Folks,
Here's a better description of Case 3. (Thanks go to David Mandelberg
for catching the problems with the previous version.)
Case 3:
Organization A is authorized to control the routing of traffic from
a set of organizations (within A's administrative control) to the
rest of the Internet. A wants to re-route traffic from these
organizations that is destined for a set of systems outside of A's
administrative control to a set of systems under its control, or to
have that traffic dropped. A accomplishes this by controlling the
UPDATES (for the routes to the addresses for those systems) that are
sent to those organizations. If these organizations use the RPKI, A
needs a way to ensure the information they obtain from the RPKI
supports A’s traffic management goals.
For example, Alice runs the network operations for a large
consortium C that operates AS Y. Her management requests that
traffic from C's members that is destined for a competitor's server
at address Q in AS X, be re-directed to one of C's servers in AS Y.
To do this,Alice assigns address Q to a server in AS Y and has AS Y
originate routes for address Q. Alice has to ensure that the RPKI
has the appropriate certificates, ROAs, etc. for these approved
routes, as well as for the rest of the Internet.
Karen
On 3/10/15 1:38 AM, Karen Seo wrote:
Randyet al.,
In hopes of restarting work on this draft, here is proposed text for
section 4. This is an attempt to integrate the original text with the
comments to the list submitted back in Feb 2014. My apologies if I've
mis-understood the original draft text or the comments. Does this
correctly and clearly describe the use cases?
4. Use Cases
Case 1:
Organization C finds that its CA certificate has been revoked (or
modified to remove resources) by the RIR (or ISP) that issued it.
Or, if C has outsourced its CA operations, C finds that one of its
children's certificates has been revoked (or modified to remove
resources).C disagrees with this action and would like relying
parties to be able to ignore, at their discretion, the certificate
revocation (or modification). The revocation or modification could be:
* unintentional, i.e., due to an error by RIR (or ISP) staff
* malicious, i.e., done with the intent to cause problems,
which could be aimed at C or some other entity.
* mandated by a law enforcement agency in the jurisdiction
where the RIR (or ISP) operates
For example, Carol, a RIPE resource holder (LIR, PI holder, ...),
is a victim of the "Dutch Court Attack." Someone has convinced a
Dutch court to forcethe RIPE/NCC to remove or modify some or all
of Carol's certificates, ROAs, etc. or the resources they
represent. However, the operational community wants to retain the
ability to route to Carol's network(s).
Case 2:
Organization B makes use of private address space (RFC 1918) or
address space allocated to another party but not globally
announced by that party or by B. B wants its routers to be able to
use RPKI data for both internal routing to these addresses and for
global routing.
Case 3:
Organization A is authorized to control the routing of traffic
from a set of organizations (within A's administrative control) to
the rest of the Internet. A wants traffic from these organizations
that is destined for a set of prefixes outside of A's
administrative control to be routed to other addresses, or to be
dropped. A accomplishes this by controlling the UPDATEs sent to
those organizations. Because these organizations use the RPKI, A
needs a way to coordinate their use of the RPKI in support of A’s
traffic management goals.
For example, Alice runs the network operations for a large
consortium X. Her management requests that traffic (from X's
members) that is destined for a competitor's site, be re-directed
to a site approved by X. To do this,Alice has to ensure that the
RPKI has the appropriate certificates, ROAs, etc. for those
approved addresses as well as for the rest of the Internet.
Thank you,
Karen
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr