
From rv@x37.NIC.DTAG.DE  Sun Sep  2 18:18:51 2012
Return-Path: <rv@x37.NIC.DTAG.DE>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1619F21F8444; Sun,  2 Sep 2012 18:18:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.349
X-Spam-Level: 
X-Spam-Status: No, score=0.349 tagged_above=-999 required=5 tests=[AWL=-1.150,  BAYES_00=-2.599, HELO_EQ_DE=0.35, HELO_MISMATCH_DE=1.448, MANGLED_DELETE=2.3]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rVVblUF10iOn; Sun,  2 Sep 2012 18:18:50 -0700 (PDT)
Received: from limes.NIC.DTAG.DE (limes.NIC.DTAG.DE [194.25.1.113]) by ietfa.amsl.com (Postfix) with ESMTP id C399921F843C; Sun,  2 Sep 2012 18:18:49 -0700 (PDT)
Received: from x37.NIC.DTAG.DE (x37.NIC.DTAG.DE [194.25.1.186]) by limes.NIC.DTAG.DE (8.8.5/8.8.3) with ESMTP id DAA16498; Mon, 3 Sep 2012 03:18:45 +0200 (MET DST)
To: Christopher Morrow <christopher.morrow@gmail.com>, "sidr@ietf.org" <sidr@ietf.org>, "sidr-chairs@ietf.org" <sidr-chairs@ietf.org>, "sidr-ads@tools.ietf.org" <sidr-ads@tools.ietf.org>
From: "Ruediger Volk, Deutsche Telekom Technik - FMED51.." <rv@NIC.DTAG.DE>
In-Reply-To: Your message of "Tue, 28 Aug 2012 17:03:35 EDT." <2671C6CDFBB59E47B64C10B3E0BD592303CE11C0@PRVPEXVS15.corp.twcable.com> 
Date: Mon, 03 Sep 2012 03:18:45 +0200
Message-ID: <17714.1346635125@x37.NIC.DTAG.DE>
Sender: rv@x37.NIC.DTAG.DE
Subject: Re: [sidr] WGLC: draft-ietf-sidr-origin-ops-
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Sep 2012 01:18:51 -0000

Wes George wrote 
  > I think we're ready to move this on, and I commend Randy for his work on it.

+1


Ruediger Volk



  > > -----Original Message-----
  > > From: sidr-bounces@ietf.org [mailto:sidr-bounces@ietf.org] On Behalf Of
  > > Christopher Morrow
  > > Sent: Friday, August 17, 2012 11:03 AM
  > > To: sidr@ietf.org; sidr-chairs@ietf.org; sidr-ads@tools.ietf.org
  > > Subject: [sidr] WGLC: draft-ietf-sidr-origin-ops-
  > >
  > > Hello WG folk,
  > > This draft has undergone 9 revisions since the last WGLC, which seemed
  > > to end with requests for changes by the authors.
  > > Can we now have a final-final-please-let's-progress WGLC for this draft
  > > now? Let's end the call: 08/31/2012 (Aug 31 2012).
  > >
  > > Htmlized version available at:
  > > http://tools.ietf.org/html/draft-ietf-sidr-origin-ops-19
  > >
  > > Abstract:
  > > "Deployment of RPKI-based BGP origin validation has many operational
  > >    considerations.  This document attempts to collect and present the
  > >    most critical.  It is expected to evolve as RPKI-based origin
  > >    validation is deployed and the dynamics are better understood."
  > >
  > > Thanks!
  > > -Chris
  > > <co-chair-2-of-3>
  > > _______________________________________________
  > > sidr mailing list
  > > sidr@ietf.org
  > > https://www.ietf.org/mailman/listinfo/sidr
  > 
  > This E-mail and any of its attachments may contain Time Warner Cable propri
etary information, which is privileged, confidential, or subject to copyright b
elonging to Time Warner Cable. This E-mail is intended solely for the use of th
e individual or entity to which it is addressed. If you are not the intended re
cipient of this E-mail, you are hereby notified that any dissemination, distrib
ution, copying, or action taken in relation to the contents of and attachments 
to this E-mail is strictly prohibited and may be unlawful. If you have received
 this E-mail in error, please notify the sender immediately and permanently del
ete the original and any copy of this E-mail and any printout.
  > _______________________________________________
  > sidr mailing list
  > sidr@ietf.org
  > https://www.ietf.org/mailman/listinfo/sidr

From kent@bbn.com  Tue Sep  4 07:38:22 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AF1F21E803A for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 07:38:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VZ+Luvb-Vja9 for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 07:38:21 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id D221821F847F for <sidr@ietf.org>; Tue,  4 Sep 2012 07:38:21 -0700 (PDT)
Received: from dhcp89-089-092.bbn.com ([128.89.89.92]:49503) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1T8uGd-000MsE-UD; Tue, 04 Sep 2012 10:38:15 -0400
Message-ID: <50461259.2090005@bbn.com>
Date: Tue, 04 Sep 2012 10:38:17 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: Brian Dickson <brian.peter.dickson@gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <CAH1iCirw4GqVfYR9hwMSFuSab9W4nV_fYUfS-EFcXW-puanzng@mail.gmail.com> <503DA7D5.2090806@bbn.com> <CAH1iCirqAq47Qu85p3ATwJktoM2x4x8aLRTgDt5niEX9zWRwWg@mail.gmail.com>
In-Reply-To: <CAH1iCirqAq47Qu85p3ATwJktoM2x4x8aLRTgDt5niEX9zWRwWg@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Sep 2012 14:38:22 -0000

Brian,

So, based on your reply, I guess the answer is to my question re the FSM 
you would like to see
re the RPKI is "no."

Also, the RIPE docs are not RFCs, and what we're talking about are IETF 
docs, ultimately RFCs,
so the comparison is not relevant in terms of what one should 
expect/demand of SIDR WG products.

Steve



From kent@bbn.com  Tue Sep  4 07:39:04 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF2E421F84EB for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 07:39:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3vbZJkl4kv9A for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 07:39:04 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id 5940A21F847B for <sidr@ietf.org>; Tue,  4 Sep 2012 07:39:04 -0700 (PDT)
Received: from dhcp89-089-092.bbn.com ([128.89.89.92]:49504) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1T8uHP-000Mtb-Vt; Tue, 04 Sep 2012 10:39:04 -0400
Message-ID: <50461289.1040907@bbn.com>
Date: Tue, 04 Sep 2012 10:39:05 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: brian Dickson <brian.peter.dickson@gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com>
In-Reply-To: <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Sep 2012 14:39:04 -0000

Exclusivity cannot be enforced via RP processing of the RPKI, because of 
INR transfers,
and a "make before break"  INR transfer policy. RFC 6480 alludes to 
"make before break"
in its discussion of ROAs, though not in the context of INR transfers.

Steve


From brian.peter.dickson@gmail.com  Tue Sep  4 09:43:03 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 359FA21F84A5 for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 09:43:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id euOL5sFeEIsm for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 09:43:02 -0700 (PDT)
Received: from mail-we0-f172.google.com (mail-we0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id 0AA9821F849C for <sidr@ietf.org>; Tue,  4 Sep 2012 09:43:01 -0700 (PDT)
Received: by weyu54 with SMTP id u54so4076348wey.31 for <sidr@ietf.org>; Tue, 04 Sep 2012 09:43:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=HFxsipZAx9cnVWgDmBwuGVIw7pL78sJAkYgvw6bX2Zo=; b=IlOhgQwJXcQJgu6sqbHIUDdzgUIYrZdiAmQgBOLnLI6cV9E6TNKqvVyiIaQfibihl0 bP1FrlTxhqDvlqdVZPzDOXSGXJs7pL4ak3RSDl3UiT2OZZ0TEiD370xjBZk4gxFnYiuM XV0skScmwXpF71QADxu3c70buQQin0WY2fCy+qdLeYfrweShrvFCNT2KZXnFMSVvEo2b pQw8I0C1IJv+YQzW2f5u6QSCgOsk+gCalsh8W+4Cep785rtgLj+GJpgxGYFEC1Brv9Qj 3gGlniaMMyFuGMKo4YHcZZpyV1kJcLX0QYBn5gs7w88p1BigBxbBBSq5Yeqlx4e6NUIE Eb/A==
MIME-Version: 1.0
Received: by 10.180.93.8 with SMTP id cq8mr31880309wib.16.1346776981061; Tue, 04 Sep 2012 09:43:01 -0700 (PDT)
Received: by 10.223.61.12 with HTTP; Tue, 4 Sep 2012 09:43:00 -0700 (PDT)
In-Reply-To: <50461289.1040907@bbn.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com>
Date: Tue, 4 Sep 2012 12:43:00 -0400
Message-ID: <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary=f46d043892b18c3f3004c8e2f35c
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Sep 2012 16:43:03 -0000

--f46d043892b18c3f3004c8e2f35c
Content-Type: text/plain; charset=ISO-8859-1

Sorry, have to call B.S. on this one.

Make-before-break is fully possible with exclusivity.

Exclusivity enforced at the CA level still allows for multiple ROAs (and
thus multiple announcing AS).

Changing (or adding, in case of anycast) ASNs requires new_ROA, new BGP
announcement, and (optionally) deletion of old ROA (or update ROA to
exclude moved INR).
(These would be two or more ROAs under control of the same party, to which
the INR had been assigned.)

If an INR needs to be moved from one party to another (e.g. transfer, such
as sale of INR), that kind of doesn't correspond to "live transfer", does
it?

And even if it does, the two-phase changes would be, new_ROA (signed by old
CA) with new_ASN, and new_new_ROA (signed by new CA) also with new_ASN.
When the parent (or parent^n) moves the INR delegation, a new validation
path replaces the old one. The fact that both new_ROA and new_new_ROA
provide validation paths for new_ASN origination of the INR, means either
way, validation continues to work.

BGP is stateful, so there isn't any substantial risk of problems. At worst,
a BGP flap during the move and/or sync issues across delegation boundaries
(from RP perspective) suggests that live transfers should occur during
maintenance windows.

This also suggests that "punting" on the requirements towards publication
points creates operational issues.
These risks could be eliminated by a requirement for atomic state-change
associated with changes to published data (e.g. *nix-style "mv" which is
atomic at the filesystem level, is well-known and widely implemented.)

IMHO, but with facts + math to back this up. Zorn's Lemma, Axiom of Choice,
anyone? FTW.

Brian

On Tue, Sep 4, 2012 at 10:39 AM, Stephen Kent <kent@bbn.com> wrote:

> Exclusivity cannot be enforced via RP processing of the RPKI, because of
> INR transfers,
> and a "make before break"  INR transfer policy. RFC 6480 alludes to "make
> before break"
> in its discussion of ROAs, though not in the context of INR transfers.
>
> Steve
>
>

--f46d043892b18c3f3004c8e2f35c
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Sorry, have to call B.S. on this one.<div><br></div><div>Make-before-break =
is fully possible with exclusivity.</div><div><br><div><div>Exclusivity enf=
orced at the CA level still allows for multiple ROAs (and thus multiple ann=
ouncing AS).</div>
<div><br></div><div>Changing (or adding, in case of anycast) ASNs requires =
new_ROA, new BGP announcement, and (optionally) deletion of old ROA (or upd=
ate ROA to exclude moved INR).</div><div>(These would be two or more ROAs u=
nder control of the same party, to which the INR had been assigned.)</div>
<div><br></div><div>If an INR needs to be moved from one party to another (=
e.g. transfer, such as sale of INR), that kind of doesn&#39;t correspond to=
 &quot;live transfer&quot;, does it?</div><div><br></div><div>And even if i=
t does, the two-phase changes would be, new_ROA (signed by old CA) with new=
_ASN, and new_new_ROA (signed by new CA) also with new_ASN. When the parent=
 (or parent^n) moves the INR delegation, a new validation path replaces the=
 old one. The fact that both new_ROA and new_new_ROA provide validation pat=
hs for new_ASN origination of the INR, means either way, validation continu=
es to work.</div>
<div><br></div><div>BGP is stateful, so there isn&#39;t any substantial ris=
k of problems. At worst, a BGP flap during the move and/or sync issues acro=
ss delegation boundaries (from RP perspective) suggests that live transfers=
 should occur during maintenance windows.</div>
<div><br></div><div>This also suggests that &quot;punting&quot; on the requ=
irements towards publication points creates operational issues.</div><div>T=
hese risks could be eliminated by a requirement for atomic state-change ass=
ociated with changes to published data (e.g. *nix-style &quot;mv&quot; whic=
h is atomic at the filesystem level, is well-known and widely implemented.)=
</div>
<div><br></div><div>IMHO, but with facts + math to back this up. Zorn&#39;s=
 Lemma, Axiom of Choice, anyone? FTW.</div><div><br></div><div>Brian</div><=
div><div><br><div class=3D"gmail_quote">On Tue, Sep 4, 2012 at 10:39 AM, St=
ephen Kent <span dir=3D"ltr">&lt;<a href=3D"mailto:kent@bbn.com" target=3D"=
_blank">kent@bbn.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Exclusivity cannot be enforced via RP proces=
sing of the RPKI, because of INR transfers,<br>
and a &quot;make before break&quot; =A0INR transfer policy. RFC 6480 allude=
s to &quot;make before break&quot;<br>
in its discussion of ROAs, though not in the context of INR transfers.<br>
<br>
Steve<br>
<br>
</blockquote></div><br></div></div></div></div>

--f46d043892b18c3f3004c8e2f35c--

From kent@bbn.com  Tue Sep  4 10:55:22 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6054321F867A for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 10:55:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xF-6U3ndWbKZ for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 10:55:22 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id DEB7721F8673 for <sidr@ietf.org>; Tue,  4 Sep 2012 10:55:21 -0700 (PDT)
Received: from dhcp89-089-092.bbn.com ([128.89.89.92]:50310) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1T8xLF-000170-7W; Tue, 04 Sep 2012 13:55:13 -0400
Message-ID: <50464081.4020305@bbn.com>
Date: Tue, 04 Sep 2012 13:55:13 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: Brian Dickson <brian.peter.dickson@gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com>
In-Reply-To: <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Sep 2012 17:55:22 -0000

Brian,
> Sorry, have to call B.S. on this one.
unsportsman-like comment, 15 yards and loss of a down.
>
> Make-before-break is fully possible with exclusivity.
In the general case, the resources are transferred between two CAs, and 
these CAs need not be
ISPs, e.g., they might be RIRs. So, before an ISP can issue ROAs for the 
newly-received INRs,
the ISP has to have these INRs added to it's CA cert. If the parent of 
that CA was not the parent
for the ISP that previously held the resources, then it too has to have 
the INRs in question added
to its cert, and so on. Thus means that, in general, there will be more 
that one CA, at corresponding
tiers of the RPKI, that will have the same INRs in their 3779 
extensions. Equivalently, this means
that some CA will have issued certs to two of its children, where the 
certs overlap (wrt the INrs
being transferred).
> Exclusivity enforced at the CA level still allows for multiple ROAs 
> (and thus multiple announcing AS).
Since this is not just a ROA question, I am ignoring the parts of your 
message that focus on ROAs, or on
BGP details that seem to be the result of this (confused) focus.

Steve

From brian.peter.dickson@gmail.com  Tue Sep  4 12:08:16 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E24721E8054 for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 12:08:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.598
X-Spam-Level: 
X-Spam-Status: No, score=-4.598 tagged_above=-999 required=5 tests=[AWL=1.000,  BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L1PUPlcTLPwt for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 12:08:15 -0700 (PDT)
Received: from mail-wg0-f44.google.com (mail-wg0-f44.google.com [74.125.82.44]) by ietfa.amsl.com (Postfix) with ESMTP id 98DDF21E804E for <sidr@ietf.org>; Tue,  4 Sep 2012 12:08:14 -0700 (PDT)
Received: by wgbdr13 with SMTP id dr13so3645945wgb.13 for <sidr@ietf.org>; Tue, 04 Sep 2012 12:08:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=eFXt3p/NqyRg6eKqYWI1UoxwUFvHUB+MUF3jdMsPCFE=; b=UGwAayQdESfGvNdg0wh8YwKbWQxgUJTjFIItiVNc+8A6fY6hu+nxtx9nSqyVPm13bL zn7INLGYJLH43YnVrj3QeB03f/wBdqxkoQ5S/8jK4p9PtXtj6Xt5yxpCyNIotSqYWPNY HxZrcOhgRua3VvXcZbf6xUmpNWmHD8/Fmpgfvy9xOgpywgCy7d6Cl/XpclcNV9dBvCAa HlUCf5gPj9POVp9ovWWXU/9E8W4Jluo8gcT+d2nGNRVfovcAa2xLdztkkkPjC8Ed7kkc BXVGNAzA7JGNFotlo3imUednYO27NsxMS0ACVJq6WYh1E7vrT+l6dLVUQVFCm7NKpK8S lBJQ==
MIME-Version: 1.0
Received: by 10.180.103.136 with SMTP id fw8mr32542726wib.20.1346785693762; Tue, 04 Sep 2012 12:08:13 -0700 (PDT)
Received: by 10.223.61.12 with HTTP; Tue, 4 Sep 2012 12:08:13 -0700 (PDT)
In-Reply-To: <50464081.4020305@bbn.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com>
Date: Tue, 4 Sep 2012 15:08:13 -0400
Message-ID: <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary=f46d04430446dd854404c8e4fa6c
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Sep 2012 19:08:16 -0000

--f46d04430446dd854404c8e4fa6c
Content-Type: text/plain; charset=ISO-8859-1

On Tue, Sep 4, 2012 at 1:55 PM, Stephen Kent <kent@bbn.com> wrote:

>
>
>> Make-before-break is fully possible with exclusivity.
>>
> In the general case, the resources are transferred between two CAs, and
> these CAs need not be
> ISPs, e.g., they might be RIRs. So, before an ISP can issue ROAs for the
> newly-received INRs,
> the ISP has to have these INRs added to it's CA cert. If the parent of
> that CA was not the parent
> for the ISP that previously held the resources, then it too has to have
> the INRs in question added
> to its cert, and so on. Thus means that, in general, there will be more
> that one CA, at corresponding
> tiers of the RPKI, that will have the same INRs in their 3779 extensions.
> Equivalently, this means
> that some CA will have issued certs to two of its children, where the
> certs overlap (wrt the INrs
> being transferred).


Let's work a straw man example.

First, the assumptions:
(1) We have existing delegations, CA_1A -> CA_1B -> CA_1C
(2) The 3779 extensions of each of these includes some INR, call it
INR_A.B.C.D/N (with exact match on each delegation)
(3) The whole of INR_A.B.C.D/N is being moved somewhere else
(3a) IMPORTANT => No "hole" in an original INR is going to exist, i.e.
there does not exist some A.B.C.E/(N-M) which covers A.B.C.D/N, which is an
INR in the 3779 of CA_1A, CA_1B, or CA_1C.
(4) It is possible to update a {CA, manifest, CRL} set to replace an
earlier instance of {CA, manifest, CRL} which includes the same set of
INRs, with different INR delegations. This is the basic mechanism for
allocation or reaping INRs.
(5) Moving an INR from CA_X to CA_Y, where CA_X and CA_Y are both children
of CA_W, is possible in a single move (using step (4) mechanics).

In all of the following, if the letter N appears in an object's name, it
means the 3779 extension includes A.B.C.D/N.

First, step by step, create new CA objects and "move" the INR up the tree
using them in an iterative fashion:
CA_1A->CA_1B->{CA_1C', CA_1CN} where CA_1CN contains *only* INR_A.B.C.D/N,
and CA_1C' no longer has A.B.C.D/N in its 3779.
CA_1A->{CA_1B', CA_1BN}
{CA_1A', CA_1AN} (signed by CA_1A's RIR or by root TAL)

Now, move the INR to the new CA parent, and then move it down the tree to
its final location (each X' is X plus 3779 addition of A.B.C.D/N):
{CA_2A, CA_2AN}
CA_2A'->{CA_2B, CA_2BN}
CA_2A'->CA_2B'->{CA_2C, CA_2CN}

And finally merge the new INR with its new owner's main CA:
CA_2A->CA_2B->CA_2C' (with CA_2C' being CA_2C plus 3779 addition of
A.B.C.D/N)

I think the above steps can be reduced to one move, where the original INR
is removed from CA_1A and added to CA_2A, as long as all the descendants of
CA_2A already had the INR included (but not validating since the
parent-most CA didn't yet have the INR in the 3779 extension).

-----

However, if there *is* a need for the old parents to cover the INR, then
the semantics are missing explicit hole-punching.

Hole-punching is needed to disambiguate overlapping certs, so as to assure
RPs the uniqueness of INRs.

A "hole" is the positively-asserted proven non-existence of permitted
matching INRs, and need to be "glued" to matching (covering) INRs wherever
INRs are delegated.

Let me know if I need to go into more detail on "hole" semantics.

(Holes are less common today than they were 15 years ago, but they are
still critical to any kind of resource validation methodology, to avoid the
entire hijacking issue.)

Brian


>
>  Exclusivity enforced at the CA level still allows for multiple ROAs (and
>> thus multiple announcing AS).
>>
> Since this is not just a ROA question, I am ignoring the parts of your
> message that focus on ROAs, or on
> BGP details that seem to be the result of this (confused) focus.
>
> Steve
>

--f46d04430446dd854404c8e4fa6c
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Tue, Sep 4, 2012 at 1:55 PM, Stephen =
Kent <span dir=3D"ltr">&lt;<a href=3D"mailto:kent@bbn.com" target=3D"_blank=
">kent@bbn.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class=3D"im"><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
Make-before-break is fully possible with exclusivity.<br>
</blockquote></div>
In the general case, the resources are transferred between two CAs, and the=
se CAs need not be<br>
ISPs, e.g., they might be RIRs. So, before an ISP can issue ROAs for the ne=
wly-received INRs,<br>
the ISP has to have these INRs added to it&#39;s CA cert. If the parent of =
that CA was not the parent<br>
for the ISP that previously held the resources, then it too has to have the=
 INRs in question added<br>
to its cert, and so on. Thus means that, in general, there will be more tha=
t one CA, at corresponding<br>
tiers of the RPKI, that will have the same INRs in their 3779 extensions. E=
quivalently, this means<br>
that some CA will have issued certs to two of its children, where the certs=
 overlap (wrt the INrs<br>
being transferred).</blockquote><div><br></div><div>Let&#39;s work a straw =
man example.</div><div><br></div><div>First, the assumptions:</div><div>(1)=
 We have existing delegations, CA_1A -&gt; CA_1B -&gt; CA_1C</div><div>
(2) The 3779 extensions of each of these includes some INR, call it INR_A.B=
.C.D/N (with exact match on each delegation)</div><div>(3) The whole of INR=
_A.B.C.D/N is being moved somewhere else</div><div>(3a) IMPORTANT =3D&gt; N=
o &quot;hole&quot; in an original INR is going to exist, i.e. there does no=
t exist some A.B.C.E/(N-M) which covers A.B.C.D/N, which is an INR in the 3=
779 of CA_1A, CA_1B, or CA_1C.</div>
<div>(4) It is possible to update a {CA, manifest, CRL} set to replace an e=
arlier instance of {CA, manifest, CRL} which includes the same set of INRs,=
 with different INR delegations. This is the basic mechanism for allocation=
 or reaping INRs.</div>
<div>(5) Moving an INR from CA_X to CA_Y, where CA_X and CA_Y are both chil=
dren of CA_W, is possible in a single move (using step (4) mechanics).</div=
><div><br></div><div>In all of the following, if the letter N appears in an=
 object&#39;s name, it means the 3779 extension includes A.B.C.D/N.</div>
<div><br></div><div>First, step by step, create new CA objects and &quot;mo=
ve&quot; the INR up the tree using them in an iterative fashion:</div><div>=
CA_1A-&gt;CA_1B-&gt;{CA_1C&#39;, CA_1CN} where CA_1CN contains *only* INR_A=
.B.C.D/N, and CA_1C&#39; no longer has A.B.C.D/N in its 3779.</div>
<div>CA_1A-&gt;{CA_1B&#39;, CA_1BN}</div><div>{CA_1A&#39;, CA_1AN} (signed =
by CA_1A&#39;s RIR or by root TAL)</div><div><br></div><div>Now, move the I=
NR to the new CA parent, and then move it down the tree to its final locati=
on (each X&#39; is X plus 3779 addition of A.B.C.D/N):</div>
<div>{CA_2A, CA_2AN}</div><div>CA_2A&#39;-&gt;{CA_2B, CA_2BN}</div><div>CA_=
2A&#39;-&gt;CA_2B&#39;-&gt;{CA_2C, CA_2CN}</div><div><br></div><div>And fin=
ally merge the new INR with its new owner&#39;s main CA:</div><div>CA_2A-&g=
t;CA_2B-&gt;CA_2C&#39; (with CA_2C&#39; being CA_2C plus 3779 addition of A=
.B.C.D/N)</div>
<div><br></div><div>I think the above steps can be reduced to one move, whe=
re the original INR is removed from CA_1A and added to CA_2A, as long as al=
l the descendants of CA_2A already had the INR included (but not validating=
 since the parent-most CA didn&#39;t yet have the INR in the 3779 extension=
).</div>
<div><br></div><div>-----</div><div><br></div><div>However, if there *is* a=
 need for the old parents to cover the INR, then the semantics are missing =
explicit hole-punching.</div><div><br></div><div>Hole-punching is needed to=
 disambiguate overlapping certs, so as to assure RPs the uniqueness of INRs=
.</div>
<div><br></div><div>A &quot;hole&quot; is the positively-asserted proven no=
n-existence of permitted matching INRs, and need to be &quot;glued&quot; to=
 matching (covering) INRs wherever INRs are delegated.</div><div><br></div>
<div>Let me know if I need to go into more detail on &quot;hole&quot; seman=
tics.</div><div><br></div><div>(Holes are less common today than they were =
15 years ago, but they are still critical to any kind of resource validatio=
n methodology, to avoid the entire hijacking issue.)</div>
<div><br></div><div>Brian</div><div>=A0</div><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
><div class=3D"im"><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Exclusivity enforced at the CA level still allows for multiple ROAs (and th=
us multiple announcing AS).<br>
</blockquote></div>
Since this is not just a ROA question, I am ignoring the parts of your mess=
age that focus on ROAs, or on<br>
BGP details that seem to be the result of this (confused) focus.<br>
<br>
Steve<br>
</blockquote></div><br>

--f46d04430446dd854404c8e4fa6c--

From kawamucho@mesh.ad.jp  Tue Sep  4 22:03:38 2012
Return-Path: <kawamucho@mesh.ad.jp>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C93021F8554 for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 22:03:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[AWL=1.990,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PQl1x4CLtPii for <sidr@ietfa.amsl.com>; Tue,  4 Sep 2012 22:03:38 -0700 (PDT)
Received: from tyo202.gate.nec.co.jp (TYO202.gate.nec.co.jp [202.32.8.206]) by ietfa.amsl.com (Postfix) with ESMTP id A624E21F8552 for <sidr@ietf.org>; Tue,  4 Sep 2012 22:03:37 -0700 (PDT)
Received: from mailgate3.nec.co.jp ([10.7.69.197]) by tyo202.gate.nec.co.jp (8.13.8/8.13.4) with ESMTP id q8553YxE029411 for <sidr@ietf.org>; Wed, 5 Sep 2012 14:03:34 +0900 (JST)
Received: (from root@localhost) by mailgate3.nec.co.jp (8.11.7/3.7W-MAILGATE-NEC) id q8553Yi25786 for sidr@ietf.org; Wed, 5 Sep 2012 14:03:34 +0900 (JST)
Received: from bgas200085.sys.biglobe.nec.co.jp (bgas200085.sys.biglobe.nec.co.jp [10.82.141.45]) by mailsv3.nec.co.jp (8.13.8/8.13.4) with ESMTP id q8553X9B002696 for <sidr@ietf.org>; Wed, 5 Sep 2012 14:03:33 +0900 (JST)
Received: from mail.sys.biglobe.nec.co.jp (localhost [127.0.0.1]) by bgas200085.sys.biglobe.nec.co.jp (BINGO/BINGO/06101717) with ESMTP id q8553XrP000585 for <sidr@ietf.org>; Wed, 5 Sep 2012 14:03:33 +0900
Received: from [127.0.0.1] ([10.65.91.161]) (authenticated bits=0) (envelope-from kawamucho@mesh.ad.jp)  by mail.sys.biglobe.nec.co.jp (BINGO/BINGO/10031711) with ESMTP id q8553Xb0004658 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sidr@ietf.org>; Wed, 5 Sep 2012 14:03:33 +0900
Message-ID: <5046DD23.7080501@mesh.ad.jp>
Date: Wed, 05 Sep 2012 14:03:31 +0900
From: Seiichi Kawamura <kawamucho@mesh.ad.jp>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: sidr@ietf.org
X-Enigmail-Version: 1.4.4
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="------------enig5E5EB80AA21C1A4ED8B7D4C5"
Subject: [sidr] draft-ietf-sidr-origin-ops-19
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Sep 2012 05:03:38 -0000

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig5E5EB80AA21C1A4ED8B7D4C5
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: quoted-printable

I've been away from the list for a while, but
Randy brought my attentiont to this draft and
I thought it was important. I support this
draft going forward. I also have a few trivial comments.

   Announcements with Invalid origins SHOULD NOT be used, but MAY be
   used to meet special operational needs.  In such circumstances, the
   announcement SHOULD have a lower preference than that given to Valid
   or NotFound.

Before I'm comfortable enough to start trashing Invalids,
I would first do the MAY, and once I get more experienced and comfortable=
,
I will do the SHOULD NOT.

I also ask myself

Q:Is there any way to check against the Invalid data and does it
make sense to do so?

 A. yes check logs, use a 3rd party tool to cross check, check a differen=
t cache, etc...
    anything else?

Q:What are the possible causes of invalid origins? I guess pointers
to documents would be helpful here, but unfortunately I don't know of any=
=2E..

 A. mis-origination, ROA publishing mistake, etc...

Q:Should I just start by sending syslogs until I'm comfortable
with trashing routes?

 A. yes

Seiichi @ operator AS2518



--------------enig5E5EB80AA21C1A4ED8B7D4C5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAlBG3SUACgkQcrhTYfxyMkIrBACeK+RLuHlLpS2mF+Jc2flWRSKU
YDsAn3dJ9dc28Gc0nKeNVAWCLJGMviPS
=gfNN
-----END PGP SIGNATURE-----

--------------enig5E5EB80AA21C1A4ED8B7D4C5--

From aservin@lacnic.net  Wed Sep  5 06:34:00 2012
Return-Path: <aservin@lacnic.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 862DC21F8433 for <sidr@ietfa.amsl.com>; Wed,  5 Sep 2012 06:34:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.672
X-Spam-Level: 
X-Spam-Status: No, score=-0.672 tagged_above=-999 required=5 tests=[AWL=-0.225, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HTML_MESSAGE=0.001, J_CHICKENPOX_14=0.6, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U5jk+H4xNykp for <sidr@ietfa.amsl.com>; Wed,  5 Sep 2012 06:33:59 -0700 (PDT)
Received: from mail.lacnic.net.uy (mail.lacnic.net.uy [IPv6:2001:13c7:7001:4000::3]) by ietfa.amsl.com (Postfix) with ESMTP id 82FD221F841C for <sidr@ietf.org>; Wed,  5 Sep 2012 06:33:59 -0700 (PDT)
Received: from 85-7-200.lacnic.net.uy (unknown [200.7.85.90]) by mail.lacnic.net.uy (Postfix) with ESMTP id E459A30844E; Wed,  5 Sep 2012 10:33:49 -0300 (UYT)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: multipart/alternative; boundary="Apple-Mail=_5CFE713D-EFCF-48BD-A7C3-AA00548941F1"
From: Arturo Servin <aservin@lacnic.net>
In-Reply-To: <5046DD23.7080501@mesh.ad.jp>
Date: Wed, 5 Sep 2012 14:33:41 +0100
Message-Id: <BBBD6B8D-8406-4994-A49A-2F8DE9CC920D@lacnic.net>
References: <5046DD23.7080501@mesh.ad.jp>
To: Seiichi Kawamura <kawamucho@mesh.ad.jp>
X-Mailer: Apple Mail (2.1278)
X-LACNIC.uy-MailScanner-Information: Please contact the ISP for more information
X-LACNIC.uy-MailScanner: Found to be clean
X-LACNIC.uy-MailScanner-SpamCheck: 
X-LACNIC.uy-MailScanner-From: aservin@lacnic.net
Cc: sidr@ietf.org
Subject: Re: [sidr] draft-ietf-sidr-origin-ops-19
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Sep 2012 13:34:00 -0000

--Apple-Mail=_5CFE713D-EFCF-48BD-A7C3-AA00548941F1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-2022-jp


	Today it appears that people make their ROAs incorrectly:

	- bad origin ASN (the ASN used in the route is different from =
the ROAs but both are registered to the ROA/Certificate issuer)
	- wrong max prefix length (people make their ROAs using their =
aggregates but they announce smaller prefixes)

	=
http://www.labs.lacnic.net/rpkitools/looking_glass/rest/invalid/cidr/0.0.0=
.0/0/

Regards,
as

On 5 Sep 2012, at 06:03, Seiichi Kawamura wrote:

> Q:What are the possible causes of invalid origins? I guess pointers
> to documents would be helpful here, but unfortunately I don't know of =
any...
>=20
> A. mis-origination, ROA publishing mistake, etc...


--Apple-Mail=_5CFE713D-EFCF-48BD-A7C3-AA00548941F1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-2022-jp

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div><br></div><div><span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span>Today it appears that people make =
their ROAs incorrectly:</div><div><br></div><div><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>- bad =
origin ASN (the ASN used in the route is different from the ROAs but =
both are registered to the ROA/Certificate issuer)</div><div><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>- wrong =
max prefix length (people make their ROAs using their aggregates but =
they announce smaller prefixes)</div><div><br></div><div><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><a =
href=3D"http://www.labs.lacnic.net/rpkitools/looking_glass/rest/invalid/ci=
dr/0.0.0.0/0/">http://www.labs.lacnic.net/rpkitools/looking_glass/rest/inv=
alid/cidr/0.0.0.0/0/</a></div><div><br></div><div>Regards,</div><div>as</d=
iv><br><div><div>On 5 Sep 2012, at 06:03, Seiichi Kawamura =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">Q:What are the possible causes of invalid origins? I guess =
pointers<br>to documents would be helpful here, but unfortunately I =
don't know of any...<br><br>A. mis-origination, ROA publishing mistake, =
etc...</blockquote></div><br></body></html>=

--Apple-Mail=_5CFE713D-EFCF-48BD-A7C3-AA00548941F1--

From benl@google.com  Fri Sep  7 06:20:04 2012
Return-Path: <benl@google.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 754FA21E805D for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 06:20:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.977
X-Spam-Level: 
X-Spam-Status: No, score=-102.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8COS0Ayo3pUL for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 06:20:02 -0700 (PDT)
Received: from mail-ob0-f172.google.com (mail-ob0-f172.google.com [209.85.214.172]) by ietfa.amsl.com (Postfix) with ESMTP id C58D621E804D for <sidr@ietf.org>; Fri,  7 Sep 2012 06:20:02 -0700 (PDT)
Received: by obbwc20 with SMTP id wc20so4998113obb.31 for <sidr@ietf.org>; Fri, 07 Sep 2012 06:20:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type :x-system-of-record; bh=Fl82Cpc+gYAyEfw19G8HCUsP6qaIRKN70MNXvBHsrWE=; b=auFJQfgFV8H8CxYBX3UJXGskU0RqllD2pWY/QGm8+t7ofqI/fDnjZnG9XPiS2zwWxA gjv5o0VvpaAyw9fpZyXEz/PQ7FOChK7kx69iP9leX33DdTvEUltWAQHA+yQ/Rh/gjloi 4YZNoZKITlbgZpJD+60Kio+nZLdzKIDJctHugywohYzAVgj3+gIh/4WJoqe9MfSoWDPb Hz7LYX1QPvRHnZ3zWHxauwNyRK0TpmeUGrFxGvofD3R9N+0o1q/2LZwccaaZ4CVYI5aY mZUolyXPe/k7+bsEb4Y4Ms1+J65S4RtNWJQz8cBsS37xMkWTSCEgQQFoTwZ2Lajyjeqa 1psA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type :x-system-of-record:x-gm-message-state; bh=Fl82Cpc+gYAyEfw19G8HCUsP6qaIRKN70MNXvBHsrWE=; b=AawLI8B4PEGMXWVLSHiBdAmQwNw2w0WklSfVd888u6tC0MdFUEM9jXB3urfD6U6hdd ZzB+ex+7YPbhN00+NTuH6o1CUGDVvdbe/+O8oV0xCi6s1C2X11HLMm5N5x6PtOuI9fZ7 EczTNM9Vtok2/aX47qawETRqMYCU9ojunaZEFuzHJV5fkPyhwQDBT1iprprhbddhIA9U +Jp25sP8i8RXzBUn+/062fjKTyP/OGX03Yb2blTZOMNkeOGqKDW962nxLmOvUmexUo0W At+3g726LkVZnXU8G3nPWn6SazuI2+Y+GUk1o47C+oL0I5FZTMvLGcsoSH8wbr4Vfc+t DTqA==
Received: by 10.60.11.104 with SMTP id p8mr6002780oeb.133.1347024002394; Fri, 07 Sep 2012 06:20:02 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.60.11.104 with SMTP id p8mr6002768oeb.133.1347024002281; Fri, 07 Sep 2012 06:20:02 -0700 (PDT)
Received: by 10.60.5.72 with HTTP; Fri, 7 Sep 2012 06:20:02 -0700 (PDT)
Date: Fri, 7 Sep 2012 14:20:02 +0100
Message-ID: <CABrd9STFwbngU9MFN8_uRcZ4ngpmbDynHo8ACgYC+4VyhX97Xg@mail.gmail.com>
From: Ben Laurie <benl@google.com>
To: sidr@ietf.org, therightkey@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
X-System-Of-Record: true
X-Gm-Message-State: ALoCoQkZYiYwZZNWOE/tI6Cx6vg09qQFmnsXY8nvfI/V4e4Pax0745PEuaj29ge6gATJZrRaFk/ykud7ZRRZIgeGCNTWzg+RSCNBOmc6+lUlSkCgGeQAIMtfw2nPfGV3LTWQc/WGQlaRtsS6ECKQ1bdZPt7TqbAyaq3HR5uEjxmHtTCCQb3R6Ojf3QkUJz0Y7Wsel7FbWH4w
Subject: [sidr] Certificate Transparency WG
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Sep 2012 13:20:05 -0000

It has been suggested to me that the SIDR WG might be interested in
Certificate Transparency and a possible BoF in Atlanta. Please send
followup discussion to therightkey@ietf.org.

Here's an (updated) draft charter.

CT IETF WG Draft Charter

version 2

Objective

Specify mechanisms and techniques that allow Internet applications to
monitor and verify the issuance of public X.509 certificates such that
all issued certificates are available to applications, and each
certificate seen by an application can be efficiently shown to be in
the log of issued certificates. Furthermore, it should be possible to
cryptographically verify the correct operation of the log.


Optionally, do the same for certificate revocations.

Problem Statement

Currently it is possible for any CA to issue a certificate for any
purpose without any oversight. This has led to some high profile
mis-issuance of web certificates, such as by DigiNotar, a subsidiary
of VASCO Data Security International, in July 2011
(http://www.vasco.com/company/about_vasco/press_room/news_archive/2011/news_diginotar_reports_security_incident.aspx).


The aim is to make it possible to detect such mis-issuance promptly
through the use of a public log of all public issued certificates.
Domain owners can then monitor this log and, upon detecting
mis-issuance, take appropriate action.


This public log must also be able to efficiently demonstrate its own
correct operation, rather than introducing yet another party that must
be trusted into the equation.


Clients should also be able to efficiently verify that certificates
they receive have indeed been entered into the public log.


For revocations, the aim would be similar: ensure that revocations are
as expected, that clients can efficiently obtain the revocation status
of a certificate and that the log is operating correctly.


Also, in both cases, the solution must be usable by browsers - this
means that it cannot add any round trips to page fetches, and that any
data transfers that are mandatory are of a reasonable size.

Existing Work

Certificate Transparency v2.1a
(http://www.links.org/files/CertificateTransparencyVersion2.1a.pdf)


Spec and working code:
http://code.google.com/p/certificate-transparency/source/browse/

From internet-drafts@ietf.org  Fri Sep  7 13:27:24 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 157F421F849A; Fri,  7 Sep 2012 13:27:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id caOC6o0oISHw; Fri,  7 Sep 2012 13:27:23 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5456121F8442; Fri,  7 Sep 2012 13:27:23 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120907202723.21152.8213.idtracker@ietfa.amsl.com>
Date: Fri, 07 Sep 2012 13:27:23 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-bgpsec-protocol-05.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Sep 2012 20:27:24 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Secure Inter-Domain Routing Working Group=
 of the IETF.

	Title           : BGPSEC Protocol Specification
	Author(s)       : Matthew Lepinski
	Filename        : draft-ietf-sidr-bgpsec-protocol-05.txt
	Pages           : 37
	Date            : 2012-09-07

Abstract:
   This document describes BGPSEC, an extension to the Border Gateway
   Protocol (BGP) that provides security for the AS-PATH attribute in
   BGP update messages.  BGPSEC is implemented via a new optional non-
   transitive BGP path attribute that carries a digital signature
   produced by each autonomous system on the AS-PATH.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-bgpsec-protocol-05


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From mlepinski@bbn.com  Fri Sep  7 13:33:49 2012
Return-Path: <mlepinski@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E87A921F84C9 for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 13:33:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3StWj9lrYfeM for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 13:33:49 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id 7436B21F84C2 for <sidr@ietf.org>; Fri,  7 Sep 2012 13:33:48 -0700 (PDT)
Received: from mail.bbn.com ([128.33.0.48]:33816) by smtp.bbn.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.77 (FreeBSD)) (envelope-from <mlepinski@bbn.com>) id 1TA5FK-0004Pf-AU for sidr@ietf.org; Fri, 07 Sep 2012 16:33:46 -0400
Received: from [128.89.254.168] by mail.bbn.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.63) (envelope-from <mlepinski@bbn.com>) id 1TA5FK-0001jH-6t for sidr@ietf.org; Fri, 07 Sep 2012 16:33:46 -0400
Message-ID: <504A5A34.1070201@bbn.com>
Date: Fri, 07 Sep 2012 16:33:56 -0400
From: Matt Lepinski <mlepinski@bbn.com>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:15.0) Gecko/20120824 Thunderbird/15.0
MIME-Version: 1.0
To: "sidr@ietf.org" <sidr@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [sidr] draft-ietf-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Sep 2012 20:33:50 -0000

I have submitted an -05 version of the BGPSEC protocol specification.

This includes changes that we discussed at the meeting in Vancouver 
(including clarity on duplicate updates, as well as clarity that 
confederations MAY choose not to verify signatures from other members of 
the confederation).

Additionally, I fleshed out the algorithm in Section 4.4 for converting 
from a BGPSEC_Path_Signatures attribute to an AS_PATH attribute. (And in 
general improved the text on how information in the 
BGPSEC_Path_Signatures attribute should be used in place of AS_PATH 
information whenever AS_PATH information is required.)

Finally, I fixed a bug in the confederation solution (Section 4.3) that 
was discussed on the SIDR list shortly after the Vancouver meeting. The 
confederation solution now better mirrors the way confederations are 
handled in BGP-4 (non-BGPSEC).

Oh, and I fixed a couple of stupid typos in the Bibliography, I am sure 
there are still a few other such typos sitting around in various 
sections, but I believe all of the outstanding technical issues have 
been addressed.

- Matt Lepinski

From Sandra.Murphy@sparta.com  Fri Sep  7 14:37:44 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84BAC21E80E1 for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 14:37:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.991
X-Spam-Level: 
X-Spam-Status: No, score=-101.991 tagged_above=-999 required=5 tests=[AWL=0.608, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C0bO9wuBM+mI for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 14:37:44 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id E6C5821E80DF for <sidr@ietf.org>; Fri,  7 Sep 2012 14:37:43 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q87Lbh1a021436 for <sidr@ietf.org>; Fri, 7 Sep 2012 16:37:43 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q87LbhjW016238 for <sidr@ietf.org>; Fri, 7 Sep 2012 16:37:43 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Fri, 7 Sep 2012 17:38:19 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: Help the NomCom: Nominations and Feedback
Thread-Index: AQHNi8WyiXBOjovKbkaRbvqVlHSPipd/afwO
Date: Fri, 7 Sep 2012 21:38:18 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F693BE@Hermes.columbia.ads.sparta.com>
References: <20120906002129.10667.70960.idtracker@ietfa.amsl.com>
In-Reply-To: <20120906002129.10667.70960.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.118]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] FW: Help the NomCom: Nominations and Feedback
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Sep 2012 21:37:44 -0000

In case some members of the wg do not read the IETF announcement or discuss=
ion lists, I am forwarding the following request from the NomCom.=0A=
=0A=
Please do consider participation in the Nomcom process.  Participation from=
 a broad cross section of the IETF community is needed to produce the best =
result.=0A=
=0A=
--Sandy=0A=
=0A=
________________________________________=0A=
From: wgchairs-bounces@ietf.org [wgchairs-bounces@ietf.org] on behalf of No=
mCom Chair [nomcom-chair@ietf.org]=0A=
Sent: Wednesday, September 05, 2012 8:21 PM=0A=
To: Working Group Chairs=0A=
Subject: Help the NomCom: Nominations and Feedback=0A=
=0A=
The IETF Nominations Committee (NomCom) is currently seeking=0A=
nominations for individuals to serve on the IESG, IAB, and IAOC.=0A=
Additionally, this is an announcement that the NomCom is seeking=0A=
feedback on individuals who have accepted nominations for IETF=0A=
leadership positions.=0A=
=0A=
It is very important to the NomCom process that we get input from a=0A=
broad spectrum of the community. Therefore, in case members of your=0A=
working group do not read the IETF announcement and discussion lists,=0A=
the NomCom would appreciate your help in disseminating the following=0A=
information.=0A=
=0A=
The NomCom website contains information about this year's NomCom=0A=
including the positions we are seeking to fill, and the qualifications=0A=
required for these positions:=0A=
=0A=
https://www.ietf.org/group/nomcom/2012/=0A=
=0A=
The NomCom is accepting nominations until September 24. Nominations=0A=
for any position can be made using the following web tool:=0A=
=0A=
https://www.ietf.org/group/nomcom/2012/nominate=0A=
=0A=
Feedback about individuals who the NomCom is considering can be=0A=
providing using the following web tool:=0A=
=0A=
https://www.ietf.org/group/nomcom/2012/input=0A=
=0A=
The feedback tool provides a list of individuals who have agreed to be=0A=
considered for each position. We will be updating this list in the coming=
=0A=
weeks as more individuals accept nominations.=0A=
=0A=
Feedback provided to the NomCom is kept strictly confidential!=0A=
=0A=
Note that use of the NomCom web tools require an ietf.org (i.e.,=0A=
datatracker) account. You can create an ietf.org account by visiting the=0A=
following URL:=0A=
=0A=
https://datatracker.ietf.org/accounts/create/=0A=
=0A=
As an alternative to using the web tools,  you can send email to the=0A=
NomCom at nomcom12@ietf.org to make a nomination or provide input to=0A=
the committee.=0A=
=0A=
Thank you for your help,=0A=
- Matt Lepinski=0A=
  nomcom-chair@ietf.org=0A=

From Sandra.Murphy@sparta.com  Fri Sep  7 16:01:53 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1A7921E8044 for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 16:01:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.219
X-Spam-Level: 
X-Spam-Status: No, score=-102.219 tagged_above=-999 required=5 tests=[AWL=0.380, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gPXTwvMr4BLB for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 16:01:53 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 3497321E80DE for <sidr@ietf.org>; Fri,  7 Sep 2012 16:01:53 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q87N1lJC022011; Fri, 7 Sep 2012 18:01:47 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q87N1lD5018071; Fri, 7 Sep 2012 18:01:47 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Fri, 7 Sep 2012 19:02:23 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: Matt Lepinski <mlepinski@bbn.com>, "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: [sidr] draft-ietf-bgpsec-protocol-05
Thread-Index: AQHNjTg920cTNwkYrkOywNOdMHFjjJd/fuUa
Date: Fri, 7 Sep 2012 23:02:23 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F696C5@Hermes.columbia.ads.sparta.com>
References: <504A5A34.1070201@bbn.com>
In-Reply-To: <504A5A34.1070201@bbn.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.118]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] draft-ietf-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Sep 2012 23:01:53 -0000

Thanks to Matt for an impressive amount of work.=0A=
=0A=
I encourage the working group to look at this draft right away.=0A=
=0A=
This will be a major focus of our interim meeting on 29 Sep.=0A=
=0A=
--Sandy=0A=
=0A=
________________________________________=0A=
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Matt Lepin=
ski [mlepinski@bbn.com]=0A=
Sent: Friday, September 07, 2012 4:33 PM=0A=
To: sidr@ietf.org=0A=
Subject: [sidr] draft-ietf-bgpsec-protocol-05=0A=
=0A=
I have submitted an -05 version of the BGPSEC protocol specification.=0A=
=0A=
This includes changes that we discussed at the meeting in Vancouver=0A=
(including clarity on duplicate updates, as well as clarity that=0A=
confederations MAY choose not to verify signatures from other members of=0A=
the confederation).=0A=
=0A=
Additionally, I fleshed out the algorithm in Section 4.4 for converting=0A=
from a BGPSEC_Path_Signatures attribute to an AS_PATH attribute. (And in=0A=
general improved the text on how information in the=0A=
BGPSEC_Path_Signatures attribute should be used in place of AS_PATH=0A=
information whenever AS_PATH information is required.)=0A=
=0A=
Finally, I fixed a bug in the confederation solution (Section 4.3) that=0A=
was discussed on the SIDR list shortly after the Vancouver meeting. The=0A=
confederation solution now better mirrors the way confederations are=0A=
handled in BGP-4 (non-BGPSEC).=0A=
=0A=
Oh, and I fixed a couple of stupid typos in the Bibliography, I am sure=0A=
there are still a few other such typos sitting around in various=0A=
sections, but I believe all of the outstanding technical issues have=0A=
been addressed.=0A=
=0A=
- Matt Lepinski=0A=
_______________________________________________=0A=
sidr mailing list=0A=
sidr@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sidr=0A=

From Sandra.Murphy@sparta.com  Fri Sep  7 16:04:58 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC3BC21F8427 for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 16:04:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.261
X-Spam-Level: 
X-Spam-Status: No, score=-102.261 tagged_above=-999 required=5 tests=[AWL=0.338, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dbh6DQ9HioWy for <sidr@ietfa.amsl.com>; Fri,  7 Sep 2012 16:04:58 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 8131E21F8422 for <sidr@ietf.org>; Fri,  7 Sep 2012 16:04:54 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q87N4nct022019; Fri, 7 Sep 2012 18:04:49 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q87N4n6v018101; Fri, 7 Sep 2012 18:04:49 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Fri, 7 Sep 2012 19:05:25 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: Matt Lepinski <mlepinski@bbn.com>, "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: [sidr] draft-ietf-bgpsec-protocol-05
Thread-Index: AQHNjTg920cTNwkYrkOywNOdMHFjjJd/fuUagAABG6I=
Date: Fri, 7 Sep 2012 23:05:24 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F696D8@Hermes.columbia.ads.sparta.com>
References: <504A5A34.1070201@bbn.com>, <24B20D14B2CD29478C8D5D6E9CBB29F625F696C5@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F696C5@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.118]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] draft-ietf-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Sep 2012 23:04:58 -0000

That's:=0A=
=0A=
--Sandy, speaking as wg co-chair=0A=
________________________________________=0A=
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Murphy, Sa=
ndra [Sandra.Murphy@sparta.com]=0A=
Sent: Friday, September 07, 2012 7:02 PM=0A=
To: Matt Lepinski; sidr@ietf.org=0A=
Subject: Re: [sidr] draft-ietf-bgpsec-protocol-05=0A=
=0A=
Thanks to Matt for an impressive amount of work.=0A=
=0A=
I encourage the working group to look at this draft right away.=0A=
=0A=
This will be a major focus of our interim meeting on 29 Sep.=0A=
=0A=
--Sandy=0A=
=0A=
________________________________________=0A=
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Matt Lepin=
ski [mlepinski@bbn.com]=0A=
Sent: Friday, September 07, 2012 4:33 PM=0A=
To: sidr@ietf.org=0A=
Subject: [sidr] draft-ietf-bgpsec-protocol-05=0A=
=0A=
I have submitted an -05 version of the BGPSEC protocol specification.=0A=
=0A=
This includes changes that we discussed at the meeting in Vancouver=0A=
(including clarity on duplicate updates, as well as clarity that=0A=
confederations MAY choose not to verify signatures from other members of=0A=
the confederation).=0A=
=0A=
Additionally, I fleshed out the algorithm in Section 4.4 for converting=0A=
from a BGPSEC_Path_Signatures attribute to an AS_PATH attribute. (And in=0A=
general improved the text on how information in the=0A=
BGPSEC_Path_Signatures attribute should be used in place of AS_PATH=0A=
information whenever AS_PATH information is required.)=0A=
=0A=
Finally, I fixed a bug in the confederation solution (Section 4.3) that=0A=
was discussed on the SIDR list shortly after the Vancouver meeting. The=0A=
confederation solution now better mirrors the way confederations are=0A=
handled in BGP-4 (non-BGPSEC).=0A=
=0A=
Oh, and I fixed a couple of stupid typos in the Bibliography, I am sure=0A=
there are still a few other such typos sitting around in various=0A=
sections, but I believe all of the outstanding technical issues have=0A=
been addressed.=0A=
=0A=
- Matt Lepinski=0A=
_______________________________________________=0A=
sidr mailing list=0A=
sidr@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sidr=0A=
_______________________________________________=0A=
sidr mailing list=0A=
sidr@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sidr=0A=

From internet-drafts@ietf.org  Sat Sep  8 03:43:04 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45E2421F8672; Sat,  8 Sep 2012 03:43:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.519
X-Spam-Level: 
X-Spam-Status: No, score=-102.519 tagged_above=-999 required=5 tests=[AWL=0.080, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fAFyO9zHs91J; Sat,  8 Sep 2012 03:43:03 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14C5521F856D; Sat,  8 Sep 2012 03:43:03 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120908104302.13522.97789.idtracker@ietfa.amsl.com>
Date: Sat, 08 Sep 2012 03:43:02 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-pfx-validate-09.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Sep 2012 10:43:04 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Secure Inter-Domain Routing Working Group=
 of the IETF.

