Chris,
I agree with several of the folks who commented about the LTAMv2
presentation and your call for comments.
We need to provide an updated description of the problems we are trying
to address, and details of how we propose to address these problems. The
slide presentation at the meeting was intended to provide a preview, but
it is not a substitute for detailed text.
So, let's begin the revised problem discussion, starting with text from
the most recent version of the LTAM doc (v8). BTW, this text has not
changed since the 00 version, dated November, 2010.
The abstract from the I-D(s) says:
The primary motivation for the facility described in this
document is to enable an RP to ensure that INR information
that it has acquired via some trusted channel is not
overridden by the information acquired from the RPKI
repository system or by the putative TAs that the RP imports.
This is still the primary motivation for LTAMv2, but I think it's worth
expanding on the rationale behind this mechanistic description of the
motivation. The concerns we are addressing are twofold:
-Local use of private (RFC 1918) address space in conjunction with RPKI
validation mechanisms
-Ways to recover from errors, or malicious actions, by CAs in the RPKI
hierarchy
In SIDR WG presentations we discussed the first rationale extensively.
The second concern was discussed more extensively in RIR meetings, where
the specter of law enforcement orders issued to RIRs was cited as a
significant concern by some folks.
As I mentioned in my presentation two weeks ago, we noticed that the
mechanism that we documented was probably fine for dealing with
allocations performed at the IANA and RIR tiers of the RPKI. So, for
example, if an RP wants to employ RFC 1918 private address space with
RPKI controls, the local TA mechanism, which makes use of "re-parenting"
and "hole punching" would work. However, if we use these mechanism to
"protect" address space for ISP-1, who received an allocation from ISP-2
(vs. from an RIR), problems could arise. Specifically, ROAs issued by
ISP-2 could be rejected by an RP using LTAM, due to hole-punching. This
was an unintended side-effect of the mechanism, one we would like to avoid.
The abstract also says:
This mechanism is designed for local use by an RP,
but any entity that is accorded administrative control over a
set of RPs may use this mechanism to convey its view of the
RPKI to RPs within its jurisdiction. The means by which this
latter use case is effected is outside the scope of this
document.
The lack of a description of how to securely distribute the LTAM
constraints file was viewed by some folks as a shortcoming. Moreover, we
were approached by an NIR that wanted to extend the capability noted
above. Their desire was to be able to publish resource allocation data
for folks in their country, for consumption both internally and
externally, in a way that would be immune to errors or malicious actions
by actors within the RPKI hierarchy (but outside of their country).
(This data needed to be valid as per the RPKI hierarchy, prior to any
errors or malicious actions, to limit the ability of a country to make
assertions about address space that was not allocated to entities within
the country.) No RPs outside of the country would have to pay attention
to this data, but they could make use of it if they wished (if there
were standards for how to make it available in a secure fashion). While
an NIR raised this issue, the concern is generally applicable,
irrespective of the presence of NIRs within a region.
We revisited the LTAM design to see if we could address the cited
motivation(s) via a mechanism that would not have the problem we noted
above, and if we could also address the concerns raised by the NIR.We
also received some comments on the document noting that the mechanisms
seemed complex, even after we revised the text to try to better explain
what was happening. So, a simpler design was also a goal. Finally, we
wanted to make the design a bit more flexible, to accommodate other
objects that might be added to the RPKI system in the future.
Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr