Randy,

here is my suggestion for text that is not so folksy and is clearer (at least to me).


Steve


4.Example Uses

Case 1:

ISP C find that its CA certificate has been be revoked (or modified to removed resources) by the RIR (or ISP) that issued it. ISP C believes that this revocation was either an error by RIR staff, or that the RIR has been compelled to revoke the certificate by a law enforcement agency in the jurisdiction where the RIR operates. ISP C would like other ISPs to be able to ignore the certificate revocation (or modification), at their discretion.

Case 1 also encompasses a larger case, e.g., when all of the ISPs with a country require protection for an RIR action of this sort, coordinated at a national level. We cannot assume that the country operates an NIR.

Case 2:

ISP B makes use of private address space (RFC 1918) or makes use of address space allocated to some other party , but which is not announced globally). ISP B makes use of the RPKI internally, as well as for global routing. ISP B would like its use of private address space to work internally with routers that make use of RPKI data.

Case 3:

An organization, A, is authorized to control routing of traffic from a set of ISPs to the rest of the Internet. (For example, A may want traffic to selected addresses to be redirected to other addresses, or be dropped.)Because these ISPs want to use the RPKI, A needs a way to coordinate their use of the RPKI (insupport of A's traffic management goal).

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to