> Most security policies focus on aspects of system operation that are
> perceived as "secruity critical."  The WG charter articulates a security
> policy, focusing on origin validation and path authenticity. These
> aspects of routing security are visible and this avoid the more
> problematic question of what the system "should look like."

Path authenticity is a check of precisely what?

What the AS Path should look like.

Once you put timers in there, and then do lazy verification, and then do
beacons, and then... You've left the realm of ensuring a received route
has a "valid" AS Path from the perspective of what the AS Path should
look like. It might have looked like that a week ago, but who knows what
it should look like right now?

As you even said:

> The usual characterization of a secruity system is a set of mechanisms that
> are intended to enforce a secruity policy.

A policy is what someone, someplace, intends. What someone intends is
simply an expression of "what the system should look like." You can't
get away from intent.

:-)

Russ
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to