	Title           : BGP Prefix Origin Validation
	Author(s)       : Pradosh Mohapatra
                          John Scudder
                          David Ward
                          Randy Bush
                          Rob Austein
	Filename        : draft-ietf-sidr-pfx-validate-09.txt
	Pages           : 10
	Date            : 2012-09-08

Abstract:
   To help reduce well-known threats against BGP including prefix mis-
   announcing and monkey-in-the-middle attacks, one of the security
   requirements is the ability to validate the origination AS of BGP
   routes.  More specifically, one needs to validate that the AS number
   claiming to originate an address prefix (as derived from the AS_PATH
   attribute of the BGP route) is in fact authorized by the prefix
   holder to do so.  This document describes a simple validation
   mechanism to partially satisfy this requirement.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-pfx-validate

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-pfx-validate-09

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-pfx-validate-09


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From kawamucho@mesh.ad.jp  Mon Sep 10 22:40:32 2012
Return-Path: <kawamucho@mesh.ad.jp>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1565221F865B for <sidr@ietfa.amsl.com>; Mon, 10 Sep 2012 22:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.51
X-Spam-Level: 
X-Spam-Status: No, score=0.51 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, J_CHICKENPOX_14=0.6]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QJu9MZSkx8rN for <sidr@ietfa.amsl.com>; Mon, 10 Sep 2012 22:40:31 -0700 (PDT)
Received: from tyo202.gate.nec.co.jp (TYO202.gate.nec.co.jp [210.143.35.52]) by ietfa.amsl.com (Postfix) with ESMTP id 23F2F21F8666 for <sidr@ietf.org>; Mon, 10 Sep 2012 22:40:30 -0700 (PDT)
Received: from mailgate3.nec.co.jp ([10.7.69.195]) by tyo202.gate.nec.co.jp (8.13.8/8.13.4) with ESMTP id q8B5eT8u013844;  Tue, 11 Sep 2012 14:40:29 +0900 (JST)
Received: (from root@localhost) by mailgate3.nec.co.jp (8.11.7/3.7W-MAILGATE-NEC) id q8B5eSD26547; Tue, 11 Sep 2012 14:40:28 +0900 (JST)
Received: from bgas200085.sys.biglobe.nec.co.jp (bgas200085.sys.biglobe.nec.co.jp [10.82.141.45]) by mailsv4.nec.co.jp (8.13.8/8.13.4) with ESMTP id q8B5eSVP017226; Tue, 11 Sep 2012 14:40:28 +0900 (JST)
Received: from mail.sys.biglobe.nec.co.jp (localhost [127.0.0.1]) by bgas200085.sys.biglobe.nec.co.jp (BINGO/BINGO/06101717) with ESMTP id q8B5eRtW023127; Tue, 11 Sep 2012 14:40:27 +0900
Received: from [127.0.0.1] ([10.65.91.161]) (authenticated bits=0) (envelope-from kawamucho@mesh.ad.jp)  by mail.sys.biglobe.nec.co.jp (BINGO/BINGO/10031711) with ESMTP id q8B5eRuv029738 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 11 Sep 2012 14:40:27 +0900
Message-ID: <504ECEC9.2070509@mesh.ad.jp>
Date: Tue, 11 Sep 2012 14:40:25 +0900
From: Seiichi Kawamura <kawamucho@mesh.ad.jp>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: Arturo Servin <aservin@lacnic.net>
References: <5046DD23.7080501@mesh.ad.jp> <BBBD6B8D-8406-4994-A49A-2F8DE9CC920D@lacnic.net>
In-Reply-To: <BBBD6B8D-8406-4994-A49A-2F8DE9CC920D@lacnic.net>
X-Enigmail-Version: 1.4.4
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="------------enigF541B92D6B4E814608010CFB"
Cc: sidr@ietf.org
Subject: Re: [sidr] draft-ietf-sidr-origin-ops-19
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Sep 2012 05:40:32 -0000

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigF541B92D6B4E814608010CFB
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: quoted-printable

This is pretty hot data. Thanks!

Regards,
Seiichi

(2012/09/05 22:33), Arturo Servin wrote:
>=20
> 	Today it appears that people make their ROAs incorrectly:
>=20
> 	- bad origin ASN (the ASN used in the route is different from the ROAs=
 but both are registered to the ROA/Certificate issuer)
> 	- wrong max prefix length (people make their ROAs using their aggregat=
es but they announce smaller prefixes)
>=20
> 	http://www.labs.lacnic.net/rpkitools/looking_glass/rest/invalid/cidr/0=
=2E0.0.0/0/
>=20
> Regards,
> as
>=20
> On 5 Sep 2012, at 06:03, Seiichi Kawamura wrote:
>=20
>> Q:What are the possible causes of invalid origins? I guess pointers
>> to documents would be helpful here, but unfortunately I don't know of =
any...
>>
>> A. mis-origination, ROA publishing mistake, etc...
>=20
>=20


--------------enigF541B92D6B4E814608010CFB
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAlBOzssACgkQcrhTYfxyMkLzfQCeKjgUb/vceXlWvQEfT3ComP4h
DloAn0atVozDixA3KkGhzPG7dA+xaGWN
=WHDo
-----END PGP SIGNATURE-----

--------------enigF541B92D6B4E814608010CFB--

From kent@bbn.com  Wed Sep 12 10:24:39 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EB9221F861E for <sidr@ietfa.amsl.com>; Wed, 12 Sep 2012 10:24:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.549
X-Spam-Level: 
X-Spam-Status: No, score=-106.549 tagged_above=-999 required=5 tests=[AWL=0.050, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MexLvBLFkKce for <sidr@ietfa.amsl.com>; Wed, 12 Sep 2012 10:24:37 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id CF82721F858F for <sidr@ietf.org>; Wed, 12 Sep 2012 10:24:37 -0700 (PDT)
Received: from dhcp89-089-153.bbn.com ([128.89.89.153]:50497) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1TBqfn-000DYK-3Y; Wed, 12 Sep 2012 13:24:23 -0400
Message-ID: <5050C546.9070304@bbn.com>
Date: Wed, 12 Sep 2012 13:24:22 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: Brian Dickson <brian.peter.dickson@gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com> <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com>
In-Reply-To: <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Sep 2012 17:24:39 -0000

Brian,

Sorry I didn't reply sooner.

I found it very difficult to follow the details of your example, but I 
think there is a higher
level consideration that makes moot a detailed analysis of optimization 
the you suggest.

In the early days of RPKI design I raised the same question that you did 
re allocation uniqueness,
and suggested that we include RP checks for overlapping allocations in 
RP software. I was told (by operators) that the old INR holder and the 
new INR holder would each need to have certs (and ROas) that are valid, 
and that encompass the INRs being moved, and that persist for some time. 
That is a fundamental reason that the RPKI does not specify that the 
allocations are "unique." The term "unique" used to appear in the text 
of several of the docs, but was removed to accommodate INR transfers.

I think the primary concern is that one cannot be confident how quickly 
all RPs will acquire all RPKI data.
Thus it seems prudent to allow for the old and new INR holders to have 
certs that contain the INRs being transferred, for these certs overlap 
in validity, and for both certs to be available via the repository 
system at the same time, for some overlap period. This enables old and 
new ROAs, which may point to the same ASN, to exist, avoiding the need 
for a flag day.

Steve


From robertl@apnic.net  Wed Sep 12 16:16:10 2012
Return-Path: <robertl@apnic.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBF6621F8604 for <sidr@ietfa.amsl.com>; Wed, 12 Sep 2012 16:16:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6Gwg0XJg7t1C for <sidr@ietfa.amsl.com>; Wed, 12 Sep 2012 16:16:10 -0700 (PDT)
Received: from asmtp.apnic.net (asmtp.apnic.net [IPv6:2001:dc0:2001:11::199]) by ietfa.amsl.com (Postfix) with ESMTP id BD48B21F843A for <sidr@ietf.org>; Wed, 12 Sep 2012 16:16:08 -0700 (PDT)
Received: from [IPv6:2001:dc0:a000:4:691d:6d9d:7f24:e18b] (unknown [IPv6:2001:dc0:a000:4:691d:6d9d:7f24:e18b]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by asmtp.apnic.net (Postfix) with ESMTP id 8B13EB68C5; Thu, 13 Sep 2012 09:16:07 +1000 (EST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.0 \(1486\))
From: Robert Loomans <robertl@apnic.net>
In-Reply-To: <5050C546.9070304@bbn.com>
Date: Thu, 13 Sep 2012 09:16:10 +1000
Content-Transfer-Encoding: quoted-printable
Message-Id: <33A96E17-0CBF-4E17-A0D8-55FE3369142F@apnic.net>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com> <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com> <5050C546.9070304@bbn.com>
To: Stephen Kent <kent@bbn.com>
X-Mailer: Apple Mail (2.1486)
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Sep 2012 23:16:11 -0000

On 13/09/2012, at 03:24, Stephen Kent <kent@bbn.com> wrote:
> Brian,
>=20
> Sorry I didn't reply sooner.
>=20
> I found it very difficult to follow the details of your example, but I =
think there is a higher
> level consideration that makes moot a detailed analysis of =
optimization the you suggest.
>=20
> In the early days of RPKI design I raised the same question that you =
did re allocation uniqueness,
> and suggested that we include RP checks for overlapping allocations in =
RP software. I was told (by operators) that the old INR holder and the =
new INR holder would each need to have certs (and ROas) that are valid, =
and that encompass the INRs being moved, and that persist for some time. =
That is a fundamental reason that the RPKI does not specify that the =
allocations are "unique." The term "unique" used to appear in the text =
of several of the docs, but was removed to accommodate INR transfers.
>=20
> I think the primary concern is that one cannot be confident how =
quickly all RPs will acquire all RPKI data.
> Thus it seems prudent to allow for the old and new INR holders to have =
certs that contain the INRs being transferred, for these certs overlap =
in validity, and for both certs to be available via the repository =
system at the same time, for some overlap period. This enables old and =
new ROAs, which may point to the same ASN, to exist, avoiding the need =
for a flag day.

There are related scenarios regarding operational changes even without =
transfers.

Currently APNIC, for example, only provides a hosted environment for =
RPKI for our members. They have a web interface from which they can ask =
for ROAs to be created and published, and we run all of the machinery =
for them and publish the results in our repositories.

In the future we may allow our members to run their own RPKI =
installation, connecting to our RPKI service using the provisioning =
protocol.

I suspect they would prefer to be able to run their new RPKI =
installation and the hosted service simultaneously for some time, =
allowing relying parties to pick up the new objects, before switching =
off the hosted service.

Similarly, when someone wants to wholesale replace their RPKI =
infrastructure with a new implementation they may choose to run old and =
new side-by-side.

Rob


--=20
Robert Loomans                         email:       robertl@apnic.net
Senior Software Engineer, APNIC        sip:    robertl@voip.apnic.net
http://www.apnic.net/                  phone:         +61 7 3858 3100


From brian.peter.dickson@gmail.com  Thu Sep 13 10:02:04 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CD7F21F851B for <sidr@ietfa.amsl.com>; Thu, 13 Sep 2012 10:02:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.098
X-Spam-Level: 
X-Spam-Status: No, score=-4.098 tagged_above=-999 required=5 tests=[AWL=-0.500, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tu1GPkveN2zs for <sidr@ietfa.amsl.com>; Thu, 13 Sep 2012 10:02:03 -0700 (PDT)
Received: from mail-we0-f172.google.com (mail-we0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id AA46B21F84DF for <sidr@ietf.org>; Thu, 13 Sep 2012 10:02:02 -0700 (PDT)
Received: by weyu54 with SMTP id u54so1983524wey.31 for <sidr@ietf.org>; Thu, 13 Sep 2012 10:01:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=jO9J9ambjmwXVtcOmTnFBqky1Yae5eG3P8aFpBBsIf4=; b=H4IHvJ3gaCRxcVcweSk0hybJRdV2U5HC0AxoZC+rBlp9l4uA9GmAeKDsImNWL5KhdY bzMt6cnkyrMHePl5bP/9Z5lNkFivsM/RKRTaA09OSLJOOhsdJiYnb3F85Hq8b9fQpKbE 7dtOVHjNr6Pe0WadS6pGGqRr4AnGFsP7Ag7h2D/BfSSdj+/3eZlLzEyrcliFj6VwHV6x NnFO16Q87Q2VpK39Hz4cZzQrVC3K1RBZ8yXaSNu4/ACHOGiHN1H5MDnsRDTSgkm9LXUe BWLyud1wRcWZJi+bn5vjJj3NU28d4uD9r3wpot3Q1XYyIDpg3kmxMniNm5jp9mZ9PMAk jWPQ==
MIME-Version: 1.0
Received: by 10.180.93.8 with SMTP id cq8mr737714wib.16.1347555717629; Thu, 13 Sep 2012 10:01:57 -0700 (PDT)
Received: by 10.223.61.12 with HTTP; Thu, 13 Sep 2012 10:01:57 -0700 (PDT)
In-Reply-To: <33A96E17-0CBF-4E17-A0D8-55FE3369142F@apnic.net>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com> <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com> <5050C546.9070304@bbn.com> <33A96E17-0CBF-4E17-A0D8-55FE3369142F@apnic.net>
Date: Thu, 13 Sep 2012 13:01:57 -0400
Message-ID: <CAH1iCirJqrpE_B=Z7B_-ksM7nPN0VC0vhT31wRexfs4a_gBAuQ@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Robert Loomans <robertl@apnic.net>
Content-Type: multipart/alternative; boundary=f46d043892b1dd46e204c9984311
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Sep 2012 17:02:04 -0000

--f46d043892b1dd46e204c9984311
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Sep 12, 2012 at 7:16 PM, Robert Loomans <robertl@apnic.net> wrote:

> On 13/09/2012, at 03:24, Stephen Kent <kent@bbn.com> wrote:
> > Brian,
> >
> > Sorry I didn't reply sooner.
> >
> > I found it very difficult to follow the details of your example, but I
> think there is a higher
> > level consideration that makes moot a detailed analysis of optimization
> the you suggest.
> >
> > In the early days of RPKI design I raised the same question that you did
> re allocation uniqueness,
> > and suggested that we include RP checks for overlapping allocations in
> RP software. I was told (by operators) that the old INR holder and the new
> INR holder would each need to have certs (and ROas) that are valid, and
> that encompass the INRs being moved, and that persist for some time. That
> is a fundamental reason that the RPKI does not specify that the allocations
> are "unique." The term "unique" used to appear in the text of several of
> the docs, but was removed to accommodate INR transfers.
> >
> > I think the primary concern is that one cannot be confident how quickly
> all RPs will acquire all RPKI data.
> > Thus it seems prudent to allow for the old and new INR holders to have
> certs that contain the INRs being transferred, for these certs overlap in
> validity, and for both certs to be available via the repository system at
> the same time, for some overlap period. This enables old and new ROAs,
> which may point to the same ASN, to exist, avoiding the need for a flag day.
>
> There are related scenarios regarding operational changes even without
> transfers.
>
> Currently APNIC, for example, only provides a hosted environment for RPKI
> for our members. They have a web interface from which they can ask for ROAs
> to be created and published, and we run all of the machinery for them and
> publish the results in our repositories.
>

I'm not familiar with what APNIC does currently.

Is it "repository" or "repositories" (plural)? Do members have their own
(hosted) repositories and CAs, or is there just one CA and a flat
repository with ROAs but no CAs?



>
> In the future we may allow our members to run their own RPKI installation,
> connecting to our RPKI service using the provisioning protocol.
>
> I suspect they would prefer to be able to run their new RPKI installation
> and the hosted service simultaneously for some time, allowing relying
> parties to pick up the new objects, before switching off the hosted service.
>

I suspect the fundamental problem is how the RPKI was "engineered" from a
specification standpoint, where the "loosely coupled" aspect was inserted
(rather than intrinsic to all possible RPKI designs), probably as a
consequence of not specifying that the notion of "time" had to be accurate
at an RP to within some specific delta of global GPS/UTC time.

For instance, prepublishing objects with validity start/end times, would in
theory be sufficient to trigger RPs to pick up objects before the start
time, and specifying (in the protocol docs) an overlap window maximum,
would achieve adequate support for transitions (of any particular purpose
and/or duration, modulo "rules" for relevant use cases).

And in particular, the transition use-case sequence would be: "pre-publish"
-> (long time) -> "enable new" -> (short window controlled by end/start
datetime in objects) -> "disable old" -> (long time) -> "unpublish old"


>
> Similarly, when someone wants to wholesale replace their RPKI
> infrastructure with a new implementation they may choose to run old and new
> side-by-side.
>
>
Architecturally limiting duplicates to dual-CAs at the same publication
point, would support this without weakening the global RPKI  security
model. All the other ways duplicates are supported, implicitly, weakens the
security model.

Brian


> Rob
>
>
> --
> Robert Loomans                         email:       robertl@apnic.net
> Senior Software Engineer, APNIC        sip:    robertl@voip.apnic.net
> http://www.apnic.net/                  phone:         +61 7 3858 3100
>
>

--f46d043892b1dd46e204c9984311
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Wed, Sep 12, 2012 at 7:16 PM, Robert =
Loomans <span dir=3D"ltr">&lt;<a href=3D"mailto:robertl@apnic.net" target=
=3D"_blank">robertl@apnic.net</a>&gt;</span> wrote:<br><blockquote class=3D=
"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding=
-left:1ex">
<div class=3D"HOEnZb"><div class=3D"h5">On 13/09/2012, at 03:24, Stephen Ke=
nt &lt;<a href=3D"mailto:kent@bbn.com">kent@bbn.com</a>&gt; wrote:<br>
&gt; Brian,<br>
&gt;<br>
&gt; Sorry I didn&#39;t reply sooner.<br>
&gt;<br>
&gt; I found it very difficult to follow the details of your example, but I=
 think there is a higher<br>
&gt; level consideration that makes moot a detailed analysis of optimizatio=
n the you suggest.<br>
&gt;<br>
&gt; In the early days of RPKI design I raised the same question that you d=
id re allocation uniqueness,<br>
&gt; and suggested that we include RP checks for overlapping allocations in=
 RP software. I was told (by operators) that the old INR holder and the new=
 INR holder would each need to have certs (and ROas) that are valid, and th=
at encompass the INRs being moved, and that persist for some time. That is =
a fundamental reason that the RPKI does not specify that the allocations ar=
e &quot;unique.&quot; The term &quot;unique&quot; used to appear in the tex=
t of several of the docs, but was removed to accommodate INR transfers.<br>

&gt;<br>
&gt; I think the primary concern is that one cannot be confident how quickl=
y all RPs will acquire all RPKI data.<br>
&gt; Thus it seems prudent to allow for the old and new INR holders to have=
 certs that contain the INRs being transferred, for these certs overlap in =
validity, and for both certs to be available via the repository system at t=
he same time, for some overlap period. This enables old and new ROAs, which=
 may point to the same ASN, to exist, avoiding the need for a flag day.<br>

<br>
</div></div>There are related scenarios regarding operational changes even =
without transfers.<br>
<br>
Currently APNIC, for example, only provides a hosted environment for RPKI f=
or our members. They have a web interface from which they can ask for ROAs =
to be created and published, and we run all of the machinery for them and p=
ublish the results in our repositories.<br>
</blockquote><div><br>I&#39;m not familiar with what APNIC does currently.<=
br><br>Is it &quot;repository&quot; or &quot;repositories&quot; (plural)? D=
o members have their own (hosted) repositories and CAs, or is there just on=
e CA and a flat repository with ROAs but no CAs?<br>
<br>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex">
<br>
In the future we may allow our members to run their own RPKI installation, =
connecting to our RPKI service using the provisioning protocol.<br>
<br>
I suspect they would prefer to be able to run their new RPKI installation a=
nd the hosted service simultaneously for some time, allowing relying partie=
s to pick up the new objects, before switching off the hosted service.<br>
</blockquote><div><br>I suspect the fundamental problem is how the RPKI was=
 &quot;engineered&quot; from a specification standpoint, where the &quot;lo=
osely coupled&quot; aspect was inserted (rather than intrinsic to all possi=
ble RPKI designs), probably as a consequence of not specifying that the not=
ion of &quot;time&quot; had to be accurate at an RP to within some specific=
 delta of global GPS/UTC time.<br>
<br>For instance, prepublishing objects with validity start/end times, woul=
d in theory be sufficient to trigger RPs to pick up objects before the star=
t time, and specifying (in the protocol docs) an overlap window maximum, wo=
uld achieve adequate support for transitions (of any particular purpose and=
/or duration, modulo &quot;rules&quot; for relevant use cases).<br>
<br>And in particular, the transition use-case sequence would be: &quot;pre=
-publish&quot; -&gt; (long time) -&gt; &quot;enable new&quot; -&gt; (short =
window controlled by end/start datetime in objects) -&gt; &quot;disable old=
&quot; -&gt; (long time) -&gt; &quot;unpublish old&quot;<br>
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex">
<br>
Similarly, when someone wants to wholesale replace their RPKI infrastructur=
e with a new implementation they may choose to run old and new side-by-side=
.<br>
<br></blockquote><div><br>Architecturally limiting duplicates to dual-CAs a=
t the same publication point, would support this without weakening the glob=
al RPKI=A0 security model. All the other ways duplicates are supported, imp=
licitly, weakens the security model.<br>
<br>Brian<br>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Rob<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br>
<br>
--<br>
Robert Loomans =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 email: =A0 =
=A0 =A0 <a href=3D"mailto:robertl@apnic.net">robertl@apnic.net</a><br>
Senior Software Engineer, APNIC =A0 =A0 =A0 =A0sip: =A0 =A0<a href=3D"mailt=
o:robertl@voip.apnic.net">robertl@voip.apnic.net</a><br>
<a href=3D"http://www.apnic.net/" target=3D"_blank">http://www.apnic.net/</=
a> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0phone: =A0 =A0 =A0 =A0 <a href=3D"tel=
:%2B61%207%203858%203100" value=3D"+61738583100">+61 7 3858 3100</a><br>
<br>
</font></span></blockquote></div><br>

--f46d043892b1dd46e204c9984311--

From kent@bbn.com  Thu Sep 13 13:44:22 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95FAC21F84D2 for <sidr@ietfa.amsl.com>; Thu, 13 Sep 2012 13:44:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.255
X-Spam-Level: 
X-Spam-Status: No, score=-106.255 tagged_above=-999 required=5 tests=[AWL=-0.257, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_72=0.6, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OviyvS+f++eF for <sidr@ietfa.amsl.com>; Thu, 13 Sep 2012 13:44:20 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id BE89421F84DF for <sidr@ietf.org>; Thu, 13 Sep 2012 13:44:19 -0700 (PDT)
Received: from dhcp89-089-153.bbn.com ([128.89.89.153]:54346) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1TCGGI-000PhH-Qo; Thu, 13 Sep 2012 16:43:46 -0400
Message-ID: <50524582.1050704@bbn.com>
Date: Thu, 13 Sep 2012 16:43:46 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: Brian Dickson <brian.peter.dickson@gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com> <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com> <5050C546.9070304@bbn.com> <33A96E17-0CBF-4E17-A0D8-55FE3369142F@apnic.net> <CAH1iCirJqrpE_B=Z7B_-ksM7nPN0VC0vhT31wRexfs4a_gBAuQ@mail.gmail.com>
In-Reply-To: <CAH1iCirJqrpE_B=Z7B_-ksM7nPN0VC0vhT31wRexfs4a_gBAuQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------010700020007000709060505"
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Sep 2012 20:44:22 -0000

This is a multi-part message in MIME format.
--------------010700020007000709060505
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Brian,

Tp paraphrase an old joke, we've established what kind of engineers we 
are, we're just haggling over the overlap interval.

Your proposal includes a period when old and new INR holders have valid 
credentials, i.e., an overlap of valid RPKI objects. I didn't see any 
indication in your message of a proposed max overlap interval. Currently 
we no specified max overlap,so both approaches really overlap, so to speak.

You suggested pre-publication of signed objects with validity start stop 
time. Since you are discussing the current RPKI design, I presume that 
you are familiar with the syntax of certs, CRLs, and RPKI signed 
objects, as specified in the RPKI RFCs. So you realize that certs and 
ROAs and manifests all contain validity intervals already. Thus one 
could pre-publish instances of the objects involved in an INR transfer, 
as you suggested, consistent with the standard syntax. of course, all of 
these pre-published objects are invalid until the validity start time.

We make use of the RFC 5280 certificate path validation rules, as 
augmented by the 3779 extension processing (as per RFC 3779). 
Certificate path validation as per 5280 will cause the certificates that 
are not yet valid to be rejected until they become valid, and thus 
objects that are validated by these certs, e.g., ROAs and manifests, are 
similarly invalid until that time. So, pre-publication would allow one 
to push out certificates to the new INR holders prior to them being 
"activated." That could be used to reduce the contribution to the 
overlap interval that is attributable to the time we allow for RPs to 
fetch RPKI data.One would have to persuade RPs to not discard such 
not-yet-valid objects, within a reasonable time window, but that might 
be done. (One has to limit the window, since none of these objects can 
be validated and that creates a DoS vector ...)

Ifwe allow a reasonable time for RPs to have fetched the not-yet-valid 
objects, then when they "turn the crank" to process local caches after 
the objects have become valid, the RPs would accept them. But, I've 
never hear anyone suggest that one ought to try to impose a global, 
coordinated, RPKI object processing time on all RPs. (That, in itself 
would be a security concern.) So there may be limits here as to how much 
the overlap can be reduced by this strategy.

Also, are there any other examples you can cite where every network 
operator is expected to perform some activity, at the same time 
(relative to UTC), every day, around the world? What is the accepted 
norm for clock sync among all ISPs today, and what processes rely on the 
extant precision and accuracy of synchronized clocks at all ISPs? Not 
being an operator, I really don't know the answers to these questions.

Anyway, if we were to adopt your suggestion, the benefit might be that 
the overlap interval need be determined primarily by the time needed to 
accommodate skew in RPs posting, fetching, and processing RPKI objects. 
Rather the overlap interval would be a function of what  folks consider 
to be a comfortable interval to accommodate human processes (and errors) 
for the INR transfers.

I don't know that this time scale as being one that requires carefully 
coordinated clocks at all RPs, especially since we don't have a 
candidate overlap interval value on the table. Moreover, since there is 
an overlap interval in either case, it's not immediately clear how hard 
we should work to reduce it. What overlap interval did you envision?

Steve


--------------010700020007000709060505
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <meta name="Title" content="">
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">Brian,<o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><o:p>&nbsp;</o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">Tp paraphrase
        an old joke, we&#8217;ve
        established what kind of engineers we are, we're just haggling
        over the overlap interval.<o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><o:p>&nbsp;</o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">Your proposal&nbsp;
        includes a period
        when old and new INR holders have valid credentials, i.e., an
        overlap of valid RPKI objects. I
        didn&#8217;t see any indication in your message of a proposed max
        overlap interval. Currently we no specified max overlap,<span
          style="mso-spacerun:yes">&nbsp; </span>so both approaches really
        overlap, so to speak.<o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><o:p>&nbsp;</o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">You suggested
        pre-publication of signed
        objects with validity start stop time. Since you are discussing
        the current
        RPKI design, I presume that you are familiar with the syntax of
        certs, CRLs,
        and RPKI signed objects, as specified in the RPKI RFCs. So you
        realize that certs
        and ROAs and manifests all contain validity intervals already.
        Thus one could
        pre-publish instances of the objects involved in an INR
        transfer, as you
        suggested, consistent with the standard syntax. of course, all
        of these pre-published objects are invalid until the validity
        start time. <o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><o:p>&nbsp;</o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">We make use of
        the RFC 5280 certificate
        path validation rules, as augmented by the 3779 extension
        processing (as per RFC 3779).
        Certificate path validation as per 5280 will cause the
        certificates that are
        not yet valid to be rejected until they become valid, and thus
        objects that are
        validated by these certs, e.g., ROAs and manifests, are
        similarly invalid until
        that time. So, pre-publication would allow one to push out
        certificates to the
        new INR holders prior to them being &#8220;activated.&#8221; That could be
        used to reduce
        the contribution to the overlap interval that is attributable to
        the time we
        allow for RPs to fetch RPKI data.<span style="mso-spacerun:yes">&nbsp;
        </span>One
        would have to persuade RPs to not discard such not-yet-valid
        objects, within a
        reasonable time window, but that might be done. (One has to
        limit the window,
        since none of these objects can be validated and that creates a
        DoS vector &#8230;) <o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><o:p>&nbsp;</o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">If<span
          style="mso-spacerun:yes">&nbsp;
        </span>we allow a reasonable time for RPs to have fetched the
        not-yet-valid
        objects, then when they "turn the crank" to process local caches
        after the objects have become valid, the RPs would accept them.
        But, I've never hear
        anyone suggest that one ought to try to impose a global,
        coordinated, RPKI object processing time on all RPs. (That, in
        itself would be
        a security concern.) So there may be limits here as to how much
        the overlap can be reduced by this strategy.<o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><o:p>&nbsp;</o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">Also, are
        there any other examples you
        can cite where every network operator is expected to perform
        some activity,
        at the same time (relative to UTC), every day, around the world?
        <span style="mso-spacerun:yes">&nbsp;</span>What is the accepted norm
        for clock sync among
        all ISPs today, and what processes rely on the extant precision
        and accuracy of synchronized clocks at all ISPs? Not being an
        operator, I really don't know the answers to these questions.<br
          style="mso-special-character:line-break">
        <!--[if !supportLineBreakNewLine]--><br
          style="mso-special-character:line-break">
        <!--[endif]--><o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">Anyway, if we
        were to adopt your suggestion, the benefit might be that the
        overlap interval need be determined primarily by the time needed
        to
        accommodate skew in RPs posting, fetching, and processing RPKI
        objects. Rather the overlap interval would be a function of
        what&nbsp; folks consider to be a comfortable </span><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><span
          style="mso-fareast-font-family:&quot;Times New Roman&quot;;
          mso-bidi-font-family:&quot;Times New Roman&quot;">interval</span>
        to accommodate human
        processes (and errors) for the INR transfers.<o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><o:p>&nbsp;</o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">I don&#8217;t know
        that this time scale as being
        one that requires carefully coordinated clocks at all RPs,
        especially since we don't have a candidate overlap interval
        value on the table. Moreover, since
        there is an overlap interval in either case, it&#8217;s not
        immediately clear how hard we should work to reduce it. What
        overlap interval did you
        envision?<o:p></o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;"><o:p>&nbsp;</o:p></span></p>
    <p class="MsoNormal"><span
        style="mso-fareast-font-family:&quot;Times New Roman&quot;;
        mso-bidi-font-family:&quot;Times New Roman&quot;">Steve</span><o:p></o:p></p>
    <meta name="Keywords" content="">
    <meta http-equiv="Content-Type" content="text/html;
      charset=ISO-8859-1">
    <meta name="ProgId" content="Word.Document">
    <meta name="Generator" content="Microsoft Word 14">
    <meta name="Originator" content="Microsoft Word 14">
    <link rel="File-List"
href="file://localhost/Users/stk/Library/Caches/TemporaryItems/msoclip/0/clip_filelist.xml">
    <!--[if gte mso 9]><xml>
 <o:DocumentProperties>
  <o:Revision>0</o:Revision>
  <o:TotalTime>0</o:TotalTime>
  <o:Pages>1</o:Pages>
  <o:Words>458</o:Words>
  <o:Characters>2614</o:Characters>
  <o:Company>BBN Technologies</o:Company>
  <o:Lines>21</o:Lines>
  <o:Paragraphs>6</o:Paragraphs>
  <o:CharactersWithSpaces>3066</o:CharactersWithSpaces>
  <o:Version>14.0</o:Version>
 </o:DocumentProperties>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]-->
    <link rel="themeData"
href="file://localhost/Users/stk/Library/Caches/TemporaryItems/msoclip/0/clip_themedata.xml">
    <!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>JA</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
   <w:UseFELayout/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="276">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]-->
    <style>
<!--
 /* Font Definitions */
@font-face
	{font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-font-charset:78;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:1 134676480 16 0 131072 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1107305727 0 0 415 0;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1073743103 0 0 415 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:JA;}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:10.0pt;
	mso-ansi-font-size:10.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:JA;}
@page WordSection1
	{size:8.5in 792.7pt;
	margin:1.0in 1.0in 1.0in 1.0in;
	mso-header-margin:.5in;
	mso-footer-margin:.5in;
	mso-paper-source:0;}
div.WordSection1
	{page:WordSection1;}
-->
</style><!--[if gte mso 10]>
<style>
 /* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-fareast-language:JA;}
</style>
<![endif]--><!--StartFragment--><!--EndFragment-->
  </body>
</html>

--------------010700020007000709060505--

From brian.peter.dickson@gmail.com  Fri Sep 14 08:50:53 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10FC621F84FC for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 08:50:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.931
X-Spam-Level: 
X-Spam-Status: No, score=-3.931 tagged_above=-999 required=5 tests=[AWL=-0.333, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zWmVKeg7l3hP for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 08:50:52 -0700 (PDT)
Received: from mail-wg0-f44.google.com (mail-wg0-f44.google.com [74.125.82.44]) by ietfa.amsl.com (Postfix) with ESMTP id CD11B21F84F8 for <sidr@ietf.org>; Fri, 14 Sep 2012 08:50:51 -0700 (PDT)
Received: by wgbdr13 with SMTP id dr13so2269225wgb.13 for <sidr@ietf.org>; Fri, 14 Sep 2012 08:50:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=2yv6MYZj5YZNKjCmUXgeOKmo/z5Z3TXh9xWAbkQbclY=; b=UdyL8eiiUAzaWrzsmzyNeSW+9w6So3TJ6zisttiZmLSq7JFnTMTwnKB8zLjBn9Jtli fIP/vhWzkrNoam8a1nJ3Ud2LWcn1G60lWslHGclkiphb64If5y/A+DJl0XRNfxDTYpao YqAeOwAGEDQarAu7Kw3x42CJEX/j5weJbNFXfRn9QJmSFj/Cb+aW4KVjXmGw30rROcoP qTiS6hX0cO0oaD7wnxXedBhsYUVo4GCRwT6d0piCh2FIbTeS3Cui6DEG2HW65WJzWNu2 Kc33h4RKlMZfcmzuxbgBipRc9foreUkxt7OTdrTOxsbNXpwfAKdWUQJbjela9mJJtMwu jZ1w==
MIME-Version: 1.0
Received: by 10.180.84.104 with SMTP id x8mr48933425wiy.20.1347637850729; Fri, 14 Sep 2012 08:50:50 -0700 (PDT)
Received: by 10.223.61.12 with HTTP; Fri, 14 Sep 2012 08:50:50 -0700 (PDT)
In-Reply-To: <5050C546.9070304@bbn.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com> <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com> <5050C546.9070304@bbn.com>
Date: Fri, 14 Sep 2012 11:50:50 -0400
Message-ID: <CAH1iCior42Z=r39Q_SNH08QOY4QZosn-OOzbqG6W+VNNUOFFhQ@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary=f46d043bd75860eae404c9ab63f7
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Sep 2012 15:50:53 -0000

--f46d043bd75860eae404c9ab63f7
Content-Type: text/plain; charset=ISO-8859-1

I'm not sure which operators you talked to, but I think you may have
conflated two different issues that are both relevant, but which have
different requirements (or semantics, if you will).

One issue is, the transfer of *live* networks. I'm not sure there is a
strong requirement to support this per se, and/or whether limited support
for this (with limited overlapping validity periods) would suffice.
If you recall, BGP is stateful, so if the origin ASN of the INR does not
change, the RP cache latency vs "refresh" BGPSEC instances, would be the
primary risk. (Network events are a secondary risk.)

However, IMHO, live networks might change their AS path, but have no reason
to change their location in the INR allocation tree.

On the other hand, non-live transfers are the norm, and do need to be
accounted for.
And this is where, IMHO, the current RPKI design is GROSSLY flawed. Sorry
to be the bearer of bad news.

Here is the typical INR policy on transfered or returned blocks:

   - Put the returned/transfered block in the "free" pool.
   - If previously used, put a "time-out" on the block to prevent it being
   allocated for some non-trivial period. (e.g. 3-6 WEEKS)
   - Once time-out expires (if there is any timeout), make available for
   allocation
   - Allocate per normal allocation mechanisms/policies.

So, not only is there no live transfer, there is an explicit gap in the
period of usage. This means that any old caches can be purged of the INR
references (via CA or EE+ROA).
And subsequent to that, an INR allocation of previously used space, is no
different from INR allocation from a never-before-used space.

While the details (e.g. time frames) belong in an ops document, the
exclusivity requirement does need to be handled within the RPKI & RP
architectures. Currently it is not.

Brian

On Wed, Sep 12, 2012 at 1:24 PM, Stephen Kent <kent@bbn.com> wrote:

> Brian,
>
> Sorry I didn't reply sooner.
>
> I found it very difficult to follow the details of your example, but I
> think there is a higher
> level consideration that makes moot a detailed analysis of optimization
> the you suggest.
>
> In the early days of RPKI design I raised the same question that you did
> re allocation uniqueness,
> and suggested that we include RP checks for overlapping allocations in RP
> software. I was told (by operators) that the old INR holder and the new INR
> holder would each need to have certs (and ROas) that are valid, and that
> encompass the INRs being moved, and that persist for some time. That is a
> fundamental reason that the RPKI does not specify that the allocations are
> "unique." The term "unique" used to appear in the text of several of the
> docs, but was removed to accommodate INR transfers.
>
> I think the primary concern is that one cannot be confident how quickly
> all RPs will acquire all RPKI data.
> Thus it seems prudent to allow for the old and new INR holders to have
> certs that contain the INRs being transferred, for these certs overlap in
> validity, and for both certs to be available via the repository system at
> the same time, for some overlap period. This enables old and new ROAs,
> which may point to the same ASN, to exist, avoiding the need for a flag day.
>
> Steve
>
>

--f46d043bd75860eae404c9ab63f7
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I&#39;m not sure which operators you talked to, but I think you may have co=
nflated two different issues that are both relevant, but which have differe=
nt requirements (or semantics, if you will).<div><br></div><div>One issue i=
s, the transfer of *live* networks. I&#39;m not sure there is a strong requ=
irement to support this per se, and/or whether limited support for this (wi=
th limited overlapping validity periods) would suffice.</div>
<div>If you recall, BGP is stateful, so if the origin ASN of the INR does n=
ot change, the RP cache latency vs &quot;refresh&quot; BGPSEC instances, wo=
uld be the primary risk. (Network events are a secondary risk.)</div><div>
<br></div><div>However, IMHO, live networks might change their AS path, but=
 have no reason to change their location in the INR allocation tree.</div><=
div><br></div><div>On the other hand, non-live transfers are the norm, and =
do need to be accounted for.</div>
<div>And this is where, IMHO, the current RPKI design is GROSSLY flawed. So=
rry to be the bearer of bad news.</div><div><br></div><div>Here is the typi=
cal INR policy on transfered or returned blocks:=A0</div><div><ul><li>Put t=
he returned/transfered block in the &quot;free&quot; pool.=A0</li>
<li>If previously used, put a &quot;time-out&quot; on the block to prevent =
it being allocated for some non-trivial period. (e.g. 3-6 WEEKS)</li><li>On=
ce time-out expires (if there is any timeout), make available for allocatio=
n</li>
<li>Allocate per normal allocation mechanisms/policies.</li></ul><div>So, n=
ot only is there no live transfer, there is an explicit gap in the period o=
f usage. This means that any old caches can be purged of the INR references=
 (via CA or EE+ROA).</div>
<div>And subsequent to that, an INR allocation of previously used space, is=
 no different from INR allocation from a never-before-used space.</div><div=
><br></div><div>While the details (e.g. time frames) belong in an ops docum=
ent, the exclusivity requirement does need to be handled within the RPKI &a=
mp; RP architectures. Currently it is not.</div>
<div><br></div><div>Brian</div><br><div class=3D"gmail_quote">On Wed, Sep 1=
2, 2012 at 1:24 PM, Stephen Kent <span dir=3D"ltr">&lt;<a href=3D"mailto:ke=
nt@bbn.com" target=3D"_blank">kent@bbn.com</a>&gt;</span> wrote:<br><blockq=
uote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex">
Brian,<br>
<br>
Sorry I didn&#39;t reply sooner.<br>
<br>
I found it very difficult to follow the details of your example, but I thin=
k there is a higher<br>
level consideration that makes moot a detailed analysis of optimization the=
 you suggest.<br>
<br>
In the early days of RPKI design I raised the same question that you did re=
 allocation uniqueness,<br>
and suggested that we include RP checks for overlapping allocations in RP s=
oftware. I was told (by operators) that the old INR holder and the new INR =
holder would each need to have certs (and ROas) that are valid, and that en=
compass the INRs being moved, and that persist for some time. That is a fun=
damental reason that the RPKI does not specify that the allocations are &qu=
ot;unique.&quot; The term &quot;unique&quot; used to appear in the text of =
several of the docs, but was removed to accommodate INR transfers.<br>

<br>
I think the primary concern is that one cannot be confident how quickly all=
 RPs will acquire all RPKI data.<br>
Thus it seems prudent to allow for the old and new INR holders to have cert=
s that contain the INRs being transferred, for these certs overlap in valid=
ity, and for both certs to be available via the repository system at the sa=
me time, for some overlap period. This enables old and new ROAs, which may =
point to the same ASN, to exist, avoiding the need for a flag day.<br>

<br>
Steve<br>
<br>
</blockquote></div><br></div>

--f46d043bd75860eae404c9ab63f7--

From alexey.melnikov@isode.com  Fri Sep 14 09:30:44 2012
Return-Path: <alexey.melnikov@isode.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D15521F84A7 for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 09:30:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.45
X-Spam-Level: 
X-Spam-Status: No, score=-102.45 tagged_above=-999 required=5 tests=[AWL=0.149, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wbmYEDXhGqEb for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 09:30:44 -0700 (PDT)
Received: from waldorf.isode.com (cl-125.lon-03.gb.sixxs.net [IPv6:2a00:14f0:e000:7c::2]) by ietfa.amsl.com (Postfix) with ESMTP id EDBCA21F84A5 for <sidr@ietf.org>; Fri, 14 Sep 2012 09:30:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1347640243; d=isode.com; s=selector; i=@isode.com; bh=1JYmzUboYUab8CE9HZ2lBdzxXI1wdAL0m0ug6womf1o=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=I06L9QUCUlH543P1mhBGYq0Hyi8dG+ZjxiYdiE+ve0l55KyvhQ60LUT77OwucVnJSHVa34 W/TQtdrJAVoq3vh1gCX+zZQ3SVF0EsGSpC7dBCUy1DOfuuC9j40KIQCnQY/jmraavchTh5 hQD4PasfL1gWlhg3qbHJFkvHrmKBLxc=;
Received: from [172.16.1.29] (shiny.isode.com [62.3.217.250])  by waldorf.isode.com (submission channel) via TCP with ESMTPA  id <UFNbsgBdyGn-@waldorf.isode.com>; Fri, 14 Sep 2012 17:30:43 +0100
Message-ID: <50535BB3.1010306@isode.com>
Date: Fri, 14 Sep 2012 17:30:43 +0100
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:13.0) Gecko/20120614 Thunderbird/13.0.1
To: "sidr@ietf.org" <sidr@ietf.org>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F6144F@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F6144F@Hermes.columbia.ads.sparta.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [sidr] WGLC for draft-ietf-sidr-rpki-rtr-protocol-mib-00
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Sep 2012 16:30:44 -0000

On 17/08/2012 18:02, Murphy, Sandra wrote:
> The authors believe that the draft is ready for publication.  This announces a two week last call.  The WGLC will end 31 Aug 2012.
>
> Please report to the list whether you support publication of this draft or not.
>
> The draft is available at
> http://tools.ietf.org/html/draft-ietf-sidr-rpki-rtr-protocol-mib-00
>
> The abstract says:
>
>     This document defines a portion of the Management Information Base
>     (MIB) for use with network management protocols in the Internet
>     community.  In particular, it describes objects used for monitoring
>     the RPKI Router protocol.
>
> --Sandy, speaking as wg co-chair

There were no comment or reviews during the WGLC. I don't think chairs 
can request publication of this document without some positive feedback 
that the document is ready to be published.


