On Apr 1, 2013, at 12:17 PM, Sharon Goldberg <[email protected]> wrote:

<snip>

> > Nonetheless, all of the methods for whacking a ROA described in the paper
> > are detectable by anyone who monitors the RPKI. One might argue that each 
> > resource holder should monitor his/her RPKI pub point to detect any action
> > that causes one's ROA to become unverifiable.
> 
> We agree that monitoring is important and in fact we are working on such a 
> monitor right now.

Yeah, actually, we've had RPKISpider up and running for several months:
        http://rpkispider.verisignlabs.com/
and @RPKIUpdateBot tweeting all global repo changes for longer:
        https://twitter.com/RPKIUpdateBot

Tweets show resource holders how they can view their own delegations and watch 
in real time _today_.  For example,
        
http://rpkispider.verisignlabs.com/rpki-rescert-chain.cgi?p=194.126.136.0/21-24&r=6254

Its metrics also serve as a pretty good detection mechanisms for outages. ;)

We're a little behind on a writeup, but we've been known to be active on email. 
;)

Eric
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to