Carlos,

It is weird that we even need to state here that we the five RIRs are not going to break things intentionally, but, yeah, LACNIC will not break things intentionally either.
I don't think anyone requested that each RIR pledge to not try to break the RPKI. I did ask that RIRs describe what measures they take to detect possible errors, prior to issuing certs that might cause subordinate CAs to fail 3779 validation criteria. I thought
the replies from RIPE and APNIC were very encouraging.
Engineering for resiliency is as much a necessity as engineering for security. If the damage caused by the failures of the solution itself becomes worse than the damage caused by the problem, well, no one is going to deploy the solution.
Terry has reminded us that, even if such accidents occur, the world does not end, at least wrt origin validation. Thus, for the current set of SIDR RFCs, the damage that would occur is not nearly so great as some have suggested; until the error is fixed (which one would presume would be fairly quickly), origin validation would treat the affected
routes as no worse than they are treated today.

Terry's message from 7/25 suggested that we revisit details of BGPSEC to see if we might want to address the the concerns about errors in the RPKI in a more accommodating fashion. I think he has a good point. We are still working on BGPSEC and so we have the leeway to
revisit details of this sort.

In the SIDR meeting last week Geoff cited a problem that relaxing the 3779 validation criteria was supposed to address (though not explicitly mentioned in his I-D): an operator who asserts that it holds an ASN, at odds with the RIR that is supposed to be authoritative for the assignment of that ASN. This case is illustrative of the concern I tried to raise in my comments to Tim, i.e., I worried that relaxing 3779 validation rules might encourage sloppiness in managing the RPKI, e.g., causing CAs to violate the CP by not maintaining the RPKI as a representation of their allocation databases. Geoff's example seems to suggest that my concern is warranted. Relaxing 3779 validation "fixes" the cited problem by making the deviation from the allocation
hierarchy acceptable, at the expense of the CP.

Finally, the point I tried to make near the end of the session was that if we are worrying about errors by high-tier CAs that break certs (via 3779 validation), then that worry also should extend to errors that revoke certs. Relaxing 3779 validation rules will not help with that problem. The Suspenders proposal does address that, and a broader range of behaviors by CAs. So while Suspenders may not be the answer, I believe that the current problem statement in draft-ietf-sidr-rpki-validation-reconsidered is way too narrow, as it fails to address the
wider set of errors (or compelled behavior) by (high tier) CAs in the RPKI.

Steve

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to