I went through your -01 draft and the SIDR presentation slides from last week 
once again, 
and have the following questions: 

(1) An update with prefix-origin pair {5.0.0.0/24, AS64511} is received. 
There is a ROA: {5.0.0.0/22, maxLength = 24; AS64511} in the RPKI. 
However, it is signed using a certificate that is “valid” only for resource 
{5.0.0.0/24}.  
In this case, is it the intent of your alternate validation model to ascertain 
that 
the above ROA is partially valid, and accordingly prefix-origin pair 
{5.0.0.0/24, AS64511} is “Valid”?

(2) Let us say, there is a ROA: {1.0.0.0/24, 2.0.0.0/22, 3.0.0.0/20; AS64500} 
in the RPKI. 
But this ROA is signed using a certificate that is “valid” only for resources 
{1.0.0.0/24, 3.0.0.0/20}
that is a subset of the prefixes listed in the ROA.  
In this case, is it the intent of your alternate validation model to ascertain 
that 
the above ROA is partially valid, and accordingly prefix-origin pairs 
{1.0.0.0/24, AS64500} and {3.0.0.0/20, AS64500} are “Valid”? 

(3) On slide #18, do you need to require “Certificates 1 through n-1 are also 
“valid” 
according to this same criterion”?  You are not validating them at this point. 
You are only validating Certificate ‘n’ for *a given INR*. 
Is it not enough to require that “the resources in the INR extension of 
Certificate x must subsume the given INR” for each x (individually); x=1, 2, 3, 
…, n? 

Thanks.
Sriram
 



_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to