Mikael,

        Do you think that
http://tools.ietf.org/html/draft-ietf-sidr-origin-ops-19 covers your
concerns?

        If not, do you recommend to add text to this draft or to focus in a new
document describing the operation of a CA?

Regards,
as

On 11/01/2013 09:12, Mikael Abrahamsson wrote:
> On Fri, 11 Jan 2013, SM wrote:
> 
>> draft-ietf-sidr-bgpsec-threats-03 discusses about the threat model. 
>> It could be used as a starting point to identify the points of failures.
> 
> Some of the failure scenarios I have heard from the dns TLD world:
> 
> Zone file was truncated due to lack of disk space. Insufficient checks
> was in place to notice the truncated zone file before it was replicated
> out to the public-facing DNS infrastructure, thus causing outage.
> 
> DNSSEC failure (don't remember the exact details), ie not everything was
> correctly signed, thus causing failure. DNSSEC is an example of a
> protocol which is quite brittle operationally. You make one mistake, and
> your entire domain is toast.
> 
> So when implementing RPKI at the RIR level, there should be operational
> advice how everything should be done. Preferrably even at the protocol
> level, there should be a disaster "off" button which the publisher can
> use to just switch off all validation for all records they handle, and
> this should be propagated very quickly.
> 
> Frankly, I'm scared when I read the documentation for this (=SIDR)
> thing. I feel it fails the "KISS" test with all the CA, signing,
> propagation infrastructure needed. It's also quite different from
> anything else that the normal network engineer is exposed to
> historically in their day to day work life. It's my opinion that a lot
> of careful though put into how this is actually implemented in real
> life, making sure there are operational tools (I still have not signed
> my private domain with DNSSEC because the operational tools are too hard
> to use) in place to aid deployment.
> 
> The re-signing needed over time to keep DNSSEC (and SSL certificates) up
> to date is something I see people fail routinely still. This needs to be
> automated.
> 
> Is it too early in the protocol development process to start looking
> into the operational aspects?
> 
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to