From brian.peter.dickson@gmail.com  Fri Sep 14 10:07:21 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 297BF21F851C for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 10:07:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.848
X-Spam-Level: 
X-Spam-Status: No, score=-3.848 tagged_above=-999 required=5 tests=[AWL=-0.250, BAYES_00=-2.599, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7vZpRkF7z4K6 for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 10:07:19 -0700 (PDT)
Received: from mail-we0-f172.google.com (mail-we0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id 3B1D721F850D for <sidr@ietf.org>; Fri, 14 Sep 2012 10:07:14 -0700 (PDT)
Received: by weyu54 with SMTP id u54so2746571wey.31 for <sidr@ietf.org>; Fri, 14 Sep 2012 10:07:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=ZCxr40N8HshdxboYc9xe818yHaT1dJpAJt+GKt1tvlc=; b=xpruj79KsCLjrsQ46+KhyrF8xqp08OTdXOagRW0kLq2/ibORSvS6JxtHObZRtpRnZi JbqyiW9VF0/Y1NNMvnWjWbxuyw8pYTu4aRzvYCaXxRvAeicO7vA+zOyRcX0mkKRfJCzC qF+xeNjYxWhNOFQwHS4a2G2S/SOn16VBu6Jre0LBmuF9rcGpmbr5DlEZwpMrIC+IEZpV jHX+HhP2hG9YrTBOt94NqUFjVdio1HVQIfWr7w+YdomIBVJuZXIhCRBUsaH7I5H7/Ceg diuLYLNuGyShpaDffkSNu6dz65VHTNvcHu6T40MmGNvfc031fmqdt6cy2I8KIzc12gaM RuOA==
MIME-Version: 1.0
Received: by 10.216.132.25 with SMTP id n25mr1751816wei.25.1347642433226; Fri, 14 Sep 2012 10:07:13 -0700 (PDT)
Received: by 10.223.61.12 with HTTP; Fri, 14 Sep 2012 10:07:12 -0700 (PDT)
In-Reply-To: <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com> <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com>
Date: Fri, 14 Sep 2012 13:07:12 -0400
Message-ID: <CAH1iCiq2ObL90xmn1iXR6x9KRX8vGSmsRiM+R2T-KT+N4qO5=w@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary=0016e6dd8d6984468d04c9ac7419
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Sep 2012 17:07:21 -0000

--0016e6dd8d6984468d04c9ac7419
Content-Type: text/plain; charset=ISO-8859-1

On Tue, Sep 4, 2012 at 3:08 PM, Brian Dickson <brian.peter.dickson@gmail.com
> wrote:

>
>
> On Tue, Sep 4, 2012 at 1:55 PM, Stephen Kent <kent@bbn.com> wrote:
>
>>
>>
>>> Make-before-break is fully possible with exclusivity.
>>>
>> In the general case, the resources are transferred between two CAs, and
>> these CAs need not be
>> ISPs, e.g., they might be RIRs. So, before an ISP can issue ROAs for the
>> newly-received INRs,
>> the ISP has to have these INRs added to it's CA cert. If the parent of
>> that CA was not the parent
>> for the ISP that previously held the resources, then it too has to have
>> the INRs in question added
>> to its cert, and so on. Thus means that, in general, there will be more
>> that one CA, at corresponding
>> tiers of the RPKI, that will have the same INRs in their 3779 extensions.
>> Equivalently, this means
>> that some CA will have issued certs to two of its children, where the
>> certs overlap (wrt the INrs
>> being transferred).
>
>
>
>
>
Re-replying to focus on one specific, MAJOR deficiency: INR transfers (in
the real world) vs limitations of RPKI (inherited from its use of 3779)
cannot be reconciled with the scalability and security requirements for
origin validation (and consequently BGPsec which presumes origin
validation).



> However, if there *is* a need for the old parents to cover the INR, then
> the semantics are missing explicit hole-punching.
>
> Hole-punching is needed to disambiguate overlapping certs, so as to assure
> RPs the uniqueness of INRs.
>
> A "hole" is the positively-asserted proven non-existence of permitted
> matching INRs, and need to be "glued" to matching (covering) INRs wherever
> INRs are delegated.
>
> Let me know if I need to go into more detail on "hole" semantics.
>
> (Holes are less common today than they were 15 years ago, but they are
> still critical to any kind of resource validation methodology, to avoid the
> entire hijacking issue.)
>
> Brian
>


Let us consider what 3779 is able to represent in terms of INR values.
(As co-author, you should be familiar with this -- I'm just explicitly
re-stating for everyone else.)
It allows IPv4 or IPv6 (and/or v4/v6 representations within other AFI/SAFI
types).
For those types, it allows one or more prefixes and/or ranges.
A prefix is X/N (where X is an IPv4 or IPv6 network, and N is the number of
bits in the network portion of the address).
A range is A-B where A and B are both addresses, and B>=A.

RFC 3779 can only express positive assertions.

This is the big problem, in the context of RPKI, when handling INR
transfers.

There is no way to correctly express INR transfers of subordinate address
blocks, without drastic implications on either security, or on the ability
to efficiently announce prefixes.

Current IANA and IRR policies allow for the transfer (e.g. sale) of INRs
between parties which are constituents of different IRRs, or between
parties which are constituents of a single IRR.
These policies allow for the transfer of INRs of flexible size, including
subordinate blocks.
The policies (rightly so) discourage unnecessary fragmentation of INRs.

So, to make this issue easier to follow, lets take a fictional example
(using RFC1918 space per standard practice a la example.com) and show the
problem that results.

Let's say someone had a right-to-use on 10.0.0.0/8.
Now suppose they want to transfer (sell) a /24 out of this space, to an
unrelated party.
(Since binary trees don't have any particular affinity, the choice of /24
is both arbitrary and irrelevant for this example.)
For illustrative purposes, suppose that it is 10.20.30.0/24.

Regardless of how long the transfer takes to process, and how long it takes
RP caches to sync up, at some point in the future, the RPKI needs to
represent the "new world order".

So, what ways does 3779 support encoding of both the original block (minus
the /24), and the new block?
The new block is easy - it is 10.20.30.0/24. The new owner could be in the
same IRR, or a different IRR. The new owner would announce, in BGP (and
BGPSEC), 10.20.30.0/24.

What about the old block?
It must be encoded in one of 4 ways:

   1. 10.0.0.0/8
   2. two ranges (10.0.0.0-10.20.29.255 and 10.20.31.0-10.255.255.255)
   3. a bunch of prefixes (16 in total) of lengths 9 through 24
      1. 10.0.0.0/12
      2. 10.16.0.0/14
         1. 10.20.0.0/20
         2. 10.20.16.0/21
         3. 10.20.24.0/22
         4. 10.20.28.0/23
         5. 10.20.31.0/24
         6. 10.20.32.0/19
         7. 10.20.64.0/18
         8. 10.20.128.0/17
      3. 10.21.0.0/16
      4. 10.22.0.0/15
      5. 10.24.0.0/13
      6. 10.32.0.0/11
      7. 10.64.0.0/10
      8. 10.128.0.0/9
   4. even larger number of prefixes that form any sort of binary
   decomposition of the above 16 prefixes

However, the RP/RPKI rules mean that it is not possible to have the
original owner advertise 10.0.0.0/8, if methods 2, 3, or 4 are used.

On the other hand, restricting INR transfers to methods 2, 3, or 4, result
in each INR causing the need for an additional (N-M) prefixes, if the
original prefix length is M and the transfered prefix length is N.

And lastly, if method 1 is used, it is impossible to prevent the original
owner from producing an ROA that would validate, which covers the
"transfered" INR.

This creates a Hobson's choice: either accept the inability to protect
against subsequent (accidental or malicious) hijacking of transfered INRs,
or accept the need for routing table bloat.

===== ALTERNATIVES =====

There is an alternative - replace 3779, and the rules of inheritance in the
RPKI, with something that supports "holes".

What is a hole? The definitive assertion of the non-routeability (or
non-ownership) of longer prefixes within a block.

This would need to be "glued" onto a parent block, and remain attached to
any delegation of a block containing the "hole".

Prefixes shorter than the "hole" would be valid (e.g. an ROA with maximum
prefix length < prefix length of enclosed hole(s)).

Prefixes the same size or longer than the "hole" would be invalid. Neither
a CA (delegation) nor an ROA would be permissible if it covered the range
of a "hole" without including the explicit hole, or made permissible a
routing announcement anywhere inside the "hole".

Examples of "new world order" allowable ROAs of a hypothetical 3779-bis
would be:
10.0.0.0/8 le 23  => would allow covering prefix 10.20.30.0/23 (which is
shorter than 10.20.30.0/24) but not allow conflicting prefix 10.20.30.0/24
10.128.0.0/9 le 32 => has no overlap with the "hole" at 10.20.30.0/24
10.20.32.0/19 le 32 => has no overlap with the "hole"
10.20.31.0/24 le 32 => adjacent to, but no overlap with, the "hole"
10.20.29.0/24 le 32 => adjacent to, but no overlap with, the "hole"
10.20.0.0/16 le 23 => covers "hole", but only permits prefixes shorter than
(covering) the "hole"

In this alternate representation scheme, any necessary prefixes by either
party could be registered (in RPKI) via ROAs, and announced, without
presenting either a security risk to either party (of hijacking) or placing
a burden on the global BGP table (of prefixes dictated by RPKI
fragmentation of parent blocks of transfered INRs).

The old owner could (continue to) announce 10.0.0.0/8.
The new owner could announce 10.20.30.0/24.
Nobody would have to worry about conflicting announcements of
10.20.30.0/24(or longer).

The current RPKI scheme cannot represent this, because RFC 3779 cannot
represent this.
And as a consequence, it is impossible to encode in origin validation
logic, so RPs are not able to enjoy the benefits.

Until such a fix is implemented (in 3779, all the RPKI documents that
incorporate 3779, and all the RP-related docs), the only reasonable
conclusion is that these are fatal flaws (from the perspective of
operators).

Brian

--0016e6dd8d6984468d04c9ac7419
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Tue, Sep 4, 2012 at 3:08 PM, Brian Di=
ckson <span dir=3D"ltr">&lt;<a href=3D"mailto:brian.peter.dickson@gmail.com=
" target=3D"_blank">brian.peter.dickson@gmail.com</a>&gt;</span> wrote:<br>=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br><br><div class=3D"gmail_quote"><div class=3D"im">On Tue, Sep 4, 2012 at=
 1:55 PM, Stephen Kent <span dir=3D"ltr">&lt;<a href=3D"mailto:kent@bbn.com=
" target=3D"_blank">kent@bbn.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">

<div><br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
Make-before-break is fully possible with exclusivity.<br>
</blockquote></div>
In the general case, the resources are transferred between two CAs, and the=
se CAs need not be<br>
ISPs, e.g., they might be RIRs. So, before an ISP can issue ROAs for the ne=
wly-received INRs,<br>
the ISP has to have these INRs added to it&#39;s CA cert. If the parent of =
that CA was not the parent<br>
for the ISP that previously held the resources, then it too has to have the=
 INRs in question added<br>
to its cert, and so on. Thus means that, in general, there will be more tha=
t one CA, at corresponding<br>
tiers of the RPKI, that will have the same INRs in their 3779 extensions. E=
quivalently, this means<br>
that some CA will have issued certs to two of its children, where the certs=
 overlap (wrt the INrs<br>
being transferred).</blockquote><div><br></div></div><div><br></div><div><b=
r></div></div></blockquote><div><br></div><div>Re-replying to focus on one =
specific, MAJOR deficiency: INR transfers (in the real world) vs limitation=
s of RPKI (inherited from its use of 3779) cannot be reconciled with the sc=
alability and security requirements for origin validation (and consequently=
 BGPsec which presumes origin validation).</div>
<div><br></div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class=3D"g=
mail_quote"><div></div><div>However, if there *is* a need for the old paren=
ts to cover the INR, then the semantics are missing explicit hole-punching.=
</div>
<div><br></div><div>Hole-punching is needed to disambiguate overlapping cer=
ts, so as to assure RPs the uniqueness of INRs.</div>
<div><br></div><div>A &quot;hole&quot; is the positively-asserted proven no=
n-existence of permitted matching INRs, and need to be &quot;glued&quot; to=
 matching (covering) INRs wherever INRs are delegated.</div><div><br></div>

<div>Let me know if I need to go into more detail on &quot;hole&quot; seman=
tics.</div><div><br></div><div>(Holes are less common today than they were =
15 years ago, but they are still critical to any kind of resource validatio=
n methodology, to avoid the entire hijacking issue.)</div>
<span class=3D"HOEnZb"><font color=3D"#888888">
<div><br></div><div>Brian</div></font></span><div class=3D"im"><div></div><=
/div></div></blockquote></div><br><div><br></div><div>Let us consider what =
3779 is able to represent in terms of INR values.</div><div>(As co-author, =
you should be familiar with this -- I&#39;m just explicitly re-stating for =
everyone else.)</div>
<div>It allows IPv4 or IPv6 (and/or v4/v6 representations within other AFI/=
SAFI types).</div><div>For those types, it allows one or more prefixes and/=
or ranges.</div><div>A prefix is X/N (where X is an IPv4 or IPv6 network, a=
nd N is the number of bits in the network portion of the address).</div>
<div>A range is A-B where A and B are both addresses, and B&gt;=3DA.</div><=
div><br></div><div>RFC 3779 can only express positive assertions.</div><div=
><br></div><div>This is the big problem, in the context of RPKI, when handl=
ing INR transfers.</div>
<div><br></div><div>There is no way to correctly express INR transfers of s=
ubordinate address blocks, without drastic implications on either security,=
 or on the ability to efficiently announce prefixes.</div><div><br></div>
<div>Current IANA and IRR policies allow for the transfer (e.g. sale) of IN=
Rs between parties which are constituents of different IRRs, or between par=
ties which are constituents of a single IRR.</div><div>These policies allow=
 for the transfer of INRs of flexible size, including subordinate blocks.</=
div>
<div>The policies (rightly so) discourage unnecessary fragmentation of INRs=
.</div><div><br></div><div>So, to make this issue easier to follow, lets ta=
ke a fictional example (using RFC1918 space per standard practice a la <a h=
ref=3D"http://example.com">example.com</a>) and show the problem that resul=
ts.</div>
<div><br></div><div>Let&#39;s say someone had a right-to-use on <a href=3D"=
http://10.0.0.0/8">10.0.0.0/8</a>.</div><div>Now suppose they want to trans=
fer (sell) a /24 out of this space, to an unrelated party.</div><div>(Since=
 binary trees don&#39;t have any particular affinity, the choice of /24 is =
both arbitrary and irrelevant for this example.)</div>
<div>For illustrative purposes, suppose that it is <a href=3D"http://10.20.=
30.0/24">10.20.30.0/24</a>.</div><div><br></div><div>Regardless of how long=
 the transfer takes to process, and how long it takes RP caches to sync up,=
 at some point in the future, the RPKI needs to represent the &quot;new wor=
ld order&quot;.</div>
<div><br></div><div>So, what ways does 3779 support encoding of both the or=
iginal block (minus the /24), and the new block?</div><div>The new block is=
 easy - it is <a href=3D"http://10.20.30.0/24">10.20.30.0/24</a>. The new o=
wner could be in the same IRR, or a different IRR. The new owner would anno=
unce, in BGP (and BGPSEC), <a href=3D"http://10.20.30.0/24">10.20.30.0/24</=
a>.</div>
<div><br></div><div>What about the old block?</div><div>It must be encoded =
in one of 4 ways:</div><div><ol><li><a href=3D"http://10.0.0.0/8">10.0.0.0/=
8</a></li><li>two ranges (10.0.0.0-10.20.29.255 and 10.20.31.0-10.255.255.2=
55)</li>
<li>a bunch of prefixes (16 in total) of lengths 9 through 24</li><ol><li><=
a href=3D"http://10.0.0.0/12">10.0.0.0/12</a></li><li><a href=3D"http://10.=
16.0.0/14">10.16.0.0/14</a></li><ol><li><a href=3D"http://10.20.0.0/20">10.=
20.0.0/20</a></li>
<li><a href=3D"http://10.20.16.0/21">10.20.16.0/21</a></li><li><a href=3D"h=
ttp://10.20.24.0/22">10.20.24.0/22</a></li><li><a href=3D"http://10.20.28.0=
/23">10.20.28.0/23</a></li><li><a href=3D"http://10.20.31.0/24">10.20.31.0/=
24</a></li>
<li><a href=3D"http://10.20.32.0/19">10.20.32.0/19</a></li><li><a href=3D"h=
ttp://10.20.64.0/18">10.20.64.0/18</a></li><li><a href=3D"http://10.20.128.=
0/17">10.20.128.0/17</a></li></ol><li><a href=3D"http://10.21.0.0/16">10.21=
.0.0/16</a></li>
<li><a href=3D"http://10.22.0.0/15">10.22.0.0/15</a></li><li><a href=3D"htt=
p://10.24.0.0/13">10.24.0.0/13</a></li><li><a href=3D"http://10.32.0.0/11">=
10.32.0.0/11</a></li><li><a href=3D"http://10.64.0.0/10">10.64.0.0/10</a></=
li><li>
<a href=3D"http://10.128.0.0/9">10.128.0.0/9</a></li></ol><li>even larger n=
umber of prefixes that form any sort of binary decomposition of the above 1=
6 prefixes</li></ol></div><div>However, the RP/RPKI rules mean that it is n=
ot possible to have the original owner advertise <a href=3D"http://10.0.0.0=
/8">10.0.0.0/8</a>, if methods 2, 3, or 4 are used.</div>
<div><br></div><div>On the other hand, restricting INR transfers to methods=
 2, 3, or 4, result in each INR causing the need for an additional (N-M) pr=
efixes, if the original prefix length is M and the transfered prefix length=
 is N.</div>
<div><br></div><div>And lastly, if method 1 is used, it is impossible to pr=
event the original owner from producing an ROA that would validate, which c=
overs the &quot;transfered&quot; INR.</div><div><br></div><div>This creates=
 a Hobson&#39;s choice: either accept the inability to protect against subs=
equent (accidental or malicious) hijacking of transfered INRs, or accept th=
e need for routing table bloat.</div>
<div><br></div><div>=3D=3D=3D=3D=3D ALTERNATIVES =3D=3D=3D=3D=3D</div><div>=
<br></div><div>There is an alternative - replace 3779, and the rules of inh=
eritance in the RPKI, with something that supports &quot;holes&quot;.</div>=
<div><br></div><div>
What is a hole? The definitive assertion of the non-routeability (or non-ow=
nership) of longer prefixes within a block.</div><div><br></div><div>This w=
ould need to be &quot;glued&quot; onto a parent block, and remain attached =
to any delegation of a block containing the &quot;hole&quot;.</div>
<div><br></div><div>Prefixes shorter than the &quot;hole&quot; would be val=
id (e.g. an ROA with maximum prefix length &lt; prefix length of enclosed h=
ole(s)).</div><div><br></div><div>Prefixes the same size or longer than the=
 &quot;hole&quot; would be invalid. Neither a CA (delegation) nor an ROA wo=
uld be permissible if it covered the range of a &quot;hole&quot; without in=
cluding the explicit hole, or made permissible a routing announcement anywh=
ere inside the &quot;hole&quot;.</div>
<div><br></div><div>Examples of &quot;new world order&quot; allowable ROAs =
of a hypothetical 3779-bis would be:</div><div><a href=3D"http://10.0.0.0/8=
">10.0.0.0/8</a> le 23 =A0=3D&gt; would allow covering prefix <a href=3D"ht=
tp://10.20.30.0/23">10.20.30.0/23</a> (which is shorter than <a href=3D"htt=
p://10.20.30.0/24">10.20.30.0/24</a>) but not allow conflicting prefix <a h=
ref=3D"http://10.20.30.0/24">10.20.30.0/24</a></div>
<div><a href=3D"http://10.128.0.0/9">10.128.0.0/9</a> le 32 =3D&gt; has no =
overlap with the &quot;hole&quot; at <a href=3D"http://10.20.30.0/24">10.20=
.30.0/24</a></div><div><a href=3D"http://10.20.32.0/19">10.20.32.0/19</a> l=
e 32 =3D&gt; has no overlap with the &quot;hole&quot;</div>
<div><a href=3D"http://10.20.31.0/24">10.20.31.0/24</a> le 32 =3D&gt; adjac=
ent to, but no overlap with, the &quot;hole&quot;</div><div><a href=3D"http=
://10.20.29.0/24">10.20.29.0/24</a> le 32 =3D&gt; adjacent to, but no overl=
ap with, the &quot;hole&quot;</div>
<div><a href=3D"http://10.20.0.0/16">10.20.0.0/16</a> le 23 =3D&gt; covers =
&quot;hole&quot;, but only permits prefixes shorter than (covering) the &qu=
ot;hole&quot;</div><div><br></div><div>In this alternate representation sch=
eme, any necessary prefixes by either party could be registered (in RPKI) v=
ia ROAs, and announced, without presenting either a security risk to either=
 party (of hijacking) or placing a burden on the global BGP table (of prefi=
xes dictated by RPKI fragmentation of parent blocks of transfered INRs).</d=
iv>
<div><br></div><div>The old owner could (continue to) announce <a href=3D"h=
ttp://10.0.0.0/8">10.0.0.0/8</a>.</div><div>The new owner could announce <a=
 href=3D"http://10.20.30.0/24">10.20.30.0/24</a>.</div><div>Nobody would ha=
ve to worry about conflicting announcements of <a href=3D"http://10.20.30.0=
/24">10.20.30.0/24</a> (or longer).</div>
<div><br></div><div>The current RPKI scheme cannot represent this, because =
RFC 3779 cannot represent this.</div><div>And as a consequence, it is impos=
sible to encode in origin validation logic, so RPs are not able to enjoy th=
e benefits.</div>
<div><br></div><div>Until such a fix is implemented (in 3779, all the RPKI =
documents that incorporate 3779, and all the RP-related docs), the only rea=
sonable conclusion is that these are fatal flaws (from the perspective of o=
perators).</div>
<div><br></div><div>Brian</div>

--0016e6dd8d6984468d04c9ac7419--

From internet-drafts@ietf.org  Fri Sep 14 10:20:01 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BEB121F8528; Fri, 14 Sep 2012 10:20:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6h2a9rblJSTt; Fri, 14 Sep 2012 10:20:00 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCCDF21F8459; Fri, 14 Sep 2012 10:20:00 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120914172000.28146.16211.idtracker@ietfa.amsl.com>
Date: Fri, 14 Sep 2012 10:20:00 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-bgpsec-threats-03.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Sep 2012 17:20:01 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Secure Inter-Domain Routing Working Group=
 of the IETF.

	Title           : Threat Model for BGP Path Security
	Author(s)       : Stephen Kent
                          Andrew Chi
	Filename        : draft-ietf-sidr-bgpsec-threats-03.txt
	Pages           : 26
	Date            : 2012-09-14

Abstract:
   This document describes a threat model for the context in which BGP
   path security mechanisms will be developed.  It assumes the context
   established by the SIDR WG charter, as of April 19, 2011.  The
   charter established two goals for the SIDR work:

   o  Enabling an AS to verify the authorization of an origin AS to

The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-threats

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-threats-03

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-bgpsec-threats-03


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From achi@bbn.com  Fri Sep 14 10:27:39 2012
Return-Path: <achi@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CA5821F8462 for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 10:27:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ThhYpX49vdtd for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 10:27:38 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id 597D521F845D for <sidr@ietf.org>; Fri, 14 Sep 2012 10:27:38 -0700 (PDT)
Received: from dhcp89-089-139.bbn.com ([128.89.89.139]:64574 helo=[127.0.0.1]) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <achi@bbn.com>) id 1TCZfm-000Lbr-TG; Fri, 14 Sep 2012 13:27:23 -0400
Message-ID: <505368F7.5040107@bbn.com>
Date: Fri, 14 Sep 2012 13:27:19 -0400
From: Andrew Chi <achi@bbn.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: Danny McPherson <danny@tcb.net>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F5604B@Hermes.columbia.ads.sparta.com> <CAH1iCiorpj6N55B9RQCvWcTgEbUZ+Vgcr4Hhc-+h8A93U8HbHA@mail.gmail.com> <F849E612-7B72-47B2-B578-CC43EEE67510@tcb.net> <503C904F.2040609@bbn.com> <B3170626-4E18-44B2-9885-0EA71D50F52D@tcb.net>
In-Reply-To: <B3170626-4E18-44B2-9885-0EA71D50F52D@tcb.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Cc: sidr wg <sidr@ietf.org>
Subject: Re: [sidr] Some comments on draft-ietf-sidr-bgpsec-threats-02
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Sep 2012 17:27:39 -0000

On 8/28/2012 11:19 AM, Danny McPherson wrote:
> Thanks for the thoughtful reply Steve, I'll get back to you in short order on these responses - but if an updated I-D appears in the interim I'll try to apply comments only to the revision.

Thanks for your comments, Danny.  The bgpsec-threats-03 I just uploaded 
includes a substantial number of edits based on this discussion (mostly 
by Steve, with a couple mine).


From achi@bbn.com  Fri Sep 14 10:40:32 2012
Return-Path: <achi@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21AB521F851C for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 10:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j2fPFJQ-JPD0 for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 10:40:31 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id A340821F84F8 for <sidr@ietf.org>; Fri, 14 Sep 2012 10:40:31 -0700 (PDT)
Received: from dhcp89-089-139.bbn.com ([128.89.89.139]:64587 helo=[127.0.0.1]) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <achi@bbn.com>) id 1TCZsU-000Los-4L; Fri, 14 Sep 2012 13:40:30 -0400
Message-ID: <50536C0B.9000704@bbn.com>
Date: Fri, 14 Sep 2012 13:40:27 -0400
From: Andrew Chi <achi@bbn.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: Andrew Chi <achi@bbn.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F5604B@Hermes.columbia.ads.sparta.com> <CAH1iCiorpj6N55B9RQCvWcTgEbUZ+Vgcr4Hhc-+h8A93U8HbHA@mail.gmail.com> <F849E612-7B72-47B2-B578-CC43EEE67510@tcb.net> <503C904F.2040609@bbn.com> <B3170626-4E18-44B2-9885-0EA71D50F52D@tcb.net> <505368F7.5040107@bbn.com>
In-Reply-To: <505368F7.5040107@bbn.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Cc: sidr wg <sidr@ietf.org>
Subject: Re: [sidr] Some comments on draft-ietf-sidr-bgpsec-threats-02
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Sep 2012 17:40:32 -0000

On 9/14/2012 1:27 PM, Andrew Chi wrote:
> Thanks for your comments, Danny.  The bgpsec-threats-03 I just uploaded
> includes a substantial number of edits based on this discussion (mostly
> by Steve, with a couple mine).

My bad, there might be some version skew as not all edits made it into 
-03; expect more text in the next rev.


From ietf-secretariat@ietf.org  Fri Sep 14 11:17:14 2012
Return-Path: <ietf-secretariat@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57D6D21F8549; Fri, 14 Sep 2012 11:17:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.475
X-Spam-Level: 
X-Spam-Status: No, score=-102.475 tagged_above=-999 required=5 tests=[AWL=-0.476, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kgpL5Prv7WQl; Fri, 14 Sep 2012 11:17:13 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C67921F853E; Fri, 14 Sep 2012 11:17:13 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: IETF Announcement List <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120914181713.8337.93189.idtracker@ietfa.amsl.com>
Date: Fri, 14 Sep 2012 11:17:13 -0700
Cc: iaoc@ietf.org, opsec@ietf.org, sidr@ietf.org, v6ops@ietf.org, wgchairs@ietf.org
Subject: [sidr] IETF Large Interim Meeting - OPSEC, SIDR and V6OPS
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Sep 2012 18:17:14 -0000

OPSEC, SIDR and V6OPS Interim Meeting
Amsterdam, The Netherlands
29 September 2012
Venue: Hotel Okura Amsterdam (www.okura.nl)
        Ferdinand Bolstraat 333
        1072 LH Amsterdam
        The Netherlands

1.  Registration
2.  Accommodations
3.  Meeting Schedule

1. Registration
    A.  Fee: $100 USD
    B.  Register online at: http://www.ietf.org/registration/lim2012/ietfre=
g.py
    C.  Online Registration and Payment closes on 28 September 2012
    D.  On Site Registration starting Saturday, 29 September at 8:00 AM

2.  Accommodations
The IETF is holding a block of rooms at the Hotel Okura. The Hotel is not c=
urrently ready to accept reservations but we hope to be able to provide boo=
king details early next week (the week of 17 September).

3.  Meeting Schedule
     0900-1700 CEST     SIDR
     0900-1130 CEST     OPSEC
     1330-1630 CEST     V6OPS

From brian.peter.dickson@gmail.com  Fri Sep 14 11:32:00 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE8F721F8554 for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 11:32:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.798
X-Spam-Level: 
X-Spam-Status: No, score=-3.798 tagged_above=-999 required=5 tests=[AWL=-0.200, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GZhLQ3Bgmdwh for <sidr@ietfa.amsl.com>; Fri, 14 Sep 2012 11:31:59 -0700 (PDT)
Received: from mail-we0-f172.google.com (mail-we0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id 0C81221F8545 for <sidr@ietf.org>; Fri, 14 Sep 2012 11:31:58 -0700 (PDT)
Received: by weyu54 with SMTP id u54so2789588wey.31 for <sidr@ietf.org>; Fri, 14 Sep 2012 11:31:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=YdwnLm/1HSGiNZTepldPAzAIGdFCouQGwhMV3k57IZ4=; b=Q/PztFMlC6mxv2+200j82SpC9+f7d5oFSXBgN03F96uR8HIOyWFdXZaJzaHEnIKgdk 8BpLdvsQ2IxPeCJz8A5hOEQL3RsELn/Tn4OFQkaesRNyGsXvtKeOqpLERtm9GTLUcQlD pwOc4wJltC6ph0m0qf43Bop0HLOHyw0feCfkI7951M4O2Z4RUDyaRGv+/LyZxTGZw5Ho V5oz6WJ0x+i2lqB3EMn4gGyvakR34J3D2vqbBNutb4zxKTteo1KHAGONDRio9hR1f7bM wMvUk5h90/0cMw7Hork17hV5j/v+E/J7nVORAI6MUBbufVTQmxLrVWARPNNpipPYlwue Fdmg==
MIME-Version: 1.0
Received: by 10.216.132.25 with SMTP id n25mr1843457wei.25.1347647509606; Fri, 14 Sep 2012 11:31:49 -0700 (PDT)
Received: by 10.223.61.12 with HTTP; Fri, 14 Sep 2012 11:31:44 -0700 (PDT)
In-Reply-To: <50524582.1050704@bbn.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com> <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com> <5050C546.9070304@bbn.com> <33A96E17-0CBF-4E17-A0D8-55FE3369142F@apnic.net> <CAH1iCirJqrpE_B=Z7B_-ksM7nPN0VC0vhT31wRexfs4a_gBAuQ@mail.gmail.com> <50524582.1050704@bbn.com>
Date: Fri, 14 Sep 2012 14:31:44 -0400
Message-ID: <CAH1iCirs=mt4AaWYB2GSVAGb+3XHZFWhLA_hviJk5objg-nARw@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary=0016e6dd8d6917b27e04c9ada3ea
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Sep 2012 18:32:01 -0000

--0016e6dd8d6917b27e04c9ada3ea
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

On Thu, Sep 13, 2012 at 4:43 PM, Stephen Kent <kent@bbn.com> wrote:

>  Brian,****
>
>
>  If  we allow a reasonable time for RPs to have fetched the not-yet-valid
> objects, then when they "turn the crank" to process local caches after th=
e
> objects have become valid, the RPs would accept them. But, I've never hea=
r
> anyone suggest that one ought to try to impose a global, coordinated, RPK=
I
> object processing time on all RPs. (That, in itself would be a security
> concern.) So there may be limits here as to how much the overlap can be
> reduced by this strategy.
>

I'm not suggesting polling-based, synchronous processing of anything.
Clearly, that would be foolish.

While the implementation is up to the implementer(s), I'd expect
event-driven scheduling of processing of changes of state. E.g. set up
queues ordered by start or end date/time.

Recall, this validation is on the RPKI cache validation side. It is outside
of the scope of RPKI-RTR protocol, with the expectation that state changes
on the validation would get pushed to routers.

Pre-publishing means that local validation would merely need to occur in
the overlap window. As long as the new and old objects have been pushed to
the router with any amount of overlap, there is no risk of validation
failure on received updates.


> ****
>
> Also, are there any other examples you can cite where every network
> operator is expected to perform some activity, at the same time (relative
> to UTC), every day, around the world?
>

NETWORK operator? No. But there are plenty of other activities driven by
certificate expirations, either passively or actively, which require
overlapping (pre-published) objects in order to avoid validation failure.
DNSSEC, TLS/SSL, pretty much any certificate-based protocol or security
mechanism.


>  What is the accepted norm for clock sync among all ISPs today, and what
> processes rely on the extant precision and accuracy of synchronized clock=
s
> at all ISPs?
>

NTP, stratum 3 or better.

BGP neighbors normally expect each others' clocks to be NTP synchronized,
for reasons of trouble-shooting instances of accidental or malicious
issues. Logs are useless if their time is not accurate to the millisecond.
(Some peering contracts actually require this.)

Transit relationships typically require accurate measurement of traffic,
both volumetrically  and with accurate time. Failure to implement
measurement and billing using accurate (NTP) time, is a huge liability.
Customers expect to be able to correlate their own measurements with their
providers - again, without NTP, this is likely to incur L8/L9 problems.

Additionally, virtually every network link requires accurate line-clock,
either supplied by the network, or by the end devices. Nearly all network
links and/or routers have line-clocking derived (directly or indirectly)
from Stratum-1 sources. This can be achieved in a number of ways, either
special NTP feeds, or BITS, or TTL, or via transmission gear with
integrated cesium clocks and/or GPS receivers.

Failure to have synchronized line-clocking is probably the #1 source of
network problems during implementation of peering links. Drifting clocks
will cause errors and/or outages, guaranteed.


> Not being an operator, I really don't know the answers to these questions=
.
>

Maybe these are questions you should have asked and gotten the answers to,
prior to designing the RPKI? (Sorry, cheap shot.)


> ****
>
> Anyway, if we were to adopt your suggestion, the benefit might be that th=
e
> overlap interval need be determined primarily by the time needed to
> accommodate skew in RPs posting, fetching, and processing RPKI objects.
>

Overlap times are only required when there is "live transfer" of INRs,
correct? So, mostly (>>99.99999% of the INRs will never have this issue, as
99.999% won't transfer, and of the transfers, 99.99% won't be "live") moot.

So, even supposing that such incidents occur, there are two limits to
consider:
(1) The minimum (actual) overlap interval between the old and new
(2) The proscribed maximum overlap interval beyond which one or the other
should be rejected

So, the discussion would really need to focus on lower bounds and upper
bounds for (2).
Lower bounds impact mandatory actions by cache operators, or alternatively,
risk to operators/RPs of RPKI-induced outages
Upper bounds impact the security of the system, and/or window of
opportunity for hijacking.


> Rather the overlap interval would be a function of what  folks consider t=
o
> be a comfortable interval to accommodate human processes (and errors) for
> the INR transfers.****
>
> ** **
>
> I don=92t know that this time scale as being one that requires carefully
> coordinated clocks at all RPs, especially since we don't have a candidate
> overlap interval value on the table. Moreover, since there is an overlap
> interval in either case, it=92s not immediately clear how hard we should =
work
> to reduce it. What overlap interval did you envision?
>

To paraphrase Vin Diesel (in pretty much any movie he's been in):
"Not my problem."

What I envision is, the authors of SIDR I-Ds/RFCs proposing intervals, and
then discussing/justifying them.

Brian

--0016e6dd8d6917b27e04c9ada3ea
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Thu, Sep 13, 2012 at 4:43 PM, Stephen=
 Kent <span dir=3D"ltr">&lt;<a href=3D"mailto:kent@bbn.com" target=3D"_blan=
k">kent@bbn.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">

 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
   =20
    <p class=3D"MsoNormal"><span>Brian,<u></u><u></u></span></p>
    <p class=3D"MsoNormal"><br></p><p class=3D"MsoNormal">=A0<span>If<span>=
=A0
        </span>we allow a reasonable time for RPs to have fetched the
        not-yet-valid
        objects, then when they &quot;turn the crank&quot; to process local=
 caches
        after the objects have become valid, the RPs would accept them.
        But, I&#39;ve never hear
        anyone suggest that one ought to try to impose a global,
        coordinated, RPKI object processing time on all RPs. (That, in
        itself would be
        a security concern.) So there may be limits here as to how much
        the overlap can be reduced by this strategy.</span></p></div></bloc=
kquote><div><br></div><div>I&#39;m not suggesting polling-based, synchronou=
s processing of anything. Clearly, that would be foolish.</div><div><br>
</div><div>While the implementation is up to the implementer(s), I&#39;d ex=
pect event-driven scheduling of processing of changes of state. E.g. set up=
 queues ordered by start or end date/time.</div><div><br></div><div>Recall,=
 this validation is on the RPKI cache validation side. It is outside of the=
 scope of RPKI-RTR protocol, with the expectation that state changes on the=
 validation would get pushed to routers.</div>
<div><br></div><div>Pre-publishing means that local validation would merely=
 need to occur in the overlap window. As long as the new and old objects ha=
ve been pushed to the router with any amount of overlap, there is no risk o=
f validation failure on received updates.</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=
=3D"#000000"><p class=3D"MsoNormal"><span><u></u><u></u></span></p>
   =20
    <p class=3D"MsoNormal"><span>Also, are
        there any other examples you
        can cite where every network operator is expected to perform
        some activity,
        at the same time (relative to UTC), every day, around the world?
</span></p></div></blockquote><div><br></div><div>NETWORK operator? No. But=
 there are plenty of other activities driven by certificate expirations, ei=
ther passively or actively, which require overlapping (pre-published) objec=
ts in order to avoid validation failure. DNSSEC, TLS/SSL, pretty much any c=
ertificate-based protocol or security mechanism.</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=
=3D"#000000"><p class=3D"MsoNormal"><span>        <span>=A0</span>What is t=
he accepted norm
        for clock sync among
        all ISPs today, and what processes rely on the extant precision
        and accuracy of synchronized clocks at all ISPs?</span></p></div></=
blockquote><div><br></div><div>NTP, stratum 3 or better.</div><div><br></di=
v><div>BGP neighbors normally expect each others&#39; clocks to be NTP sync=
hronized, for reasons of trouble-shooting instances of accidental or malici=
ous issues. Logs are useless if their time is not accurate to the milliseco=
nd.</div>
<div>(Some peering contracts actually require this.)</div><div><br></div><d=
iv>Transit relationships typically require accurate measurement of traffic,=
 both volumetrically =A0and with accurate time. Failure to implement measur=
ement and billing using accurate (NTP) time, is a huge liability.</div>
<div>Customers expect to be able to correlate their own measurements with t=
heir providers - again, without NTP, this is likely to incur L8/L9 problems=
.</div><div><br></div><div>Additionally, virtually every network link requi=
res accurate line-clock, either supplied by the network, or by the end devi=
ces. Nearly all network links and/or routers have line-clocking derived (di=
rectly or indirectly) from Stratum-1 sources. This can be achieved in a num=
ber of ways, either special NTP feeds, or BITS, or TTL, or via transmission=
 gear with integrated cesium clocks and/or GPS receivers.</div>
<div><br></div><div>Failure to have synchronized line-clocking is probably =
the #1 source of network problems during implementation of peering links. D=
rifting clocks will cause errors and/or outages, guaranteed.</div><div>
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#0=
00000"><p class=3D"MsoNormal"><span>Not being an
        operator, I really don&#39;t know the answers to these questions.<b=
r></span></p></div></blockquote><div><br></div><div>Maybe these are questio=
ns you should have asked and gotten the answers to, prior to designing the =
RPKI? (Sorry, cheap shot.)</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=
=3D"#000000"><p class=3D"MsoNormal"><span>
        <u></u><u></u></span></p>
    <p class=3D"MsoNormal"><span>Anyway, if we
        were to adopt your suggestion, the benefit might be that the
        overlap interval need be determined primarily by the time needed
        to
        accommodate skew in RPs posting, fetching, and processing RPKI
        objects. </span></p></div></blockquote><div><br></div><div>Overlap =
times are only required when there is &quot;live transfer&quot; of INRs, co=
rrect? So, mostly (&gt;&gt;99.99999% of the INRs will never have this issue=
, as 99.999% won&#39;t transfer, and of the transfers, 99.99% won&#39;t be =
&quot;live&quot;) moot.</div>
<div><br></div><div>So, even supposing that such incidents occur, there are=
 two limits to consider:</div><div>(1) The minimum (actual) overlap interva=
l between the old and new</div><div>(2) The proscribed maximum overlap inte=
rval beyond which one or the other should be rejected</div>
<div><br></div><div>So, the discussion would really need to focus on lower =
bounds and upper bounds for (2).</div><div>Lower bounds impact mandatory ac=
tions by cache operators, or alternatively, risk to operators/RPs of RPKI-i=
nduced outages</div>
<div>Upper bounds impact the security of the system, and/or window of oppor=
tunity for hijacking.</div><div>=A0</div><blockquote class=3D"gmail_quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><di=
v bgcolor=3D"#FFFFFF" text=3D"#000000">
<p class=3D"MsoNormal"><span>Rather the overlap interval would be a functio=
n of
        what=A0 folks consider to be a comfortable </span><span><span>inter=
val</span>
        to accommodate human
        processes (and errors) for the INR transfers.<u></u><u></u></span><=
/p>
    <p class=3D"MsoNormal"><span><u></u>=A0<u></u></span></p>
    <p class=3D"MsoNormal"><span>I don=92t know
        that this time scale as being
        one that requires carefully coordinated clocks at all RPs,
        especially since we don&#39;t have a candidate overlap interval
        value on the table. Moreover, since
        there is an overlap interval in either case, it=92s not
        immediately clear how hard we should work to reduce it. What
        overlap interval did you
        envision?</span></p></div></blockquote><div><br></div><div>To parap=
hrase Vin Diesel (in pretty much any movie he&#39;s been in):=A0</div><div>=
&quot;Not my problem.&quot;</div><div><br></div><div>What I envision is, th=
e authors of SIDR I-Ds/RFCs proposing intervals, and then discussing/justif=
ying them.</div>
<div><br></div><div>Brian=A0</div></div>

--0016e6dd8d6917b27e04c9ada3ea--

From Sandra.Murphy@sparta.com  Sat Sep 15 04:44:04 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE07821F84F8 for <sidr@ietfa.amsl.com>; Sat, 15 Sep 2012 04:44:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.42
X-Spam-Level: 
X-Spam-Status: No, score=-102.42 tagged_above=-999 required=5 tests=[AWL=0.179, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mIB5DMj7YKQN for <sidr@ietfa.amsl.com>; Sat, 15 Sep 2012 04:44:04 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 6A5E621F8468 for <sidr@ietf.org>; Sat, 15 Sep 2012 04:44:03 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8FBi1Db008570 for <sidr@ietf.org>; Sat, 15 Sep 2012 06:44:02 -0500
Received: from kraven.huntsville.ads.sparta.com (kraven.huntsville.sparta.com [157.185.63.137]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8FBi1X1015887 for <sidr@ietf.org>; Sat, 15 Sep 2012 06:44:01 -0500
Received: from CMA-MB003.columbia.ads.sparta.com ([fe80::94ee:521e:9fc9:ebc3]) by kraven.huntsville.ads.sparta.com ([2002:9db9:3f89::9db9:3f89]) with mapi id 14.01.0379.000; Sat, 15 Sep 2012 06:45:14 -0500
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: WGLC for draft-ietf-sidr-bgpsec-protocol-05
Thread-Index: Ac2TN5E+gtWY3jVQTo2aIJ20K9PIbg==
Date: Sat, 15 Sep 2012 11:45:13 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.61.23]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Sep 2012 11:44:05 -0000

This starts a working group last call for draft-ietf-sidr-bgpsec-protocol-0=
5.  The draft is available at http://tools.ietf.org/html/draft-ietf-sidr-bg=
psec-protocol-05 and https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpse=
c-protocol/

Please review this draft to see if you think it is ready for publication.  =
Send end comments to the list. =20

The WGLC will end on 29 September 2012.

--Sandy, speaking as wg co-chair=

From internet-drafts@ietf.org  Mon Sep 17 07:04:31 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1B8621F8697; Mon, 17 Sep 2012 07:04:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.539
X-Spam-Level: 
X-Spam-Status: No, score=-102.539 tagged_above=-999 required=5 tests=[AWL=0.060, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3E9MxdiWZVQd; Mon, 17 Sep 2012 07:04:30 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E4A821F8686; Mon, 17 Sep 2012 07:04:30 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120917140430.12970.80904.idtracker@ietfa.amsl.com>
Date: Mon, 17 Sep 2012 07:04:30 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-rpki-rtr-protocol-mib-01.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Sep 2012 14:04:31 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Secure Inter-Domain Routing Working Group=
 of the IETF.

	Title           : Definitions of Managed Objects for the RPKI-Router Proto=
col
	Author(s)       : Randy Bush
                          Bert Wijnen
                          Keyur Patel
                          Michael Baer
	Filename        : draft-ietf-sidr-rpki-rtr-protocol-mib-01.txt
	Pages           : 21
	Date            : 2012-09-17

Abstract:
   This document defines a portion of the Management Information Base
   (MIB) for use with network management protocols in the Internet
   community.  In particular, it describes objects used for monitoring
   the RPKI Router protocol.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-rpki-rtr-protocol-mib

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-rpki-rtr-protocol-mib-01

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-rpki-rtr-protocol-mib-01


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From iesg-secretary@ietf.org  Mon Sep 17 09:45:58 2012
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5F1821F86FC; Mon, 17 Sep 2012 09:45:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.514
X-Spam-Level: 
X-Spam-Status: No, score=-102.514 tagged_above=-999 required=5 tests=[AWL=0.085, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LQzEciRQAZJL; Mon, 17 Sep 2012 09:45:58 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DC4E21F8522; Mon, 17 Sep 2012 09:45:58 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120917164558.2730.23040.idtracker@ietfa.amsl.com>
Date: Mon, 17 Sep 2012 09:45:58 -0700
Cc: sidr@ietf.org
Subject: [sidr] Last Call: <draft-ietf-sidr-pfx-validate-09.txt> (BGP Prefix Origin	Validation) to Proposed Standard
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: ietf@ietf.org
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Sep 2012 16:45:59 -0000

The IESG has received a request from the Secure Inter-Domain Routing WG
(sidr) to consider the following document:
- 'BGP Prefix Origin Validation'
  <draft-ietf-sidr-pfx-validate-09.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-10-01. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   To help reduce well-known threats against BGP including prefix mis-
   announcing and monkey-in-the-middle attacks, one of the security
   requirements is the ability to validate the origination AS of BGP
   routes.  More specifically, one needs to validate that the AS number
   claiming to originate an address prefix (as derived from the AS_PATH
   attribute of the BGP route) is in fact authorized by the prefix
   holder to do so.  This document describes a simple validation
   mechanism to partially satisfy this requirement.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-sidr-pfx-validate/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-sidr-pfx-validate/ballot/


The following IPR Declarations may be related to this I-D:

   http://datatracker.ietf.org/ipr/1569/




From ietf-secretariat@ietf.org  Mon Sep 17 12:56:20 2012
Return-Path: <ietf-secretariat@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B54F821E8044; Mon, 17 Sep 2012 12:56:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.35
X-Spam-Level: 
X-Spam-Status: No, score=-102.35 tagged_above=-999 required=5 tests=[AWL=-0.351, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i4UhwGWYibXz; Mon, 17 Sep 2012 12:56:20 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3640221E8037; Mon, 17 Sep 2012 12:56:20 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: IETF Announcement List <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120917195620.22823.34712.idtracker@ietfa.amsl.com>
Date: Mon, 17 Sep 2012 12:56:20 -0700
Cc: iaoc@ietf.org, opsec@ietf.org, sidr@ietf.org, v6ops@ietf.org, wgchairs@ietf.org
Subject: [sidr] IETF Large Interim Meeting - Accommodations Information
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Sep 2012 19:56:20 -0000

OPSEC, SIDR and V6OPS Interim Meeting
Amsterdam, The Netherlands
29 September 2012
Venue: Hotel Okura Amsterdam (www.okura.nl)
       Ferdinand Bolstraat 333
       1072 LH Amsterdam
       The Netherlands

1.  Registration
2.  Accommodations - Information now available!
3.  Meeting Schedule

1. Registration
    A.  Fee: $100 USD
    B.  Register online at: http://www.ietf.org/registration/lim2012/ietfre=
g.py
    C.  Online Registration and Payment closes on 28 September 2012
    D.  On Site Registration starting Saturday, 29 September at 8:00 AM

2. Accommodations
    A block of rooms is being held at the Hotel Okura Amsterdam (meeting ve=
nue) for the nights of September 28 and 29.
    Rate: 195 EUR [256 USD; 20,065 JPY]
      Rate includes breakfast and guest room wireless internet.
    To make your reservation on line, please go to: www.okura.nl
      Group Code: IETF2012

    Reservations cut-off date: 21 September 2012

    Guest Cancellation:
    - Reservations may=C2=A0be changed up to 1 week prior to the event with=
out penalty.
    - 50% of reservation value penalty for cancellation less than 14 days a=
nd greater than 7 days prior to event.
    - 80% of reservation value penalty for cancellation less than 7 days an=
d greater than 3 days prior to event.
    - 100% of reservation value penalty for cancellation less than 3 days p=
rior to event or non-arrival or no-show.
    - In case of early departure, the full value of the reservation will be=
 charged to the guest.

