Stephen, et al.,
A couple of observations about the topic of certs used to verify RPSL sigs:
- the title of the I-D says that it relies upon the RPKI, and, as
currently
written, it mandates use of RPKI certs. So, using certs from a different PKI
would require a re-write. Also, the security of the system would be reduced
if other certs were employed, wrt verification of assertions about address
space and ASN holdings. So, I don't think it's appropriate to suggest
alternative
PKIs. I also note that the text on page 3 that says "equivalent
functionality can
be achieved" using an alternative PKI is questionable. Merely having
3379 extensions
in a cert does not mean that all of the other security-relevant elements
of the RPKI
accrue. (Also, there is a typo: certificate authority" -> "certification
authority")
- if one is using RPKI EE certs, as currently mandated, then the
single use
requirement (which is imposed on CAs, but RPs are not required to
verify) applies.
Deliberate re-use of a cert would mean that the CA violated the cert
policy, and
thus the cert ought not contain the RPKI policy ID, etc. Also, the
Security Considerations
section of the I-D refers to 6487, which is appropriate only if we're
discussing RPKI certs.
- The phrase "money-in-the-middle" is cute, but Randy's terminology
is not widely
adopted. I suggest using the more conventional terminology that a wider
range of
readers will recognize.
Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr