Sandy,

I think "draft-ietf-sidr-rpki-validation-reconsidered served a valuable purpose, highlighting valid concerns about potential fragility in the RPKI, in the face of errors by CAs and in the context of INR transfers. However, I feel that this I-D
should not progress.

The topic of INR transfers is being addressed in much grater detail in
draft-ymbk-sidr-transfer (which lists Geoff and George as co-authors). This doc. for which I provided extensive comments over the summer, is examining discussing INR transfers in a more thorough fashion and thus should provide a better basis for
selecting a standard mechanism for their support.

The impact of errors by CAs is being examined in a much broader context in an I-D that Di Ma and I have authored: draft-kent-sidr-adverse-actions. This document examines a very wide range of impacts that can result from an error by a CA or an attack against a CA (or an error/attack involving a repository manager). Thus I feel that it
will provide a more comprehensive analysis of the sort of concerns raised in
validation-reconsidered.

Finally, the the validation algorithm change proposed in validation-reconsidered does not address the broader range of errors noted in adverse-actions. It also is not compatible with current RP software designs that validates CA (not just EE) certs as part of local cache
maintenance.

Once the sidr-transfer and adverse-actions I-Ds are completed, I believe the WG will be a much better position to develop mechanisms that will address both sets
of concerns noted above.

Steve

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to