If you have any problems making your reservation, please send a message to =
agenda@ietf.org

3. Meeting Schedule
    0900-1700 CEST     SIDR
    0900-1130 CEST     OPSEC
    1330-1630 CEST     V6OPS

From achi@bbn.com  Mon Sep 17 14:37:57 2012
Return-Path: <achi@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CC3421E804A for <sidr@ietfa.amsl.com>; Mon, 17 Sep 2012 14:37:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.67
X-Spam-Level: 
X-Spam-Status: No, score=-5.67 tagged_above=-999 required=5 tests=[AWL=-0.929,  BAYES_20=-0.74, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eQCT5-+5LJZ6 for <sidr@ietfa.amsl.com>; Mon, 17 Sep 2012 14:37:56 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id B5ABD21E803D for <sidr@ietf.org>; Mon, 17 Sep 2012 14:37:56 -0700 (PDT)
Received: from dhcp89-089-139.bbn.com ([128.89.89.139]:57272 helo=[127.0.0.1]) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <achi@bbn.com>) id 1TDj0i-0002tp-Az; Mon, 17 Sep 2012 17:37:44 -0400
Message-ID: <50579828.6070206@bbn.com>
Date: Mon, 17 Sep 2012 17:37:44 -0400
From: Andrew Chi <achi@bbn.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: Andrew Chi <achi@bbn.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F5604B@Hermes.columbia.ads.sparta.com> <CAH1iCiorpj6N55B9RQCvWcTgEbUZ+Vgcr4Hhc-+h8A93U8HbHA@mail.gmail.com> <F849E612-7B72-47B2-B578-CC43EEE67510@tcb.net> <503C904F.2040609@bbn.com> <B3170626-4E18-44B2-9885-0EA71D50F52D@tcb.net> <505368F7.5040107@bbn.com> <50536C0B.9000704@bbn.com>
In-Reply-To: <50536C0B.9000704@bbn.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Cc: sidr wg <sidr@ietf.org>
Subject: Re: [sidr] Some comments on draft-ietf-sidr-bgpsec-threats-02
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Sep 2012 21:37:57 -0000

On 9/14/2012 1:40 PM, Andrew Chi wrote:
> On 9/14/2012 1:27 PM, Andrew Chi wrote:
>> Thanks for your comments, Danny.  The bgpsec-threats-03 I just uploaded
>> includes a substantial number of edits based on this discussion (mostly
>> by Steve, with a couple mine).
>
> My bad, there might be some version skew as not all edits made it into
> -03; expect more text in the next rev.
>

Never mind, it looks like I got my wires crossed twice.  Danny and 
others, the -03 is ready for your review and any further comments.

-Andrew


From ietf-secretariat@ietf.org  Tue Sep 18 12:01:58 2012
Return-Path: <ietf-secretariat@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F9D821E8103; Tue, 18 Sep 2012 12:01:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.315
X-Spam-Level: 
X-Spam-Status: No, score=-102.315 tagged_above=-999 required=5 tests=[AWL=-0.316, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bE2gWA4GHP33; Tue, 18 Sep 2012 12:01:57 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5FA221E80C1; Tue, 18 Sep 2012 12:01:57 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: IETF Announcement List <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120918190157.21518.15763.idtracker@ietfa.amsl.com>
Date: Tue, 18 Sep 2012 12:01:57 -0700
Cc: iaoc@ietf.org, opsec@ietf.org, sidr@ietf.org, v6ops@ietf.org, wgchairs@ietf.org
Subject: [sidr] IETF Large Interim Meeting - OPSEC, SIDR and V6OPS
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Sep 2012 19:01:58 -0000

OPSEC, SIDR and V6OPS Interim Meeting
Amsterdam, The Netherlands
29 September 2012
Venue: Hotel Okura Amsterdam (www.okura.nl)
      Ferdinand Bolstraat 333
      1072 LH Amsterdam
      The Netherlands

1.  Registration
2.  Accommodations - Reservations Cutoff: 21 September
3.  Meeting Schedule

1. Registration
   A.  Fee: $100 USD
   B.  Register online at: http://www.ietf.org/registration/lim2012/ietfreg=
.py
   C.  Online Registration and Payment closes on 28 September 2012
   D.  On Site Registration starting Saturday, 29 September at 8:00 AM

2. Accommodations
   A block of rooms is being held at the Hotel Okura Amsterdam (meeting ven=
ue) for the nights of September 28 and 29.
   Rate: 195 EUR [256 USD; 20,065 JPY]
     Rate includes breakfast and guest room wireless internet but excludes =
5% city tax.
   To make your reservation on line, please go to: www.okura.nl
     Group Code: IETF2012

   Reservations cut-off date: 21 September 2012

   Guest Cancellation:
   - Reservations may be changed up to 1 week prior to the event without pe=
nalty. (You can change, not cancel, the reservation, i.e. change
arrival, departure dates or name, up to 1 week without penalty but not
cancel the reservation without penalty.)
   - 50% of reservation value penalty for cancellation less than 14 days an=
d greater than 7 days prior to event. If you cancel, not change, the reserv=
ation less than 14 days but more than 7 days prior to the event you will be=
 charged 50% of the total reservation fee.
   - 80% of reservation value penalty for cancellation less than 7 days and=
 greater than 3 days prior to event. If you cancel, not change, the reserva=
tion less than 7 days prior to the event you will be charged 80% of the tot=
al reservation fee.
   - 100% of reservation value penalty for cancellation less than 3 days pr=
ior to event or non-arrival or no-show.
   - In case of early departure, the full value of the reservation will be =
charged to the guest.

If you have any problems making your reservation, please send a message to =
agenda@ietf.org

3. Meeting Schedule
   0900-1700 CEST     SIDR
   0900-1130 CEST     OPSEC
   1330-1630 CEST     V6OPS

From wesley.george@twcable.com  Tue Sep 18 13:21:58 2012
Return-Path: <wesley.george@twcable.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BE6921E8042 for <sidr@ietfa.amsl.com>; Tue, 18 Sep 2012 13:21:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.462
X-Spam-Level: 
X-Spam-Status: No, score=-0.462 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ttMF4suy40Vp for <sidr@ietfa.amsl.com>; Tue, 18 Sep 2012 13:21:57 -0700 (PDT)
Received: from cdpipgw02.twcable.com (cdpipgw02.twcable.com [165.237.59.23]) by ietfa.amsl.com (Postfix) with ESMTP id 6951F21E8040 for <sidr@ietf.org>; Tue, 18 Sep 2012 13:21:57 -0700 (PDT)
X-SENDER-IP: 10.136.163.13
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.80,445,1344225600"; d="scan'208";a="422334172"
Received: from unknown (HELO PRVPEXHUB04.corp.twcable.com) ([10.136.163.13]) by cdpipgw02.twcable.com with ESMTP/TLS/RC4-MD5; 18 Sep 2012 16:21:18 -0400
Received: from PRVPEXVS15.corp.twcable.com ([10.136.163.78]) by PRVPEXHUB04.corp.twcable.com ([10.136.163.13]) with mapi; Tue, 18 Sep 2012 16:21:55 -0400
From: "George, Wes" <wesley.george@twcable.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>, "sidr@ietf.org" <sidr@ietf.org>
Date: Tue, 18 Sep 2012 16:21:55 -0400
Thread-Topic: WGLC for draft-ietf-sidr-bgpsec-protocol-05
Thread-Index: Ac2TN5E+gtWY3jVQTo2aIJ20K9PIbgCmdL0w
Message-ID: <2671C6CDFBB59E47B64C10B3E0BD59235EFAAF6F@PRVPEXVS15.corp.twcable.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Sep 2012 20:21:58 -0000

Nits:
Multiple sections have "musts" and "shoulds" that are not 2119-formatted (l=
ower-case) - please ensure that this is intentional

Substantial:

Any reason why we're using "good" and "not good"  for validation state inst=
ead of valid/invalid (and unknown)? I'd think that consistency between this=
 and the language in the origin validation stuff would be helpful unless we=
 have a specific reason not to use the same language. And I realize that th=
ere isn't really an "unknown" status as the result of trying to validate a =
BGPSec update, but as far as the implementation is concerned, standard BGP =
updates (those without BGPSec) are considered unknown, and it might be good=
 to explicitly state that as a part of the validation algorithm.

I'm awaiting co-author review of the I-D version of the email I wrote about=
 AS-Migration, and am hoping to have it posted next week sometime. I think =
that we need to discuss the considerations from that issue to ensure that n=
o changes need to be made in the protocol spec document/design before we pr=
ogress this. There's been some discussion of using pcount=3D0 to manage som=
e parts of this, but that would have to be covered in the update validation=
 and origination algorithm if we choose to solve the problem that way. Also=
 I'm not completely certain that pcount will solve the use case completely.=
 I'm not opposed to using the draft as a follow-on to the protocol draft (u=
pdate it) to handle this specific case, but I'd like to have WG consensus t=
hat this is the route we should take rather than incorporating any solution=
 for this use case into the current document since it is still in draft.

Thanks,

Wes George


> -----Original Message-----
> From: sidr-bounces@ietf.org [mailto:sidr-bounces@ietf.org] On Behalf Of
> Murphy, Sandra
> Sent: Saturday, September 15, 2012 7:45 AM
> To: sidr@ietf.org
> Subject: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
>
> This starts a working group last call for draft-ietf-sidr-bgpsec-
> protocol-05.  The draft is available at
> http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05 and
> https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/
>
> Please review this draft to see if you think it is ready for
> publication.  Send end comments to the list.
>
> The WGLC will end on 29 September 2012.
>
> --Sandy, speaking as wg co-chair
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr

This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.

From Sandra.Murphy@sparta.com  Tue Sep 18 14:02:24 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E58421E8044 for <sidr@ietfa.amsl.com>; Tue, 18 Sep 2012 14:02:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.423
X-Spam-Level: 
X-Spam-Status: No, score=-102.423 tagged_above=-999 required=5 tests=[AWL=0.176, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ycfd-vFhIsGA for <sidr@ietfa.amsl.com>; Tue, 18 Sep 2012 14:02:24 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id E7EC821E8041 for <sidr@ietf.org>; Tue, 18 Sep 2012 14:02:23 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8IL2Mg3030746; Tue, 18 Sep 2012 16:02:22 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8IL2MVV018177; Tue, 18 Sep 2012 16:02:22 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Tue, 18 Sep 2012 17:03:31 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "George, Wes" <wesley.george@twcable.com>, "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: WGLC for draft-ietf-sidr-bgpsec-protocol-05
Thread-Index: Ac2TN5E+gtWY3jVQTo2aIJ20K9PIbgCmdL0wAAPG+j4=
Date: Tue, 18 Sep 2012 21:03:30 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F78EE0@Hermes.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>, <2671C6CDFBB59E47B64C10B3E0BD59235EFAAF6F@PRVPEXVS15.corp.twcable.com>
In-Reply-To: <2671C6CDFBB59E47B64C10B3E0BD59235EFAAF6F@PRVPEXVS15.corp.twcable.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.118]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Sep 2012 21:02:24 -0000

>There's been some discussion of using pcount=3D0 to manage =0A=
>some parts of this, but that would have to be covered in the =0A=
>update validation and origination algorithm if we choose to =0A=
>solve the problem that way.=0A=
=0A=
The use of pcount=3D0 was hoped/expected to require NO changes in the updat=
e validation algorithm.  If you have discovered places where it would requi=
re changes, it will indeed be interesting to see and discuss.=0A=
=0A=
--Sandy=0A=
________________________________________=0A=
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of George, We=
s [wesley.george@twcable.com]=0A=
Sent: Tuesday, September 18, 2012 4:21 PM=0A=
To: Murphy, Sandra; sidr@ietf.org=0A=
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05=0A=
=0A=
Nits:=0A=
Multiple sections have "musts" and "shoulds" that are not 2119-formatted (l=
ower-case) - please ensure that this is intentional=0A=
=0A=
Substantial:=0A=
=0A=
Any reason why we're using "good" and "not good"  for validation state inst=
ead of valid/invalid (and unknown)? I'd think that consistency between this=
 and the language in the origin validation stuff would be helpful unless we=
 have a specific reason not to use the same language. And I realize that th=
ere isn't really an "unknown" status as the result of trying to validate a =
BGPSec update, but as far as the implementation is concerned, standard BGP =
updates (those without BGPSec) are considered unknown, and it might be good=
 to explicitly state that as a part of the validation algorithm.=0A=
=0A=
I'm awaiting co-author review of the I-D version of the email I wrote about=
 AS-Migration, and am hoping to have it posted next week sometime. I think =
that we need to discuss the considerations from that issue to ensure that n=
o changes need to be made in the protocol spec document/design before we pr=
ogress this. There's been some discussion of using pcount=3D0 to manage som=
e parts of this, but that would have to be covered in the update validation=
 and origination algorithm if we choose to solve the problem that way. Also=
 I'm not completely certain that pcount will solve the use case completely.=
 I'm not opposed to using the draft as a follow-on to the protocol draft (u=
pdate it) to handle this specific case, but I'd like to have WG consensus t=
hat this is the route we should take rather than incorporating any solution=
 for this use case into the current document since it is still in draft.=0A=
=0A=
Thanks,=0A=
=0A=
Wes George=0A=
=0A=
=0A=
> -----Original Message-----=0A=
> From: sidr-bounces@ietf.org [mailto:sidr-bounces@ietf.org] On Behalf Of=
=0A=
> Murphy, Sandra=0A=
> Sent: Saturday, September 15, 2012 7:45 AM=0A=
> To: sidr@ietf.org=0A=
> Subject: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05=0A=
>=0A=
> This starts a working group last call for draft-ietf-sidr-bgpsec-=0A=
> protocol-05.  The draft is available at=0A=
> http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05 and=0A=
> https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/=0A=
>=0A=
> Please review this draft to see if you think it is ready for=0A=
> publication.  Send end comments to the list.=0A=
>=0A=
> The WGLC will end on 29 September 2012.=0A=
>=0A=
> --Sandy, speaking as wg co-chair=0A=
> _______________________________________________=0A=
> sidr mailing list=0A=
> sidr@ietf.org=0A=
> https://www.ietf.org/mailman/listinfo/sidr=0A=
=0A=
This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.=0A=
_______________________________________________=0A=
sidr mailing list=0A=
sidr@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sidr=0A=

From wesley.george@twcable.com  Wed Sep 19 10:15:59 2012
Return-Path: <wesley.george@twcable.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C4E821F86E4 for <sidr@ietfa.amsl.com>; Wed, 19 Sep 2012 10:15:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.462
X-Spam-Level: 
X-Spam-Status: No, score=-0.462 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i6gZ20G4HKe7 for <sidr@ietfa.amsl.com>; Wed, 19 Sep 2012 10:15:58 -0700 (PDT)
Received: from cdpipgw02.twcable.com (cdpipgw02.twcable.com [165.237.59.23]) by ietfa.amsl.com (Postfix) with ESMTP id 683A621F8526 for <sidr@ietf.org>; Wed, 19 Sep 2012 10:15:58 -0700 (PDT)
X-SENDER-IP: 10.136.163.10
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.80,450,1344225600"; d="scan'208";a="422834099"
Received: from unknown (HELO PRVPEXHUB01.corp.twcable.com) ([10.136.163.10]) by cdpipgw02.twcable.com with ESMTP/TLS/RC4-MD5; 19 Sep 2012 13:15:16 -0400
Received: from PRVPEXVS15.corp.twcable.com ([10.136.163.78]) by PRVPEXHUB01.corp.twcable.com ([10.136.163.10]) with mapi; Wed, 19 Sep 2012 13:15:55 -0400
From: "George, Wes" <wesley.george@twcable.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>, "sidr@ietf.org" <sidr@ietf.org>
Date: Wed, 19 Sep 2012 13:15:54 -0400
Thread-Topic: WGLC for draft-ietf-sidr-bgpsec-protocol-05
Thread-Index: Ac2TN5E+gtWY3jVQTo2aIJ20K9PIbgCmdL0wAAPG+j4AKlMiMA==
Message-ID: <2671C6CDFBB59E47B64C10B3E0BD59235EFAB75F@PRVPEXVS15.corp.twcable.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>, <2671C6CDFBB59E47B64C10B3E0BD59235EFAAF6F@PRVPEXVS15.corp.twcable.com> <24B20D14B2CD29478C8D5D6E9CBB29F625F78EE0@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F78EE0@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Sep 2012 17:15:59 -0000

> From: Murphy, Sandra [mailto:Sandra.Murphy@sparta.com]
> Sent: Tuesday, September 18, 2012 5:04 PM
> To: George, Wes; sidr@ietf.org
> Subject: RE: WGLC for draft-ietf-sidr-bgpsec-protocol-05
>
> The use of pcount=3D0 was hoped/expected to require NO changes in the
> update validation algorithm.  If you have discovered places where it
> would require changes, it will indeed be interesting to see and discuss.

[WEG] use of pcount=3D0 for AS migration may not require changes to the *al=
gorithm* itself, as much as it will simply require discussion of the proces=
s for handling pcount=3D0 in the cases where it is used and the neighbor is=
 not a transparent route-server, since currently that case is discussed spe=
cifically in the draft, and there is a specific recommendation that pcount=
=3D0 updates be dropped if they didn't come from a known route-server neigh=
bor.

That said, I'm not convinced it completely solves the problem, as I (hopefu=
lly) articulated in my pending draft, and *that* may require algorithm chan=
ges.

Wes

This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.

From danny@tcb.net  Thu Sep 20 07:42:22 2012
Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB2A121F87EA for <sidr@ietfa.amsl.com>; Thu, 20 Sep 2012 07:42:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.716
X-Spam-Level: 
X-Spam-Status: No, score=-102.716 tagged_above=-999 required=5 tests=[AWL=-0.117, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dEDN6+9obZ8h for <sidr@ietfa.amsl.com>; Thu, 20 Sep 2012 07:42:22 -0700 (PDT)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id 66CE221F8798 for <sidr@ietf.org>; Thu, 20 Sep 2012 07:42:22 -0700 (PDT)
Received: by dog.tcb.net (Postfix, from userid 0) id 0303D3780F4; Thu, 20 Sep 2012 08:42:22 -0600 (MDT)
Received: from dul1dmcphers-m2.vcorp.ad.vrsn.com (nat1.corp-fo.iad1.verisign.com [216.168.230.7]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; Thu, 20 Sep 2012 08:42:21 -0600 (MDT) (envelope-from danny@tcb.net)
X-Avenger: version=0.7.8; receiver=dog.tcb.net; client-ip=216.168.230.7; client-port=39166; syn-fingerprint=65535:53:1:64:M1460,N,W3,N,N,T,S MacOS 10.4.8; data-bytes=0
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Danny McPherson <danny@tcb.net>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
Date: Thu, 20 Sep 2012 10:42:19 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
X-Mailer: Apple Mail (2.1278)
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Sep 2012 14:42:22 -0000

Sandy,=20
I don't understand how we can WG LC this document when the requirements =
document isn't complete, and the requirements document isn't complete =
because we're still working out the threats document. =20

Can you explain the logic here?

-danny

On Sep 15, 2012, at 7:45 AM, Murphy, Sandra wrote:

> This starts a working group last call for =
draft-ietf-sidr-bgpsec-protocol-05.  The draft is available at =
http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05 and =
https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/
>=20
> Please review this draft to see if you think it is ready for =
publication.  Send end comments to the list. =20
>=20
> The WGLC will end on 29 September 2012.
>=20
> --Sandy, speaking as wg co-chair
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr


From turners@ieca.com  Thu Sep 20 14:47:04 2012
Return-Path: <turners@ieca.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF68E21E809C for <sidr@ietfa.amsl.com>; Thu, 20 Sep 2012 14:47:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.915
X-Spam-Level: 
X-Spam-Status: No, score=-100.915 tagged_above=-999 required=5 tests=[AWL=-0.950, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, MANGLED_LIST=2.3, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M2JReIUlL3fA for <sidr@ietfa.amsl.com>; Thu, 20 Sep 2012 14:47:03 -0700 (PDT)
Received: from gateway08.websitewelcome.com (gateway08.websitewelcome.com [67.18.36.18]) by ietfa.amsl.com (Postfix) with ESMTP id E58E921E8049 for <sidr@ietf.org>; Thu, 20 Sep 2012 14:47:02 -0700 (PDT)
Received: by gateway08.websitewelcome.com (Postfix, from userid 5007) id 4453122CB6AE8; Thu, 20 Sep 2012 16:47:02 -0500 (CDT)
Received: from gator1743.hostgator.com (gator1743.hostgator.com [184.173.253.227]) by gateway08.websitewelcome.com (Postfix) with ESMTP id 3964322CB6AC8 for <sidr@ietf.org>; Thu, 20 Sep 2012 16:47:02 -0500 (CDT)
Received: from [108.18.174.220] (port=49401 helo=thunderfish.local) by gator1743.hostgator.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.77) (envelope-from <turners@ieca.com>) id 1TEoaK-0000Iu-Pk for sidr@ietf.org; Thu, 20 Sep 2012 16:47:00 -0500
Message-ID: <505B8ED3.8020505@ieca.com>
Date: Thu, 20 Sep 2012 17:46:59 -0400
From: Sean Turner <turners@ieca.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: "sidr@ietf.org" <sidr@ietf.org>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - gator1743.hostgator.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - ieca.com
X-BWhitelist: no
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: (thunderfish.local) [108.18.174.220]:49401
X-Source-Auth: sean.turner@ieca.com
X-Email-Count: 1
X-Source-Cap: ZG9tbWdyNDg7ZG9tbWdyNDg7Z2F0b3IxNzQzLmhvc3RnYXRvci5jb20=
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Sep 2012 21:47:04 -0000

Here's my review:

One biggie:

1) MUST have an "IANA Considerations" section even if it says "none". 
But, I think you've Flags and Info Types to register right?

Algs are getting done elsewhere ;)

One not so biggie but a required formatting thing:

1) s9: If all references are normative, put "Normative" in the section 
title.

A bunch of nits mixed in with requests for additional clarifications 
(i.e., no biggies):

1) s1: r/must have an/needs an

2) s1: r/does not require/does not need

3) s2: r/[4]that/[4] that

4) s2, bits 2 and 3 as well as the fourth octet: normally this should 
would be a must any reason it's not a must?:

  These
  reserved bits should be set to zero by the sender and ignored by the
  receiver.

5) s2: contains the following:

  If there does not exist at least one version of BGPSEC that is
  supported by both peers in a BGP session, then the use of BGPSEC has
  not been negotiated.  (That is, in such a case, messages containing
  the BGPSEC_Path_Signatures MUST NOT be sent.)

Should this paragraph say something about the BGP NOTIFICATION message 
with the Error Code 2 (OPEN Message Error) and the OPEN Message Error 
SubCode 4 (Unsupported Optional Parameter) or is it the SubCode 7 
(Unsupported Capability) MUST be returned if both don't support bgpsec?

6) s2, Figure: If the AFI is 2 octets can we do the following:

    +---------------------------------------+
    |               AFI                     |
    +                                       +
    |                                       |
    +---------------------------------------+

so people won't ask what's in the blank line ;)

7) s2: Is there a reference for AFI that we can point to?

8) s2: ? r/speaker must include two/speaker includes two

9) s2: r/it has also advertises/it has also advertised

10) s2: r/(see RFC 4893)./[RFC 4893] - and add a reference.

11) s2: X2 (aligns with earlier sentences) r:/its open message/its BGP 
OPEN message/

12) s3: r/new optional/new OPTIONAL

13) High-Level Diagram of the BGPSEC_Path_Signatures Attribute
     BGPSEC_Path_Signatures figure: I might be reading way to much in to 
this but I don't want people to get the impression that signature X and 
Y for alg 1 and 2 are the same.  You might draw that conclusion from this:

  |     +-----------------+       +-----------------+       |
  |     | Sig Block 1     |       |  Sig Block 2    |       |
  |     +-----------------+       +-----------------+       |
  |     | Alg Suite 1     |       |  Alg Suite 2    |       |
  |     | SKI X           |       |  SKI X          |       |
  |     | Sig Length X    |       |  Sig Length X   |       |
  |     | Signature X     |       |  Signature X    |       |
  |     | SKI Length Y    |       |  SKI Length Y   |       |
  |     | SKI Y           |       |  SKI Y          |       |
  |     | Sig Length Y    |       |  Sig Length Y   |       |
  |     | Signature Y     |       |  Signature Y    |       |
  |     |      ...        |       |      ....       |       |
  |     +-----------------+       +-----------------+       |

Maybe in Sig Block 1 r/X/X1 and r/Y/Y1 and in Sig block 2 r/X/X2 and r/Y/Y2?

14) s3: If it does include the AS_PATH attribute what happens:

  That is, update messages that contain the
  BGPSEC_Path_Signatures attribute MUST NOT contain the AS_PATH
  attribute.

15) s3.1: Should probably add some ascii art for the flags:

+-+-+-+-+-+-+-+-+
|C|   Reserved  |
+-+-+-+-+-+-+-+-+

16) s3.1: r/These bits MUST be set to zero by the sender.
            /These bits MUST be set to zero by the sender and ignored
             by the recipient.

17) s3.1/3.2: Are the editor's notes going to get removed at some point 
or are we planning on keeping it?

18) s3.3: Probably worth adding the the SKI is copied from the signers 
certificate and need not be generated.  Or, is that implementation specific?

19) s4: In the last paragraph should the "must" be "MUST" x2.  It's in a 
"Note" paragraph so I could see not use MUST, but in that case maybe 
r/must possess/needs and r/must/needs to. If you use the MUST strike 
"Note" -  I don't think requirements should appear in Note paragraphs 
(though they often do).

20) s4.1: I'd just strike "Note that" from the those two paragraphs (x3).

21) s4.2: If we're going to keep NOT RECOMMENDED then you need to add it 
to the conventions.  Put it after RECOMMENDED so the nit checker won't 
barf on it.

    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
    "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
    and "OPTIONAL" in this document are to be interpreted as described
    in RFC 2119 [8].

Actually, the RFC editor is going to move the requirements language to 
the mainbody so might as well do it now.  Just slap it in as s1.1.

22) s4.3: MUST instead of must:

   Members of autonomous system confederations [3] must additionally
   follow the instructions in this section for processing BGPSEC update
   messages.

23) s4.3: r/it must remove all
            /it MUST remove all ?
           r/confederation members must make
            /confederation members MUST make ?

24) s5.2: I think there a link missing to how you determine whether the 
certificate is valid in the following:

   To do this, consult the valid
   RPKI end-entity certificate data and look up all valid (AS, SKI,
   Public Key) triples in which the AS matches the AS number in the
   corresponding Secure_Path segment.

To me that means do the RPKI certificate checks in RFC 6487 as augmented 
by s3.3 of draft-ietf-sidr-bgpsec-pki-profiles.  Probably just adding a 
pointer to [11] would wfm.

   To do this, consult the valid
   RPKI end-entity certificate data and look up all valid (AS, SKI,
   Public Key) triples, see Section 3.3 of [11], in which the AS matches
   the AS number in the corresponding Secure_Path segment.

or something like that.

25) s6.1, 1st para: r/must/needs to X2

26) s6.1, 2nd para, 2nd sentence: I think the bit about the 'new' 
algorithm being specified in [12] should be deleted. It doesn't say 
anything about 'new' algorithm right now and the 3rd paragraph says if 
and when the new alg is chosen that draft will be updated.

27) s6.1: r/the future the mandatory/the future mandatory

That's it for now.

spt


On 9/15/12 7:45 AM, Murphy, Sandra wrote:
> This starts a working group last call for draft-ietf-sidr-bgpsec-protocol-05.  The draft is available at http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05 and https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/
>
> Please review this draft to see if you think it is ready for publication.  Send end comments to the list.
>
> The WGLC will end on 29 September 2012.
>
> --Sandy, speaking as wg co-chair
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
>

From ietf-secretariat@ietf.org  Fri Sep 21 06:17:47 2012
Return-Path: <ietf-secretariat@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1193C21F880C; Fri, 21 Sep 2012 06:17:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.286
X-Spam-Level: 
X-Spam-Status: No, score=-102.286 tagged_above=-999 required=5 tests=[AWL=-0.287, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WbnflMjE5-O5; Fri, 21 Sep 2012 06:17:46 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E19421F87E5; Fri, 21 Sep 2012 06:17:46 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: IETF Announcement List <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120921131746.9793.61038.idtracker@ietfa.amsl.com>
Date: Fri, 21 Sep 2012 06:17:46 -0700
Cc: iaoc@ietf.org, opsec@ietf.org, sidr@ietf.org, v6ops@ietf.org, wgchairs@ietf.org
Subject: [sidr] IETF Large Interim Meeting - OPSEC, SIDR and V6OPS
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 13:17:47 -0000

OPSEC, SIDR and V6OPS Interim Meeting
Amsterdam, The Netherlands
29 September 2012
Venue: Hotel Okura Amsterdam (www.okura.nl)
     Ferdinand Bolstraat 333
     1072 LH Amsterdam
     The Netherlands

1.  Registration
2.  Accommodations - Reservations Cutoff: 21 September
3.  Meeting Schedule

1. Registration
  A.  Fee: $100 USD
  B.  Register online at: http://www.ietf.org/registration/lim2012/ietfreg.=
py
  C.  Online Registration and Payment closes on 28 September 2012
  D.  On Site Registration starting Saturday, 29 September at 8:00 AM

2. Accommodations
  A block of rooms is being held at the Hotel Okura Amsterdam (meeting venu=
e) for the nights of September 28 and 29.
  Rate: 195 EUR [256 USD; 20,065 JPY]
    Rate includes breakfast and guest room wireless internet but excludes 5=
% city tax.
  To make your reservation on line, please go to: www.okura.nl
    Group Code: IETF2012

  Reservations cut-off date: 21 September 2012

  Guest Cancellation:
  - Reservations may be changed up to 1 week prior to the event without pen=
alty. (You can change, not cancel, the reservation, i.e. change
arrival, departure dates or name, up to 1 week without penalty but not
cancel the reservation without penalty.)
  - 50% of reservation value penalty for cancellation less than 14 days and=
 greater than 7 days prior to event. If you cancel, not change, the reserva=
tion less than 14 days but more than 7 days prior to the event you will be =
charged 50% of the total reservation fee.
  - 80% of reservation value penalty for cancellation less than 7 days and =
greater than 3 days prior to event. If you cancel, not change, the reservat=
ion less than 7 days prior to the event you will be charged 80% of the tota=
l reservation fee.
  - 100% of reservation value penalty for cancellation less than 3 days pri=
or to event or non-arrival or no-show.
  - In case of early departure, the full value of the reservation will be c=
harged to the guest.

If you have any problems making your reservation, please send a message to =
agenda@ietf.org

3. Meeting Schedule
  0900-1700 CEST     SIDR
  0900-1130 CEST     OPSEC
  1330-1630 CEST     V6OPS

From Sandra.Murphy@sparta.com  Fri Sep 21 07:31:09 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B7F321F85F7 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 07:31:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.44
X-Spam-Level: 
X-Spam-Status: No, score=-102.44 tagged_above=-999 required=5 tests=[AWL=0.159, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KIFPkrtHwvfR for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 07:31:08 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 7A01921F8705 for <sidr@ietf.org>; Fri, 21 Sep 2012 07:31:08 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8LEV62i020116 for <sidr@ietf.org>; Fri, 21 Sep 2012 09:31:06 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8LEV508024023 for <sidr@ietf.org>; Fri, 21 Sep 2012 09:31:06 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Fri, 21 Sep 2012 10:32:12 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: meeting registration for interim 29 Sep 2012
Thread-Index: AQHNmAWr2yH8wM+vf0GlHqPcY6n69w==
Date: Fri, 21 Sep 2012 14:32:12 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BE53@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] meeting registration for interim 29 Sep 2012
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 14:31:09 -0000

The IETF Secretariat announced the interim meeting details on Tues.  There =
is a registration process for this meeting, much the same as for a regular =
IETF meeting.  See the Secretariat's message http://www.ietf.org/mail-archi=
ve/web/sidr/current/msg05067.html.  Registration is at http://www.ietf.org/=
registration/lim2012/ietfreg.py.  You MUST register with the IETF for this =
meeting.=0A=
=0A=
For planning purposes, please do also indicate your plans to attend by send=
ing a message to sidr-chairs+reg09292012@ietf.org.   In particular, please =
do mention if you plan on participating in person or remotely.=0A=
=0A=
This is for the sidr meeting planning purposes only; it DOES NOT take the p=
lace of the IETF registration announced 18 Sep.   You MUST register for the=
 interim meeting with the IETF at http://www.ietf.org/registration/lim2012/=
ietfreg.py.=0A=
=0A=
--Sandy=

From Sandra.Murphy@sparta.com  Fri Sep 21 07:34:20 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B51521F884B for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 07:34:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.566
X-Spam-Level: 
X-Spam-Status: No, score=-101.566 tagged_above=-999 required=5 tests=[AWL=-0.729, BAYES_00=-2.599, MISSING_SUBJECT=1.762, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e8IT24G6vAKc for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 07:34:19 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 3F7B021F8705 for <sidr@ietf.org>; Fri, 21 Sep 2012 07:34:19 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8LEYIYM020146 for <sidr@ietf.org>; Fri, 21 Sep 2012 09:34:18 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8LEYIU0024091 for <sidr@ietf.org>; Fri, 21 Sep 2012 09:34:18 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Fri, 21 Sep 2012 10:35:25 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Index: Ac2YBlYwJMbKAA+IR0u8O4RPhAWXaA==
Date: Fri, 21 Sep 2012 14:35:24 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BE6B@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] (no subject)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 14:34:20 -0000

For remote participation in the past, we have used webex.=0A=
=0A=
We've heard that there are going to be people expert in Meetecho at the mee=
ting in Amsterdam.  This might be a good opportunity for us to try Meetecho=
 as a remote participation tool.=0A=
=0A=
Is there anyone who has a preference for webex vs Meetecho that would influ=
ence the choice?=0A=
=0A=
(If we try to use Meetecho, webex is likely to serve as a backup.)=0A=
=0A=
--Sandy=

From Sandra.Murphy@sparta.com  Fri Sep 21 08:03:42 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20D4321F8836 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 08:03:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.415
X-Spam-Level: 
X-Spam-Status: No, score=-102.415 tagged_above=-999 required=5 tests=[AWL=0.184, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QTTGoWHqAMzJ for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 08:03:41 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 6E2CA21F8830 for <sidr@ietf.org>; Fri, 21 Sep 2012 08:03:41 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8LF3bM8020493 for <sidr@ietf.org>; Fri, 21 Sep 2012 10:03:37 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8LF3aoC025027 for <sidr@ietf.org>; Fri, 21 Sep 2012 10:03:36 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Fri, 21 Sep 2012 11:04:43 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: remote participation possibilities in the interim meeting
Thread-Index: AQHNmApuMMNgjvti90GKkSkxH13YsQ==
Date: Fri, 21 Sep 2012 15:04:43 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BEA5@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] remote participation possibilities in the interim meeting
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 15:03:42 -0000

Correcting lack of subject.=0A=
=0A=
And the attached should have been signed off as:=0A=
=0A=
--Sandy, speaking as co-chair=0A=
________________________________________=0A=
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Murphy, Sa=
ndra [Sandra.Murphy@sparta.com]=0A=
Sent: Friday, September 21, 2012 10:35 AM=0A=
To: sidr@ietf.org=0A=
Subject: [sidr] (no subject)=0A=
=0A=
For remote participation in the past, we have used webex.=0A=
=0A=
We've heard that there are going to be people expert in Meetecho at the mee=
ting in Amsterdam.  This might be a good opportunity for us to try Meetecho=
 as a remote participation tool.=0A=
=0A=
Is there anyone who has a preference for webex vs Meetecho that would influ=
ence the choice?=0A=
=0A=
(If we try to use Meetecho, webex is likely to serve as a backup.)=0A=
=0A=
--Sandy=0A=
_______________________________________________=0A=
sidr mailing list=0A=
sidr@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sidr=0A=

From danny@tcb.net  Fri Sep 21 15:20:24 2012
Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2DBF21F8623 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 15:20:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.299
X-Spam-Level: 
X-Spam-Status: No, score=-102.299 tagged_above=-999 required=5 tests=[AWL=0.300, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ILYc7CqZ5xhr for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 15:20:23 -0700 (PDT)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id 3E68321F8622 for <sidr@ietf.org>; Fri, 21 Sep 2012 15:20:23 -0700 (PDT)
Received: by dog.tcb.net (Postfix, from userid 0) id 75F522680A3; Fri, 21 Sep 2012 16:20:22 -0600 (MDT)
Received: from dul1dmcphers-m2.home (pool-71-171-124-149.clppva.fios.verizon.net [71.171.124.149]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; Fri, 21 Sep 2012 16:20:22 -0600 (MDT) (envelope-from danny@tcb.net)
X-Avenger: version=0.7.8; receiver=dog.tcb.net; client-ip=71.171.124.149; client-port=51317; syn-fingerprint=65535:48:1:64:M1460,N,W1,N,N,T,S MacOS 10.4.8; data-bytes=0
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Danny McPherson <danny@tcb.net>
In-Reply-To: <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net>
Date: Fri, 21 Sep 2012 18:20:09 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net>
To: Sandra Murphy <Sandra.Murphy@sparta.com>, Chris Morrow <morrowc@ops-netman.net>, alexey.melnikov@isode.com
X-Mailer: Apple Mail (2.1278)
Cc: "sidr@ietf.org wg" <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 22:20:24 -0000

=09
I do not intend to review this document in it's current state and am =
confused how we can WG LC it while the threat and [presumably =
subsequent] requirements documents are still being developed by the WG.=20=


I would like an explanation from the chairs regarding what the intention =
is here.

-danny


On Sep 20, 2012, at 10:42 AM, Danny McPherson wrote:

>=20
> Sandy,=20
> I don't understand how we can WG LC this document when the =
requirements document isn't complete, and the requirements document =
isn't complete because we're still working out the threats document. =20
>=20
> Can you explain the logic here?
>=20
> -danny
>=20
> On Sep 15, 2012, at 7:45 AM, Murphy, Sandra wrote:
>=20
>> This starts a working group last call for =
draft-ietf-sidr-bgpsec-protocol-05.  The draft is available at =
http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05 and =
https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/
>>=20
>> Please review this draft to see if you think it is ready for =
publication.  Send end comments to the list. =20
>>=20
>> The WGLC will end on 29 September 2012.
>>=20
>> --Sandy, speaking as wg co-chair
>> _______________________________________________
>> sidr mailing list
>> sidr@ietf.org
>> https://www.ietf.org/mailman/listinfo/sidr
>=20
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr


From christopher.morrow@gmail.com  Fri Sep 21 16:14:00 2012
Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C93BA21E8096 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 16:14:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.599
X-Spam-Level: 
X-Spam-Status: No, score=-103.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6X4VY3ins81o for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 16:14:00 -0700 (PDT)
Received: from mail-vb0-f44.google.com (mail-vb0-f44.google.com [209.85.212.44]) by ietfa.amsl.com (Postfix) with ESMTP id 2F6E921E8092 for <sidr@ietf.org>; Fri, 21 Sep 2012 16:14:00 -0700 (PDT)
Received: by vbbfc26 with SMTP id fc26so4794699vbb.31 for <sidr@ietf.org>; Fri, 21 Sep 2012 16:13:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=cyJLMgluxC5AZCPCmtHs0YjC2X07wlsobQO4ZScYl2s=; b=Io83BGYQzJhvdIllQqGcnJFHU/JvCCrQEgzCwRjZThEaHEAyYdTrTKk3V0e6oLqm6r Tka44QhI58IcGq3UDc/7D9UXI+VEOs3mubA84gySqvcLY+p/Q9zdKupMHo8413n/gfO7 Po1iqeeeosxvEeWc8i/oBhwaHFYi/yI1sEWM6fhGQ3uaZl21s0IOvYWwzUTA5WXS/vrI Gog7CFLyDfUrCDJMGTOv/GcT5DB0ggHHQbDVVKfhM3O75cMhWdNLXrNNVYPytqltn43w RnPHa+SC0uRDDrwJBz4foHMnn38BzhPfEDaZAGEXKFlqzIxnZ826X5LTvMWuocIeKjVl pEPQ==
MIME-Version: 1.0
Received: by 10.220.220.203 with SMTP id hz11mr3820605vcb.50.1348269239627; Fri, 21 Sep 2012 16:13:59 -0700 (PDT)
Sender: christopher.morrow@gmail.com
Received: by 10.58.216.42 with HTTP; Fri, 21 Sep 2012 16:13:59 -0700 (PDT)
In-Reply-To: <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net> <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net>
Date: Fri, 21 Sep 2012 19:13:59 -0400
X-Google-Sender-Auth: UKkYps4Q6CxwMsO13kU0fgXqkfU
Message-ID: <CAL9jLaZs=Q5ZaWKHjBh8hgUy8hiJcs_h1e_KRvsTuFtPt4_1NQ@mail.gmail.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
To: Danny McPherson <danny@tcb.net>
Content-Type: text/plain; charset=ISO-8859-1
Cc: Chris Morrow <morrowc@ops-netman.net>, Sandra Murphy <Sandra.Murphy@sparta.com>, "sidr@ietf.org wg" <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 23:14:00 -0000

On Fri, Sep 21, 2012 at 6:20 PM, Danny McPherson <danny@tcb.net> wrote:
>
> I do not intend to review this document in it's current state and am confused how we can WG LC it while the threat and [presumably subsequent] requirements documents are still being developed by the WG.
>
> I would like an explanation from the chairs regarding what the intention is here.

I believe the hope was to stir up some discussion, interest and
readers prior to the interim meeting next saturday. As with all WGLC's
perhaps this document needs to wait on something else, or isn't ready
yet, or has other considerations to deal with... or is ready to fly
like a baby birdie. we won't know without some discussion, and I
believe there will be a bunch more of that in 8 days time.

-chris

> On Sep 20, 2012, at 10:42 AM, Danny McPherson wrote:
>
>>
>> Sandy,
>> I don't understand how we can WG LC this document when the requirements document isn't complete, and the requirements document isn't complete because we're still working out the threats document.
>>
>> Can you explain the logic here?
>>
>> -danny
>>
>> On Sep 15, 2012, at 7:45 AM, Murphy, Sandra wrote:
>>
>>> This starts a working group last call for draft-ietf-sidr-bgpsec-protocol-05.  The draft is available at http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05 and https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/
>>>
>>> Please review this draft to see if you think it is ready for publication.  Send end comments to the list.
>>>
>>> The WGLC will end on 29 September 2012.
>>>
>>> --Sandy, speaking as wg co-chair
>>> _______________________________________________
>>> sidr mailing list
>>> sidr@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sidr
>>
>> _______________________________________________
>> sidr mailing list
>> sidr@ietf.org
>> https://www.ietf.org/mailman/listinfo/sidr
>
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr

From kotikalapudi.sriram@nist.gov  Fri Sep 21 16:19:29 2012
Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1FB021E8092 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 16:19:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mx2wz8oQNOiP for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 16:19:28 -0700 (PDT)
Received: from wsget2.nist.gov (wsget2.nist.gov [129.6.13.151]) by ietfa.amsl.com (Postfix) with ESMTP id 5ECA121E805A for <sidr@ietf.org>; Fri, 21 Sep 2012 16:19:28 -0700 (PDT)
Received: from WSXGHUB1.xchange.nist.gov (129.6.18.96) by wsget2.nist.gov (129.6.13.151) with Microsoft SMTP Server (TLS) id 14.1.379.0; Fri, 21 Sep 2012 19:19:17 -0400
Received: from MBCLUSTER.xchange.nist.gov ([fe80::d479:3188:aec0:cb66]) by WSXGHUB1.xchange.nist.gov ([129.6.18.96]) with mapi; Fri, 21 Sep 2012 19:19:22 -0400
From: "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>
To: "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>
Date: Fri, 21 Sep 2012 19:19:21 -0400
Thread-Topic: New Version Notification for draft-sriram-replay-protection-design-discussion-00.txt
Thread-Index: Ac2YT4fJC0t5HA0aQJeHmSOjvzko+g==
Message-ID: <D7A0423E5E193F40BE6E94126930C4930BA86CE472@MBCLUSTER.xchange.nist.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Subject: [sidr] FW: New Version Notification for draft-sriram-replay-protection-design-discussion-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 23:19:29 -0000

VGhpcyBzdWJtaXNzaW9uIGlzIGFuIGluZm9ybWF0aXZlIGRlc2lnbiBkaXNjdXNzaW9uIGRvY3Vt
ZW50IHRoYXQgcHJvdmlkZXMgaW5zaWdodHMgDQppbnRvIHRoZSBvcGVyYXRpb24gb2YgbXVsdGlw
bGUgYWx0ZXJuYXRpdmUgbWV0aG9kcyBmb3IgcmVwbGF5LWF0dGFjayBwcm90ZWN0aW9uLiANCldl
IGhvcGUgdGhhdCB0aGUgU0lEUiBXRyB3aWxsIHRha2UgdGhlIGluc2lnaHRzIGFuZCB0cmFkZS1v
ZmZzIHByZXNlbnRlZCBoZXJlIGFzIGlucHV0IA0KZm9yIGRlY2lkaW5nIG9uIHRoZSBjaG9pY2Ug
b2YgYSBtZWNoYW5pc20gZm9yIHByb3RlY3Rpb24gZnJvbSByZXBsYXkgYXR0YWNrcy4NCkl0IGlz
IG1lYW50IHRvIGJlIGEgY29tcGFuaW9uIGRvY3VtZW50IHRvIHRoZSBzdGFuZGFyZHMgdHJhY2sg
DQpJLUQuLWlldGYtc2lkci1iZ3BzZWMtcm9sbG92ZXIgdGhhdCB3aWxsIHNwZWNpZnkgYSBtZXRo
b2QgdG8gYmUgdXNlZCANCndpdGggQkdQU0VDIGZvciByZXBsYXktYXR0YWNrIHByb3RlY3Rpb24u
DQoNCkEgc2V0IHNsaWRlcyB3aXRoIGZpZ3VyZXMgdGhhdCBpcyByZWZlcmVuY2VkIGluIHRoZSBk
b2N1bWVudCBjYW4gYmUgZm91bmQgYXQ6DQpodHRwOi8vd3d3Lm5pc3QuZ292L2l0bC9hbnRkL3Vw
bG9hZC9yZXBsYXktZGlzY3Vzc2lvbi5wZGYgDQoodGhlIGZpZ3VyZXMgYXJlIGhlbHBmdWwgYnV0
IG5vdCBuZWNlc3NhcnkgdG8gcmVhZCB0aGUgZG9jdW1lbnQpLg0KDQpDb21tZW50cyB3ZWxjb21l
Lg0KDQpTcmlyYW0NCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IGludGVybmV0
LWRyYWZ0c0BpZXRmLm9yZyBbbWFpbHRvOmludGVybmV0LWRyYWZ0c0BpZXRmLm9yZ10gDQpTZW50
OiBGcmlkYXksIFNlcHRlbWJlciAyMSwgMjAxMiA3OjAxIFBNDQpUbzogc3JpcmFtLmlldGZAZ21h
aWwuY29tDQpDYzogTW9udGdvbWVyeSwgRG91Z2xhczsgU3JpcmFtLCBLb3Rpa2FsYXB1ZGkNClN1
YmplY3Q6IE5ldyBWZXJzaW9uIE5vdGlmaWNhdGlvbiBmb3IgZHJhZnQtc3JpcmFtLXJlcGxheS1w
cm90ZWN0aW9uLWRlc2lnbi1kaXNjdXNzaW9uLTAwLnR4dA0KDQoNCkEgbmV3IHZlcnNpb24gb2Yg
SS1ELCBkcmFmdC1zcmlyYW0tcmVwbGF5LXByb3RlY3Rpb24tZGVzaWduLWRpc2N1c3Npb24tMDAu
dHh0DQpoYXMgYmVlbiBzdWNjZXNzZnVsbHkgc3VibWl0dGVkIGJ5IEtvdGlrYWxhcHVkaSBTcmly
YW0gYW5kIHBvc3RlZCB0byB0aGUgSUVURiByZXBvc2l0b3J5Lg0KDQpGaWxlbmFtZToJIGRyYWZ0
LXNyaXJhbS1yZXBsYXktcHJvdGVjdGlvbi1kZXNpZ24tZGlzY3Vzc2lvbg0KUmV2aXNpb246CSAw
MA0KVGl0bGU6CQkgRGVzaWduIERpc2N1c3Npb24gYW5kIENvbXBhcmlzb24gb2YgUmVwbGF5LUF0
dGFjayBQcm90ZWN0aW9uIE1lY2hhbmlzbXMgZm9yIEJHUFNFQw0KQ3JlYXRpb24gZGF0ZToJIDIw
MTItMDktMjINCldHIElEOgkJIEluZGl2aWR1YWwgU3VibWlzc2lvbg0KTnVtYmVyIG9mIHBhZ2Vz
OiAxNw0KVVJMOiAgICAgICAgICAgICBodHRwOi8vd3d3LmlldGYub3JnL2ludGVybmV0LWRyYWZ0
cy9kcmFmdC1zcmlyYW0tcmVwbGF5LXByb3RlY3Rpb24tZGVzaWduLWRpc2N1c3Npb24tMDAudHh0
DQpTdGF0dXM6ICAgICAgICAgIGh0dHA6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQt
c3JpcmFtLXJlcGxheS1wcm90ZWN0aW9uLWRlc2lnbi1kaXNjdXNzaW9uDQpIdG1saXplZDogICAg
ICAgIGh0dHA6Ly90b29scy5pZXRmLm9yZy9odG1sL2RyYWZ0LXNyaXJhbS1yZXBsYXktcHJvdGVj
dGlvbi1kZXNpZ24tZGlzY3Vzc2lvbi0wMA0KDQoNCkFic3RyYWN0Og0KICAgVGhlIEJHUFNFQyBw
cm90b2NvbCByZXF1aXJlcyBhIG1ldGhvZCBmb3IgcHJvdGVjdGlvbiBmcm9tIHJlcGxheQ0KICAg
YXR0YWNrcywgYXQgbGVhc3QgdG8gY29udHJvbCB0aGUgd2luZG93IG9mIGV4cG9zdXJlLiAgSW4g
dGhlIGNvbnRleHQNCiAgIG9mIEJHUFNFQywgYSByZXBsYXkgYXR0YWNrIG9jY3VycyB3aGVuIGFu
IGFkdmVyc2FyeSBzdXBwcmVzc2VzIGENCiAgIHByZWZpeCB3aXRoZHJhd2FsIChpbXBsaWNpdCBv
ciBleHBsaWNpdCkgb3IgcmVwbGF5cyBhIHByZXZpb3VzbHkNCiAgIHJlY2VpdmVkIEJHUFNFQyBh
bm5vdW5jZW1lbnQgZm9yIGEgcHJlZml4IHRoYXQgaGFzIHNpbmNlIGJlZW4NCiAgIHdpdGhkcmF3
bi4gIFRoaXMgaW5mb3JtYXRpb25hbCBkb2N1bWVudCBwcm92aWRlcyBkZXNpZ24gZGlzY3Vzc2lv
bg0KICAgYW5kIGNvbXBhcmlzb24gb2YgbXVsdGlwbGUgYWx0ZXJuYXRpdmUgcmVwbGF5LWF0dGFj
ayBwcm90ZWN0aW9uDQogICBtZWNoYW5pc21zIHdlaWdoaW5nIHRoZWlyIHByb3MgYW5kIGNvbnMu
ICBJdCBpcyBtZWFudCB0byBiZSBhDQogICBjb21wYW5pb24gZG9jdW1lbnQgdG8gdGhlIHN0YW5k
YXJkcyB0cmFjayBJLUQuLWlldGYtc2lkci1iZ3BzZWMtDQogICByb2xsb3ZlciB0aGF0IHdpbGwg
c3BlY2lmeSBhIG1ldGhvZCB0byBiZSB1c2VkIHdpdGggQkdQU0VDIGZvcg0KICAgcmVwbGF5LWF0
dGFjayBwcm90ZWN0aW9uLg0KDQo=

From Sandra.Murphy@sparta.com  Fri Sep 21 16:26:43 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 477DB21E8037 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 16:26:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.423
X-Spam-Level: 
X-Spam-Status: No, score=-102.423 tagged_above=-999 required=5 tests=[AWL=0.176, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aBtRJYkKNpNv for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 16:26:42 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 8EF5121E8034 for <sidr@ietf.org>; Fri, 21 Sep 2012 16:26:42 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8LNQdaB025026; Fri, 21 Sep 2012 18:26:39 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8LNQcGW004318; Fri, 21 Sep 2012 18:26:39 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Fri, 21 Sep 2012 19:27:45 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: Danny McPherson <danny@tcb.net>, Chris Morrow <morrowc@ops-netman.net>, "alexey.melnikov@isode.com" <alexey.melnikov@isode.com>
Thread-Topic: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
Thread-Index: Ac2TN5E+gtWY3jVQTo2aIJ20K9PIbgEKBiOAAEJH9ID//8xkPg==
Date: Fri, 21 Sep 2012 23:27:45 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BFF7@Hermes.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net>, <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net>
In-Reply-To: <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "sidr@ietf.org wg" <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 23:26:43 -0000

The protocol, threats and requirements documents are definitely tied togeth=
er and will progress together.  The three documents have been in the workin=
g group for the same length of time, so you'd think that they, being so tie=
d, would have had equal attention and be equally mature.=0A=
=0A=
On the non-process, reality side of things:  The newest protocol draft came=
 out on 7 Sep and I asked the working group to "look at this draft right aw=
ay" because it would be discussed at the interim meeting.  After eight days=
 with no comments, a wglc seemed a good idea.  Sad that our lives need a wg=
lc to produce participation, but it is what it is.=0A=
=0A=
--Sandy=

From brian.peter.dickson@gmail.com  Fri Sep 21 17:18:08 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 748E221F84F0 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:18:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.765
X-Spam-Level: 
X-Spam-Status: No, score=-3.765 tagged_above=-999 required=5 tests=[AWL=-0.167, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GYDmJj78uqFB for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:18:07 -0700 (PDT)
Received: from mail-wg0-f44.google.com (mail-wg0-f44.google.com [74.125.82.44]) by ietfa.amsl.com (Postfix) with ESMTP id 103D721F84EF for <sidr@ietf.org>; Fri, 21 Sep 2012 17:18:03 -0700 (PDT)
Received: by wgbdr13 with SMTP id dr13so1206764wgb.13 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:18:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=TcidZSw3tkqMlxN9zQ/RdwK+yDpzeMXiTfQQTS2lNrI=; b=NJXJsA3VdGphNv6aDZeijeUyXVNW09ctiiKcpIrsZAmhPQeED+6evQ6e+4VOyjRcjY ottGaeoVSjKe9+ysqPKs9/zqeE6ES9fi42jTOyA44iCO/RRg4q3brl6+dS4Gj8rpAzEK zM8lXW4IHrh8ow7ZaaAtpVr2IiDlhFpTtDdmnYhAfbZkhmOaTfMEGEFn2iyFBEzsi3if aAzaa7N/iZPZRAS0DuVl+7P9iTGI0q09yKBm6jvUswTNDB8CIIhLLXvuE8Oml14LTSfw RZBPN0yLMa3YoF/XXuRpizmPHh6UFtTOB06t6yhhEUZjdds/0TArjplNpOiXIlxLig/v fQnQ==
MIME-Version: 1.0
Received: by 10.180.100.37 with SMTP id ev5mr59612wib.5.1348273082918; Fri, 21 Sep 2012 17:18:02 -0700 (PDT)
Received: by 10.223.145.133 with HTTP; Fri, 21 Sep 2012 17:18:02 -0700 (PDT)
In-Reply-To: <CAL9jLaZs=Q5ZaWKHjBh8hgUy8hiJcs_h1e_KRvsTuFtPt4_1NQ@mail.gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net> <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net> <CAL9jLaZs=Q5ZaWKHjBh8hgUy8hiJcs_h1e_KRvsTuFtPt4_1NQ@mail.gmail.com>
Date: Fri, 21 Sep 2012 20:18:02 -0400
Message-ID: <CAH1iCiq-U-_5OgQbHwLqfSnx+cWtxJ5XNg7Ok9oxFEsJ1e7QMw@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Christopher Morrow <morrowc.lists@gmail.com>
Content-Type: multipart/alternative; boundary=f46d041826d62ae6ed04ca3f4a28
Cc: Chris Morrow <morrowc@ops-netman.net>, "sidr@ietf.org wg" <sidr@ietf.org>, Sandra Murphy <Sandra.Murphy@sparta.com>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 00:18:08 -0000

--f46d041826d62ae6ed04ca3f4a28
Content-Type: text/plain; charset=ISO-8859-1

IMHO, attempting to generate discussion on a document by doing WGLC, is
completely bass-ackwards.

