> i didn't update the tracker... (i hadn't ever in the past).
uh, that is between you and the datawhacker
> Did we circle down on an answer for the leak/persay language that
> everyone's happy with? If so I'd like to push out a pub request today.
as far as i am aware, there is no issue with leak language. we got past
folk looking up 'per se' in their dictionaries. the one open issue is
>>>>> 3.14 While the trust level of a route should be determined by the
>>>>> BGPsec protocol, local routing preference and policy MUST then
>>>>> be applied to best path and other routing decisions. Such
>>>>> mechanisms SHOULD conform with [I-D.ietf-sidr-ltamgmt].
>>>>> ...
>>>>> 3.17 If a BGPsec design makes use of a security infrastructure,
that
>>>>> infrastructure SHOULD enable each network operator to select
>>>>> the entities it will trust when authenticating data in the
>>>>> security infrastructure. See, for example,
>>>>> [I-D.ietf-sidr-ltamgmt].
>>>
>>> What about adding that "the connection to this security infrastructure
>>> MUST be through a secure channel"?
>
> it's done via rcynic and/or rpki-to-rtr, right? depending on where in
> the process you are... presuming the process looks like:
> publication-point - gatherer - cache - router
> (rcynic) (rcynic) (rpki-rtr)
apologies to roque. some external data were indeed what was meant (an
rpki-like thing is an example), and was inteneded by "security
infrastructure."
the authenticity of those data is an issue. we might say so in sec
cons.
and i am waiting for wglc to close so i can make the hack once.
randy
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr