Sandy,

I can’t parse “but using the constraints applied come from this specification”. 
 Can you clarify?
The text I supplied for the replacement validation alg were based on the original text, whenever possible. Unfortunately, the original text refers to sections of 6487 implicitly as "this specification". Thus, in the new document we need to explicitly note that the indicated constraints on certs (e.g., required/prohibited extensions, etc.) are in the relevant parts of 6487.


Sean added an implementation considerations section which I suggest will say:

    Operators MAY choose to issue separate BGPsec Router Certificates for
    different ASNs. Doing so may prevent a BGPsec Router Certificate from
    becoming invalid if one of the ASNs is removed from any superior CA 
certificate
    along the path to a trust anchor.
I quibble about this wording.  why do you say “may”?  Is it because if the ASN 
in one of the separate router certificates is one of the ASNs that is removed, 
then it still becomes invalid?

I think you mean:


This document permits the operator to include a list of ASNs in a BGPsec Router 
Certificate.
In that case, the router certificate would become invalid if any one of the 
ASNs is removed
from any superior CA certificate along the path to a trust anchor.  Operators 
MAY choose
to avoid this possibility by issuing a separate BGPsec Router Certificate for 
each distinct
ASN, so that the router certificates for ASNs that are retained in the superior 
CA certificate
would remain valid.
I prefer your text. Nice job.
I’m not sure you meant a normative “MAY choose” ("there are reasons, <listed 
here,> to make this choice”) or “could possibly choose”
I'm not picky about the case of the MAY here.


I hope these changes avoid the need to say anything about router certs in your 
doc.

I'm not sure there is a need to change the ROA spec. If we agree that all 
prefixes in the ROA MUST be contained in the EE cert for that ROA, then the 
current text in the ROA spec does not need to change.
Well……

The ROA RFC says validation of the ROA must satisfy:

    o  The IP address delegation extension [RFC3779] is present in the
       end-entity (EE) certificate (contained within the ROA), and each
       IP address prefix(es) in the ROA is contained within the set of IP
       addresses specified by the EE certificate's IP address delegation
       extension.

If the EE certificate and the ROA mention a /18, and a /19 is removed from a 
“superior CA certificate”, then there is/are only a /19 of the EE certificate 
that is/are VRP.  And every prefix in the ROA is still contained in the EE 
cert, so this validation step is satisfied.  What does this ROA now authorized? 
 How would it be applied in BGP route validation?
I see your point. yes, the ROA spec does need to be modified.

Steve

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to