I appreciate the changes Randy made to the -00 version of this doc.

However, I have a few concerns about the current version.

The end of Section 3 states:
   For the purposes of this exploration, we refer to this localized view
   as a 'Local Trust Anchor', mostly for historical reasons, but also
   because implementation would likely be the local distribution of one
   or more specialized trust anchors, [RFC6481].

Since this is supposed to be a requirements (aka use cases) doc, we ought
not prejudice the doc by presuming how the requirements will be satisfied.
Also, there are two docs that, together, probably address the requirements
I think we are trying to characterize, and they do not rely on the LTA model
that was proposed long ago.

Section 4 is a set of folksy, almost parable-style examples. I think the doc should provide clear definitions of the requirements, not examples from which the reader is expected to extract the underlying requirements. Examples are fine as ways to help illustrate a requirement, but are not a substitute for a clear statement
of a requirement.

I offered re-worded examples in response to the -00 version of the use cases doc. They try to avoid extraneous comments and use very simple text (see below). Still, they were just examples based on Randy's -00 text. I suggest we try to develop simple, clear requirements statements that align with the examples Randy and I have offered.

Section 5 correctly notes that what we are trying to "fix" are ROAs, not certs. But, if we are to avoid pre-judging solutions, we ought to remove the discussion of the
need to modify Resource certs, GB  records, etc.


Steve
-----

Case 1:

ISP C find that its CA certificate has been be revoked (or modified to removed resources) by the RIR (or ISP) that issued it. ISP C believes that this revocation was either an error by RIR staff, or that the RIR has been compelled to revoke the certificate by a law enforcement agency in the jurisdiction where the RIR operates. ISP C would like other ISPs to be able to ignore the certificate revocation (or modification), at their discretion.

Case 1 also encompasses a larger case, e.g., when all of the ISPs with a country require protection for an RIR action of this sort, coordinated at a national level. We cannot assume that the country operates an NIR.



Case 2:

ISP B makes use of private address space (RFC 1918) or makes use of address space allocated to some other party , but which is not announced globally). ISP B makes use of the RPKI internally, as well as for global routing. ISP B would like its use of private address space to work internally with routers that make use of RPKI data.



Case 3:

An organization, A, is authorized to control routing of traffic from a set of ISPs to the rest of the Internet. (For example, A may want traffic to selected addresses to be redirected to other addresses, or be dropped.)Because these ISPs want to use the RPKI, A needs a way to coordinate their use of the RPKI (insupport of A's traffic management goal).

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to