I don't believe it is at all appropriate to WGLC a document prior to
substantive review and maturity.

I.e. the chairs should ask FIRST, informally, if folks think we're ready to
WGLC, and wait a bit for answers.
The bar for saying "no" should be fairly low, and only in the absence of
lots of positive "hum" should WGLC proceed.

I would suggest the chairs review the processes adopted in other (more
mature) WGs, such as dnsext, for better processes and procedures.
E.g. commitment of >=5 reviewers to review, prior to WGLC. This excludes
authors, of course, from the review process.
It has worked very well there, IMHO.

Given that, as Danny notes, the entire content of -protocol depends on
-requirements, which itself depends on -threats, I have to concur with him
- "NO" to proceeding at this time.

So, to be clear:
- I don't think that, even if it were otherwise ready, that it wold be
appropriate to WGLC the -protocol doc
- I do not believe the -protocol doc is ready to go (independent of the
gating issue)

There are several areas that are not adequately settled, especially in the
pcount=0 and transition areas.

Consider this a formal request to bounce this document out of WGLC.

It would be fine to discuss on the interim meeting, and there does not need
to be a WGLC just to get discussion.

Brian

On Fri, Sep 21, 2012 at 7:13 PM, Christopher Morrow <morrowc.lists@gmail.com
> wrote:

> On Fri, Sep 21, 2012 at 6:20 PM, Danny McPherson <danny@tcb.net> wrote:
> >
> > I do not intend to review this document in it's current state and am
> confused how we can WG LC it while the threat and [presumably subsequent]
> requirements documents are still being developed by the WG.
> >
> > I would like an explanation from the chairs regarding what the intention
> is here.
>
> I believe the hope was to stir up some discussion, interest and
> readers prior to the interim meeting next saturday. As with all WGLC's
> perhaps this document needs to wait on something else, or isn't ready
> yet, or has other considerations to deal with... or is ready to fly
> like a baby birdie. we won't know without some discussion, and I
> believe there will be a bunch more of that in 8 days time.
>
> -chris
>
> > On Sep 20, 2012, at 10:42 AM, Danny McPherson wrote:
> >
> >>
> >> Sandy,
> >> I don't understand how we can WG LC this document when the requirements
> document isn't complete, and the requirements document isn't complete
> because we're still working out the threats document.
> >>
> >> Can you explain the logic here?
> >>
> >> -danny
> >>
> >> On Sep 15, 2012, at 7:45 AM, Murphy, Sandra wrote:
> >>
> >>> This starts a working group last call for
> draft-ietf-sidr-bgpsec-protocol-05.  The draft is available at
> http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05 and
> https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/
> >>>
> >>> Please review this draft to see if you think it is ready for
> publication.  Send end comments to the list.
> >>>
> >>> The WGLC will end on 29 September 2012.
> >>>
> >>> --Sandy, speaking as wg co-chair
> >>> _______________________________________________
> >>> sidr mailing list
> >>> sidr@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/sidr
> >>
> >> _______________________________________________
> >> sidr mailing list
> >> sidr@ietf.org
> >> https://www.ietf.org/mailman/listinfo/sidr
> >
> > _______________________________________________
> > sidr mailing list
> > sidr@ietf.org
> > https://www.ietf.org/mailman/listinfo/sidr
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
>

--f46d041826d62ae6ed04ca3f4a28
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

IMHO, attempting to generate discussion on a document by doing WGLC, is com=
pletely bass-ackwards.<br><br>I don&#39;t believe it is at all appropriate =
to WGLC a document prior to substantive review and maturity.<br><br>I.e. th=
e chairs should ask FIRST, informally, if folks think we&#39;re ready to WG=
LC, and wait a bit for answers.<br>
The bar for saying &quot;no&quot; should be fairly low, and only in the abs=
ence of lots of positive &quot;hum&quot; should WGLC proceed.<br><br>I woul=
d suggest the chairs review the processes adopted in other (more mature) WG=
s, such as dnsext, for better processes and procedures.<br>
E.g. commitment of &gt;=3D5 reviewers to review, prior to WGLC. This exclud=
es authors, of course, from the review process.<br>It has worked very well =
there, IMHO.<br><br>Given that, as Danny notes, the entire content of -prot=
ocol depends on -requirements, which itself depends on -threats, I have to =
concur with him - &quot;NO&quot; to proceeding at this time.<br>
<br>So, to be clear:<br>- I don&#39;t think that, even if it were otherwise=
 ready, that it wold be appropriate to WGLC the -protocol doc<br>- I do not=
 believe the -protocol doc is ready to go (independent of the gating issue)=
<br>
<br>There are several areas that are not adequately settled, especially in =
the pcount=3D0 and transition areas.<br><br>Consider this a formal request =
to bounce this document out of WGLC.<br><br>It would be fine to discuss on =
the interim meeting, and there does not need to be a WGLC just to get discu=
ssion.<br>
<br>Brian<br><br><div class=3D"gmail_quote">On Fri, Sep 21, 2012 at 7:13 PM=
, Christopher Morrow <span dir=3D"ltr">&lt;<a href=3D"mailto:morrowc.lists@=
gmail.com" target=3D"_blank">morrowc.lists@gmail.com</a>&gt;</span> wrote:<=
br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left=
:1px #ccc solid;padding-left:1ex">
<div class=3D"im">On Fri, Sep 21, 2012 at 6:20 PM, Danny McPherson &lt;<a h=
ref=3D"mailto:danny@tcb.net">danny@tcb.net</a>&gt; wrote:<br>
&gt;<br>
&gt; I do not intend to review this document in it&#39;s current state and =
am confused how we can WG LC it while the threat and [presumably subsequent=
] requirements documents are still being developed by the WG.<br>
&gt;<br>
&gt; I would like an explanation from the chairs regarding what the intenti=
on is here.<br>
<br>
</div>I believe the hope was to stir up some discussion, interest and<br>
readers prior to the interim meeting next saturday. As with all WGLC&#39;s<=
br>
perhaps this document needs to wait on something else, or isn&#39;t ready<b=
r>
yet, or has other considerations to deal with... or is ready to fly<br>
like a baby birdie. we won&#39;t know without some discussion, and I<br>
believe there will be a bunch more of that in 8 days time.<br>
<br>
-chris<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; On Sep 20, 2012, at 10:42 AM, Danny McPherson wrote:<br>
&gt;<br>
&gt;&gt;<br>
&gt;&gt; Sandy,<br>
&gt;&gt; I don&#39;t understand how we can WG LC this document when the req=
uirements document isn&#39;t complete, and the requirements document isn&#3=
9;t complete because we&#39;re still working out the threats document.<br>

&gt;&gt;<br>
&gt;&gt; Can you explain the logic here?<br>
&gt;&gt;<br>
&gt;&gt; -danny<br>
&gt;&gt;<br>
&gt;&gt; On Sep 15, 2012, at 7:45 AM, Murphy, Sandra wrote:<br>
&gt;&gt;<br>
&gt;&gt;&gt; This starts a working group last call for draft-ietf-sidr-bgps=
ec-protocol-05. =A0The draft is available at <a href=3D"http://tools.ietf.o=
rg/html/draft-ietf-sidr-bgpsec-protocol-05" target=3D"_blank">http://tools.=
ietf.org/html/draft-ietf-sidr-bgpsec-protocol-05</a> and <a href=3D"https:/=
/datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/" target=3D"_blan=
k">https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-protocol/</a><br=
>

&gt;&gt;&gt;<br>
&gt;&gt;&gt; Please review this draft to see if you think it is ready for p=
ublication. =A0Send end comments to the list.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; The WGLC will end on 29 September 2012.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; --Sandy, speaking as wg co-chair<br>
&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt; sidr mailing list<br>
&gt;&gt;&gt; <a href=3D"mailto:sidr@ietf.org">sidr@ietf.org</a><br>
&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sidr" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/sidr</a><br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; sidr mailing list<br>
&gt;&gt; <a href=3D"mailto:sidr@ietf.org">sidr@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sidr" target=3D"_=
blank">https://www.ietf.org/mailman/listinfo/sidr</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; sidr mailing list<br>
&gt; <a href=3D"mailto:sidr@ietf.org">sidr@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sidr" target=3D"_blan=
k">https://www.ietf.org/mailman/listinfo/sidr</a><br>
_______________________________________________<br>
sidr mailing list<br>
<a href=3D"mailto:sidr@ietf.org">sidr@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sidr" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/sidr</a><br>
</div></div></blockquote></div><br>

--f46d041826d62ae6ed04ca3f4a28--

From christopher.morrow@gmail.com  Fri Sep 21 17:20:39 2012
Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6BAF21F853F for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:20:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.599
X-Spam-Level: 
X-Spam-Status: No, score=-103.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2lBD1qYRERwb for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:20:38 -0700 (PDT)
Received: from mail-vc0-f172.google.com (mail-vc0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id E270E21F84F2 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:20:37 -0700 (PDT)
Received: by vcbfo14 with SMTP id fo14so4916132vcb.31 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:20:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=Dzbii+l6SJ492elBEulyIbkwCtIR2HdgMCAxr7BGzlA=; b=TiVrH9UcMWSyJ6UDW4RO7fySx+stOaU9hTWGBx6Zn/SyvdyNrLjROC8eLqiAO6SPaf Ibe5AAvhU8wmzxYnY2YhAE7mI69RwnPneNgvoH/cwVngW9c1hNmbunA6ulEiFP1/aeDL T184bh3x4jZ4d9t7XN5UZAkn7Vw5n1BFUWZpIntHdI690Xu48JChXn2EJNRRrF3fGJcO DGRnRHsyKZMKU0EYnfipU6IyKqsY/NZSN3WAftiaLwfHiyAOtFPO1OJHrFlsrEPajPRs p3AhgEjhN+GdhBI9brhEuAs9sIan3mkrj6cPbOe9Chb4XRsiyi5SxImdxez2dPfWc+dH oeow==
MIME-Version: 1.0
Received: by 10.220.240.18 with SMTP id ky18mr3865292vcb.54.1348273233106; Fri, 21 Sep 2012 17:20:33 -0700 (PDT)
Sender: christopher.morrow@gmail.com
Received: by 10.58.216.42 with HTTP; Fri, 21 Sep 2012 17:20:33 -0700 (PDT)
In-Reply-To: <CAH1iCiq-U-_5OgQbHwLqfSnx+cWtxJ5XNg7Ok9oxFEsJ1e7QMw@mail.gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net> <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net> <CAL9jLaZs=Q5ZaWKHjBh8hgUy8hiJcs_h1e_KRvsTuFtPt4_1NQ@mail.gmail.com> <CAH1iCiq-U-_5OgQbHwLqfSnx+cWtxJ5XNg7Ok9oxFEsJ1e7QMw@mail.gmail.com>
Date: Fri, 21 Sep 2012 20:20:33 -0400
X-Google-Sender-Auth: hSRhT_Jn3EKhK4GTNeBq3bDSFM8
Message-ID: <CAL9jLaZqpM0DMOjQdESzQudZ5n1f7jESx0qK8E6=N=jpVnv1Xg@mail.gmail.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
To: Brian Dickson <brian.peter.dickson@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: Chris Morrow <morrowc@ops-netman.net>, "sidr@ietf.org wg" <sidr@ietf.org>, Sandra Murphy <Sandra.Murphy@sparta.com>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 00:20:39 -0000

On Fri, Sep 21, 2012 at 8:18 PM, Brian Dickson
<brian.peter.dickson@gmail.com> wrote:

> I don't believe it is at all appropriate to WGLC a document prior to
> substantive review and maturity.

it's on it's 5th revision, with substantive discussion along the way...

From brian.peter.dickson@gmail.com  Fri Sep 21 17:24:47 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E157221E8049 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:24:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.741
X-Spam-Level: 
X-Spam-Status: No, score=-3.741 tagged_above=-999 required=5 tests=[AWL=-0.143, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wx62AM4ZXpjB for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:24:47 -0700 (PDT)
Received: from mail-we0-f172.google.com (mail-we0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id 6780E21E8053 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:24:43 -0700 (PDT)
Received: by weyx48 with SMTP id x48so2456456wey.31 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:24:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=vXQmJ33P9XUQQA1HNKAUjQbfGNeXQVAwYuWll5dfVAw=; b=Jd5ikt1t2ZqleC6gCkVprylImGMopGLnf6zkzXFnaF5oJ5qbb96/thGhj0vjP60qfA 9JZ+mREZ5nqZY06SpIkia8xcry4Bhk736iUNKIIqH/BMREe1BisglDrScLlPRgFwltuu MRm8PSzJivyf/MlwOwS0oCtaJc+CrCrDY4tiphVhsEYaU/Rm8Gk7QtF59d3ssnMA/EUb AG9Z7B2qNaJIO3epgd/hlkNIRjgZ4dQLkumiPRQykSZPoOvo9KMUm9GXPlaQ49qX5uks SxCDNR6O+Pd97F+317n9f8DQYhwuM+Hr3CIqQP2zLSNw4vg7XUH0VBVWZLr/W6TgWou5 pySA==
MIME-Version: 1.0
Received: by 10.216.145.88 with SMTP id o66mr3792816wej.169.1348273477568; Fri, 21 Sep 2012 17:24:37 -0700 (PDT)
Received: by 10.223.145.133 with HTTP; Fri, 21 Sep 2012 17:24:37 -0700 (PDT)
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BFF7@Hermes.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net> <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net> <24B20D14B2CD29478C8D5D6E9CBB29F625F7BFF7@Hermes.columbia.ads.sparta.com>
Date: Fri, 21 Sep 2012 20:24:37 -0400
Message-ID: <CAH1iCiqwsV9+xUanmPikxCOu5QhC1jgzo1+r4KONhmD15e_50g@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
Content-Type: multipart/alternative; boundary=0016e6d646a6b0c85304ca3f6168
Cc: Chris Morrow <morrowc@ops-netman.net>, "sidr@ietf.org wg" <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 00:24:48 -0000

--0016e6d646a6b0c85304ca3f6168
Content-Type: text/plain; charset=ISO-8859-1

With all due respect, Sandy, what are you smoking?

If there is a dependency that goes "A, then B, then C", then CLEARLY "C"
needs to bake longer than "B", and "B" longer than "A". Maybe not strictly
relative elapsed time, but certainly there would need to be a post-A
significant time before "B" finishes. Ditto for B->C.

In most cases, effort on C and B is likely to be potentially wasted prior
to A, and worse, it leads to work on "C" and "B" resulting in wrong-headed
decisions concerning "A", precisely *because* of the work on "B" and "C"
would otherwise be wasted.

The history of tech is littered with (frequently DOD subcontractors')
wasted efforts that end up bloating projects or putting them into dead-end
paths. ADA, anyone?

Let's look at the reality, rather than the theory, when evaluating
documents' progress and status, please. Especially when one is "chair" of a
WG.

I don't think putting any sort of time pressure is appropriate when we are
talking about a critical infrastructure security protocol.

Brian



On Fri, Sep 21, 2012 at 7:27 PM, Murphy, Sandra <Sandra.Murphy@sparta.com>wrote:

> The protocol, threats and requirements documents are definitely tied
> together and will progress together.  The three documents have been in the
> working group for the same length of time, so you'd think that they, being
> so tied, would have had equal attention and be equally mature.
>
> On the non-process, reality side of things:  The newest protocol draft
> came out on 7 Sep and I asked the working group to "look at this draft
> right away" because it would be discussed at the interim meeting.  After
> eight days with no comments, a wglc seemed a good idea.  Sad that our lives
> need a wglc to produce participation, but it is what it is.
>
> --Sandy
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
>

--0016e6d646a6b0c85304ca3f6168
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

With all due respect, Sandy, what are you smoking?<br><br>If there is a dep=
endency that goes &quot;A, then B, then C&quot;, then CLEARLY &quot;C&quot;=
 needs to bake longer than &quot;B&quot;, and &quot;B&quot; longer than &qu=
ot;A&quot;. Maybe not strictly relative elapsed time, but certainly there w=
ould need to be a post-A significant time before &quot;B&quot; finishes. Di=
tto for B-&gt;C.<br>
<br>In most cases, effort on C and B is likely to be potentially wasted pri=
or to A, and worse, it leads to work on &quot;C&quot; and &quot;B&quot; res=
ulting in wrong-headed decisions concerning &quot;A&quot;, precisely *becau=
se* of the work on &quot;B&quot; and &quot;C&quot; would otherwise be waste=
d.<br>
<br>The history of tech is littered with (frequently DOD subcontractors&#39=
;) wasted efforts that end up bloating projects or putting them into dead-e=
nd paths. ADA, anyone?<br><br>Let&#39;s look at the reality, rather than th=
e theory, when evaluating documents&#39; progress and status, please. Espec=
ially when one is &quot;chair&quot; of a WG.<br>
<br>I don&#39;t think putting any sort of time pressure is appropriate when=
 we are talking about a critical infrastructure security protocol.<br><br>B=
rian<br><br><br><br><div class=3D"gmail_quote">On Fri, Sep 21, 2012 at 7:27=
 PM, Murphy, Sandra <span dir=3D"ltr">&lt;<a href=3D"mailto:Sandra.Murphy@s=
parta.com" target=3D"_blank">Sandra.Murphy@sparta.com</a>&gt;</span> wrote:=
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">The protocol, threats and requirements docum=
ents are definitely tied together and will progress together. =A0The three =
documents have been in the working group for the same length of time, so yo=
u&#39;d think that they, being so tied, would have had equal attention and =
be equally mature.<br>

<br>
On the non-process, reality side of things: =A0The newest protocol draft ca=
me out on 7 Sep and I asked the working group to &quot;look at this draft r=
ight away&quot; because it would be discussed at the interim meeting. =A0Af=
ter eight days with no comments, a wglc seemed a good idea. =A0Sad that our=
 lives need a wglc to produce participation, but it is what it is.<br>

<br>
--Sandy<br>
<div class=3D"HOEnZb"><div class=3D"h5">___________________________________=
____________<br>
sidr mailing list<br>
<a href=3D"mailto:sidr@ietf.org">sidr@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sidr" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/sidr</a><br>
</div></div></blockquote></div><br>

--0016e6d646a6b0c85304ca3f6168--

From brian.peter.dickson@gmail.com  Fri Sep 21 17:28:49 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACB3921F8501 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:28:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x5-X3KLg5UpG for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:28:48 -0700 (PDT)
Received: from mail-wi0-f170.google.com (mail-wi0-f170.google.com [209.85.212.170]) by ietfa.amsl.com (Postfix) with ESMTP id 2443721F84D7 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:28:47 -0700 (PDT)
Received: by wibcb5 with SMTP id cb5so2069194wib.1 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:28:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=1eO9gHw30Q4DHGJ3xyR051x0avp9zMZKTjgZrDm72sk=; b=jafkOxeZ4dhNWeuFmnxX5y+hiKysrvvxvRpDGXLHujUiHIIvuAEirOaSh6sMzif8pd aQw2A59G+jdjhGvWxCEk7p77NLy863jSm/NECBFFSFZddr6SOlRmSfkboRlfYZdOOJE0 jsxJrpyAyKMrd1woscRbbLB6g+O9MFtKUnJMYl0Cpi6GDadxISIJ5iZzIf7CgYIedf/6 KpGuflvc+8qh8t1SL3So4ghipZ3oEFW3n4uVXaWy7hoWftskFMzMi3ax26vWKTTaPRo3 QzscKDdAZ0fuG4w14OKrIUsnhjrFEa2PzFH0kGMCLweDtlimsaays0Pmg+KRlnQmqnmT oU+Q==
MIME-Version: 1.0
Received: by 10.216.145.88 with SMTP id o66mr3797383wej.169.1348273727276; Fri, 21 Sep 2012 17:28:47 -0700 (PDT)
Received: by 10.223.145.133 with HTTP; Fri, 21 Sep 2012 17:28:47 -0700 (PDT)
In-Reply-To: <CAL9jLaZqpM0DMOjQdESzQudZ5n1f7jESx0qK8E6=N=jpVnv1Xg@mail.gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net> <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net> <CAL9jLaZs=Q5ZaWKHjBh8hgUy8hiJcs_h1e_KRvsTuFtPt4_1NQ@mail.gmail.com> <CAH1iCiq-U-_5OgQbHwLqfSnx+cWtxJ5XNg7Ok9oxFEsJ1e7QMw@mail.gmail.com> <CAL9jLaZqpM0DMOjQdESzQudZ5n1f7jESx0qK8E6=N=jpVnv1Xg@mail.gmail.com>
Date: Fri, 21 Sep 2012 20:28:47 -0400
Message-ID: <CAH1iCirBLeZVBWQv8L6ECW_Nzx1LwObRL_5+oUfqxXwzuD_Rug@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Christopher Morrow <morrowc.lists@gmail.com>
Content-Type: multipart/alternative; boundary=0016e6d646a69308bb04ca3f7024
Cc: Chris Morrow <morrowc@ops-netman.net>, "sidr@ietf.org wg" <sidr@ietf.org>, Sandra Murphy <Sandra.Murphy@sparta.com>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 00:28:49 -0000

--0016e6d646a69308bb04ca3f7024
Content-Type: text/plain; charset=ISO-8859-1

Discussion yes, revisions, not so much, and in particular, -threats is not
done. WGLC is inappropriate prior to -threats completion in WG.

Plus, -threats has not adequately accommodated criticism. Doing
s/BGPSEC/ANOTHER_NAME/g does not qualify as "substantive", IMHO.

There was no review post -05 publication. Review prior to that point is not
relevant, IMHO.

At a minimum, those whose comments were in theory addressed, should be
given the opportunity, each and every one of them, to speak up and be heard.

It is the job of the chairs to track issues and confirm with commentators
that revisions are adequate.

I am not a chair.

Brian

On Fri, Sep 21, 2012 at 8:20 PM, Christopher Morrow <morrowc.lists@gmail.com
> wrote:

> On Fri, Sep 21, 2012 at 8:18 PM, Brian Dickson
> <brian.peter.dickson@gmail.com> wrote:
>
> > I don't believe it is at all appropriate to WGLC a document prior to
> > substantive review and maturity.
>
> it's on it's 5th revision, with substantive discussion along the way...
>

--0016e6d646a69308bb04ca3f7024
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Discussion yes, revisions, not so much, and in particular, -threats is not =
done. WGLC is inappropriate prior to -threats completion in WG.<br><br>Plus=
, -threats has not adequately accommodated criticism. Doing s/BGPSEC/ANOTHE=
R_NAME/g does not qualify as &quot;substantive&quot;, IMHO.<br>
<br>There was no review post -05 publication. Review prior to that point is=
 not relevant, IMHO.<br><br>At a minimum, those whose comments were in theo=
ry addressed, should be given the opportunity, each and every one of them, =
to speak up and be heard.<br>
<br>It is the job of the chairs to track issues and confirm with commentato=
rs that revisions are adequate.<br><br>I am not a chair.<br><br>Brian<br><b=
r><div class=3D"gmail_quote">On Fri, Sep 21, 2012 at 8:20 PM, Christopher M=
orrow <span dir=3D"ltr">&lt;<a href=3D"mailto:morrowc.lists@gmail.com" targ=
et=3D"_blank">morrowc.lists@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"im">On Fri, Sep 21, 2012 at 8:=
18 PM, Brian Dickson<br>
&lt;<a href=3D"mailto:brian.peter.dickson@gmail.com">brian.peter.dickson@gm=
ail.com</a>&gt; wrote:<br>
<br>
&gt; I don&#39;t believe it is at all appropriate to WGLC a document prior =
to<br>
&gt; substantive review and maturity.<br>
<br>
</div>it&#39;s on it&#39;s 5th revision, with substantive discussion along =
the way...<br>
</blockquote></div><br>

--0016e6d646a69308bb04ca3f7024--

From randy@psg.com  Fri Sep 21 17:32:08 2012
Return-Path: <randy@psg.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B43621F853D for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:32:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F4fatijcamq5 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:32:07 -0700 (PDT)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:1::36]) by ietfa.amsl.com (Postfix) with ESMTP id B38D621F84FA for <sidr@ietf.org>; Fri, 21 Sep 2012 17:32:07 -0700 (PDT)
Received: from localhost ([127.0.0.1] helo=rair.psg.com.psg.com) by ran.psg.com with esmtp (Exim 4.80 (FreeBSD)) (envelope-from <randy@psg.com>) id 1TFDde-000PoZ-Ed; Sat, 22 Sep 2012 00:32:06 +0000
Date: Sat, 22 Sep 2012 09:32:05 +0900
Message-ID: <m27grmhp8a.wl%randy@psg.com>
From: Randy Bush <randy@psg.com>
To: Sandra Murphy <Sandra.Murphy@sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BFF7@Hermes.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.7 - "Harue")
Content-Type: text/plain; charset=US-ASCII
Cc: sidr wg <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 00:32:08 -0000

> The newest protocol draft came out on 7 Sep and I asked the working
> group to "look at this draft right away" because it would be discussed
> at the interim meeting.  After eight days with no comments, a wglc
> seemed a good idea.  Sad that our lives need a wglc to produce
> participation, but it is what it is.

i note that you got one actual reivew, which is good.  the only other
stuff i have seen is people telling the chairs what the process should
be, embarrassing.  i promise a detailed re-read in the next days.

randy


From christopher.morrow@gmail.com  Fri Sep 21 17:52:02 2012
Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9052A21E80BF for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:52:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.599
X-Spam-Level: 
X-Spam-Status: No, score=-103.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UAZ7u6KufgOt for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:52:02 -0700 (PDT)
Received: from mail-vb0-f44.google.com (mail-vb0-f44.google.com [209.85.212.44]) by ietfa.amsl.com (Postfix) with ESMTP id F0EA421E80D7 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:52:01 -0700 (PDT)
Received: by vbbfc26 with SMTP id fc26so4842968vbb.31 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:52:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=kmzMpc9QhNlXwx9C9XwR5o4TI4yNqzmpf7GqScXOwfE=; b=JL5mKo8OBp95QT06poDlUizgRSve77ug6l7/jMXrhuVxy4Hl/IhL4k90eSd8rtLqzJ Ts2wM4E33s9o1e9qej13PrctMbBvSLFUdU5Zanj3Ltop39BO2r7n1HPXs6T6AEqGSKS4 pbdHon6eH4yUPBOh2eApBRv+UN3r5Tii1CBqtyQrhNqwOQrflmSdai/+DJK9w2egnmsM 1+rn2x+VDa/Zpy5f/1V62pDY72nXNkwQp3lDw2O2Uliqd6Jr8MAckvmO8pJgWNw9nK/M SJ0vBhnGn7ajA67m1Sq9IUYfEAoFvjFBlAQnAMtjRqkV/VNM4OjGIcBkVOeifL4KH1pd xgag==
MIME-Version: 1.0
Received: by 10.58.0.82 with SMTP id 18mr4131707vec.0.1348275121340; Fri, 21 Sep 2012 17:52:01 -0700 (PDT)
Sender: christopher.morrow@gmail.com
Received: by 10.58.216.42 with HTTP; Fri, 21 Sep 2012 17:52:01 -0700 (PDT)
In-Reply-To: <CAH1iCirBLeZVBWQv8L6ECW_Nzx1LwObRL_5+oUfqxXwzuD_Rug@mail.gmail.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net> <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net> <CAL9jLaZs=Q5ZaWKHjBh8hgUy8hiJcs_h1e_KRvsTuFtPt4_1NQ@mail.gmail.com> <CAH1iCiq-U-_5OgQbHwLqfSnx+cWtxJ5XNg7Ok9oxFEsJ1e7QMw@mail.gmail.com> <CAL9jLaZqpM0DMOjQdESzQudZ5n1f7jESx0qK8E6=N=jpVnv1Xg@mail.gmail.com> <CAH1iCirBLeZVBWQv8L6ECW_Nzx1LwObRL_5+oUfqxXwzuD_Rug@mail.gmail.com>
Date: Fri, 21 Sep 2012 20:52:01 -0400
X-Google-Sender-Auth: pQP9-BElrHFizb9ZZOSz47yH3qc
Message-ID: <CAL9jLaYiHQiStrG511j_hDQaupGwNsCEfsPULyJoQqVe+Q-9fg@mail.gmail.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
To: Brian Dickson <brian.peter.dickson@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: "sidr@ietf.org wg" <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 00:52:02 -0000

I think your objection was noted... no need to belabour the point (or
become uncivil)

thanks for your opinion.
-chris

From christopher.morrow@gmail.com  Fri Sep 21 17:52:22 2012
Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 739D621E80D7 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:52:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.599
X-Spam-Level: 
X-Spam-Status: No, score=-103.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z3Uo3UvGMDgm for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 17:52:22 -0700 (PDT)
Received: from mail-vc0-f172.google.com (mail-vc0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id DB47F21E80BF for <sidr@ietf.org>; Fri, 21 Sep 2012 17:52:21 -0700 (PDT)
Received: by vcbfo14 with SMTP id fo14so4931170vcb.31 for <sidr@ietf.org>; Fri, 21 Sep 2012 17:52:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=LjcSx/cIoQsrrtnNeXRNhaJnp1A/inif7vX0nO8bNYo=; b=XyMO4i15gg+knKS9/bcOprj6eNHM+dPlC5uWfVn6/8cx+0eZar2JtlmJ853cVPfNDV v9u6eTXs1h4aXuDX4pbxrzVYPdpHERGHwcJFa8KCFrZvr+SGWcwKu4XvVURCZcdbsabF hsfYmDSL1C9l9ZzsY6kiVAVi/io56YAiqzT/ojp0rPZSFunWCKtDsYCOmC6G2wUlErVn CFS9e7Pd/WrxDu/G3eF0v+NMUaVRCUWZcHDABCHqPkdkkU5K0/FiaJCk2Vq60Enwc9tF CWEVFbaFwBGUeW+TPUOR5lYgikjMZv8W+NhPP8jnQrsGyzXBEoxOVFccS+UcfLtE94O6 lAIQ==
MIME-Version: 1.0
Received: by 10.52.88.18 with SMTP id bc18mr3175111vdb.99.1348275141368; Fri, 21 Sep 2012 17:52:21 -0700 (PDT)
Sender: christopher.morrow@gmail.com
Received: by 10.58.216.42 with HTTP; Fri, 21 Sep 2012 17:52:21 -0700 (PDT)
In-Reply-To: <m27grmhp8a.wl%randy@psg.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net> <24B20D14B2CD29478C8D5D6E9CBB29F625F7BFF7@Hermes.columbia.ads.sparta.com> <m27grmhp8a.wl%randy@psg.com>
Date: Fri, 21 Sep 2012 20:52:21 -0400
X-Google-Sender-Auth: M29cvk_cSKJ1UTKUmeWHely-jSw
Message-ID: <CAL9jLaZKphD8_ShCOefWYL3wLi3jyPMT6Ad+hMjDxC3N=MFdZQ@mail.gmail.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
To: Randy Bush <randy@psg.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: Sandra Murphy <Sandra.Murphy@sparta.com>, sidr wg <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 00:52:22 -0000

On Fri, Sep 21, 2012 at 8:32 PM, Randy Bush <randy@psg.com> wrote:

> i note that you got one actual reivew, which is good.  the only other
> stuff i have seen is people telling the chairs what the process should
> be, embarrassing.  i promise a detailed re-read in the next days.

thnx!

From eosterweil@verisign.com  Fri Sep 21 18:15:07 2012
Return-Path: <eosterweil@verisign.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 175EC21F84EA for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 18:15:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nwHr8rcP04pC for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 18:15:06 -0700 (PDT)
Received: from exprod6og110.obsmtp.com (exprod6og110.obsmtp.com [64.18.1.25]) by ietfa.amsl.com (Postfix) with ESMTP id E5A1A21F84EB for <sidr@ietf.org>; Fri, 21 Sep 2012 18:15:01 -0700 (PDT)
Received: from peregrine.verisign.com ([216.168.239.74]) (using TLSv1) by exprod6ob110.postini.com ([64.18.5.12]) with SMTP ID DSNKUF0RFMRkbDhzMQ4hh5UneBUZMBkAHHH5@postini.com; Fri, 21 Sep 2012 18:15:05 PDT
Received: from brn1wnexcas02.vcorp.ad.vrsn.com (brn1wnexcas02.vcorp.ad.vrsn.com [10.173.152.206]) by peregrine.verisign.com (8.13.6/8.13.4) with ESMTP id q8M1EuAf027605 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 21 Sep 2012 21:14:56 -0400
Received: from BRN1WNEXMBX02.vcorp.ad.vrsn.com ([::1]) by brn1wnexcas02.vcorp.ad.vrsn.com ([::1]) with mapi id 14.02.0318.001; Fri, 21 Sep 2012 21:14:56 -0400
From: "Osterweil, Eric" <eosterweil@verisign.com>
To: "'randy@psg.com'" <randy@psg.com>, "'Sandra.Murphy@sparta.com'" <Sandra.Murphy@sparta.com>
Thread-Topic: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
Thread-Index: Ac2TN5E+gtWY3jVQTo2aIJ20K9PIbgEKBiOAAEJH9ID//8xkPoAAWHiAgAA3FX0=
Date: Sat, 22 Sep 2012 01:14:55 +0000
Message-ID: <CE0C4A314044C843AEE900875D90D54E1B3EB9@BRN1WNEXMBX02.vcorp.ad.vrsn.com>
In-Reply-To: <m27grmhp8a.wl%randy@psg.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.173.148.16]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "'sidr@ietf.org'" <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 01:15:07 -0000

Dear wg and wg chairs (those without and those with hats),

My comments on the requirements draft have never been addressed. This threa=
d highlights a dependency that exists between the requirements of this prot=
ocol and the design of this protocol.  I do not think that (as engineers) s=
hould embrace the backward nature of this situation.

I object to this draft until we can mature the drafts it depends on.

Eric

----- Original Message -----
From: Randy Bush [mailto:randy@psg.com]
Sent: Friday, September 21, 2012 08:32 PM=0A=
To: Sandra Murphy <Sandra.Murphy@sparta.com>
Cc: sidr wg <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05

> The newest protocol draft came out on 7 Sep and I asked the working
> group to "look at this draft right away" because it would be discussed
> at the interim meeting.  After eight days with no comments, a wglc
> seemed a good idea.  Sad that our lives need a wglc to produce
> participation, but it is what it is.

i note that you got one actual reivew, which is good.  the only other
stuff i have seen is people telling the chairs what the process should
be, embarrassing.  i promise a detailed re-read in the next days.

randy

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

From randy@psg.com  Fri Sep 21 18:49:55 2012
Return-Path: <randy@psg.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF85C21E8053 for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 18:49:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j-FU-hTS8Gef for <sidr@ietfa.amsl.com>; Fri, 21 Sep 2012 18:49:55 -0700 (PDT)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:1::36]) by ietfa.amsl.com (Postfix) with ESMTP id 713F221E8041 for <sidr@ietf.org>; Fri, 21 Sep 2012 18:49:55 -0700 (PDT)
Received: from localhost ([127.0.0.1] helo=rair.psg.com.psg.com) by ran.psg.com with esmtp (Exim 4.80 (FreeBSD)) (envelope-from <randy@psg.com>) id 1TFEqu-0000I4-Rn; Sat, 22 Sep 2012 01:49:53 +0000
Date: Sat, 22 Sep 2012 10:49:51 +0900
Message-ID: <m2y5k2g728.wl%randy@psg.com>
From: Randy Bush <randy@psg.com>
To: Eric Osterweil <eosterweil@verisign.com>
In-Reply-To: <CE0C4A314044C843AEE900875D90D54E1B3EB9@BRN1WNEXMBX02.vcorp.ad.vrsn.com>
References: <m27grmhp8a.wl%randy@psg.com> <CE0C4A314044C843AEE900875D90D54E1B3EB9@BRN1WNEXMBX02.vcorp.ad.vrsn.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.7 - "Harue")
Content-Type: text/plain; charset=US-ASCII
Cc: sidr wg <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 01:49:55 -0000

> My comments on the requirements draft have never been addressed.

not ignoring you.  i have kept them and plan a rev.  chairs have not
told me it's a rush so i am trying not to do a rev a day on this one.

randy

From danny@tcb.net  Sat Sep 22 10:24:58 2012
Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B155321F8690 for <sidr@ietfa.amsl.com>; Sat, 22 Sep 2012 10:24:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.399
X-Spam-Level: 
X-Spam-Status: No, score=-102.399 tagged_above=-999 required=5 tests=[AWL=0.200, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f5uhAf0WcorN for <sidr@ietfa.amsl.com>; Sat, 22 Sep 2012 10:24:58 -0700 (PDT)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id 3053B21F8674 for <sidr@ietf.org>; Sat, 22 Sep 2012 10:24:58 -0700 (PDT)
Received: by dog.tcb.net (Postfix, from userid 0) id 6471A2680C7; Sat, 22 Sep 2012 11:24:57 -0600 (MDT)
Received: from dul1dmcphers-m2.home (pool-71-171-124-149.clppva.fios.verizon.net [71.171.124.149]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; Sat, 22 Sep 2012 11:24:57 -0600 (MDT) (envelope-from danny@tcb.net)
X-Avenger: version=0.7.8; receiver=dog.tcb.net; client-ip=71.171.124.149; client-port=52570; syn-fingerprint=65535:48:1:64:M1460,N,W1,N,N,T,S MacOS 10.4.8; data-bytes=0
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Danny McPherson <danny@tcb.net>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BFF7@Hermes.columbia.ads.sparta.com>
Date: Sat, 22 Sep 2012 13:24:46 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <C64D75DB-759F-4DC1-B02B-C0071043734D@tcb.net>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net>, <6D70F892-6696-488D-9EBB-B23C6327C3A3@tcb.net> <24B20D14B2CD29478C8D5D6E9CBB29F625F7BFF7@Hermes.columbia.ads.sparta.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
X-Mailer: Apple Mail (2.1278)
Cc: Chris Morrow <morrowc@ops-netman.net>, "sidr@ietf.org wg" <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 17:24:58 -0000

On Sep 21, 2012, at 7:27 PM, Murphy, Sandra wrote:

> er.  The three documents have been in the working group for the same =
length of time, so you'd think that they, being so tied, would have had =
equal attention and be equally mature.

Sandy - The very fact that "The three documents have been in the working =
group for the same length of time" is PRECISELY why I have this concern. =
=20

Until we've agreed upon requirements we intend to design for I don't =
know what problems we profess to be solving in a proposed protocol and =
therefore I am not capable of assessing if a protocol is meeting said =
requirements - the point of transparency here is so that others [who =
didn't bring these documents into the WG as a set] can have a fair say =
about their content before we progress. =20

Further, if there wasn't such an apparent disconnect at the earlier =
stages of the process (e.g., what problems we are solving for), or IF we =
were designing these things in an IRTF group as EXPERIMENTAL and not as =
IETF Standards Track documents, I might be afforded the opportunity to =
care less.

-danny


From danny@tcb.net  Sat Sep 22 10:55:17 2012
Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4C1521F86AA for <sidr@ietfa.amsl.com>; Sat, 22 Sep 2012 10:55:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.449
X-Spam-Level: 
X-Spam-Status: No, score=-102.449 tagged_above=-999 required=5 tests=[AWL=0.150, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MLUjJ-ximSUW for <sidr@ietfa.amsl.com>; Sat, 22 Sep 2012 10:55:16 -0700 (PDT)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id 4AF6921F8584 for <sidr@ietf.org>; Sat, 22 Sep 2012 10:55:16 -0700 (PDT)
Received: by dog.tcb.net (Postfix, from userid 0) id 074B42680C7; Sat, 22 Sep 2012 11:55:16 -0600 (MDT)
Received: from dul1dmcphers-m2.home (pool-71-171-124-149.clppva.fios.verizon.net [71.171.124.149]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; for sidr@ietf.org; Sat, 22 Sep 2012 11:55:15 -0600 (MDT) (envelope-from danny@tcb.net)
X-Avenger: version=0.7.8; receiver=dog.tcb.net; client-ip=71.171.124.149; client-port=53769; syn-fingerprint=65535:48:1:64:M1460,N,W1,N,N,T,S MacOS 10.4.8; data-bytes=0
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1278)
From: Danny McPherson <danny@tcb.net>
In-Reply-To: <m27grmhp8a.wl%randy@psg.com>
Date: Sat, 22 Sep 2012 13:55:05 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <D738805E-3AB7-4377-A5BD-662B70A74553@tcb.net>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <EB8264B4-5C6A-4877-BA7B-034C95E7605B@tcb.net> <m27grmhp8a.wl%randy@psg.com>
To: sidr wg <sidr@ietf.org>
X-Mailer: Apple Mail (2.1278)
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Sep 2012 17:55:17 -0000

On Sep 21, 2012, at 8:32 PM, Randy Bush wrote:

> i note that you got one actual reivew, which is good.  the only other
> stuff i have seen is people telling the chairs what the process should
> be, embarrassing.=20

I concur - the stated fact that we're still awaiting revisions to the =
threats document and the requirements draft has long-standing =
unaddressed comments and the protocol document is being WG last called =
-- it is indeed embarrassing.

Given the potential array of implications of work here, as well as the =
climate surrounding Internet governance and the global stability of the =
routing system, open standards development and transparency, we ought to =
have the good sense to follow our own processes.  If solutions champions =
want less friction take it to the IRTF and make it EXPERIMENTAL...

Feeling a bit like "the wall" here [1]....

-danny


[1] http://archive.psg.com/051000.ccr-ivtf.html=

From internet-drafts@ietf.org  Sun Sep 23 10:42:22 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD13F21F84D5; Sun, 23 Sep 2012 10:42:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.492
X-Spam-Level: 
X-Spam-Status: No, score=-102.492 tagged_above=-999 required=5 tests=[AWL=0.107, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dOyrFMiLbRB0; Sun, 23 Sep 2012 10:42:21 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5AAA421F84FA; Sun, 23 Sep 2012 10:42:21 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120923174221.23012.29930.idtracker@ietfa.amsl.com>
Date: Sun, 23 Sep 2012 10:42:21 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-rpki-rtr-protocol-mib-02.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Sep 2012 17:42:22 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Secure Inter-Domain Routing Working Group=
 of the IETF.

	Title           : Definitions of Managed Objects for the RPKI-Router Proto=
col
	Author(s)       : Randy Bush
                          Bert Wijnen
                          Keyur Patel
                          Michael Baer
	Filename        : draft-ietf-sidr-rpki-rtr-protocol-mib-02.txt
	Pages           : 21
	Date            : 2012-09-23

Abstract:
   This document defines a portion of the Management Information Base
   (MIB) for use with network management protocols in the Internet
   community.  In particular, it describes objects used for monitoring
   the RPKI Router protocol.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-rpki-rtr-protocol-mib

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-rpki-rtr-protocol-mib-02

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-rpki-rtr-protocol-mib-02


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From internet-drafts@ietf.org  Sun Sep 23 12:27:43 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4B0821F84F3; Sun, 23 Sep 2012 12:27:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.494
X-Spam-Level: 
X-Spam-Status: No, score=-102.494 tagged_above=-999 required=5 tests=[AWL=0.105, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5xFvZ5eEfUMO; Sun, 23 Sep 2012 12:27:43 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C0AA21F84DD; Sun, 23 Sep 2012 12:27:43 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120923192743.22828.3547.idtracker@ietfa.amsl.com>
Date: Sun, 23 Sep 2012 12:27:43 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-algorithm-agility-07.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Sep 2012 19:27:43 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Secure Inter-Domain Routing Working Group=
 of the IETF.

