that affect
> BGP may also affect RPKI-RTR.  That means protecting the transport
> from reset attacks, and that means AO, IPSec or MD5.

rpki-rtr != bgp

the purpose of the wrap in rpki-rtr is authentication of the
end-points.  am i talking to the cache which i think i am?

tcp session restart is actually doable in rpki-rtr.  that is why the
nonce is there.

randy
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to