Randy,
here is my suggestion for text that is not so folksy and is clearer (at
least to me).
Steve
4.Example Uses
Case 1:
ISP C find that its CA certificate has been be revoked (or modified to
removed resources) by the RIR (or ISP) that issued it. ISP C believes
that this revocation was either an error by RIR staff, or that the RIR
has been compelled to revoke the certificate by a law enforcement agency
in the jurisdiction where the RIR operates. ISP C would like other ISPs
to be able to ignore the certificate revocation (or modification), at
their discretion.
Case 1 also encompasses a larger case, e.g., when all of the ISPs with a
country require protection for an RIR action of this sort, coordinated
at a national level. We cannot assume that the country operates an NIR.
Case 2:
ISP B makes use of private address space (RFC 1918) or makes use of
address space allocated to some other party , but which is not announced
globally). ISP B makes use of the RPKI internally, as well as for global
routing. ISP B would like its use of private address space to work
internally with routers that make use of RPKI data.
Case 3:
An organization, A, is authorized to control routing of traffic from a
set of ISPs to the rest of the Internet. (For example, A may want
traffic to selected addresses to be redirected to other addresses, or be
dropped.)Because these ISPs want to use the RPKI, A needs a way to
coordinate their use of the RPKI (insupport of A's traffic management
goal).
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr