Hi Randy,

I did. Thank you very much.

Do you think that a notice to law enforcement about how this action would be 
ineffective and counter-productive has a place in your analysis? Something 
along the lines of what I suggested earlier:

    Law enforcement would be ill-advised to take this cause of action as it 
will degrade the trust that
    operators place in the global RPKI. Not only can operators use local policy 
to circumvent the "bogus"
    objects - making it an ineffective measure, abuse of this power will also 
lead to operators choosing
    not to use RPKI at all. This in turn will mean that critical internet 
infrastructure will remain
    vulnerable to hijacks.

I never denied that there will be some in LEA that look at RPKI as a knob to 
control routing. But rather than raising this as a given and misquoting a 
different incident as legal precedence (which again it just isn't in the legal 
sense - freezing contact data is a far cry from changing routing), it would be 
much better if the analysis made it very clear to LEAs that this is a very bad 
idea in the first place.

They really should care more about protecting critical infrastructure, 
governmental, military and civil - where a lot more is to be lost in security 
and economic damages if the technical community turns away from this 
technology, than there is to be gained by black-holing some traffic - 
ineffectively and temporarily.

And to operators it should be clear that the use of local policy or exceptions 
(e.g. SLURM) can be used to easily circumvent such actions.

Tim



> On 01 Aug 2016, at 18:40, Randy Bush <[email protected]> wrote:
> 
> you may, or may not, notice that the current i-d does not mention
> ripe/ncc
> 
> randy

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to