Russ,

        The "automated" changes would be similar to the ones that you would do
on your own CA.

        As adding a new attack surface by using web interfaces, yes we are as
you said, the convenience has a price. Nevertheless if well protected it
could be an acceptable trade-off. Forcing everyone to have their own CA
(possible as it should be from a security stand point) would make rpki
very complex to deploy for the small/medium players (similar to DNSSEC
today).
        
        Perhaps we should document all these.

Regards,
as
        


On 06/12/2012 17:42, Russ White wrote:
> 
>>      Yes, the hosted keep your private key, but you can modify your ROAs
>> anytime you want. At least the hosted systems that I know provide a web
>> interface to do that. The ROA would be published immediately or a few
>> minute/hours later, depending of the rpki-operator (my personal view and
>> with my network operator hat on is that it should be immediately or in
>> minutes).
> 
> Modulo the propagation time...
> 
> But isn't it bad to allow automated changes to a certificate that's
> designed to operate "at human speeds," (based on other conversations on
> this list), and is so critical to the operation of the routing system?
> Aren't we just adding to the total attack surface available against the
> routing system by allowing users to go into a web page and change what's
> advertised into the ROA system?
> 
> I know --it takes that bit of the problem out of the actual BGP space,
> and moves it into another space altogether, but... I don't see banking
> as being "more secure" because you can do all your banking on line
> --it's more convenient, but I think there's a clear tradeoff in security
> and convenience here, right?
> 
> If this is the type of system that's envisioned, shouldn't the risks
> involved be documented someplace?
> 
> Russ
> 
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to