On Fri, 8 Jul 2011, Chris Hall wrote:

Randy Bush wrote (on Fri 08-Jul-2011 at 19:24 +0100):
....
This is what "6.6 Proxy Signing" in
draft-sriram-bgpsec-design-choices suggests, is it
not ?  Or does that blow the trust model to hell,
also ?

it does indeed.  that is why 6.6 was rejected.

Ah.  There I was, reading a draft of 5-Jul-2011 and thinking I was up
to date :-(

The previous section, 6.5, lists alternatives for handling stub ASs. Note that alternative 2 is the same description as 6.6, but alternative 2 was not the chosen alternative. That might be what Randy meant when he said "rejected."

Section 6.6 rightly notes that if an AS decided to share its private key with another AS, no one outside the agreement could tell the difference.

Therein lies the power and the danger of sharing private keys.

--Sandy, regular ol' wg member



OK.  If the RS ASN is in the path, then nobody needs to depend on the
integrity of the RS (however trustworthy one may expect them to be).
I look forward to the ASN count mechanism appearing in the draft(s),
and support for Route Servers making its way into the Requirements.

Chris

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to