	Title           : Algorithm Agility Procedure for RPKI.
	Author(s)       : Roque Gagliano
                          Stephen Kent
                          Sean Turner
	Filename        : draft-ietf-sidr-algorithm-agility-07.txt
	Pages           : 30
	Date            : 2012-09-23

Abstract:
   This document specifies the process that Certification Authorities
   (CAs) and Relying Parties (RPs) participating in the Resource Public
   Key Infrastructure (RPKI) will need to follow to transition to a new
   (and probably cryptographically stronger) algorithm set.  The process
   is expected to be completed in a time scale of months or years.
   Consequently, no emergency transition is specified.  The transition
   procedure defined in this document supports only a top-down migration
   (parent migrates before children).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-algorithm-agility

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-algorithm-agility-07

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-algorithm-agility-07


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From rogaglia@cisco.com  Sun Sep 23 12:30:52 2012
Return-Path: <rogaglia@cisco.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E04DF21F84F2 for <sidr@ietfa.amsl.com>; Sun, 23 Sep 2012 12:30:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G5I9aMYj4lFC for <sidr@ietfa.amsl.com>; Sun, 23 Sep 2012 12:30:51 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) by ietfa.amsl.com (Postfix) with ESMTP id 8236621F847D for <sidr@ietf.org>; Sun, 23 Sep 2012 12:30:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7509; q=dns/txt; s=iport; t=1348428649; x=1349638249; h=from:to:subject:date:message-id:references:mime-version; bh=iRb7DJgWmLUD7+1xDpBySvY7oBgP9AGiyT1g7YiZgiY=; b=jIT8qQuqfc76U9yhaNYTCQ4TL/FvsE51QlgpvoL5Hex5UTNG4s+Y+/iT P5S5QDRlQyQObkfhhxy/7mY69I7sbgM2hLDLmwR4WDJmVlukXMj7iNJdq u1gu3Wm5zqHb969I97k4qSD0lmg2NzIgeOg0DFjxkGRt2DpX07S7HwQV6 g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Am8HACFjX1CtJXHA/2dsb2JhbABEiGqkBIhnAYYhgjqBCIIgAQEBBBIBZBICARkDAQIoBzIUBwIIAgQTCRmHYwuYR58WixyFSmADlWWBFY0lgWmCZ4IX
X-IronPort-AV: E=Sophos;i="4.80,471,1344211200";  d="scan'208,217";a="124488337"
Received: from rcdn-core2-5.cisco.com ([173.37.113.192]) by rcdn-iport-3.cisco.com with ESMTP; 23 Sep 2012 19:30:49 +0000
Received: from xhc-aln-x14.cisco.com (xhc-aln-x14.cisco.com [173.36.12.88]) by rcdn-core2-5.cisco.com (8.14.5/8.14.5) with ESMTP id q8NJUmim020863 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <sidr@ietf.org>; Sun, 23 Sep 2012 19:30:48 GMT
Received: from xmb-rcd-x01.cisco.com ([169.254.1.113]) by xhc-aln-x14.cisco.com ([173.36.12.88]) with mapi id 14.02.0318.001; Sun, 23 Sep 2012 14:30:47 -0500
From: "Roque Gagliano (rogaglia)" <rogaglia@cisco.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: New Version Notification for draft-ietf-sidr-algorithm-agility-07.txt
Thread-Index: AQHNmcGG9G9JP/KW5k+1PTtRl35ZCQ==
Date: Sun, 23 Sep 2012 19:30:47 +0000
Message-ID: <2D59CB47-921C-4CAE-AA78-4188BF034B36@cisco.com>
References: <20120923192743.22828.34095.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.61.103.68]
x-tm-as-product-ver: SMEX-10.2.0.1135-7.000.1014-19204.004
x-tm-as-result: No--38.644700-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: multipart/alternative; boundary="_000_2D59CB47921C4CAEAA784188BF034B36ciscocom_"
MIME-Version: 1.0
Subject: [sidr] Fwd: New Version Notification for draft-ietf-sidr-algorithm-agility-07.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Sep 2012 19:30:52 -0000

--_000_2D59CB47921C4CAEAA784188BF034B36ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi WG,

This update took care of some nits detected by the WG chairs before heading=
 to IETF LC.

Roque


   From 06 to 07:

   1.  Added definition for "Correspond"

   2.  Added reference of correspondence between suites in phase 2 and 3

   3.  Small nit on the revocation definition.


Begin forwarded message:

From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: September 23, 2012 9:27:43 PM GMT+02:00
To: <rogaglia@cisco.com<mailto:rogaglia@cisco.com>>
Cc: <turners@ieca.com<mailto:turners@ieca.com>>, <kent@bbn.com<mailto:kent@=
bbn.com>>
Subject: New Version Notification for draft-ietf-sidr-algorithm-agility-07.=
txt


A new version of I-D, draft-ietf-sidr-algorithm-agility-07.txt
has been successfully submitted by Roque Gagliano and posted to the
IETF repository.

Filename: draft-ietf-sidr-algorithm-agility
Revision: 07
Title: Algorithm Agility Procedure for RPKI.
Creation date: 2012-09-23
WG ID: sidr
Number of pages: 30
URL:             http://www.ietf.org/internet-drafts/draft-ietf-sidr-algori=
thm-agility-07.txt
Status:          http://datatracker.ietf.org/doc/draft-ietf-sidr-algorithm-=
agility
Htmlized:        http://tools.ietf.org/html/draft-ietf-sidr-algorithm-agili=
ty-07
Diff:            http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-algorit=
hm-agility-07

Abstract:
  This document specifies the process that Certification Authorities
  (CAs) and Relying Parties (RPs) participating in the Resource Public
  Key Infrastructure (RPKI) will need to follow to transition to a new
  (and probably cryptographically stronger) algorithm set.  The process
  is expected to be completed in a time scale of months or years.
  Consequently, no emergency transition is specified.  The transition
  procedure defined in this document supports only a top-down migration
  (parent migrates before children).




The IETF Secretariat



--_000_2D59CB47921C4CAEAA784188BF034B36ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <E703912301DCD943B4DB6132721D88DA@cisco.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
Hi WG,
<div><br>
</div>
<div>This update took care of some nits detected by the WG chairs before he=
ading to IETF LC.</div>
<div><br>
</div>
<div>Roque</div>
<div><br>
</div>
<div>
<pre>   From 06 to 07:

   1.  Added definition for &quot;Correspond&quot;

   2.  Added reference of correspondence between suites in phase 2 and 3

   3.  Small nit on the revocation definition.</pre>
<div><br>
</div>
<div><br>
<div>Begin forwarded message:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margi=
n-left: 0px;">
<span style=3D"font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, =
0, 1);"><b>From:
</b></span><span style=3D"font-family:'Helvetica'; font-size:medium;">&lt;<=
a href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;=
<br>
</span></div>
<div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margi=
n-left: 0px;">
<span style=3D"font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, =
0, 1);"><b>Date:
</b></span><span style=3D"font-family:'Helvetica'; font-size:medium;">Septe=
mber 23, 2012 9:27:43 PM GMT&#43;02:00<br>
</span></div>
<div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margi=
n-left: 0px;">
<span style=3D"font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, =
0, 1);"><b>To:
</b></span><span style=3D"font-family:'Helvetica'; font-size:medium;">&lt;<=
a href=3D"mailto:rogaglia@cisco.com">rogaglia@cisco.com</a>&gt;<br>
</span></div>
<div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margi=
n-left: 0px;">
<span style=3D"font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, =
0, 1);"><b>Cc:
</b></span><span style=3D"font-family:'Helvetica'; font-size:medium;">&lt;<=
a href=3D"mailto:turners@ieca.com">turners@ieca.com</a>&gt;, &lt;<a href=3D=
"mailto:kent@bbn.com">kent@bbn.com</a>&gt;<br>
</span></div>
<div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margi=
n-left: 0px;">
<span style=3D"font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, =
0, 1);"><b>Subject:
</b></span><span style=3D"font-family:'Helvetica'; font-size:medium;"><b>Ne=
w Version Notification for draft-ietf-sidr-algorithm-agility-07.txt</b><br>
</span></div>
<br>
<div><br>
A new version of I-D, draft-ietf-sidr-algorithm-agility-07.txt<br>
has been successfully submitted by Roque Gagliano and posted to the<br>
IETF repository.<br>
<br>
Filename:<span class=3D"Apple-tab-span" style=3D"white-space:pre"> </span>d=
raft-ietf-sidr-algorithm-agility<br>
Revision:<span class=3D"Apple-tab-span" style=3D"white-space:pre"> </span>0=
7<br>
Title:<span class=3D"Apple-tab-span" style=3D"white-space:pre"> </span><spa=
n class=3D"Apple-tab-span" style=3D"white-space:pre"></span>Algorithm Agili=
ty Procedure for RPKI.<br>
Creation date:<span class=3D"Apple-tab-span" style=3D"white-space:pre"> </s=
pan>2012-09-23<br>
WG ID:<span class=3D"Apple-tab-span" style=3D"white-space:pre"> </span><spa=
n class=3D"Apple-tab-span" style=3D"white-space:pre"></span>sidr<br>
Number of pages: 30<br>
URL: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-sidr-algorithm-=
agility-07.txt">http://www.ietf.org/internet-drafts/draft-ietf-sidr-algorit=
hm-agility-07.txt</a><br>
Status: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a href=3D"ht=
tp://datatracker.ietf.org/doc/draft-ietf-sidr-algorithm-agility">http://dat=
atracker.ietf.org/doc/draft-ietf-sidr-algorithm-agility</a><br>
Htmlized: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a href=3D"http://tools=
.ietf.org/html/draft-ietf-sidr-algorithm-agility-07">http://tools.ietf.org/=
html/draft-ietf-sidr-algorithm-agility-07</a><br>
Diff: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-algorithm-agilit=
y-07">http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-algorithm-agility-=
07</a><br>
<br>
Abstract:<br>
&nbsp;&nbsp;This document specifies the process that Certification Authorit=
ies<br>
&nbsp;&nbsp;(CAs) and Relying Parties (RPs) participating in the Resource P=
ublic<br>
&nbsp;&nbsp;Key Infrastructure (RPKI) will need to follow to transition to =
a new<br>
&nbsp;&nbsp;(and probably cryptographically stronger) algorithm set. &nbsp;=
The process<br>
&nbsp;&nbsp;is expected to be completed in a time scale of months or years.=
<br>
&nbsp;&nbsp;Consequently, no emergency transition is specified. &nbsp;The t=
ransition<br>
&nbsp;&nbsp;procedure defined in this document supports only a top-down mig=
ration<br>
&nbsp;&nbsp;(parent migrates before children).<br>
<br>
<br>
<br>
<br>
The IETF Secretariat<br>
<br>
</div>
</blockquote>
</div>
<br>
</div>
</body>
</html>

--_000_2D59CB47921C4CAEAA784188BF034B36ciscocom_--

From randy@psg.com  Sun Sep 23 21:59:39 2012
Return-Path: <randy@psg.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFFD021F8555 for <sidr@ietfa.amsl.com>; Sun, 23 Sep 2012 21:59:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HPR0tVoSUUuc for <sidr@ietfa.amsl.com>; Sun, 23 Sep 2012 21:59:37 -0700 (PDT)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:1::36]) by ietfa.amsl.com (Postfix) with ESMTP id 467C721F8493 for <sidr@ietf.org>; Sun, 23 Sep 2012 21:59:36 -0700 (PDT)
Received: from localhost ([127.0.0.1] helo=rair.psg.com.psg.com) by ran.psg.com with esmtp (Exim 4.80 (FreeBSD)) (envelope-from <randy@psg.com>) id 1TG0lW-0007zc-TG; Mon, 24 Sep 2012 04:59:34 +0000
Date: Mon, 24 Sep 2012 06:59:29 +0200
Message-ID: <m2vcf4c8y6.wl%randy@psg.com>
From: Randy Bush <randy@psg.com>
To: Sandy Murphy <sandy@sparta.com>
In-Reply-To: <2671C6CDFBB59E47B64C10B3E0BD59235EFAAF6F@PRVPEXVS15.corp.twcable.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <2671C6CDFBB59E47B64C10B3E0BD59235EFAAF6F@PRVPEXVS15.corp.twcable.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.7 - "Harue")
Content-Type: text/plain; charset=US-ASCII
Cc: sidr wg <sidr@ietf.org>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 04:59:40 -0000

my apologies for the bald and boring ascii text.  if you wish i can put
it in word perfect or pdf.  :)
</in joke>

the document seems to have lost that Router Certificates for key sets
may be per router, not just per AS.  see section 3.1.1.1 (sic), Subject,
of draft-ietf-sidr-bgpsec-pki-profiles.  as an AS may have hundreds of
BGPSEC speaking edge routers, you don't want to have to search the whole
bag of Router Certificates for an AS to find the cert/key that verifies
a particular signature.  and you can not just use the router-id of the
peer AS received in the bgp open, as you will also need the router-ids
of the signers further down the path.

the document repeaytedly refers to EE Certs etc. where it should simply
reference BGPsec Router Certificates as described in Section 3.1 of
[I-D.ietf-sidr-bgpsec-pki-profiles]

in general, i think the wording is redundant and unnecessarily complex
in many places.  but that is probably as much my disease than the editor's.

---

Abstract

   This document describes BGPSEC, an extension to the Border Gateway
   Protocol (BGP) that provides security for the AS-PATH attribute in
   BGP update messages.

uh, the bgp attribute is AS_PATH, note the underbar

and since it removes the AS_PATH attribute, it does not really secure
it.

in general, i think the nomenclature needs tightening, and it needs a
clear phrase for the ASs through which the announcement has been routed.

--

Requirements Language

fwiw, recently i have been using more specific language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" are to
   be interpreted as described in RFC 2119 [RFC2119] only when they
   appear in all upper case.  They may also appear in lower or mixed
   case as English words, without normative meaning.

--

1.  Introduction

   2.  Every AS listed in the AS_Path attribute of the update explicitly
       authorized the advertisement of the route to the subsequent AS in
       the AS_Path.

ain't no as_path attribute in a bgpsec update.  it seems to be the
bgpsec_path_signatures attribute.  btw, why not just bgpsec_path?
or more formally BGPSEC_PATH

--

   This document specifies a new optional (non-transitive) BGP path

why is "non-transitive" in parens?

--

   the documents referenced therein.)  Any BGPSEC speaker who wishes to
   send BGP update messages to external peers (eBGP) containing the
   BGPSEC_Path_Signatures

scrambled.  the external peers do not contain the BGPSEC_Path_Signatures

--

   must have an RPKI end-entity certificate (as
   well as the associated private signing key) corresponding to the
   BGPSEC speaker's AS number.

i think you want to refer to BGPsec Router Certificates as described in
Section 3.1 of [I-D.ietf-sidr-bgpsec-pki-profiles]

--

2.  BGPSEC Negotiation

   This document defines a new BGP capability [4]that allows a BGP
   speaker to advertise to its neighbors the ability to send and/or

it advertises to *a* neighbor

--

                    0        1        2  3       4 5 6 7
                 +---------------------------------------+
                 | Send | Receive | Reserved  |  Version |
                 +---------------------------------------+
                 |               AFI                     |
                 +---------------------------------------+
                 |                                       |
                 +---------------------------------------+
                 |             Reserved                  |
                 +---------------------------------------+
                 |               SAFI                    |
                 +---------------------------------------+

remove the middle part of the line between AFI and the following octet.
e.g.

                 +---------------------------------------+
                 |                                       |
                 +----             AFI           --------+
                 |                                       |
                 +---------------------------------------+

--


   The high order bit (bit 0) of the first octet is set to 1 to indicate
   that the sender is able to send BGPSEC update messages, and is set to
   zero otherwise.  The next highest order bit (bit 1) of this octet is
   set to 1 to indicate that the sender is able to receive BGPSEC update
   messages, and is set to zero otherwise.

this leaves open that both may be zero

--

   The BGPSEC_Path_Signatures algorithm carries the secured AS Path
   information, including the digital signatures that protect this AS

"algorithm?"  attribute, i suspect

--

   BGPSEC_Path_Signatures attribute replaces the AS_PATH attribute, in a
   BGPSEC update message.  That is, update messages that contain the
   BGPSEC_Path_Signatures attribute MUST NOT contain the AS_PATH
   attribute.

and vice versa

--

                     BGPSEC_Path_Signatures Attribute

         +-------------------------------------------------------+
         | Secure_Path                             (variable)    |
         +-------------------------------------------------------+
         | Additional_Info                         (variable)    |
         +-------------------------------------------------------+
         | Sequence of one or two Signature_Blocks (variable)    |
         +-------------------------------------------------------+


   The Secure_Path contains AS Path information for the BGPSEC update

"Path" should probably be lower case to avoid confusion

--

   message.  This is logically equivalent to the information that would
   be contained in the AS_PATH attribute.

s/would be contained in the/is contained in a non-BGPSEC/

--

                       The path information is used by BGPSEC speakers
   in the same way that information from the AS_PATH is used by non-
   BGPSEC speakers.

s/path information/Secure_Path/

--

   suite.  Each of the Signature_Blocks will contain a signature segment
   for each AS number (i.e, secure path segment) in the Secure_Path.

s/each/one/

--

                                       However, in order to enable a
   transition from an old algorithm suite to a new algorithm suite

without a flag day

--

   The Secure_Path Length contains the length (in octets) of the
   variable-length sequence of Secure_Path Segments.  As explained
   below, each Secure_Path segment is six octets long.  Note that this
   means the Secure_Path Length is six times the number Secure_Path
   Segments (i.e., the number of AS numbers in the path).

imiho, L in TLV includes itself so that you can just skip over that many
octets.  i.e. it would be 2 x segments + 2.  this occurs throughout.

--

   The Secure_Path contains one Secure_Path segment for each (distinct)

capitalize Segment

--

   Autonomous System in the path to the NLRI specified in the update
   message.

in the path to the origiating AS of the NLRI

--

                            Secure_Path Segment

                       +----------------------------+
                       | AS Number      (4 octets)  |
                       +----------------------------+
                       | pCount         (1 octet)   |
                       +----------------------------+
                       | Flags          (1 octet)   |
                       +----------------------------+

you are going to need the Router-ID of the signing router so that the
verifier knows which BGPsec Router Certificate to choose.

--

   The pCount field contains the number of repetitions of the associated
   autonomous system number that the signature covers.  This field
   enables a BGPSEC speaker to mimic the semantics of adding multiple

s/adding/prepending/

--

   The remaining seven bits of the Flags field are reserved for future
   use.  These bits MUST be set to zero by the sender.  The receiver
   uses the entire Flags octet to verify the digital signature
   (regardless of what value the reserved bits contain)

The remaining seven bits of the Flags MUST be set to zero by the sender,
and the signature is computed over all seven bits of the Flags.

--

                            Signature Segments
              +---------------------------------------------+
              | Subject Key Identifier        (20 octets)   |
              +---------------------------------------------+
              | Signature Length              (2 octets)    |
              +---------------------------------------------+
              | Signature                     (variable)    |
              +---------------------------------------------+


   The Subject Key Identifier contains the value in the Subject Key
   Identifier extension of the RPKI end-entity certificate 

again. please refer to BGPsec Router Certificates as described in
Section 3.1 of [I-D.ietf-sidr-bgpsec-pki-profiles]

--

4.  Generating a BGPSEC Update

   Note that in order to create or add a new signature to a BGPSEC
   update message with a given algorithm suite, the BGPSEC speaker must
   possess a private key suitable for generating signatures for this
   algorithm suite.  Additionally, this private key must correspond to
   the public key in a valid Resource PKI end-entity certificate whose
   AS number resource extension includes the BGPSEC speaker's AS number
   [11].

you do not mention that it could be a per-router-id key set.

--

4.1.  Originating a New BGPSEC Update

   The pCount field of the Secure_Path Segment is typically set to the
   value 1.  However, a BGPSEC speaker may set the pCount field to a
   value greater than 1.  Setting the pCount field to a value greater
   than one has the same semantics as repeating an AS number multiple
   times in the AS_PATH of a non-BGPSEC update message (e.g., for
   traffic engineering purposes).  Setting the pCount field to a value
   greater than one permits this repetition without requiring a separate
   digital signature for each repetition.

it may be zero in certain special circumstances, see section 42.666

--

   o  Construct a sequence of octets by concatenating the Target AS
      Number, the Secure_Path (Origin AS, pCount, and Flags), the
                                         ^ Router-ID

--

4.2.  Propagating a Route Advertisement

   If a BGPSEC router has received only non-BGPSEC update messages
   (without the BGPSEC_Path_Signatures attribute), containing the
   AS_Path attribute, from a peer for a given prefix 

s/messages/message/

--

   Note that removing BGPSEC signatures (i.e., propagating a route
   advertisement without the BGPSEC_Path_Signatures attribute) has
   significant security ramifications.  (See Section 7 for discussion of
   the security ramifications of removing BGPSEC signatures.)
   Therefore, when a route advertisement is received via a BGPSEC update
   message, propagating the route advertisement without the
   BGPSEC_Path_Signatures attribute is NOT RECOMMENDED.

unless the peer to which the BGPSEC speaker is sending did not signal
the ability to receive BGPSEC in the capability negotiation.  if this is
the case, see section 42.666 for converting to AS_PATH.

--

   If the BGPSEC speaker is not a member of an autonomous system
   confederation [3], then the Flags field of the Secure_Path Segment
   MUST be set to zero.

it might be prudent to not talk about the whole flags field, as we do
not know what exciting future may lie before it.  just talk about the 
Confed_Segment flag.

--

   If the received BGPSEC update message contains two Signature_ Blocks
   and the BGPSEC speaker supports both of the corresponding algorithms
   suites, then the new update message generated by the BGPSEC speaker
   SHOULD include both of the Signature_Blocks.  If the received BGPSEC
   update message contains two Signature_Blocks and the BGPSEC speaker
   only supports one of the two corresponding algorithm suites, then the
   BGPSEC speaker MUST remove the Signature_Block corresponding to the
   algorithm suite that it does not understand.  If the BGPSEC speaker
   does not support the algorithm suites in any of the Signature_Blocks
   contained in the received update message, then the BGPSEC speaker
   MUST NOT propagate the route advertisement with the
   BGPSEC_Path_Signatures attribute (i.e., propagate it as an unsigned
   BGP update message).

explain why.  the speaker can not add its info to a sig block for which
it does not understand the alg.  and there can not be a gap in the sig
block.

--

4.3.  Processing Instructions for Confederation Members

   o  First, starting with the least recently added Secure_Path
      segments, remove all of the consecutive Secure_Path segments that
      have the Confed_Segment flag set to one.

s/least/most/

--

4.4.  Reconstructing the AS_PATH Attribute

   2.  If the Confed_Segment flag in the Secure_Path segment is set to
       zero, then look at the most-recently added segment in the
       AS_PATH.

       *  In the case where the AS_PATH is empty then add (prepend to
          the AS_PATH) a new AS_PATH segment of type AS_SEQUENCE.

In the case where the AS_PATH is empty and pcount is greater than zero,
...

--

5.  Processing a Received BGPSEC Update

   Upon receiving a BGPSEC update message from an external (eBGP) peer,
   a BGPSEC speaker SHOULD validate the message to determine the
   authenticity of the AS PATH information contained in the
   BGPSEC_Path_Signatures attribute.

AS PATH is confusing.  maybe

   Upon receiving a BGPSEC update message from an external (eBGP) peer,
   a BGPSEC speaker SHOULD validate the message to determine the
   authenticity of the data covered by the BGPSEC_Path_Signatures
   attribute.

--

                                          However, in practice, it
   is expected that most implementations will not actually run the
   algorithm from Section 4.4, and will instead transform the
   BGPSEC_Path_Signatures attribute directly into some internal
   representation of AS path.

how about just saying that it will behave the same, and do not say it
actually has to transform it in any way?

--

   With regards to the processing of duplicate update messages, if the
   first update message is valid, then an implementation SHOULD NOT run
   the validation procedure on the second, duplicate update message
   (even if the bits of the signature field are different).  If the
   first update message is not valid, then an implementation SHOULD run
   the validation procedure on the second duplicate update message (as
   the signatures in the second update may be valid even though the
   first contained a signature that was invalid).

in the very next section, you use the words "Good" and "Not Good."
there is a consistency problem, and not just here.

--

  5.1.  Overview of BGPSEC Validation

   Validation of a BGPSEC update messages makes use of data from RPKI
   certificates and signed Route Origination Authorizations (ROA).  In
   particular, to validate update messages containing the
   BGPSEC_Path_Signatures attribute, it is necessary that the recipient
   have access to the following data obtained from valid RPKI
   certificates and ROAs:

   o  For each valid RPKI end-entity certificate containing an AS Number
      extension, the AS Number, Public Key and Subject Key Identifier
      are required,

and router-id

--

   o  For each valid ROA, the AS Number and the list of IP address
      prefixes.

what is a 'valid' roa?

--

   Note that the BGPSEC speaker could perform the validation of RPKI
   certificates and ROAs on its own and extract the required data, or it
   could receive the same data from a trusted cache that performs RPKI
   validation on behalf of (some set of) BGPSEC speakers.  (The latter
   case in analogous to the use of the RPKI-RTR protocol [13] for origin
   validation.)

draft-ymbk-rpki-rtr-keys is soon to describe a new rpki-rtr pdu to
handle the per-as and per-router keys

--

   It is expected that the output of the validation procedure will be
   used as an input to BGP route selection.  However, BGP route
   selection and thus the handling of the two validation states is a
   matter of local policy, and shall be handled using existing local
   policy mechanisms.

s/existing// i.e. a vendor could create a new testable attribute
bgpsec-state.

--

  It is expected that BGP peers will generally
   prefer routes received via 'Good' BGPSEC update messages over routes
   received via 'Not Good' BGPSEC update messages as well as routes
   received via update messages that do not contain the
   BGPSEC_Path_Signatures attribute.  However, BGPSEC specifies no
   changes to the BGP decision process and leaves to the operator the
   selection of an appropriate policy mechanism to achieve the
   operator's desired results within the BGP decision process.

someone should write a draft something like draft-ietf-sidr-bgpsec-ops

--

   BGPSEC validation needs only be performed at eBGP edge.  The
   validation status of a BGP signed/unsigned update MAY be conveyed via
   iBGP from an ingress edge router to an egress edge router.

how?  where are the bits to carry validation state?

--

   Local
   policy in the AS determines the specific means for conveying the
   validation status through various pre-existing mechanisms (e.g.,
   modifying an attribute).

imiho, this document should not get into all the lovely things local
policy might do unless it is required for bgpsec, and nothing should
be in that set.

--

   As discussed in Section 4, when a BGPSEC
   speaker chooses to forward a (syntactically correct) BGPSEC update
   message, it SHOULD be forwarded with its BGPSEC_Path_Signatures
   attribute intact (regardless of the validation state of the update
   message).

no.  not when the speaker does not understand one of the algorithms.

--

   Based entirely on local policy settings, an egress router
   MAY trust the validation status conveyed by an ingress router or it
   MAY perform its own validation.

or it can just sign it and not test anything at all.  this does not need
to be said

--

5.2.  Validation Algorithm

   3.  Check that the update message does not contain both a
       BGPSEC_Path_Signatures attribute and an AS_PATH attribute.

this sentence implies bgpsec validation could happen on an update with
only as_path.  you want to simply say no as_path is allowed.

--

   If there are two Signature_Blocks within the BGPSEC_Path_Signatures
   attribute and one of them is poorly formed (or contains the wrong
   number of Signature segments) , then the recipient should log that an
   error occurred

s/log/inform the operator/  i.e. it could snmp trap etc

--

   strip off that particular Signature_Block and process
   the update message as though it arrived with a single
   Signature_Block.  If the BGPSEC_Path_Signatures attribute contains an
   error that is not local to one of two Signature_Blocks, then the
   recipient should log that an error occurred

s/log/inform the operator/

--

   message containing the error.  (In particular, if any of checks 3-5
   above fail, the recipient should log that an error occurred and drop
   the update message containing the error.)

s/log/inform the operator/

--

   o  (Step II): Compute the digest function (for the given algorithm
      suite) on the appropriate data.  If the segment is not the (least
      recently added) segment corresponding to the origin AS, then the
      digest function should be computed on the following sequence of
      octets:

                      Sequence of Octets to be Hashed

     +-------------------------------------------+
     | AS Number of Target AS         (4 octets) |
     +-------------------------------------------+
     | AS Number                      (4 octets) |  ---\
     +-------------------------------------------+      \
     | pCount                         (1 octet)  |       >  Secure_Path
     +-------------------------------------------+      /
     | Flags                          (1 octet)  |  ---/
     +-------------------------------------------+
     | Sig Field in the Next Segment  (variable) |
     +-------------- ----------------------------+
                    ^
did the router-id fall through that little hole? :)

--

7.  Security Considerations

   o  The origin AS number corresponds to an autonomous system that has
      been authorized by the IP address space holder to originate route
                     ^ in the RPKI
      advertisements for the given prefix.

   o  For each AS number in the AS Path, a BGPSEC speaker authorized by
                                                        in the RPKI ^
      the holder of the AS number intentionally chose (in accordance
      with local policy) to propagate the route advertisement to the
      next AS in the Secure_Path.

--

   That is, the recipient of a valid BGPSEC Update message is assured
   that the Secure_Path corresponds to a sequence of autonomous systems
   who have all agreed in principle to forward packets to the given
   prefix along the indicated path.

we do not know what the bgp announcement is signaling.  while
willingness to forward has been the classic, idr is declaring bgp to be
a competitor to the dns for arbitrary signaling.

--

   (It should be noted that BGPSEC
   does not offer a precise guarantee that the data packets would
   propagate along the indicated path; it only guarantees that the BGP
   update conveying the path indeed propagated along the indicated
   path.)

this is more like it

--

   Therefore, it is important to note that when a BGPSEC speaker signs
   an outgoing update message, it is not attesting to a belief that all
   signatures prior to its are valid.  Instead it is merely asserting
   that:

   o  The BGPSEC speaker received the given route advertisement with the
      indicated NLRI and Secure_Path; and

   o  The BGPSEC speaker chose to propagate an advertisement for this
      route to the peer (implicitly) indicated by the 'Target AS'

and that it is capable of that particular algorithm suite (trivial)

--

   Finally, BGPSEC does not provide protection against all attacks at
   the transport layer.

s/all//

--

   EDITOR'S NOTE: Do we want to mandate a specific transport security
   mechanism (e.g., TCP-AO)?

slippery slope.

--

   Samuel Weiler
   Cobham

sparta again

-30-

From Sandra.Murphy@sparta.com  Mon Sep 24 07:09:45 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55B3421F8690 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 07:09:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.43
X-Spam-Level: 
X-Spam-Status: No, score=-102.43 tagged_above=-999 required=5 tests=[AWL=0.169, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DXdBj9mSiIia for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 07:09:44 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 7FAC821F8683 for <sidr@ietf.org>; Mon, 24 Sep 2012 07:09:42 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8OE9b2G003354; Mon, 24 Sep 2012 09:09:37 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8OE9Z4S029197; Mon, 24 Sep 2012 09:09:37 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Mon, 24 Sep 2012 10:10:39 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "George, Wes" <wesley.george@twcable.com>
Thread-Topic: [Idr] FW: New Version Notification for draft-ga-idr-as-migration-00.txt
Thread-Index: Ac2aVaf9m7Pu1w+oTl+N2XA+iw2nvwAAB4rQAAGkTEs=
Date: Mon, 24 Sep 2012 14:10:39 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C2BF@Hermes.columbia.ads.sparta.com>
References: <20120924130811.20935.26346.idtracker@ietfa.amsl.com>, <2671C6CDFBB59E47B64C10B3E0BD59235F961AA5@PRVPEXVS15.corp.twcable.com>
In-Reply-To: <2671C6CDFBB59E47B64C10B3E0BD59235F961AA5@PRVPEXVS15.corp.twcable.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.118]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] [Idr] FW: New Version Notification for	draft-ga-idr-as-migration-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 14:09:45 -0000

Wes, Thank you for this work and in getting this out. =20

Because you mention sidr below, I am forwarding this to the sidr list.

I have tentatively included this topic on the sidr interim meeting agenda. =
  Please, sidr wg, please do read this and be prepared to discuss on 29 Sep=
.  Otherwise, it could be a really short topic on the agenda.

--Sandy, speaking as working group co-chair

________________________________________
From: idr-bounces@ietf.org [idr-bounces@ietf.org] on behalf of George, Wes =
[wesley.george@twcable.com]
Sent: Monday, September 24, 2012 9:11 AM
To: idr@ietf.org
Cc: shane@castlepoint.net
Subject: [Idr] FW: New Version Notification for draft-ga-idr-as-migration-0=
0.txt

New draft for your review. This is related to a discussion we've been havin=
g in SIDR, but since this procedure is not specific to SIDR, we thought it =
best to document the procedure and features used during an ASN migration he=
re, and then SIDR will need to simply determine the best way to support thi=
s.

This is currently an informational ID, but could potentially be a PS as wel=
l.

Thanks,

Wes George and Shane Amante


-----Original Message-----
From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org]
Sent: Monday, September 24, 2012 9:08 AM
To: George, Wes
Cc: shane@level3.net
Subject: New Version Notification for draft-ga-idr-as-migration-00.txt


A new version of I-D, draft-ga-idr-as-migration-00.txt has been successfull=
y submitted by Wesley George and posted to the IETF repository.

Filename:        draft-ga-idr-as-migration
Revision:        00
Title:           Autonomous System (AS) Migration Features and Their Effect=
s on the BGP AS_PATH Attribute
Creation date:   2012-09-24
WG ID:           Individual Submission
Number of pages: 10
URL:             http://www.ietf.org/internet-drafts/draft-ga-idr-as-migrat=
ion-00.txt
Status:          http://datatracker.ietf.org/doc/draft-ga-idr-as-migration
Htmlized:        http://tools.ietf.org/html/draft-ga-idr-as-migration-00


Abstract:
   This draft discusses common methods of managing an ASN migration
   using some BGP features that while commonly-used are not formally
   part of the BGP4 protocol specification and may be vendor-specific in
   exact implementation.  It is necessary to document these de facto
   standards to ensure that they are properly supported in BGPSec.




The IETF Secretariat


This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.
_______________________________________________
Idr mailing list
Idr@ietf.org
https://www.ietf.org/mailman/listinfo/idr=

From wesley.george@twcable.com  Mon Sep 24 10:24:56 2012
Return-Path: <wesley.george@twcable.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87B7821F8826 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 10:24:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.474
X-Spam-Level: 
X-Spam-Status: No, score=-0.474 tagged_above=-999 required=5 tests=[AWL=-0.011, BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fYQmIajet36s for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 10:24:56 -0700 (PDT)
Received: from cdpipgw02.twcable.com (cdpipgw02.twcable.com [165.237.59.23]) by ietfa.amsl.com (Postfix) with ESMTP id E7AFE21F8822 for <sidr@ietf.org>; Mon, 24 Sep 2012 10:24:55 -0700 (PDT)
X-SENDER-IP: 10.136.163.15
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.80,476,1344225600"; d="scan'208";a="425052037"
Received: from unknown (HELO PRVPEXHUB06.corp.twcable.com) ([10.136.163.15]) by cdpipgw02.twcable.com with ESMTP/TLS/RC4-MD5; 24 Sep 2012 13:23:57 -0400
Received: from PRVPEXVS15.corp.twcable.com ([10.136.163.79]) by PRVPEXHUB06.corp.twcable.com ([10.136.163.15]) with mapi; Mon, 24 Sep 2012 13:24:54 -0400
From: "George, Wes" <wesley.george@twcable.com>
To: "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>
Date: Mon, 24 Sep 2012 13:24:53 -0400
Thread-Topic: New Version Notification for draft-george-sidr-as-migration-00.txt
Thread-Index: Ac2aeOrUNWR0JoYFRE6OKRKBzioSTQAACHNQ
Message-ID: <2671C6CDFBB59E47B64C10B3E0BD592360076037@PRVPEXVS15.corp.twcable.com>
References: <20120924172036.9269.86184.idtracker@ietfa.amsl.com>
In-Reply-To: <20120924172036.9269.86184.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Subject: [sidr] FW: New Version Notification for draft-george-sidr-as-migration-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 17:24:56 -0000
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From Sandra.Murphy@sparta.com  Mon Sep 24 10:38:29 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86AE721F8527 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 10:38:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.453
X-Spam-Level: 
X-Spam-Status: No, score=-102.453 tagged_above=-999 required=5 tests=[AWL=0.146, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RJtoA48DrOpB for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 10:38:29 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id F2E7721F84F1 for <sidr@ietf.org>; Mon, 24 Sep 2012 10:38:28 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8OHcScY006321 for <sidr@ietf.org>; Mon, 24 Sep 2012 12:38:28 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8OHcSx1005796 for <sidr@ietf.org>; Mon, 24 Sep 2012 12:38:28 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0355.002; Mon, 24 Sep 2012 13:39:32 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: [sidr] remote participation possibilities in the interim meeting
Thread-Index: AQHNmnuNxUGkbO/yOEirEG8Wt0QEag==
Date: Mon, 24 Sep 2012 17:39:31 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.118]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] remote participation possibilities in the interim meeting
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 17:38:29 -0000

I haven't seen much (any) traffic on this question.=0A=
=0A=
If anyone has opinions for or against any particular tool for remote partic=
ipation, you should say so.=0A=
=0A=
--Sandy=0A=
=0A=
________________________________________=0A=
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Murphy, Sa=
ndra [Sandra.Murphy@sparta.com]=0A=
Sent: Friday, September 21, 2012 10:35 AM=0A=
To: sidr@ietf.org=0A=
Subject: [sidr] (no subject)=0A=
=0A=
For remote participation in the past, we have used webex.=0A=
=0A=
We've heard that there are going to be people expert in Meetecho at the mee=
ting in Amsterdam.  This might be a good opportunity for us to try Meetecho=
 as a remote participation tool.=0A=
=0A=
Is there anyone who has a preference for webex vs Meetecho that would influ=
ence the choice?=0A=
=0A=
(If we try to use Meetecho, webex is likely to serve as a backup.)=0A=
=0A=
--Sandy=0A=
_______________________________________________=0A=
sidr mailing list=0A=
sidr@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sidr=0A=

From aservin@lacnic.net  Mon Sep 24 10:58:28 2012
Return-Path: <aservin@lacnic.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC98921F87FE for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 10:58:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.048
X-Spam-Level: 
X-Spam-Status: No, score=-1.048 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_RELAY_NODNS=1.451, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yOIh2ZBzNTyn for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 10:58:28 -0700 (PDT)
Received: from mail.lacnic.net.uy (mail.lacnic.net.uy [IPv6:2001:13c7:7001:4000::3]) by ietfa.amsl.com (Postfix) with ESMTP id 40FBF21F87E8 for <sidr@ietf.org>; Mon, 24 Sep 2012 10:58:28 -0700 (PDT)
Received: from 85-7-200.lacnic.net.uy (unknown [200.7.85.144]) by mail.lacnic.net.uy (Postfix) with ESMTP id 022DC30841C for <sidr@ietf.org>; Mon, 24 Sep 2012 14:58:21 -0300 (UYT)
Message-ID: <50609F3D.1040109@lacnic.net>
Date: Mon, 24 Sep 2012 14:58:21 -0300
From: Arturo Servin <aservin@lacnic.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: sidr@ietf.org
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-LACNIC.uy-MailScanner-Information: Please contact the ISP for more information
X-LACNIC.uy-MailScanner: Found to be clean
X-LACNIC.uy-MailScanner-SpamCheck: 
X-LACNIC.uy-MailScanner-From: aservin@lacnic.net
Subject: Re: [sidr] remote participation possibilities in the interim meeting
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 17:58:28 -0000

    Webex is ok but it I do not mind giving Meetecho a try.

/as


On 24/09/2012 14:39, Murphy, Sandra wrote:
> I haven't seen much (any) traffic on this question.
>
> If anyone has opinions for or against any particular tool for remote participation, you should say so.
>
> --Sandy
>
> ________________________________________
> From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Murphy, Sandra [Sandra.Murphy@sparta.com]
> Sent: Friday, September 21, 2012 10:35 AM
> To: sidr@ietf.org
> Subject: [sidr] (no subject)
>
> For remote participation in the past, we have used webex.
>
> We've heard that there are going to be people expert in Meetecho at the meeting in Amsterdam.  This might be a good opportunity for us to try Meetecho as a remote participation tool.
>
> Is there anyone who has a preference for webex vs Meetecho that would influence the choice?
>
> (If we try to use Meetecho, webex is likely to serve as a backup.)
>
> --Sandy
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr

From weiler@watson.org  Mon Sep 24 11:01:00 2012
Return-Path: <weiler@watson.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FFBD21F8812 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 11:01:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.855
X-Spam-Level: 
X-Spam-Status: No, score=-1.855 tagged_above=-999 required=5 tests=[AWL=0.745,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eEjCePAUEAf8 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 11:00:59 -0700 (PDT)
Received: from fledge.watson.org (fledge.watson.org [65.122.17.41]) by ietfa.amsl.com (Postfix) with ESMTP id 3C3A621F8803 for <sidr@ietf.org>; Mon, 24 Sep 2012 11:00:59 -0700 (PDT)
Received: from fledge.watson.org (localhost.watson.org [127.0.0.1]) by fledge.watson.org (8.14.5/8.14.5) with ESMTP id q8OI0wRx033760; Mon, 24 Sep 2012 14:00:58 -0400 (EDT) (envelope-from weiler@watson.org)
Received: from localhost (weiler@localhost) by fledge.watson.org (8.14.5/8.14.5/Submit) with ESMTP id q8OI0wxF033754; Mon, 24 Sep 2012 14:00:58 -0400 (EDT) (envelope-from weiler@watson.org)
X-Authentication-Warning: fledge.watson.org: weiler owned process doing -bs
Date: Mon, 24 Sep 2012 14:00:58 -0400 (EDT)
From: Samuel Weiler <weiler@watson.org>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
Message-ID: <alpine.BSF.2.00.1209241359450.27042@fledge.watson.org>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (fledge.watson.org [127.0.0.1]); Mon, 24 Sep 2012 14:00:58 -0400 (EDT)
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] remote participation possibilities in the interim meeting
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 18:01:00 -0000

On Mon, 24 Sep 2012, Murphy, Sandra wrote:

> If anyone has opinions for or against any particular tool for remote 
> participation, you should say so.

Having experiences pain with webex, I would like to attempt something 
different.  Meetecho counts.

-- Sam, planning to attend in person this time, so having less of a 
dog in this fight

From SONALKERA@battelle.org  Mon Sep 24 11:07:56 2012
Return-Path: <SONALKERA@battelle.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C858A21E808D for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 11:07:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B0-jM1RGIB92 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 11:07:56 -0700 (PDT)
Received: from egw2.battelle.org (egw2.battelle.org [131.167.253.51]) by ietfa.amsl.com (Postfix) with ESMTP id 49DE321E8086 for <sidr@ietf.org>; Mon, 24 Sep 2012 11:07:56 -0700 (PDT)
Received: from pps.filterd (lp-prfpnta2 [127.0.0.1]) by lp-prfpnta2.battelle.org (8.14.5/8.14.5) with SMTP id q8OI53Rv001495; Mon, 24 Sep 2012 14:07:55 -0400
Received: from lp-prfpnta5.milky-way.battelle.org ([10.50.10.72]) by lp-prfpnta2.battelle.org with ESMTP id 17ffc1rk0d-1; Mon, 24 Sep 2012 14:07:55 -0400
Received: from pps.filterd (lp-prfpnta5 [127.0.0.1]) by lp-prfpnta5.milky-way.battelle.org (8.14.5/8.14.5) with SMTP id q8OI7tvG025951; Mon, 24 Sep 2012 14:07:55 -0400
Received: from ws-bco-cas2.milky-way.battelle.org (ws-bco-cas2.milky-way.battelle.org [131.167.8.115]) by lp-prfpnta5.milky-way.battelle.org with ESMTP id 17grkx8f9b-1; Mon, 24 Sep 2012 14:07:55 -0400
Received: from WS-BEST-MBX1.milky-way.battelle.org (131.167.188.7) by ws-bco-cas2.milky-way.battelle.org (131.167.8.115) with Microsoft SMTP Server (TLS) id 8.3.106.1; Mon, 24 Sep 2012 14:07:55 -0400
Received: from WS-BEST-MBX1.milky-way.battelle.org ([131.167.188.7]) by WS-BEST-MBX1.milky-way.battelle.org ([131.167.188.7]) with mapi; Mon, 24 Sep 2012 14:07:47 -0400
From: "Sonalker, Anuja" <SONALKERA@battelle.org>
To: Samuel Weiler <weiler@watson.org>, "Murphy, Sandra" <Sandra.Murphy@sparta.com>
Date: Mon, 24 Sep 2012 14:07:46 -0400
Thread-Topic: [sidr] remote participation possibilities in the interim meeting
Thread-Index: Ac2afpK7j7WbQxbRTdaBRbjo/p3wegAAClBp
Message-ID: <AEDBD9C3109C3649BF68A077B7A592FD058871B66D@WS-BEST-MBX1.milky-way.battelle.org>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>, <alpine.BSF.2.00.1209241359450.27042@fledge.watson.org>
In-Reply-To: <alpine.BSF.2.00.1209241359450.27042@fledge.watson.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.7.7855, 1.0.431, 0.0.0000 definitions=2012-09-24_04:2012-09-24, 2012-09-24, 1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=1 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1207200000 definitions=main-1209240225
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] remote participation possibilities in the interim meeting
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 18:07:56 -0000

I am planning to remote in, so I guess I have more of a dog.=20

In the past, Webex presentations on a transatlantic remote meeting have had=
 lag issues with respect to audio.
So it would be interesting to try something new (even though sometimes a kn=
own evil is better than an unknown).

-Anuja



________________________________________
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] On Behalf Of Samuel Wei=
ler [weiler@watson.org]
Sent: Monday, September 24, 2012 2:00 PM
To: Murphy, Sandra
Cc: sidr@ietf.org
Subject: Re: [sidr] remote participation possibilities in the interim meeti=
ng

On Mon, 24 Sep 2012, Murphy, Sandra wrote:

> If anyone has opinions for or against any particular tool for remote
> participation, you should say so.

Having experiences pain with webex, I would like to attempt something
different.  Meetecho counts.

-- Sam, planning to attend in person this time, so having less of a
dog in this fight
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr=

From melinda.shore@gmail.com  Mon Sep 24 11:33:43 2012
Return-Path: <melinda.shore@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5913F21F8864 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 11:33:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.506
X-Spam-Level: 
X-Spam-Status: No, score=-3.506 tagged_above=-999 required=5 tests=[AWL=0.093,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wZ5yiNnGPhQ8 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 11:33:42 -0700 (PDT)
Received: from mail-pb0-f44.google.com (mail-pb0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id 85EC221F8865 for <sidr@ietf.org>; Mon, 24 Sep 2012 11:33:42 -0700 (PDT)
Received: by pbbro8 with SMTP id ro8so2147739pbb.31 for <sidr@ietf.org>; Mon, 24 Sep 2012 11:33:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; bh=Q1ZTzys2mxWnEyd0H+DFywtAgTIy3okYxTJzy4D/MFs=; b=GfRaLWlKQi5oNS0fHMYdW2HLTom/xJAfST039iVNskfoLkMxZ2yyuyZGLh2hbS3KSu hAdu6vfN3joN7X3O8M7gVb85wF/+/aPDcIAjKWllQoIuyCpZDCkl7hGZTytlOvnITTbz D6IcT+4uhsfkPeuD2lteqSyzX20UitMc/XzYciKG5UCU3F+sZkM1KCr3ijCiuNWHNJGi mueXDQiGq4Z90z2HpbbFa2S85Erlh4AZT7tHiNWfEZyaj/hE1l1H9XKJdFpMGazJVBav lE7xR6F8CeX45xC8/d/6DH0VNpPpb07G5ZtFSRu0421K+B6uoRBWY4cULcheZlNVd8AD TNPA==
Received: by 10.66.76.3 with SMTP id g3mr34735151paw.25.1348511622351; Mon, 24 Sep 2012 11:33:42 -0700 (PDT)
Received: from spandex.local (66-230-86-185-rb1.fai.dsl.dynamic.acsalaska.net. [66.230.86.185]) by mx.google.com with ESMTPS id bm8sm9119856pab.3.2012.09.24.11.33.40 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 24 Sep 2012 11:33:41 -0700 (PDT)
Message-ID: <5060A781.6040206@gmail.com>
Date: Mon, 24 Sep 2012 10:33:37 -0800
From: Melinda Shore <melinda.shore@gmail.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: sidr@ietf.org
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com> <alpine.BSF.2.00.1209241359450.27042@fledge.watson.org>
In-Reply-To: <alpine.BSF.2.00.1209241359450.27042@fledge.watson.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Subject: Re: [sidr] remote participation possibilities in the interim meeting
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 18:33:43 -0000

On 9/24/12 10:00 AM, Samuel Weiler wrote:
> Having experiences pain with webex, I would like to attempt something
> different.  Meetecho counts.

My main (only, really) gripe with Webex is that the audio quality
is poor, so I end up dialing in with Skype for the audio.

Melinda



From housley@vigilsec.com  Mon Sep 24 11:33:45 2012
Return-Path: <housley@vigilsec.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AC5221F8867 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 11:33:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.554
X-Spam-Level: 
X-Spam-Status: No, score=-102.554 tagged_above=-999 required=5 tests=[AWL=0.045, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XfMI8rGs0xpk for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 11:33:44 -0700 (PDT)
Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by ietfa.amsl.com (Postfix) with ESMTP id 708EE21F8686 for <sidr@ietf.org>; Mon, 24 Sep 2012 11:33:44 -0700 (PDT)
Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id CAE159A4002 for <sidr@ietf.org>; Mon, 24 Sep 2012 14:33:56 -0400 (EDT)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id PnQ0VZ+icE6x for <sidr@ietf.org>; Mon, 24 Sep 2012 14:33:31 -0400 (EDT)
Received: from [192.168.2.100] (pool-96-255-37-162.washdc.fios.verizon.net [96.255.37.162]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id 62CEB9A4001 for <sidr@ietf.org>; Mon, 24 Sep 2012 14:33:52 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1084)
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
Date: Mon, 24 Sep 2012 14:33:38 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <26493A60-A656-4D66-8415-62A530380220@vigilsec.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
To: sidr@ietf.org
X-Mailer: Apple Mail (2.1084)
Subject: Re: [sidr] remote participation possibilities in the interim meeting
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 18:33:45 -0000

I'd like to try Meetecho.  We have had trouble with WebEX in San Diego.

