Hi,

On 8/8/14, 3:35 PM, Randy Bush wrote:
>> The question was about why, in this effort, we are using 3779
>> validation rules
> 
> because we understand how they work formally from considerable
> experience with PKIs.  they are deployed and working today.
> 

Where? Can you provide examples? I seem to be having a really hard time
finding real, widespread world uses of RFC 3779, outside RPKI that is.

As a another data point, most people attending LACNIC conferences had
never heard of RFC 3779 validation before Arturo and myself brought RPKI
into their radars. And among those you can count engineering depts of
ISPs counting their user base in tens of millions.

regards

-Carlos

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to