<big snip :) >

> The constraints are simple text files and parsed in a restricted
> subprocess. Operators can trivially disable the imposition of
> constraints by deleting /etc/rpki/*.constraints, if need be.

Mmm.... I fully get your sentiment & concern and agree with it.

The biggest problem simply lies in the "allow all" effectively, that should 
have been only the specific prefixes. Due to transfers etc that is likely hard 
to encode there.


With this problem we are moving the problem from "trusting 5 RIRs" that are 
publicly accountable to "trust the code", at that point rpki-client could just 
produce the RPKI summary it would generate anyway, and at each update release 
it and people can consume (console.rpki-client.org 
<http://console.rpki-client.org/> etc can already in a way be used for that :).

The question becomes:
  Who keeps the constraints files up-to-date... (next to how do we trust&verify 
this big original research/entry)

At least, it becomes easily tracked who changed it and likely with a decent 
commit message, why and when.

Is there a tool that can generate the list, could we run that tool distributed 
locally on a system?


Or to alleviate the 'trust the code'. We could do something similar to 
Certificate Transparency: have multiple places (that you have to trust) 
generate and publish the constraint files, then one can say "I need 3 out of 5 
to agree to a change" and if you poll them and they change take that update. 
And of course a big giant alert when something does not add up (which we can 
also do when the constraint constraints something issued by a RIR. ==> btw, did 
you verify that the constraints in the file constraint something today?


Though, one could also say "I trust rpki-client coders" (they can circumvent it 
in code if they wanted to be evil) and call it a day ,then, your big diff is 
then quite fine ;)

Greets,
 Jeroen

Reply via email to