Russ


On 24/09/2012 14:39, Murphy, Sandra wrote:
> I haven't seen much (any) traffic on this question.
>=20
> If anyone has opinions for or against any particular tool for remote =
participation, you should say so.
>=20
> --Sandy
>=20
> ________________________________________
> From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of =
Murphy, Sandra [Sandra.Murphy@sparta.com]
> Sent: Friday, September 21, 2012 10:35 AM
> To: sidr@ietf.org
> Subject: [sidr] (no subject)
>=20
> For remote participation in the past, we have used webex.
>=20
> We've heard that there are going to be people expert in Meetecho at =
the meeting in Amsterdam.  This might be a good opportunity for us to =
try Meetecho as a remote participation tool.
>=20
> Is there anyone who has a preference for webex vs Meetecho that would =
influence the choice?
>=20
> (If we try to use Meetecho, webex is likely to serve as a backup.)
>=20
> --Sandy
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

From brian.peter.dickson@gmail.com  Mon Sep 24 12:43:37 2012
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D996F21F8628 for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 12:43:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eUSo5Lt4c24p for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 12:43:37 -0700 (PDT)
Received: from mail-wi0-f172.google.com (mail-wi0-f172.google.com [209.85.212.172]) by ietfa.amsl.com (Postfix) with ESMTP id D89C321F8623 for <sidr@ietf.org>; Mon, 24 Sep 2012 12:43:36 -0700 (PDT)
Received: by wibhq12 with SMTP id hq12so1806155wib.13 for <sidr@ietf.org>; Mon, 24 Sep 2012 12:43:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=TqtI/S0/DTtneLSa9Eo3hQ4IFvSuNJc+UaPMxht0PCQ=; b=hhAQ4EKK745/l7GcI43d3FM5o57EhKqEebDYAp7nR76vI7umJaUNyhPQGC7P3VIgcj wCjF2QnV0ZTIo/fkqkoEb7CsicRHzgdMhoMBS77GhSn03q2TkKVAI47HtjrXZEwgt3Xl bOn2HNBKIUdfSEEI5kGvpFIzp6TuSW2b2TWcf1sYRu3g5wqKz2HkN0wAlmPE5cQ12PiG UcsMBAcmibqi1BKX+Hv02+3RtUNktfWJLHVRXIsfdpYTnEKRAfSPbhmYsC4JbhTwkezt TeSDJ0Lv5LRQLhkGUb63G/oVu0KKave35qvFyKAa5igLJbcIsrRa+k81rjZEigiiUHCx FGIQ==
MIME-Version: 1.0
Received: by 10.216.72.5 with SMTP id s5mr7970890wed.154.1348515804664; Mon, 24 Sep 2012 12:43:24 -0700 (PDT)
Received: by 10.223.145.133 with HTTP; Mon, 24 Sep 2012 12:43:24 -0700 (PDT)
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F7C3AD@Hermes.columbia.ads.sparta.com>
Date: Mon, 24 Sep 2012 15:43:24 -0400
Message-ID: <CAH1iCiovgpmOt+zPZg6tK4Vsj=nFPjniRcCGK35sh8rpvq8iNg@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
Content-Type: multipart/alternative; boundary=00504502cd8b82d2a504ca77cdd6
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] remote participation possibilities in the interim meeting
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 19:43:38 -0000

--00504502cd8b82d2a504ca77cdd6
Content-Type: text/plain; charset=ISO-8859-1

If the tool(s) for remote participation don't have a $$$/hr cost associated
with them, and if the physical space is available, maybe try starting the
remote set-up earlier, 30-60 minutes?
Or even have someone running the "host" mode for the tool, start hosting,
via wifi, prior to moving into the meeting room?

Having things started early, avoids delays if there are problems getting it
started.

And if it succeeds early, that's just either a bonus or a no-op.

Just my $0.02

Brian

On Mon, Sep 24, 2012 at 1:39 PM, Murphy, Sandra <Sandra.Murphy@sparta.com>wrote:

> I haven't seen much (any) traffic on this question.
>
> If anyone has opinions for or against any particular tool for remote
> participation, you should say so.
>
> --Sandy
>
> ________________________________________
> From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Murphy,
> Sandra [Sandra.Murphy@sparta.com]
> Sent: Friday, September 21, 2012 10:35 AM
> To: sidr@ietf.org
> Subject: [sidr] (no subject)
>
> For remote participation in the past, we have used webex.
>
> We've heard that there are going to be people expert in Meetecho at the
> meeting in Amsterdam.  This might be a good opportunity for us to try
> Meetecho as a remote participation tool.
>
> Is there anyone who has a preference for webex vs Meetecho that would
> influence the choice?
>
> (If we try to use Meetecho, webex is likely to serve as a backup.)
>
> --Sandy
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
>

--00504502cd8b82d2a504ca77cdd6
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

If the tool(s) for remote participation don&#39;t have a $$$/hr cost associ=
ated with them, and if the physical space is available, maybe try starting =
the remote set-up earlier, 30-60 minutes?<div>Or even have someone running =
the &quot;host&quot; mode for the tool, start hosting, via wifi, prior to m=
oving into the meeting room?<br>
<div><br><div>Having things started early, avoids delays if there are probl=
ems getting it started.</div><div><br></div><div>And if it succeeds early, =
that&#39;s just either a bonus or a no-op.</div><div><br></div><div>Just my=
 $0.02</div>
<div><br></div><div>Brian<br><br><div class=3D"gmail_quote">On Mon, Sep 24,=
 2012 at 1:39 PM, Murphy, Sandra <span dir=3D"ltr">&lt;<a href=3D"mailto:Sa=
ndra.Murphy@sparta.com" target=3D"_blank">Sandra.Murphy@sparta.com</a>&gt;<=
/span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">I haven&#39;t seen much (any) traffic on thi=
s question.<br>
<br>
If anyone has opinions for or against any particular tool for remote partic=
ipation, you should say so.<br>
<br>
--Sandy<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
________________________________________<br>
From: <a href=3D"mailto:sidr-bounces@ietf.org">sidr-bounces@ietf.org</a> [<=
a href=3D"mailto:sidr-bounces@ietf.org">sidr-bounces@ietf.org</a>] on behal=
f of Murphy, Sandra [<a href=3D"mailto:Sandra.Murphy@sparta.com">Sandra.Mur=
phy@sparta.com</a>]<br>

Sent: Friday, September 21, 2012 10:35 AM<br>
To: <a href=3D"mailto:sidr@ietf.org">sidr@ietf.org</a><br>
Subject: [sidr] (no subject)<br>
<br>
For remote participation in the past, we have used webex.<br>
<br>
We&#39;ve heard that there are going to be people expert in Meetecho at the=
 meeting in Amsterdam. =A0This might be a good opportunity for us to try Me=
etecho as a remote participation tool.<br>
<br>
Is there anyone who has a preference for webex vs Meetecho that would influ=
ence the choice?<br>
<br>
(If we try to use Meetecho, webex is likely to serve as a backup.)<br>
<br>
--Sandy<br>
_______________________________________________<br>
sidr mailing list<br>
<a href=3D"mailto:sidr@ietf.org">sidr@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sidr" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/sidr</a><br>
_______________________________________________<br>
sidr mailing list<br>
<a href=3D"mailto:sidr@ietf.org">sidr@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sidr" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/sidr</a><br>
</div></div></blockquote></div><br></div></div></div>

--00504502cd8b82d2a504ca77cdd6--

From internet-drafts@ietf.org  Mon Sep 24 15:21:30 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51C0E1F0C92; Mon, 24 Sep 2012 15:21:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.532
X-Spam-Level: 
X-Spam-Status: No, score=-102.532 tagged_above=-999 required=5 tests=[AWL=0.067, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FP04WE27yrNN; Mon, 24 Sep 2012 15:21:29 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 99DEE1F0C8A; Mon, 24 Sep 2012 15:21:29 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120924222129.4457.55183.idtracker@ietfa.amsl.com>
Date: Mon, 24 Sep 2012 15:21:29 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-bgpsec-algs-03.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 22:21:30 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Secure Inter-Domain Routing Working Group=
 of the IETF.

	Title           : BGP Algorithms, Key Formats, & Signature Formats
	Author(s)       : Sean Turner
	Filename        : draft-ietf-sidr-bgpsec-algs-03.txt
	Pages           : 7
	Date            : 2012-09-24

Abstract:
   This document specifies the algorithms, algorithms' parameters,
   asymmetric key formats, asymmetric key size and signature format used
   in BGPSEC (Border Gateway Protocol Security).  This document updates
   the Profile for Algorithms and Key Sizes for use in the Resource
   Public Key Infrastructure (RFC 6485).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-algs

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-algs-03

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-bgpsec-algs-03


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From turners@ieca.com  Mon Sep 24 15:23:03 2012
Return-Path: <turners@ieca.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12DB81F0C8E for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 15:23:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.979
X-Spam-Level: 
X-Spam-Status: No, score=-101.979 tagged_above=-999 required=5 tests=[AWL=0.286, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gl8x0FQvChFY for <sidr@ietfa.amsl.com>; Mon, 24 Sep 2012 15:23:01 -0700 (PDT)
Received: from gateway05.websitewelcome.com (gateway05.websitewelcome.com [67.18.55.14]) by ietfa.amsl.com (Postfix) with ESMTP id EE39E1F041D for <sidr@ietf.org>; Mon, 24 Sep 2012 15:22:59 -0700 (PDT)
Received: by gateway05.websitewelcome.com (Postfix, from userid 5007) id 7E21F3178834C; Mon, 24 Sep 2012 17:22:59 -0500 (CDT)
Received: from gator1743.hostgator.com (gator1743.hostgator.com [184.173.253.227]) by gateway05.websitewelcome.com (Postfix) with ESMTP id 73AA03178832C for <sidr@ietf.org>; Mon, 24 Sep 2012 17:22:59 -0500 (CDT)
Received: from [108.18.174.220] (port=50143 helo=thunderfish.local) by gator1743.hostgator.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.77) (envelope-from <turners@ieca.com>) id 1TGH3L-00036w-7S for sidr@ietf.org; Mon, 24 Sep 2012 17:22:59 -0500
Message-ID: <5060DD42.8040000@ieca.com>
Date: Mon, 24 Sep 2012 18:22:58 -0400
From: Sean Turner <turners@ieca.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: sidr@ietf.org
References: <20120924222129.4457.55183.idtracker@ietfa.amsl.com>
In-Reply-To: <20120924222129.4457.55183.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - gator1743.hostgator.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - ieca.com
X-BWhitelist: no
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: (thunderfish.local) [108.18.174.220]:50143
X-Source-Auth: sean.turner@ieca.com
X-Email-Count: 2
X-Source-Cap: ZG9tbWdyNDg7ZG9tbWdyNDg7Z2F0b3IxNzQzLmhvc3RnYXRvci5jb20=
Subject: Re: [sidr] I-D Action: draft-ietf-sidr-bgpsec-algs-03.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Sep 2012 22:23:03 -0000

This is just a keep-alive update (i.e., I only changed the dates and 
copyright year).

spt

On 9/24/12 6:21 PM, internet-drafts@ietf.org wrote:
>
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>   This draft is a work item of the Secure Inter-Domain Routing Working Group of the IETF.
>
> 	Title           : BGP Algorithms, Key Formats, & Signature Formats
> 	Author(s)       : Sean Turner
> 	Filename        : draft-ietf-sidr-bgpsec-algs-03.txt
> 	Pages           : 7
> 	Date            : 2012-09-24
>
> Abstract:
>     This document specifies the algorithms, algorithms' parameters,
>     asymmetric key formats, asymmetric key size and signature format used
>     in BGPSEC (Border Gateway Protocol Security).  This document updates
>     the Profile for Algorithms and Key Sizes for use in the Resource
>     Public Key Infrastructure (RFC 6485).
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-algs
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-algs-03
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=draft-ietf-sidr-bgpsec-algs-03
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
>

From kent@bbn.com  Tue Sep 25 07:28:24 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE4AF21F84FD for <sidr@ietfa.amsl.com>; Tue, 25 Sep 2012 07:28:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xn5xAcIR2gJu for <sidr@ietfa.amsl.com>; Tue, 25 Sep 2012 07:28:24 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id 306B221F84D9 for <sidr@ietf.org>; Tue, 25 Sep 2012 07:28:24 -0700 (PDT)
Received: from dommiel.bbn.com ([192.1.122.15]:48507 helo=dhcp-25-201.ripemtg.ripe.net) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1TGW7W-000ARy-Fx for sidr@ietf.org; Tue, 25 Sep 2012 10:28:18 -0400
Message-ID: <5061BF82.5050403@bbn.com>
Date: Tue, 25 Sep 2012 10:28:18 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: sidr@ietf.org
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F67351@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F67351@Hermes.columbia.ads.sparta.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [sidr] reminder of wglc in progress
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Sep 2012 14:28:25 -0000

Sandy,

Replying (belatedly) to your WGLC message of 8/29:

> A reminder that there are three wglc in progress:
>
> http://www.ietf.org/mail-archive/web/sidr/current/msg04987.html
in favor, with one minor edit: I'd like to see cites to additional RP 
validation tools,
not just rcynic.
> http://www.ietf.org/mail-archive/web/sidr/current/msg04988.html
in favor
> http://www.ietf.org/mail-archive/web/sidr/current/msg04989.html
in favor

From andrei.robachevsky@gmail.com  Wed Sep 26 02:08:15 2012
Return-Path: <andrei.robachevsky@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66E7421F8470 for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 02:08:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hRX3b6x4OWOJ for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 02:08:14 -0700 (PDT)
Received: from mail-bk0-f44.google.com (mail-bk0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 1D32721F8621 for <sidr@ietf.org>; Wed, 26 Sep 2012 02:08:12 -0700 (PDT)
Received: by bkcjc3 with SMTP id jc3so164100bkc.31 for <sidr@ietf.org>; Wed, 26 Sep 2012 02:08:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; bh=EyrBpEJv8zNAHZJmU9Bi8d/BYdR3UR0Gy3D0R+pmh+Y=; b=ZkJrzJd0jPUaNA1SQj2uS4cAGqorcsMA3kkk1N/nb8A8WN94Tbabi3SwAFGsXkAcFu PrYS81w6TXhabxa/Hj+D2DPjYB3T5pGuVxoFhuSCIHOgr0dSjor62CEBQuS5Xi9fA61I DELRy7byQ/MOZXomLaFleytslv9GQhkEPXdeiRMWNIgktybin+Hj4gEUOp5gMvTU8232 8Yz3lXMzav4P1BBmC7/hjgRcjYU/j9/37pwC7qYMVKlhTAR2Lt3FSQclJgTwES5l6VNn duGUBcJHpIpLO6uLwNRzutiB/qTNhgSp4se1/bD6ha2lqVL2Q9BxdXFR5AoKZyPbWce1 +b1A==
Received: by 10.204.11.209 with SMTP id u17mr6615845bku.130.1348650492156; Wed, 26 Sep 2012 02:08:12 -0700 (PDT)
Received: from dhcp-25-161.ripemtg.ripe.net ([2001:67c:64:42:e2f8:47ff:fe34:4a14]) by mx.google.com with ESMTPS id n5sm1775460bkv.14.2012.09.26.02.08.10 (version=SSLv3 cipher=OTHER); Wed, 26 Sep 2012 02:08:11 -0700 (PDT)
Message-ID: <5062C5F8.3010504@gmail.com>
Date: Wed, 26 Sep 2012 11:08:08 +0200
From: Andrei Robachevsky <andrei.robachevsky@gmail.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BE53@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F7BE53@Hermes.columbia.ads.sparta.com>
X-Enigmail-Version: 1.4.4
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] meeting registration for interim 29 Sep 2012
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Sep 2012 09:08:15 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Is the agenda for the interim meeting available already? Apologies, if
I missed it.

Andrei

Murphy, Sandra wrote on 9/21/12 4:32 PM:
> The IETF Secretariat announced the interim meeting details on
> Tues. There is a registration process for this meeting, much the
> same as for a regular IETF meeting.  See the Secretariat's message 
> http://www.ietf.org/mail-archive/web/sidr/current/msg05067.html. 
> Registration is at 
> http://www.ietf.org/registration/lim2012/ietfreg.py.  You MUST 
> register with the IETF for this meeting.
> 
> For planning purposes, please do also indicate your plans to
> attend by sending a message to sidr-chairs+reg09292012@ietf.org.
> In particular, please do mention if you plan on participating in
> person or remotely.
> 
> This is for the sidr meeting planning purposes only; it DOES NOT
> take the place of the IETF registration announced 18 Sep.   You
> MUST register for the interim meeting with the IETF at 
> http://www.ietf.org/registration/lim2012/ietfreg.py.
> 
> --Sandy _______________________________________________ sidr
> mailing list sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/

iEYEARECAAYFAlBixfcACgkQljz5tZmtij+sSQCgkvG5TWuE69YHBJZwYL2tSZ0M
NzcAnRDFasvezFtacYZih8IsNSieH1BF
=IbZD
-----END PGP SIGNATURE-----

From kent@bbn.com  Wed Sep 26 05:55:30 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7881321F86CB for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 05:55:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.598
X-Spam-Level: 
X-Spam-Status: No, score=-106.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tr3+jLIzC4EW for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 05:55:26 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 5734121F86D8 for <sidr@ietf.org>; Wed, 26 Sep 2012 05:55:26 -0700 (PDT)
Received: from dommiel.bbn.com ([192.1.122.15]:32918 helo=dhcp-25-201.ripemtg.ripe.net) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1TGr9A-000JHc-Ev; Wed, 26 Sep 2012 08:55:24 -0400
Message-ID: <5062FB3B.9060703@bbn.com>
Date: Wed, 26 Sep 2012 08:55:23 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: Brian Dickson <brian.peter.dickson@gmail.com>, sidr <sidr@ietf.org>
Content-Type: multipart/alternative; boundary="------------050901030408080700090105"
Subject: Re: [sidr] allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Sep 2012 12:55:30 -0000

This is a multi-part message in MIME format.
--------------050901030408080700090105
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Brian,

I've consolidated my reply to your 3 messages.

First, the "live" transfer case _is_ the one that motivated the 
discussion of certificates with overlapping allocations and validity 
intervals. Your messages suggests that you believe this to be a corner 
case and that doesn't warrant allowing overlapping allocation 
certificates. The operators with whom this was discussed during the 
design phase (e.g., Randy Bush, Chris Morrow, and Warren Kumari) feel it 
is a critical case to support. In response to your messages I asked them 
about this and they not have changed their minds on this topic, i.e., 
they still see it as a critical capability to support.

That still leaves open the question of how long the certificates in 
question should overlap in validity. I polled these operators and there 
was a sense that it might be as short as a 17 days, but the overlap 
might last much, much longer. It was noted that, ultimately the ISPs 
engaging in the transfer will decide how long the overlap will be. So, 
it's not clear that it makes sense to posit a max overlap interval in RFCs.


Your third message went into a lot of details about time sync by ISPs. 
The bulk of this discussion was not germane to the issue that motivated 
the discussion, but maybe I posed the question poorly. The fact that 
Tier 1 ISPs usually have access to very accurate time sources is 
somewhat relevant, but not probative. The issue is whether ISPs manage 
to coordinate procedures across AS boundaries in a fashion consistent 
with precise timekeeping.My operator cadre advised me that, in their 
experience, smaller ISPs often do not. (Also, the discussion of line 
synch between routers on specific links is largely irrelevant to the 
RPKI synch discussion.)

When you alluded to time sync in PKIs, I had to chuckle.I have seen a 
lot of very sloppy PKI management when it comes to time sync, e.g., 
failure to issue certificates with overlapping validity intervals, 
failure to issue CRLs at the next update time, etc. I don't expect ISPs 
to be a lot better at this than folks who claim to be in the PKI 
business, which is why some of the RPKI documents suggest that RPs be 
tolerant of stale CRLs, etc.


On the positive side, we do agree that when the transfer does not 
involve addresses that are in use by subscribers/customers, there is no 
need for the certificates associated with the transfer to have 
overlapping allocations in certificates that are valid simultaneously.


With respect to punching holes in allocations when "non-live" transfers 
take place, I understand your concern. Unless the transferred addresses 
are at the edges of an allocation, they will create holes in the address 
ranges expressed in certificates. In turn, this will preclude secure 
origin advertisements for encompassing prefixes, as the ROAs will not 
match the advertisement. (Such an advertisement would not be "invalid" 
since there is no competing advertisement for the encompassing prefix 
that is valid under the RPKI. The status of the advertisement would be 
"unknown" which is likely to be a common status for some time as the 
RPKI is incrementally deployed.)


Deployment of the RPKI has the potential to reduce a lot of the 
de-aggregation that currently arises as ISPs try to counter prefix 
hijacking. Sandy Murphy recently suggested that table size increases 
attributed to transfers that punch holes in allocations also might be 
offset by ISPs revising the prefixes they advertise, as a result of 
figuring out how to specify ROAs. In any case, it is not clear that 
transfers that punch holes in allocations will have a substantial net 
impact on routing table size, given other factors that affect table size.


I note that there is a possible security concern if the ISP that 
transfers a prefix (and creates the hole in its allocation) continues to 
advertise the encompassing prefix. If the more specific prefix (that was 
transferred) becomes unavailable at some ASes, then traffic could flow 
to the encompassing prefix, if it is still being advertised. I've been 
told that this is not an uncommon occurrence, today, but it's not a 
great security outcome. If we had to allow advertising the encompassing 
prefix under the RPKI, your suggestion would require a number of changes:

-re-engineer 3779 to allow negative statements about address ranges

-define a new path validation algorithm to accommodate the redefined 
3779 extension

-change the ROA specification to accommodate the new 3779 extension

-change the origin validation specification to accommodate the new ROA 
specification and 3779 extension

Since there are some adverse security implications associated with the 
strategy you propose, it's hard to support the changes that would have 
to be made.There might be another way to address this issue (which Sandy 
mentioned), that would require fewer changes. We could retain the 3779 
syntax and the path validation algorithm, and create a new signed object 
to deal with the specific case created by holes. We could call the new 
object a joint ROA (JROA). The JROA could represent (joint) 
authorization to advertise a prefix, when no single entity holds all of 
the address space in question. A set of resource holders could sign a 
JROA, authorizing an AS to advertise to aggregated prefix. This would 
not require changes to all of the specs listed above; it would require a 
new signed object specification, and a revised origin validation 
specification, to accommodate both ROAs and JROAs. That said, I don't 
advocate the added complexity incurred by this strategy either.


Steve


--------------050901030408080700090105
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <meta name="Title" content="">
    <!--[if gte mso 9]><xml>
 <o:DocumentProperties>
  <o:Revision>0</o:Revision>
  <o:TotalTime>0</o:TotalTime>
  <o:Pages>1</o:Pages>
  <o:Words>791</o:Words>
  <o:Characters>4509</o:Characters>
  <o:Company>BBN Technologies</o:Company>
  <o:Lines>37</o:Lines>
  <o:Paragraphs>10</o:Paragraphs>
  <o:CharactersWithSpaces>5290</o:CharactersWithSpaces>
  <o:Version>14.0</o:Version>
 </o:DocumentProperties>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]-->
    <!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>JA</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
   <w:UseFELayout/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="276">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]-->
    <!--[if gte mso 10]>
<style>
 /* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-fareast-language:JA;}
</style>
<![endif]-->
    <!--StartFragment-->
    <meta name="Title" content="">
    <!--[if gte mso 9]><xml>
 <o:DocumentProperties>
  <o:Revision>0</o:Revision>
  <o:TotalTime>0</o:TotalTime>
  <o:Pages>1</o:Pages>
  <o:Words>837</o:Words>
  <o:Characters>4772</o:Characters>
  <o:Company>BBN Technologies</o:Company>
  <o:Lines>39</o:Lines>
  <o:Paragraphs>11</o:Paragraphs>
  <o:CharactersWithSpaces>5598</o:CharactersWithSpaces>
  <o:Version>14.0</o:Version>
 </o:DocumentProperties>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]-->
    <!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>JA</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
   <w:UseFELayout/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="276">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]-->
    <!--[if gte mso 10]>
<style>
 /* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";
	mso-fareast-language:JA;}
</style>
<![endif]-->
    <!--StartFragment-->
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">Brian,</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">&nbsp;</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">I&#8217;ve consolidated
        my reply to your 3 messages.</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">&nbsp;</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">First, the &#8220;live&#8221;
        transfer case <u>is</u> the one that motivated the discussion
        of certificates with overlapping allocations and validity
        intervals. Your messages suggests that you believe this to be a
        corner case and that doesn&#8217;t warrant allowing overlapping
        allocation certificates. The operators with whom this was
        discussed during the design phase (e.g., Randy Bush, Chris
        Morrow, and Warren Kumari) feel it is a critical case to
        support. In response to your messages I asked them about this
        and they not have changed their minds on this topic, i.e., they
        still see it as a critical capability to support.</span><span
        style="font-size:10.0pt; font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">That still leaves
        open the question of how long the certificates in question
        should overlap in validity. I polled these operators and there
        was a sense that it might be as short as a 17 days, but the
        overlap might last much, much longer. It was noted that,
        ultimately the ISPs engaging in the transfer will decide how
        long the overlap will be. So, it&#8217;s not clear that it makes sense
        to posit a max overlap interval in RFCs. <br>
      </span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
      <span style="font-size:10.0pt;font-family:Courier"></span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">Your third message
        went into a lot of details about time sync by ISPs. The bulk of
        this discussion was not germane to the issue that motivated the
        discussion, but maybe I posed the question poorly. The fact that
        Tier 1 ISPs usually have access to very accurate time sources is
        somewhat relevant, but not probative. The issue is whether ISPs
        manage to coordinate procedures across AS boundaries in a
        fashion consistent with precise timekeeping.</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span><span
        style="font-size:10.0pt;font-family:Courier"> My operator cadre
        advised me that, in their experience, smaller ISPs often do not.
        (Also, the discussion of line synch between routers on specific
        links is largely irrelevant to the RPKI synch discussion.)<br>
        &nbsp;</span><span style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">When you alluded to
        time sync in PKIs, I had to chuckle.<span
          style="mso-spacerun:yes">&nbsp; </span>I have seen a lot of very
        sloppy PKI management when it comes to time sync, e.g., failure
        to issue certificates with overlapping validity intervals,
        failure to issue CRLs at the next update time, etc. I don&#8217;t
        expect ISPs to be a lot better at this than folks who claim to
        be in the PKI business, which is why some of the RPKI documents
        suggest that RPs be tolerant of stale CRLs, etc. <br>
      </span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
      <span style="font-size:10.0pt;font-family:Courier"></span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">On the positive
        side, we do agree that when the transfer does not involve
        addresses that are in use by subscribers/customers, there is no
        need for the certificates associated with the transfer to have
        overlapping allocations in certificates that are valid
        simultaneously.</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier"><br>
        With respect to punching holes in allocations when &#8220;non-live&#8221;
        transfers take place, I understand your concern. Unless the
        transferred addresses are at the edges of an allocation, they
        will create holes in the address ranges expressed in
        certificates. In turn, this will preclude secure origin
        advertisements for encompassing prefixes, as the ROAs will not
        match the advertisement. (Such an advertisement would not be
        &#8220;invalid&#8221; since there is no competing advertisement for the
        encompassing prefix that is valid under the RPKI. The status of
        the advertisement would be &#8220;unknown&#8221; which is likely to be a
        common status for some time as the RPKI is incrementally
        deployed.)<br>
      </span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
      <span style="font-size:10.0pt;font-family:Courier"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">Deployment of the
        RPKI has the potential to reduce a lot of the de-aggregation
        that currently arises as ISPs try to counter prefix hijacking.
        Sandy Murphy recently suggested that table size increases
        attributed to transfers that punch holes in allocations also
        might be offset by ISPs revising the prefixes they advertise, as
        a result of figuring out how to specify ROAs. In any case, it is
        not clear that transfers that punch holes in allocations will
        have a substantial net impact on routing table size, given other
        factors that affect table size.<br>
      </span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
      <span style="font-size:10.0pt;font-family:Courier"></span><span
        style="font-size:10.0pt; font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">I note that there
        is a possible security concern if the ISP that transfers a
        prefix (and creates the hole in its allocation) continues to
        advertise the encompassing prefix. If the more specific prefix
        (that was transferred) becomes unavailable at some ASes, then
        traffic could flow to the encompassing prefix, if it is still
        being advertised. I&#8217;ve been told that this is not an uncommon
        occurrence, today, but it&#8217;s not a great security outcome. If we
        had to allow advertising the encompassing prefix under the RPKI,
        your suggestion would require a number of changes: </span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormalCxSpMiddle"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:
      auto;margin-left:86.0pt;mso-add-space:auto;text-indent:-50.0pt"><span
        style="font-size:10.0pt;font-family:Courier;mso-fareast-font-family:Courier;

        mso-bidi-font-family:Courier">-</span><span
        style="font-size:7.0pt;mso-fareast-font-family:
        Courier;mso-bidi-font-family:Courier">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><span
        style="font-size:10.0pt;font-family:Courier">re-engineer 3779 to
        allow negative statements about address ranges</span><span
        style="font-size: 10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormalCxSpMiddle"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:
      auto;margin-left:86.0pt;mso-add-space:auto;text-indent:-50.0pt"><span
        style="font-size:10.0pt;font-family:Courier;mso-fareast-font-family:Courier;

        mso-bidi-font-family:Courier">-</span><span
        style="font-size:7.0pt;mso-fareast-font-family:
        Courier;mso-bidi-font-family:Courier">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><span
        style="font-size:10.0pt;font-family:Courier">define a new path
        validation algorithm to accommodate the redefined 3779 extension</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormalCxSpMiddle"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:
      auto;margin-left:86.0pt;mso-add-space:auto;text-indent:-50.0pt"><span
        style="font-size:10.0pt;font-family:Courier;mso-fareast-font-family:Courier;

        mso-bidi-font-family:Courier">-</span><span
        style="font-size:7.0pt;mso-fareast-font-family:
        Courier;mso-bidi-font-family:Courier">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><span
        style="font-size:10.0pt;font-family:Courier">change the ROA
        specification to accommodate the new 3779 extension</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormalCxSpMiddle"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:
      auto;margin-left:86.0pt;mso-add-space:auto;text-indent:-50.0pt"><span
        style="font-size:10.0pt;font-family:Courier;mso-fareast-font-family:Courier;

        mso-bidi-font-family:Courier">-</span><span
        style="font-size:7.0pt;mso-fareast-font-family:
        Courier;mso-bidi-font-family:Courier">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><span
        style="font-size:10.0pt;font-family:Courier">change the origin
        validation specification to accommodate the new ROA
        specification and 3779 extension</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">&nbsp;</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">Since there are
        some adverse security implications associated with the strategy
        you propose, it&#8217;s hard to support the changes that would have to
        be made.</span><span style="font-size:10.0pt;font-family:Times"><o:p></o:p></span><span
        style="font-size:10.0pt;font-family:Courier"> There might be
        another way to address this issue (which Sandy mentioned), that
        would require fewer changes. We could retain the 3779 syntax and
        the path validation algorithm, and create a new signed object to
        deal with the specific case created by holes. We could call the
        new object a joint ROA (JROA). The JROA could represent (joint)
        authorization to advertise a prefix, when no single entity holds
        all of the address space in question. A set of resource holders
        could sign a JROA, authorizing an AS to advertise to aggregated
        prefix. This would not require changes to all of the specs
        listed above; it would require a new signed object
        specification, and a revised origin validation specification, to
        accommodate both ROAs and JROAs. That said, I don&#8217;t advocate the
        added complexity incurred by this strategy either.<br>
      </span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
      <span style="font-size:10.0pt;font-family:Courier"></span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <p class="MsoNormal"
      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
        style="font-size:10.0pt;font-family:Courier">Steve</span><span
        style="font-size:10.0pt;font-family:Times"><o:p></o:p></span></p>
    <!--EndFragment-->
    <meta name="Keywords" content="">
    <meta http-equiv="Content-Type" content="text/html;
      charset=ISO-8859-1">
    <meta name="ProgId" content="Word.Document">
    <meta name="Generator" content="Microsoft Word 14">
    <meta name="Originator" content="Microsoft Word 14">
    <link rel="File-List"
href="file://localhost/Users/skent/Library/Caches/TemporaryItems/msoclip/0/clip_filelist.xml">
    <link rel="themeData"
href="file://localhost/Users/skent/Library/Caches/TemporaryItems/msoclip/0/clip_themedata.xml">
    <style>
<!--
 /* Font Definitions */
@font-face
	{font-family:Times;
	panose-1:2 0 5 0 0 0 0 0 0 0;
	mso-font-charset:0;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:3 0 0 0 1 0;}
@font-face
	{font-family:"&#65325;&#65331; &#26126;&#26397;";
	panose-1:0 0 0 0 0 0 0 0 0 0;
	mso-font-charset:128;
	mso-generic-font-family:roman;
	mso-font-format:other;
	mso-font-pitch:fixed;
	mso-font-signature:1 134676480 16 0 131072 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:1;
	mso-generic-font-family:roman;
	mso-font-format:other;
	mso-font-pitch:variable;
	mso-font-signature:0 0 0 0 0 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-bidi-font-family:"Times New Roman";}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:10.0pt;
	mso-ansi-font-size:10.0pt;
	mso-bidi-font-size:10.0pt;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-fareast-language:JA;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;
	mso-header-margin:.5in;
	mso-footer-margin:.5in;
	mso-paper-source:0;}
div.WordSection1
	{page:WordSection1;}
-->
</style><span style="font-family:Courier"><o:p></o:p></span>
    <!--EndFragment-->
    <meta name="Keywords" content="">
    <meta http-equiv="Content-Type" content="text/html;
      charset=ISO-8859-1">
    <meta name="ProgId" content="Word.Document">
    <meta name="Generator" content="Microsoft Word 14">
    <meta name="Originator" content="Microsoft Word 14">
    <link rel="File-List"
href="file://localhost/Users/skent/Library/Caches/TemporaryItems/msoclip/0clip_filelist.xml">
    <link rel="themeData"
href="file://localhost/Users/skent/Library/Caches/TemporaryItems/msoclip/0clip_themedata.xml">
    <style>
<!--
 /* Font Definitions */
@font-face
	{font-family:"Courier New";
	panose-1:2 7 3 9 2 2 5 2 4 4;
	mso-font-charset:0;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:-536859905 -1073711037 9 0 511 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;
	mso-font-charset:2;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:0 268435456 0 0 -2147483648 0;}
@font-face
	{font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-font-charset:78;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:1 134676480 16 0 131072 0;}
@font-face
	{font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-font-charset:78;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:1 134676480 16 0 131072 0;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1073743103 0 0 415 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:JA;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	mso-add-space:auto;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:JA;}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
	{mso-style-priority:34;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-type:export-only;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	mso-add-space:auto;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:JA;}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
	{mso-style-priority:34;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-type:export-only;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	mso-add-space:auto;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:JA;}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
	{mso-style-priority:34;
	mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-type:export-only;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	mso-add-space:auto;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:JA;}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:10.0pt;
	mso-ansi-font-size:10.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Cambria;
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:JA;}
@page WordSection1
	{size:8.5in 792.7pt;
	margin:1.0in 1.0in 1.0in 1.0in;
	mso-header-margin:.5in;
	mso-footer-margin:.5in;
	mso-paper-source:0;}
div.WordSection1
	{page:WordSection1;}
 /* List Definitions */
@list l0
	{mso-list-id:614748749;
	mso-list-type:hybrid;
	mso-list-template-ids:-1129148936 -152909360 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:86.0pt;
	text-indent:-50.0pt;
	font-family:Courier;
	mso-fareast-font-family:"&#65325;&#65331; &#26126;&#26397;";
	mso-fareast-theme-font:minor-fareast;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.25in;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:&#61607;;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:&#61623;;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.75in;
	text-indent:-.25in;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:&#61607;;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:&#61623;;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.25in;
	text-indent:-.25in;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:&#61607;;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
  </body>
</html>

--------------050901030408080700090105--

From ietf-secretariat@ietf.org  Wed Sep 26 08:07:06 2012
Return-Path: <ietf-secretariat@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F163F21F8658; Wed, 26 Sep 2012 08:07:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.242
X-Spam-Level: 
X-Spam-Status: No, score=-102.242 tagged_above=-999 required=5 tests=[AWL=-0.243, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N3PS-G0yrdGj; Wed, 26 Sep 2012 08:07:05 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8087F21F84C4; Wed, 26 Sep 2012 08:07:05 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: opsec@ietf.org, v6ops@ietf.org, sidr@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120926150705.8596.75260.idtracker@ietfa.amsl.com>
Date: Wed, 26 Sep 2012 08:07:05 -0700
Subject: [sidr] IETF Large Interim Meeting - OPSEC, SIDR and V6OPS
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Sep 2012 15:07:06 -0000

OPSEC, SIDR and V6OPS Interim Meeting
Amsterdam, The Netherlands
29 September 2012
Venue: Hotel Okura Amsterdam (www.okura.nl)
    Ferdinand Bolstraat 333
    1072 LH Amsterdam
    The Netherlands

1.  Registration
2.  Accommodations
3.  Meeting Schedule

1. Registration
 A.  Fee: $100 USD
 B.  Register online at: http://www.ietf.org/registration/lim2012/ietfreg.py
 C.  Online Registration and Payment closes on 28 September 2012
 D.  On Site Registration starting Saturday, 29 September at 8:00 AM

2. Accommodations
 A block of rooms is being held at the Hotel Okura Amsterdam (meeting venue=
) for the nights of September 28 and 29.
 Rate: 195 EUR [256 USD; 20,065 JPY]
   Rate includes breakfast and guest room wireless internet but excludes 5%=
 city tax.
 To make your reservation on line, please go to: www.okura.nl
   Group Code: IETF2012

 Guest Cancellation:
 - Reservations may be changed up to 1 week prior to the event without pena=
lty. (You can change, not cancel, the reservation, i.e. change
arrival, departure dates or name, up to 1 week without penalty but not
cancel the reservation without penalty.)
 - 50% of reservation value penalty for cancellation less than 14 days and =
greater than 7 days prior to event. If you cancel, not change, the reservat=
ion less than 14 days but more than 7 days prior to the event you will be c=
harged 50% of the total reservation fee.
 - 80% of reservation value penalty for cancellation less than 7 days and g=
reater than 3 days prior to event. If you cancel, not change, the reservati=
on less than 7 days prior to the event you will be charged 80% of the total=
 reservation fee.
 - 100% of reservation value penalty for cancellation less than 3 days prio=
r to event or non-arrival or no-show.
 - In case of early departure, the full value of the reservation will be ch=
arged to the guest.

If you have any problems making your reservation, please send a message to =
agenda@ietf.org

3. Meeting Agenda
0800-1700	Okura Foyer	Registration
0830-0900	Okura Foyer	AM Coffee
0900-1130	Room: Otter	SIDR
0900-1130	Room: Heian I	OPSEC
1030-1100	Okura Foyer	AM Break

1130-1330	On Own	        Lunch Break

1330-1700	Room: Otter     SIDR
1330-1700	Room: Heian I	V6OPS
1500-1530	Okura Foyer	PM Break

From Sandra.Murphy@sparta.com  Wed Sep 26 08:43:11 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9290E21F84EE for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 08:43:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.449
X-Spam-Level: 
X-Spam-Status: No, score=-102.449 tagged_above=-999 required=5 tests=[AWL=0.150, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bg6P92bNzxzF for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 08:43:10 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id B8F2C21F84D7 for <sidr@ietf.org>; Wed, 26 Sep 2012 08:42:58 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8QFgv6N004651 for <sidr@ietf.org>; Wed, 26 Sep 2012 10:42:57 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8QFgveg030765 for <sidr@ietf.org>; Wed, 26 Sep 2012 10:42:57 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Wed, 26 Sep 2012 11:43:59 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: agenda update
Thread-Index: Ac2b/YVVihi3CaXPQIGngQ7iRGBfPA==
Date: Wed, 26 Sep 2012 15:43:58 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEBAB9@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.118]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] agenda update
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Sep 2012 15:43:11 -0000

I updated the agenda on the wiki page to move discussion of as aliasing to =
the end of our time to accommodate the authors of the as aliasing writeups =
who are not going to be present in person.  No guarantees of participation =
but at least the time move makes it not impossible.=0A=
=0A=
I do not know for sure that the IETF will provide refreshments at some brea=
k schedule, but even if not, we will take breaks in mid morning and afterno=
on.=0A=
=0A=
If there are other topics that people want to discuss, please please do men=
tion them so they can be added to the agenda.=0A=
=0A=
0900-1130 bgpsec protocol draft -05=0A=
1130-1330 Lunch=0A=
1330-1530 bgpsec protocol draft -05=0A=
1530-1700 provision for AS aliasing =0A=
=0A=
--Sandy=0A=

From Sandra.Murphy@sparta.com  Wed Sep 26 10:42:16 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC94D21F85B4 for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 10:42:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.457
X-Spam-Level: 
X-Spam-Status: No, score=-102.457 tagged_above=-999 required=5 tests=[AWL=0.142, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T8eI3bVRfw4g for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 10:42:13 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 89C9121F85AD for <sidr@ietf.org>; Wed, 26 Sep 2012 10:42:13 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8QHgCTH005760 for <sidr@ietf.org>; Wed, 26 Sep 2012 12:42:12 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8QHgCwn001769 for <sidr@ietf.org>; Wed, 26 Sep 2012 12:42:12 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Wed, 26 Sep 2012 13:43:14 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: comments on draft-ietf-sidr-bgpsec-protocol
Thread-Index: Ac2cDfYV7vTCpylATqyRNkOYNxLCXg==
Date: Wed, 26 Sep 2012 17:43:14 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEBB4A@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] comments on draft-ietf-sidr-bgpsec-protocol
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Sep 2012 17:42:17 -0000

