On 12/19/12 3:33 PM, Pradosh Mohapatra (pmohapat) wrote: >> [1] I'd also note there are legitimate cases where customers may be ...
> > In these use cases, what breaks if we allow two ROAs to co-exist in the > system (one authorizing the customer AS and one authorizing the proxy AS > to originate the prefix) _much before_ the attack (or storm) takes place? > After all, this is a valid business relationship. Choose your pill wisely. Is't this already allowed ? I don't think we need to change anything for this to work. > > - Pradosh ~Carlos > > _______________________________________________ > sidr mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/sidr > _______________________________________________ sidr mailing list [email protected] https://www.ietf.org/mailman/listinfo/sidr
