Speaking as a regular ol' member

On Wed, 10 Aug 2011, Montgomery, Douglas wrote:


On 8/9/11 9:42 PM, "George Michaelson" <[email protected]> wrote:


On 10/08/2011, at 11:34 AM, Danny McPherson wrote:


On Aug 9, 2011, at 9:23 PM, George Michaelson wrote:



<snip>


I think it important to remember that BGPSEC and Origin Validation are
basically preventative, not reactionary/response mechanisms.   That is
infrastructure that is manipulated in human time scales (e.g., ROAs,
AS/router Certs) that prevent future false announcements.   I think it is
the assumption that having ROAs in place will address most pop-up spam
false announcements.


I agree that the RPKI is an infrastructure whose contents change in human time scales, with the examples you mention. But the bgpsec protocol operates in-line and at bgp time scales. (Whether that is human scale or not, I'll leave to the operators.)

Certainly ROAs would make the pop-up spammers work harder, but I don't know that ROAs could be said to address them completely. Danny has pointed out many times that origin validation does not prevent a bad actor from attaching the valid origin to a bogus path. That was a motivation for doing path validation. I would think pop-up spammers might be determined enough to go to the effort of doing the attach-valid-to-bogus step. They seem to be determined enough to take steps to thwart any other measure thrown in their path.


--Sandy
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to