Here are my comments on the protocol draft.=0A=
=0A=
These are long.  Many are editorial, but not all.=0A=
=0A=
I have put in the page number for each piece of text I'm commenting on to h=
elp find the right text.  Quotes from the text are right shifted as they ar=
e in the doc, my comments are left justified and surrounded by=0A=
****=0A=
comment=0A=
****=0A=
=0A=
--Sandy=0A=
=0A=
=0A=
=0A=
=0A=
=0A=
=0A=
IDnits reports 4 errors.=0A=
- There's no IANA considerations section, which is a required section.=0A=
- Two normative downrefs.=0A=
- No separation of references into normative vs informative.  (Fixing this =
might=0A=
fix the downrefs.)=0A=
=0A=
=0A=
=0A=
"least recently added", "most recently added", "next most recently added",=
=0A=
"n order from most recently added to least recently added", "a current =0A=
Secure_Path Segment that has the Confed_Segment flag set to zero, if the =
=0A=
next most recently added Secure_Path segment" --=0A=
there must be a reason why you decided not to use a subscripted naming=0A=
scheme.  It may be just me, but I think subscripts work.=0A=
=0A=
=0A=
=0A=
There are places where "should" is used, which do not seem to be "SHOULD".=
=0A=
But it would be good for one pass to make sure.=0A=
=0A=
Purists say that SHOULD should (:-)) be accompanied by an explanation of=0A=
legitimate reasons why you might not.=0A=
=0A=
=0A=
Secure_Path Segment vs Secure_Path segment.  Similarly consistency in=0A=
underscores and hyphens (least-recently)  etc.  AS Number vs AS number.=0A=
=0A=
=0A=
Where do we put the discussion that a change in RPKI state should=0A=
cause re-run of the decision process?=0A=
=0A=
=0A=
I think somewhere we need an overarching statement that in receiving=0A=
updates that do not contain the bgpsec attribute and in propagating=0A=
those non-bgpsec updates, the implementation behaves exactly as is =0A=
specified in 4271.=0A=
=0A=
=0A=
=0A=
for a message with bgpsec attribute:=0A=
bgpsec speaker -> bgpsec speaker:  SHOULD add attribute, MAY remove block=
=0A=
                                   MAY remove attribute=0A=
bgpsec seaker -> non-bgpsec speaker: MUST remove bgpsec attribute, =0A=
                                    MUST add AS_PATH=0A=
=0A=
for a message with no bpgsec attribute (and therefore an AS_PATH):=0A=
bgpsec speaker --> bgpsec speaker : MUST NOT add bgpsec attribute=0A=
bgpsec speaker --> non-bgpsec speaker: MUST NOT add bgpsec attribute,=0A=
                                    MUST continue normal AS_PATH constructi=
on=0A=
=0A=
=0A=
page 3=0A=
=0A=
=0A=
   2.  Every AS listed in the AS_Path attribute of the update explicitly=0A=
       authorized the advertisement of the route to the subsequent AS in=0A=
       the AS_Path.=0A=
=0A=
***=0A=
The AS_PATH is gone, so maybe you mean the list of ASs that appear in =0A=
the bgpsec attribute=0A=
***=0A=
=0A=
 =0A=
                                       Any BGPSEC speaker who wishes to=0A=
   send BGP update messages to external peers (eBGP) containing the=0A=
   BGPSEC_Path_Signatures must have an RPKI end-entity certificate (as=0A=
   well as the associated private signing key) corresponding to the=0A=
   BGPSEC speaker's AS number.  =0A=
=0A=
***=0A=
wrt "must have"=0A=
There must exist such a EE cert, but the router may not need to have=0A=
possession on-box of that cert.  If the AS is using the same keys on=0A=
all routers, then maybe the router needs the common AS wide cert=0A=
(verifying signatures generated at confed boundaries, maybe?) but if=0A=
there are per-router keys then the router need not hold its own cert=0A=
on-box. I'd say the router definitely needs to have possession of its =0A=
own private key (as long as you allow an off-box crypto engine as =0A=
incorporated into the "router" by reference)=0A=
Right?=0A=
***=0A=
=0A=
                               Note, however, that a BGPSEC speaker=0A=
   does not require such a certificate in order to validate update=0A=
   messages containing the BGPSEC_Path_Signatures attribute.=0A=
=0A=
***=0A=
Kinda my point above.  Quibbling about the "such a cert" words - the=0A=
bgp speaker requires lots of such certificates to provide keys that =0A=
validate signatures.  It does not validate signatures that it=0A=
has created itself, it is validating signatures created by other=0A=
bgp speakers.=0A=
***=0A=
=0A=
=0A=
Page 4=0A=
=0A=
=0A=
   If version 0 is the only version of BGPSEC for which both peers (in a=0A=
   BGP session) advertise support, then the use of BGPSEC has been=0A=
   negotiated and the BGPSEC peers MUST adhere to the specification of=0A=
   BGPSEC provided in this document.  (If there are multiple versions of=0A=
   BGPSEC which are supported by both peers, then the behavior of those=0A=
   peers is outside the scope of this document.)=0A=
=0A=
***=0A=
Do we need to add "Any future specification of a version other than=0A=
0 MUST specify the behavior of bgp speakers who support multiple=0A=
versions and how they determine the version to use to communicate.=0A=
***=0A=
=0A=
=0A=
=0A=
Page 5=0A=
=0A=
=0A=
=0A=
   Note that if the BGPSEC speaker wishes to use BGPSEC with two=0A=
   different address families (i.e., IPv4 and IPv6) over the same BGP=0A=
   session, then the speaker must include two instances of this=0A=
   capability (one for each address family) in the BGP OPEN message.  A=0A=
   BGPSEC speaker SHOULD NOT advertise the capability of BGPSEC support=0A=
   for any <AFI, SAFI> combination unless it has also advertises the=0A=
                                                      ^^^^^^^^^^=0A=
                                                      advertised=0A=
   multiprotocol extension capability for the same <AFI, SAFI>=0A=
   combination [2].=0A=
=0A=
=0A=
=0A=
   By indicating support for receiving BGPSEC update messages, a BGP=0A=
   speaker is, in particular, indicating that the following are true:=0A=
=0A=
   o  The BGP speaker understands the BGPSEC_Path_Signatures attribute=0A=
      (see Section 3).=0A=
=0A=
   o  The BGP speaker supports 4-byte AS numbers (see RFC 4893).=0A=
=0A=
***=0A=
So what if the "Support for 4-octet AS number capability" capability =0A=
is not also negotiated at the same time?  Then what?  Does negotiating=0A=
this capability mean you do not need to negotiate the 4byte capability?=0A=
***=0A=
=0A=
   Note that BGPSEC update messages can be quite large, therefore any=0A=
   BGPSEC speaker announcing the capability to receive BGPSEC messages=0A=
   SHOULD also announce support for the capability to receive BGP=0A=
   extended messages [9].=0A=
=0A=
***=0A=
So what if the extended msg capability is not negotiated at the same time?=
=0A=
Then what?  Etc.=0A=
***=0A=
=0A=
   A BGP speaker MUST NOT send an update message containing the=0A=
   BGPSEC_Path_Signatures attribute within a given BGP session unless=0A=
   both of the following are true:=0A=
=0A=
   o  The BGP speaker indicated support for sending BGPSEC update=0A=
      messages in its open message.=0A=
=0A=
   o  The peer of the BGP speaker indicated support for receiving BGPSEC=0A=
      update messages in its open message.=0A=
=0A=
***=0A=
If  both these statements are true, is sending a bgpsec attribute a=0A=
MUST? SHOULD? MAY?  [expect answer is SHOULD]=0A=
Maybe there needs to be a caveat about "only where this spec allows=0A=
addition of the bgpsec attribute".=0A=
***=0A=
=0A=
Page 6=0A=
=0A=
=0A=
   The BGPSEC_Path_Signatures attribute is a new optional (non-=0A=
   transitive) BGP path attribute.=0A=
=0A=
***=0A=
ibgp speakers will drop this if they are non-bgpsec-aware, which if I=0A=
have things correct means that route reflectors better be upgraded early=0A=
on.  The bgpsec ops doc says that.  Perhaps a ref to that doc?=0A=
if one edge router is not bgpsec aware, it might make inconsistent=0A=
decisions.  I think.  Is this a problem?  Or a reason why we should=0A=
be doing the validation-signalling draft?=0A=
***=0A=
=0A=
   This document registers a new attribute type code for this attribute=0A=
   : TBD=0A=
=0A=
   The BGPSEC_Path_Signatures algorithm carries the secured AS Path=0A=
   information, including the digital signatures that protect this AS=0A=
   Path information.  We refer to those update messages that contain the=0A=
   BGPSEC_Path_Signatures attribute as "BGPSEC Update messages".  The=0A=
   BGPSEC_Path_Signatures attribute replaces the AS_PATH attribute, in a=0A=
   BGPSEC update message.  That is, update messages that contain the=0A=
   BGPSEC_Path_Signatures attribute MUST NOT contain the AS_PATH=0A=
   attribute.=0A=
=0A=
***=0A=
On a personal note, I like to think of the bgpsec attribute as=0A=
"encapsulating" the AS_PATH.  A quibble about terms, but "encapsulate"=0A=
for me captures the idea that it contains the same AS list as the AS_PATH=
=0A=
in another form, so loop checking still works, and AS_PATH length can=0A=
still be computed, etc.=0A=
***=0A=
=0A=
Page 7=0A=
=0A=
=0A=
        High-Level Diagram of the BGPSEC_Path_Signatures Attribute=0A=
                          BGPSEC_Path_Signatures=0A=
        +---------------------------------------------------------+=0A=
        |     +-----------------+                                 |=0A=
        |     |   Secure Path   |        +-----------------+      |=0A=
        |     +-----------------+        | Additional Info |      |=0A=
        |     |    AS X         |        +-----------------+      |=0A=
        |     |    pCount X     |        |  Info Type      |      |=0A=
        |     |    Flags X      |        |  Info Length    |      |=0A=
        |     |    AS Y         |        |  Info Value     |      |=0A=
        |     |    pCount Y     |        +-----------------+      |=0A=
        |     |    Flags Y      |                                 |=0A=
        |     |      ...        |                                 |=0A=
        |     +-----------------+                                 |=0A=
        |                                                         |=0A=
        |     +-----------------+       +-----------------+       |=0A=
        |     | Sig Block 1     |       |  Sig Block 2    |       |=0A=
        |     +-----------------+       +-----------------+       |=0A=
        |     | Alg Suite 1     |       |  Alg Suite 2    |       |=0A=
=0A=
***=0A=
The Signature_Block picture on page 11 says that there is a=0A=
Signature_Block Length field here=0A=
***=0A=
=0A=
        |     | SKI X           |       |  SKI X          |       |=0A=
        |     | Sig Length X    |       |  Sig Length X   |       |=0A=
        |     | Signature X     |       |  Signature X    |       |=0A=
        |     | SKI Length Y    |       |  SKI Length Y   |       |=0A=
=0A=
=0A=
***=0A=
why is this SKI Length not included for X as well?=0A=
(figure this is an editing error)=0A=
***=0A=
=0A=
        |     | SKI Y           |       |  SKI Y          |       |=0A=
        |     | Sig Length Y    |       |  Sig Length Y   |       |=0A=
        |     | Signature Y     |       |  Signature Y    |       |=0A=
        |     |      ...        |       |      ....       |       |=0A=
        |     +-----------------+       +-----------------+       |=0A=
        |                                                         |=0A=
        +---------------------------------------------------------+=0A=
=0A=
=0A=
=0A=
Page 8=0A=
=0A=
=0A=
   be contained in the AS_PATH attribute.  A BGPSEC update message=0A=
   containing the BGPSEC_PATH_SIGNATURES attribute MUST NOT contain the=0A=
   AS_PATH attribute.  The path information is used by BGPSEC speakers=0A=
   in the same way that information from the AS_PATH is used by non-=0A=
   BGPSEC speakers.  The format of the Secure_Path is described below in=0A=
   Section 3.1.=0A=
=0A=
***=0A=
"path information" meaning the list of ASs that appear in the list of=0A=
secure_path segments.  I think.  This needs to be more precise.=0A=
in cases where current bgp code refers to the AS_PATH (as in read=0A=
access), the code can refer to the as_path extracted from the bgpsec=0A=
signature attributes iaw section xyz.=0A=
in cases where current bgp speakers add ASs to the AS_PATH, the code=0A=
should be adding bgpsec signature attributes.=0A=
***=0A=
=0A=
***=0A=
curiousity here: do current bgp implemenations ensure that you *ONLY*=0A=
add the local ASN on external sessions?=0A=
***=0A=
                                                        Note that this=0A=
   means the Secure_Path Length is six times the number Secure_Path=0A=
                                                       ^of=0A=
   Segments (i.e., the number of AS numbers in the path).=0A=
=0A=
=0A=
=0A=
Page 9=0A=
=0A=
=0A=
***=0A=
Is it Secure_Path segment or Secure_Path Segment?  (case consistency)=0A=
****=0A=
 =0A=
=0A=
Page 10=0A=
=0A=
Page 11=0A=
=0A=
 =0A=
=0A=
   Here we provide a detailed description of the Signature_Blocks in the=0A=
                                                 ^^^^^^^^^^^^^^^^=0A=
                                                 Signature_Block=0A=
=0A=
Page 12=0A=
=0A=
                            Signature Segments=0A=
              +---------------------------------------------+=0A=
              | Subject Key Identifier        (20 octets)   |=0A=
              +---------------------------------------------+=0A=
              | Signature Length              (2 octets)    |=0A=
              +---------------------------------------------+=0A=
              | Signature                     (variable)    |=0A=
              +---------------------------------------------+=0A=
=0A=
***=0A=
Page 7 has an SKI length, but as I said there I think that was a=0A=
remnant from editing.=0A=
***=0A=
=0A=
4.  Generating a BGPSEC Update=0A=
=0A=
***=0A=
I think somewhere we need an overarching statement that in receiving=0A=
updates that do not contain the bgpsec attribute and in propagating=0A=
those non-bgpsec updates, the implementation behaves exactly as is =0A=
specified in 4271.=0A=
***=0A=
 =0A=
Page 13=0A=
=0A=
   Note that in order to create or add a new signature to a BGPSEC=0A=
   update message with a given algorithm suite, the BGPSEC speaker must=0A=
   possess a private key suitable for generating signatures for this=0A=
   algorithm suite.  Additionally, this private key must correspond to=0A=
   the public key in a valid Resource PKI end-entity certificate whose=0A=
   AS number resource extension includes the BGPSEC speaker's AS number=0A=
   [11].  Note also that new signatures are only added to a BGPSEC=0A=
   update message when a BGPSEC speaker is generating an update message=0A=
   to send to an external peer (i.e., when the AS number of the peer is=0A=
   not equal to the BGPSEC speaker's own AS number).  =0A=
=0A=
***=0A=
I think that this restriction has not been previously mentioned.  There=0A=
is previous text that talks about adding signatures when sending to an=0A=
external peer, but not the constraint that this is the *ONLY* case when=0A=
the bgpsec attribute is added=0A=
=0A=
Note also.  In the AS aliasing case, the peer may be in the same AS in=0A=
some sense, but have a different ASN.  We will have to pay careful=0A=
attention to Wes/Shane's description of the aliasing case.=0A=
***=0A=
=0A=
4.1.  Originating a New BGPSEC Update=0A=
=0A=
***=0A=
See comment on page 17 about what happens when an internal bgpsec=0A=
speaker originates a route to a network.=0A=
***=0A=
=0A=
   In an update message that originates a new route advertisement (i.e.,=0A=
   an update whose path will contain only a single AS number), when=0A=
=0A=
***=0A=
path -> Secure Path=0A=
***=0A=
=0A=
 =0A=
=0A=
   First, the BGPSEC speaker constructs the Secure_Path with a single=0A=
   Secure_Path Segment.  The AS in this path is the BGPSEC speaker's own=0A=
   AS number.  In particular, this AS number MUST match the AS number in=0A=
   the AS number resource extension field of the Resource PKI end-entity=0A=
   certificate(s) that will be used to verify the digital signature(s)=0A=
   constructed by this BGPSEC speaker.=0A=
=0A=
***=0A=
"will be used" - this is not a action constraint on the protocol, but more=
=0A=
an operational or configuration problem.  That is, how does the sender know=
=0A=
what the recipient will use?  A: by putting the AS in the field.  That's=0A=
circular.  This should be a note to operators - make sure there's a RPKI=0A=
cert for the AS you are configuring for the implementation=0A=
***=0A=
=0A=
=0A=
Page 14=0A=
=0A=
=0A=
=0A=
   If the BGPSEC speaker is not a member of an autonomous system=0A=
   confederation [3], then the Flags field of the Secure_Path Segment=0A=
   MUST be set to zero.  (Members of a confederation should follow the=0A=
   special processing instructions for confederation members in Section=0A=
   4.4.)=0A=
=0A=
***=0A=
It is not just that the speaker is in some confederation.  I think the =0A=
flag is set to 1 if you and your neighbor are in the same confederation.  =
=0A=
I don't think this text says that.  I think phrasing it as "when speaker=0A=
and neighbor are in same confed, then 1, else 0" might be easier phrasing.=
=0A=
***=0A=
=0A=
   The BGPSEC speaker next constructs the Additional_Info portion of the=0A=
   BGPSEC_Path_Signatures attribute.  The Info Type MUST be set to zero=0A=
   and the Info Length MUST also be set to zero.  The Info Value field=0A=
   is empty (has length zero).  It is anticipated that future=0A=
   specifications may specify values of Info Type other than zero.=0A=
   Therefore, BGPSEC receivers compliant with this specification must be=0A=
   able to accept Additional_Info fields with non-zero Info Type.  Such=0A=
   receivers will use the Additional_Field to verify digital signatures=0A=
   (see Section 5) but will otherwise ignore Additional_Field non-zero=0A=
   Info Fields.=0A=
=0A=
***=0A=
Is it OK if people use the A.I. field to trnasmit info to people who=0A=
know what to do with it?  (we just created a covert channel? can't come up=
=0A=
with a reason why that is bad, just curious.)=0A=
***=0A=
=0A=
=0A=
Page 15=0A=
=0A=
=0A=
   The Subject Key Identifier field (see Section 3) is populated with=0A=
   the identifier contained in the Subject Key Identifier extension of=0A=
   the RPKI end-entity certificate used by the BGPSEC speaker.  This=0A=
   Subject Key Identifier will be used by recipients of the route=0A=
   advertisement to identify the proper certificate to use in verifying=0A=
   the signature.=0A=
=0A=
***=0A=
I don't think that "used by the BGPSEC speaker" is quite right.  You mean=
=0A=
something like "corresponding to" or something vague like that.=0A=
***=0A=
=0A=
=0A=
Page 16=0A=
=0A=
=0A=
=0A=
=0A=
=0A=
=0A=
   If a BGPSEC router has received only non-BGPSEC update messages=0A=
   (without the BGPSEC_Path_Signatures attribute), containing the=0A=
   AS_Path attribute, from a peer for a given prefix and if it chooses=0A=
   to propagate that peer's route for the prefix, then it MUST NOT=0A=
   attach any BGPSEC_Path_Signatures attribute to the corresponding=0A=
   update being propagated.  =0A=
=0A=
***=0A=
I think this is the case whenever the path you choose to propagate=0A=
has no bgpsec attribute, whether or not *all* the paths you have received=
=0A=
have no bgpsec attribute.  I think this is just a wording issue, but=0A=
people should be sure.  Verify: we DO NOT mandate that you choose and =0A=
propagate a non-bgpsec message only if you have received NO bgpsec messages=
.=0A=
***=0A=
                           (Note that a BGPSEC router may also receive=0A=
=0A=
=0A=
=0A=
Page 17=0A=
=0A=
   a non-BGPSEC update message from an internal peer without the AS_Path=0A=
   attribute, i.e., with just the NLRI in it.  In that case, the prefix=0A=
   is originating from that AS and hence the BGPSEC speaker SHOULD sign=0A=
   and forward the update to its external peers, as specified in Section=0A=
   4.1.)=0A=
=0A=
***=0A=
First: the AS_PATH is empty, not missing.=0A=
=0A=
Second, when an edge router receives a route from an internal peer when=0A=
the nlri is originated internally, the update will contain an as-path that=
=0A=
is empty if the internal originator is a non-bgpsec speaker.  Yep.=0A=
What if the originator is a bgpsec speaker?  What does an internal=0A=
originator do when originating a route?  no bgpsec attribute at all?=0A=
an empty bgpsec attribute?  Empty attribute emulates the behavior=0A=
in the as_path case but the as_path is mandatory so they have to=0A=
include it.  No bgpsec attribute follows the rule that the attribute=0A=
is not added over internal sessions, is only added on the edge.  But=0A=
means lots of special cases for the as_path extraction and tools that=0A=
need to know that no attribute and no as_path means a bgpsec message.=0A=
Etc.=0A=
***=0A=
=0A=
=0A=
   Conversely, if a BGPSEC router has received a BGPSEC update message=0A=
   (with the BGPSEC_Path_Signatures attribute) from a peer for a given=0A=
   prefix and it chooses to propagate that peer's route for the prefix,=0A=
   then it SHOULD propagate the route as a BGPSEC update message=0A=
   containing the BGPSEC_Path_Signatures attribute.  =0A=
=0A=
***=0A=
propagate to all neighbors who have negotiated the bgpsec attribute=0A=
***=0A=
                                                    However, the BGPSEC=0A=
   speaker MAY propagate the route as a (unsigned) BGP update message=0A=
   without the BGPSEC_Path_Signatures attribute.=0A=
=0A=
   Note that removing BGPSEC signatures (i.e., propagating a route=0A=
   advertisement without the BGPSEC_Path_Signatures attribute) has=0A=
   significant security ramifications.  (See Section 7 for discussion of=0A=
   the security ramifications of removing BGPSEC signatures.)=0A=
   Therefore, when a route advertisement is received via a BGPSEC update=0A=
   message, propagating the route advertisement without the=0A=
   BGPSEC_Path_Signatures attribute is NOT RECOMMENDED.  =0A=
=0A=
***=0A=
propagating to a neighbor how has neogiated the bgpsec attribut=0A=
***=0A=
=0A=
=0A=
   To generate the BGPSEC_Path_Signatures attribute on the outgoing=0A=
   update message, the BGPSEC speaker first prepends a new Secure_Path=0A=
   Segment (places in first position) to the Secure_Path.  The AS number=0A=
   in this Secure_Path segment MUST match the AS number in the AS number=0A=
   resource extension field of the Resource PKI end-entity=0A=
   certificate(s) that will be used to verify the digital signature(s)=0A=
   constructed by this BGPSEC speaker.=0A=
=0A=
***=0A=
Again, this is an operational comment, not a protocol behavior.  There=0A=
must exist a cert corresponding to the private key =0A=
***=0A=
=0A=
   The pCount is typically set to the value 1.  A BGPSEC speaker may set=0A=
   the pCount field to a value greater than 1.  (See Section 4.1 for a=0A=
   discussion of setting pCount to a value greater than 1.)  A route=0A=
   server that participates in the BGP control path, but does not act as=0A=
=0A=
Page 18=0A=
=0A=
   a transit AS in the data plane, may choose to set pCount to 0.  This=0A=
   option enables the route server to participate in BGPSEC and obtain=0A=
   the associated security guarantees without increasing the effective=0A=
   length of the AS path.  =0A=
=0A=
***=0A=
We are now considering the use of pcount=3D0 to allow for as aliasing.=0A=
We don't know yet if that will be effective (see Wes George's recent=0A=
draft).  But who knows there might be others.  It might be good to say=0A=
There might be operational need that would be met by employing a=0A=
pcount value of 0.  One example is route servers.=0A=
***=0A=
                          (Note that BGPSEC speakers compute the=0A=
   effective length of the AS path by summing the pCount values in the=0A=
   BGPSEC_Path_Signatures attribute, see Section 5.)  However, when a=0A=
   route server sets the pCount value to 0, it still inserts its AS=0A=
   number into the Secure_Path segment, as this information is needed to=0A=
   validate the signature added by the route server.  Note that the=0A=
   option of setting pCount to 0 is intended only for use by route=0A=
   servers that desire not to increase the effective AS-PATH length of=0A=
   routes they advertise.  The pCount field SHOULD NOT be set to 0 in=0A=
   other circumstances.  =0A=
=0A=
***=0A=
as aliasing is a possible other use.  whether or not that works out,=0A=
putting this statement here seems inadvisable.=0A=
***=0A=
=0A=
                         BGPSEC speakers SHOULD drop incoming update=0A=
   messages with pCount set to zero in cases where the BGPSEC speaker=0A=
   does not expect its peer to set pCount to zero (i.e., cases where the=0A=
   peer is not acting as a route server).=0A=
=0A=
***=0A=
Again, we might not end up limiting the use to route servers, so...=0A=
***=0A=
=0A=
=0A=
=0A=
Page 19=0A=
=0A=
   corresponding Signature_Block) that is deemed 'Good'.  This means=0A=
   that a 'Good' BGPSEC update message may contain a Signature_Block=0A=
   which is not deemed 'Good' (e.g., contains signatures that the BGPSEC=0A=
   does not successfully verify).  Nonetheless, such Signature_Blocks=0A=
   MUST NOT be removed.  (See Section 7 for a discussion of the security=0A=
   ramifications of this design choice.)=0A=
=0A=
***=0A=
There is only a SHOULD NOT for removing the signatures in total when they=
=0A=
invalidate.  So why this MUST NOT for when just one algorithm fails?  Is=0A=
it a worse security concern?=0A=
***=0A=
=0A=
=0A=
=0A=
Page 20=0A=
=0A=
                      Sequence of Octets to be Signed=0A=
       +--------------------------------------+=0A=
       | Target AS Number        (4 octets)   |=0A=
       +--------------------------------------+=0A=
       | Signer's AS Number      (4 octets)   |  ---\=0A=
       +--------------------------------------+      \=0A=
       | pCount                  (1 octet)    |       >  Secure_Path=0A=
       +--------- ----------------------------+      /=0A=
       | Flags                   (1 octet)    |  ---/=0A=
       +--------------------------------------+=0A=
       | Most Recent Sig Field   (variable)   |=0A=
       +--------------------------------------+=0A=
=0A=
***=0A=
This is a Secure_Path *Segment*, I think.=0A=
***=0A=
=0A=
=0A=
=0A=
   Within a confederation, the verification of BGPSEC signatures added=0A=
   by other members of the confederation is optional.  If a=0A=
=0A=
***=0A=
Isn't verification always optional?=0A=
***=0A=
=0A=
Page 21=0A=
=0A=
   message to a peer that is a member of the same confederation, the=0A=
   confederation MAY set the Signature field within the=0A=
   Signature_Segment that it generates to be zero (in lieu of=0A=
   calculating the correct digital signature as described in Sections=0A=
   4.1 and 4.2).  Note that if a confederation chooses not to verify=0A=
   digital signatures within the confederation, then BGPSEC is able to=0A=
   provide no assurances about the integrity of the (private) Member-AS=0A=
   Numbers placed in Secure_Path segments where the Confed_Segment flag=0A=
   is set to one.=0A=
=0A=
***=0A=
Should there be a security considerations discussion of this?=0A=
***=0A=
=0A=
   When a confederation member receives a BGPSEC update message from a=0A=
   peer within the confederation and propagates it to a peer outside the=0A=
   confederation, it must remove all of the Secure_Path Segments added=0A=
   by confederation members as well as the corresponding Signature=0A=
   Segments.  To do this, the confederation member propagating the route=0A=
   outside the confederation does the following:=0A=
=0A=
   o  First, starting with the least recently added Secure_Path=0A=
      segments, remove all of the consecutive Secure_Path segments that=0A=
      have the Confed_Segment flag set to one.  Stop this process once a=0A=
      Scure_Path segment is reached which has its Confed_Segment flag=0A=
      set to zero.  Keep a count of the number of segments removed in=0A=
      this fashion.=0A=
=0A=
***=0A=
Why does this start with the least recently added segment?  Isn't that=0A=
the origin segment?  (Oh, for an indexed name!)=0A=
***=0A=
=0A=
   o  Second, starting with the most recently added Signature Segment,=0A=
      remove a number of Signature Segments equal to the number of=0A=
      Secure_Path Segments removed in the previous step.  (That is,=0A=
      remove the K most recently added signature segments, where K is=0A=
      the number of Secure_Path Segments removed in the previous step.)=0A=
=0A=
***=0A=
Why two passes through the bgpsec attribute?  Why not a loop that looks at=
=0A=
the secure_path segment list and signature_block segment list in lock step?=
=0A=
And break the loop when you hit flag(i)=3D0?  They are completely synchrono=
us=0A=
aren't they?=0A=
*** =0A=
   o  Finally, add a Secure_Path Segment containing, in the AS field,=0A=
      the AS Confederation Identifier (the public AS number of the=0A=
      confederation) as well as a corresponding Signature Segment.  Note=0A=
      that all fields other that the AS field are populated as per=0A=
      Sections 4.1 and 4.2.=0A=
=0A=
   When validating a received BGPSEC update message, confederation=0A=
   members must make the following adjustment to the algorithm presented=0A=
   in Section 5.2.  When a confederation member processes (validates) a=0A=
   Signature Segment and its corresponding Secure_Path Segment, the=0A=
   confederation member must note that for a signature produced by a=0A=
   BGPSEC speaker outside of a confederation, the Target AS will always=0A=
   be the AS Confederation Identifier (the public AS number of the=0A=
   confederation) as opposed to the Member-AS Number.=0A=
=0A=
***=0A=
This should be mentioned in the validation section.  As well as here=0A=
or instead of here.  (both places or only there)=0A=
***=0A=
=0A=
   To handle this case, when a BGPSEC speaker (that is a confederation=0A=
   member) processes a current Secure_Path Segment that has the=0A=
   Confed_Segment flag set to zero, if the next most recently added=0A=
=0A=
Page 22=0A=
=0A=
   Secure_Path segment has the Confed_Segment flag set to one then, when=0A=
   computing the digest for the current Secure_Path segment, the BGPSEC=0A=
   speaker takes the Target AS Number to be the AS Confederation=0A=
   Identifier of the validating BGPSEC speaker's own confederation.=0A=
   (Note that the algorithm in Section 5.2 processes Secure_Path=0A=
   Segments in order from most recently added to least recently added,=0A=
   therefore this special case will apply to the first Secure_Path=0A=
   segment that the algorithm encounters that has the Confed_Segment=0A=
   flag set to one.)=0A=
=0A=
***=0A=
Don't you mean "flag set to zero" in that last line?=0A=
I can't claim to have followed the order here, so I could be wrong.=0A=
***=0A=
=0A=
=0A=
                                               (Such an error is treated=0A=
   in exactly the same way as receipt of a non-BGPSEC update message=0A=
   containing an AS_CONFED_SEQUENCE from a peer that is not a member of=0A=
   the same AS confederation.)=0A=
=0A=
***=0A=
See section 5 of rfc 5064, but that refers to 4271 section 6.3.=0A=
That would send a Notification that breaks the session.  Not what=0A=
we want, I think.=0A=
And there's a work going on in idr right now that is reviewing the=0A=
whole subject of how bgp does error handling.=0A=
But we do want to modify the behavior of 6.3, which mandates=0A=
an error if a mandatory attribute is not present (like, oh, AS_PATH).=0A=
***=0A=
=0A=
=0A=
=0A=
=0A=
Page 23=0A=
=0A=
 =0A=
 =0A=
5.  Processing a Received BGPSEC Update=0A=
=0A=
   Upon receiving a BGPSEC update message from an external (eBGP) peer,=0A=
   a BGPSEC speaker SHOULD validate the message to determine the=0A=
   authenticity of the AS PATH information contained in the=0A=
=0A=
Page 24=0A=
=0A=
   BGPSEC_Path_Signatures attribute.  Section 5.1 provides an overview=0A=
   of BGPSEC validation and Section 5.2 provides a specific algorithm=0A=
   for performing such validation.  (Note that an implementation need=0A=
   not follow the specific algorithm in Section 5.2 as long as the input=0A=
   output behavior of the validation is identical to that of the=0A=
=0A=
***=0A=
input output -> "input and output"?  "input/output"?=0A=
***=0A=
 =0A=
   BGPSEC_Path_Signatures attribute.  Whenever the use of AS path=0A=
   information is called for (e.g., loop detection, or use of AS path=0A=
   length in best path selection) the externally visible behavior of the=0A=
                                 ^,=0A=
   implementation shall be the same as if the implementation had run the=0A=
   algorithm in Section 4.4 and used the resulting AS_PATH attribute as=0A=
   it would for a non-BGPSEC update message.  However, in practice, it=0A=
   is expected that most implementations will not actually run the=0A=
   algorithm from Section 4.4, and will instead transform the=0A=
   BGPSEC_Path_Signatures attribute directly into some internal=0A=
   representation of AS path.=0A=
=0A=
***=0A=
I'm not sure the "However" sentence is necessary.  We do intend for=0A=
the implementation to follow 4.4, whether they end up with an actual=0A=
AS_PATH attribute or some internal representation of the same, right?=0A=
Or maybe you are trying to distinguish running the 4.4 algorithm for=0A=
each use vs run once and store the result?=0A=
Aren't implementers already accustomed to using their=0A=
internal representation for any structure mentioned in a specification?=0A=
***=0A=
=0A=
 Page 25=0A=
=0A=
   between two update messages then the two updates are not duplicates.=0A=
=0A=
   With regards to the processing of duplicate update messages, if the=0A=
   first update message is valid, then an implementation SHOULD NOT run=0A=
   the validation procedure on the second, duplicate update message=0A=
   (even if the bits of the signature field are different).  If the=0A=
   first update message is not valid, then an implementation SHOULD run=0A=
   the validation procedure on the second duplicate update message (as=0A=
   the signatures in the second update may be valid even though the=0A=
   first contained a signature that was invalid).=0A=
=0A=
***=0A=
Why is the converse not also true?  Could RPKI state change not just as=0A=
well make the second validation result differ from the first -- the first=
=0A=
update signature looked valid but now the signature looks invalid?=0A=
***=0A=
=0A=
=0A=
5.1.  Overview of BGPSEC Validation=0A=
=0A=
   Validation of a BGPSEC update messages makes use of data from RPKI=0A=
   certificates and signed Route Origination Authorizations (ROA).  In=0A=
   particular, to validate update messages containing the=0A=
   BGPSEC_Path_Signatures attribute, it is necessary that the recipient=0A=
   have access to the following data obtained from valid RPKI=0A=
   certificates and ROAs:=0A=
=0A=
   o  For each valid RPKI end-entity certificate containing an AS Number=0A=
      extension, the AS Number, Public Key and Subject Key Identifier=0A=
      are required,=0A=
=0A=
***=0A=
"containing an AS number extension" -> that's a way to refer to router =0A=
certs, right?  Perhaps we can name them?=0A=
Needs a reference to the router certs I-D.=0A=
***=0A=
=0A=
   policy mechanisms.  It is expected that BGP peers will generally=0A=
   prefer routes received via 'Good' BGPSEC update messages over routes=0A=
   received via 'Not Good' BGPSEC update messages as well as routes=0A=
   received via update messages that do not contain the=0A=
   BGPSEC_Path_Signatures attribute.  However, BGPSEC specifies no=0A=
=0A=
=0A=
***=0A=
The "as well as" confuses me.=0A=
I think you mean "prefer ... Good ... over ... Not Good ... and over=0A=
... non-bgpsec".=0A=
But I had to think about that.=0A=
***=0A=
=0A=
Page 26=0A=
=0A=
=0A=
   changes to the BGP decision process and leaves to the operator the=0A=
   selection of an appropriate policy mechanism to achieve the=0A=
   operator's desired results within the BGP decision process.=0A=
=0A=
   BGPSEC validation needs only be performed at eBGP edge.  The=0A=
                     ^need only be?  (admit I'm not sure)=0A=
   validation status of a BGP signed/unsigned update MAY be conveyed via=0A=
                              bgpsec/non-bgpsec=0A=
   iBGP from an ingress edge router to an egress edge router.  Local=0A=
   policy in the AS determines the specific means for conveying the=0A=
   validation status through various pre-existing mechanisms (e.g.,=0A=
   modifying an attribute).  As discussed in Section 4, when a BGPSEC=0A=
=0A=
***=0A=
did you mean "community" rather than "attribute"?  isn't every mechanism=0A=
modifying some attribute?=0A=
***=0A=
=0A=
5.2.  Validation Algorithm=0A=
=0A=
Some of this looks like syntax checking, not really validation.  Do the=0A=
syntac checks need to be separated, or is all one task?=0A=
=0A=
Page 27=0A=
=0A=
=0A=
   Signature_Block.  If the BGPSEC_Path_Signatures attribute contains an=0A=
   error that is not local to one of two Signature_Blocks, then the=0A=
                                    ^the=0A=
   recipient should log that an error occurred and drop the update=0A=
   message containing the error.  (In particular, if any of checks 3-5=0A=
   above fail, the recipient should log that an error occurred and drop=0A=
   the update message containing the error.)=0A=
=0A=
***=0A=
Is it not the case that if 1 or 2 fail, the error should be logged and =0A=
the update dropped?  If so, why this comment?  If not, why not?=0A=
***=0A=
=0A=
   Next, the BGPSEC speaker verifies that the origin AS is authorized to=0A=
   advertise the prefix in question.  To do this, consult the valid ROA=0A=
   data to obtain a list of AS numbers that are associated with the=0A=
   given IP address prefix in the update message.  Then locate the last=0A=
   (least recently added) AS number in the Secure_Path portion of the=0A=
   BGPSEC_Path_Signatures attribute.  If the origin AS in the=0A=
   Secure_Path is not in the set of AS numbers associated with the given=0A=
   prefix, then the BGPSEC update message is 'Not Good' and the=0A=
   validation algorithm terminates.=0A=
=0A=
***=0A=
To answer those who are confused by the origin validation having three=0A=
states and bgpsec having two, should a note be put here that bgpsec=0A=
messages will only allow origins that are "Valid" and not origins that=0A=
are "Unkown"?  So in bgpsec, the "unknown" origins get lumped in with=0A=
the "invalid" origins into the "Not Good" category?=0A=
***=0A=
=0A=
=0A=
   Finally, the BGPSEC speaker examines the Signature_Blocks in the=0A=
   BGPSEC_Path_Signatures attribute.  A Signature_Block corresponding to=0A=
   an algorithm suite that the BGPSEC speaker does not support is not=0A=
   considered in validation.  If there does not exist a Signature_Block=0A=
   corresponding to an algorithm suite that the BGPSEC speaker supports,=0A=
   then the BGPSEC speaker MUST treat the update message in the same=0A=
   manner that the BGPSEC speaker would treat an (unsigned) update=0A=
   message that arrived without a BGPSEC_Path_Signatures attribute.=0A=
=0A=
***=0A=
I thought that sig blocks for unrecognized sig algs were dropped, not=0A=
just ignored in validation.=0A=
***=0A=
=0A=
Page 28=0A=
=0A=
=0A=
 =0A=
=0A=
                      Sequence of Octets to be Hashed=0A=
=0A=
     +-------------------------------------------+=0A=
     | AS Number of Target AS         (4 octets) |=0A=
     +-------------------------------------------+=0A=
     | AS Number                      (4 octets) |  ---\=0A=
     +-------------------------------------------+      \=0A=
     | pCount                         (1 octet)  |       >  Secure_Path=0A=
     +-------------------------------------------+      /=0A=
     | Flags                          (1 octet)  |  ---/=0A=
     +-------------------------------------------+=0A=
     | Sig Field in the Next Segment  (variable) |=0A=
     +-------------- ----------------------------+=0A=
=0A=
***=0A=
Think this is supposed to be Secure_Path Segment=0A=
This happens other places as well, I'm not going to note it everywhere=0A=
***=0A=
=0A=
Page 29=0A=
=0A=
=0A=
Page 30=0A=
=0A=
=0A=
      signature is invalid, then mark the entire Signature-List Block as=0A=
      'Not Good' and proceed to the next Signature_Block.  If the=0A=
      signature validation algorithm determines that the signature is=0A=
      valid, then continue processing Signature-Segments (within the=0A=
      current Signature-List Block).=0A=
=0A=
   If all Signature-Segments within a Signature-List Block pass=0A=
   validation (i.e., all segments are processed and the Signature-List=0A=
   Block has not yet been marked 'Not Good'), then the Signature_Block=0A=
   is marked as 'Good'.=0A=
=0A=
   If at least one Signature_Block is marked as 'Good', then the=0A=
   validation algorithm terminates and the BGPSEC update message is=0A=
   deemed to be 'Good'.  (That is, if a BGPSEC update message contains=0A=
   two Signature_Blocks then the update message is deemed 'Good' if the=0A=
   first Signature_Block is marked 'Good' OR the second Signature_Block=0A=
   is marked 'Good'.)=0A=
=0A=
***=0A=
So if one is good, is there any reason to try to the other?  you would=0A=
propagage it even if it were not, and by this point you know it is=0A=
syntactically valid, right?=0A=
****=0A=
=0A=
=0A=
6.  Algorithms and Extensibility=0A=
=0A=
6.1.  Algorithm Suite Considerations=0A=
=0A=
***=0A=
How much of this section is needed and how much can just refer to the=0A=
algorithm agility draft?=0A=
***=0A=
=0A=
=0A=
   complete, use of the old 'current' algorithm will be deprecated, use=0A=
   of the 'new' algorithm will be mandatory, and a subsequent 'even=0A=
=0A=
Page 31=0A=
=0A=
   newer' algorithm suite may be specified as recommend to implement.=0A=
=0A=
***=0A=
I do not believe that once algorithm transition has completed that there=0A=
will necessarily be a "even newer" algorithm proposed.=0A=
***=0A=
=0A=
   Once the transition has successfully been completed in this manner,=0A=
   BGPSEC speakers SHOULD include only a single Signature_Block=0A=
   (corresponding to the 'new' algorithm).=0A=
=0A=
***=0A=
What is the signal to revert to just sending on sig block?  The end of=0A=
life deadline in the alg agility draft?=0A=
=0A=
I believe that alg agility draft allows for router certs to be of mixed=0A=
algorithm.  That might affect the timeline.=0A=
***=0A=
=0A=
=0A=
   In the case that such a change to BGPSEC were deemed desirable, it is=0A=
   expected that a subsequent version of BGPSEC would be created and=0A=
   that this version of BGPSEC would specify a new BGP Path Attribute,=0A=
=0A=
***=0A=
If BGP Path Attribute means the attribute defined here, you should call=0A=
it by the name used here.=0A=
***=0A=
=0A=
   let's call it BGPSEC_PATH_SIG_TWO, which is designed to accommodate=0A=
   the desired changes to BGPSEC.  In such a case, the mandatory=0A=
   algorithm suites document would be updated to specify algorithm=0A=
   suites appropriate for the new version of BGPSEC.=0A=
=0A=
***=0A=
Any such new version of BGP would also have to produce a new version of=0A=
this draft to talk about generating and validating the new attribute.=0A=
***=0A=
=0A=
Page 32=0A=
=0A=
=0A=
   path.)  Furthermore, the recipient is assured that this path=0A=
   terminates in an autonomous system that has been authorized by the IP=0A=
   address space holder as a legitimate destination for traffic to the=0A=
   given prefix.=0A=
=0A=
***=0A=
I'd say that the legitimate destination is the prefix, not the AS that=0A=
is originating a route to the prefix.=0A=
=0A=
I think the path terminates in an AS that has a direct connection to the=0A=
prefix.  That is probably subject to the caveats that seem to always show=
=0A=
up.  (We've disallowed AS_SETs, so that caveat does not apply).  Hm.=0A=
Terminates in an AS that can deliver traffic to the prefix without the=0A=
assistance of any other publically announced AS (ie it could go through=0A=
private ASs to get there.)=0A=
***=0A=
=0A=
=0A=
=0A=
   Note that although BGPSEC provides a mechanism for an AS to validate=0A=
   that a received update message has certain security properties, the=0A=
   use of such a mechanism to influence route selection is completely a=0A=
   matter of local policy.  Therefore, a BGPSEC speaker can make no=0A=
   assumptions about the validity of a route received from an external=0A=
   BGPSEC peer.  That is, a compliant BGPSEC peer may (depending on the=0A=
   local policy of the peer) send update messages that fail the validity=0A=
   test in Section 5.  Thus, a BGPSEC speaker MUST completely validate=0A=
   all BGPSEC update messages received from external peers.  (Validation=0A=
   of update messages received from internal peers is a matter of local=0A=
   policy, see Section 5).=0A=
=0A=
***=0A=
What does MUST completely validate mean? what is a not completely =0A=
validated message?=0A=
And why is this a MUST? Since we allow propagation of messages that =0A=
are Not Good, this seems an odd requirement.=0A=
***=0A=
=0A=
Page 33=0A=
=0A=
   To understand the reason for such a design decision consider the case=0A=
   where the BGPSEC speaker receives an update message with both a set=0A=
   of algorithm A signatures which are 'Good' and a set of algorithm B=0A=
   signatures which are 'Not Good'.  In such a case it is possible=0A=
   (perhaps even quite likely) that some of the BGPSEC speaker's peers=0A=
   (or other entities further 'downstream' in the BGP topology) do not=0A=
   support algorithm A. Therefore, if the BGPSEC speaker were to remove=0A=
   the 'Not Good' set of signatures corresponding to algorithm B, such=0A=
   entities would treat the message as though it were unsigned.  By=0A=
   including the 'Not Good' set of signatures when propagating a route=0A=
   advertisement, the BGPSEC speaker ensures that 'downstream' entities=0A=
   have as much information as possible to make an informed opinion=0A=
   about the validation status of a BGPSEC update.=0A=
=0A=
   Note also that during a period of partial BGPSEC deployment, a=0A=
   'downstream' entity might reasonably treat unsigned messages=0A=
   different from BGPSEC updates that contain a single set of 'Not Good'=0A=
   ^differently=0A=
=0A=
***=0A=
actually, it is more than they might be treated differently, it is that=0A=
unsigned might be preferred over Not Good.=0A=
***=0A=
=0A=
   signatures.  That is, by removing the set of 'Not Good' signatures=0A=
   the BGPSEC speaker might actually cause a downstream entity to=0A=
   'upgrade' the status of a route advertisement from 'Not Good' to=0A=
   unsigned.  Finally, note that in the above scenario, the BGPSEC=0A=
   speaker might have deemed algorithm A signatures 'Good' only because=0A=
   of some issue with RPKI state local to his AS (for example, his AS=0A=
   might not yet have obtained a CRL indicating that a key used to=0A=
   verify an algorithm A signature belongs to a newly revoked=0A=
   certificate).  In such a case, it is highly desirable for a=0A=
   downstream entity to treat the update as 'Not Good' (due to the=0A=
   revocation) and not as 'unsigned' (which would happen if the 'Not=0A=
   Good' Signature_Blocks were removed).=0A=
=0A=
Page 34=0A=
=0A=
=0A=
=0A=
   The mechanism of setting the pCount field to zero is included in this=0A=
   specification to enable route servers in the control path to=0A=
   participate in BGPSEC without increasing the effective length of the=0A=
   AS-PATH.  However, entities other than route servers could=0A=
   conceivably use this mechanism (set the pCount to zero) to attract=0A=
   traffic (by reducing the effective length of the AS-PATH)=0A=
   illegitimately.  This risk is largely mitigated if every BGPSEC=0A=
   speaker drops incoming update messages that set pCount to zero but=0A=
   come from a peer that is not a route server.  However, note that a=0A=
   recipient of a BGPSEC update message in which an upstream entity that=0A=
   is two or more hops away set pCount to zero is unable to verify for=0A=
   themselves whether pCount was set to zero legitimately.=0A=
=0A=
***=0A=
As there are suggestions of using pcount=3D0 for the AS aliasing work,=0A=
we might not want to be specific about the use case here.=0A=
The recipient should check to be sure that pcount=3D0 only when it expects=
=0A=
that peer to be using pcount=3D0.  We can't force the reasoning behind=0A=
the configuration anyway.=0A=
*** =0A=
=0A=
=0A=
=0A=
   EDITOR'S NOTE: Do we want to mandate a specific transport security=0A=
   mechanism (e.g., TCP-AO)?=0A=
=0A=
***=0A=
If we do, then implementers would be required to use that transport for=0A=
compliance - last I heard the TCP-AO implementations were not there yet.=0A=
Tho' it will be a long while before this implementation is there yet either=
,=0A=
so it may not matter.=0A=
***=0A=
=0A=
=0A=
Page 35=0A=
=0A=
   Randy Bush begin_of_the_skype_highlighting     end_of_the_skype_highligh=
ting=0A=
   Internet Initiative Japan=0A=
   randy@psg.com=0A=
=0A=
***=0A=
figure this is a cut and paste error=0A=
***=0A=
=0A=
=0A=
=0A=

From Sandra.Murphy@sparta.com  Wed Sep 26 10:52:31 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F6A021F858F for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 10:52:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.464
X-Spam-Level: 
X-Spam-Status: No, score=-102.464 tagged_above=-999 required=5 tests=[AWL=0.135, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gkjn2ppcbuX4 for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 10:52:30 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 12C4221F8588 for <sidr@ietf.org>; Wed, 26 Sep 2012 10:52:30 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8QHqT8V005881 for <sidr@ietf.org>; Wed, 26 Sep 2012 12:52:29 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8QHqThd002135 for <sidr@ietf.org>; Wed, 26 Sep 2012 12:52:29 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Wed, 26 Sep 2012 13:53:32 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: slides for Sat
Thread-Index: Ac2cD9eGY1gswE2qSAqPFYSBu54T3Q==
Date: Wed, 26 Sep 2012 17:53:31 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEECB73@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] slides for Sat
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Sep 2012 17:52:31 -0000

Anyone who intends to have slides on Sat, could you please get them to the =
chairs long before the meeting starts?  like the day before.=0A=
=0A=
--Sandy, speaking as co-chair=0A=

From Sandra.Murphy@sparta.com  Wed Sep 26 10:54:50 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27AF021F858F for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 10:54:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.467
X-Spam-Level: 
X-Spam-Status: No, score=-102.467 tagged_above=-999 required=5 tests=[AWL=0.132, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wo-HklPHFcVM for <sidr@ietfa.amsl.com>; Wed, 26 Sep 2012 10:54:49 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 782A821F8588 for <sidr@ietf.org>; Wed, 26 Sep 2012 10:54:49 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8QHsmOk005910; Wed, 26 Sep 2012 12:54:49 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8QHslJo002205; Wed, 26 Sep 2012 12:54:48 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Wed, 26 Sep 2012 13:55:49 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "George, Wes" <wesley.george@twcable.com>, "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>
Thread-Topic: [sidr] FW: New Version Notification for draft-george-sidr-as-migration-00.txt
Thread-Index: Ac2aeOrUNWR0JoYFRE6OKRKBzioSTQAACHNQAGW/1Es=
Date: Wed, 26 Sep 2012 17:55:49 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEECB86@Hermes.columbia.ads.sparta.com>
References: <20120924172036.9269.86184.idtracker@ietfa.amsl.com>, <2671C6CDFBB59E47B64C10B3E0BD592360076037@PRVPEXVS15.corp.twcable.com>
In-Reply-To: <2671C6CDFBB59E47B64C10B3E0BD592360076037@PRVPEXVS15.corp.twcable.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] FW: New Version Notification for draft-george-sidr-as-migration-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Sep 2012 17:54:50 -0000

Folks, please do read and comment as soon as you can.  It would be great to=
 be able to discuss this on Saturday.=0A=
=0A=
--Sandy, speaking as co-chair=0A=
________________________________________=0A=
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of George, We=
s [wesley.george@twcable.com]=0A=
Sent: Monday, September 24, 2012 1:24 PM=0A=
To: sidr wg list (sidr@ietf.org)=0A=
Subject: [sidr] FW: New Version Notification for draft-george-sidr-as-migra=
tion-00.txt=0A=
=0A=
Folks, this is the companion draft to draft-ga-idr-as-migration that discus=
ses the specific implications to SIDR. I'll caveat by saying that it's quit=
e likely that I have a few mistakes in terminology and would appreciate any=
 corrections to make the discussion crisper and clearer, but I think I have=
 at least some of the considerations documented in a way that we can have s=
ome more discussion about it. This probably isn't a complete set of conside=
rations yet, but hopefully this will get folks thinking about it so that th=
ey come up with others.=0A=
=0A=
Thanks,=0A=
=0A=
Wes=0A=
=0A=
=0A=
=0A=
-----Original Message-----=0A=
From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org]=0A=
Sent: Monday, September 24, 2012 1:21 PM=0A=
To: George, Wes=0A=
Subject: New Version Notification for draft-george-sidr-as-migration-00.txt=
=0A=
=0A=
=0A=
A new version of I-D, draft-george-sidr-as-migration-00.txt=0A=
has been successfully submitted by Wesley George and posted to the IETF rep=
ository.=0A=
=0A=
Filename:        draft-george-sidr-as-migration=0A=
Revision:        00=0A=
Title:           BGPSec Considerations for AS Migration=0A=
Creation date:   2012-09-24=0A=
WG ID:           Individual Submission=0A=
Number of pages: 8=0A=
URL:             http://www.ietf.org/internet-drafts/draft-george-sidr-as-m=
igration-00.txt=0A=
Status:          http://datatracker.ietf.org/doc/draft-george-sidr-as-migra=
tion=0A=
Htmlized:        http://tools.ietf.org/html/draft-george-sidr-as-migration-=
00=0A=
=0A=
=0A=
Abstract:=0A=
   This draft discusses considerations for supporting and securing a=0A=
   common method for AS-Migration within the BGPSec protocol.=0A=
=0A=
=0A=
=0A=
=0A=
The IETF Secretariat=0A=
=0A=
=0A=
This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.=0A=
_______________________________________________=0A=
sidr mailing list=0A=
sidr@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sidr=0A=

From internet-drafts@ietf.org  Wed Sep 26 17:56:31 2012
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4E1621F861B; Wed, 26 Sep 2012 17:56:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.487
X-Spam-Level: 
X-Spam-Status: No, score=-102.487 tagged_above=-999 required=5 tests=[AWL=0.112, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ThinrgPXzU2F; Wed, 26 Sep 2012 17:56:31 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48E3721F861E; Wed, 26 Sep 2012 17:56:31 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <20120927005631.20212.21301.idtracker@ietfa.amsl.com>
Date: Wed, 26 Sep 2012 17:56:31 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-ltamgmt-06.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Sep 2012 00:56:31 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Secure Inter-Domain Routing Working Group=
 of the IETF.

	Title           : Local Trust Anchor Management for the Resource Public Ke=
y Infrastructure
	Author(s)       : Mark Reynolds
                          Stephen Kent
                          Matthew Lepinski
	Filename        : draft-ietf-sidr-ltamgmt-06.txt
	Pages           : 28
	Date            : 2012-09-26

Abstract:
   This document describes a facility to enable a relying party (RP) to
   manage trust anchors (TAs) in the context of the Resource Public Key
   Infrastructure (RPKI). It is common in RP software (not just in the
   RPKI) to allow an RP to import TA material in the form of self-signed
   certificates. However, this approach to incorporating TAs is
   potentially dangerous. (These self-signed certificates rarely
   incorporate any extensions that impose constraints on the scope of
   the imported public keys, and the RP is not able to impose such
   constraints.) The facility described in this document allows an RP to
   impose constraints on such TAs. Because this mechanism is designed to
   operate in the RPKI context, the most important constraints are the
   Internet Number Resources (INRs) expressed via RFC 3779 extensions.
   These extentions bind address spaces and/or autonomous system (AS)
   numbers to entities. The primary motivation for the facility described
   in this document is to enable an RP to ensure that INR information
   that it has acquired via some trusted channel is not overridden by the
   information acquired from the RPKI repository system or by the putative
   TAs that the RP imports. Specifically, the mechanism allows an RP to
   specify a set of overriding bindings between public key identifiers and
   INR data. These bindings take precedence over any conflicting bindings
   acquired by the putative TAs and the certificates downloaded from the
   RPKI repository system. This mechanism is designed for local use by an R=
P,
   but any entity that is accorded administrative control over a set of RPs
   may use this mechanism to convey its view of the RPKI to RPs within its
   jurisdiction. The means by which this latter use case is effected is
   outside the scope of this document.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-ltamgmt

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-ltamgmt-06

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sidr-ltamgmt-06


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From Sandra.Murphy@sparta.com  Thu Sep 27 06:39:28 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65FE421F853E for <sidr@ietfa.amsl.com>; Thu, 27 Sep 2012 06:39:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.473
X-Spam-Level: 
X-Spam-Status: No, score=-102.473 tagged_above=-999 required=5 tests=[AWL=0.126, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T8C8+sgGCLYR for <sidr@ietfa.amsl.com>; Thu, 27 Sep 2012 06:39:27 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 6257821F8508 for <sidr@ietf.org>; Thu, 27 Sep 2012 06:39:27 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8RDdQDl011414 for <sidr@ietf.org>; Thu, 27 Sep 2012 08:39:26 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8RDdQ5L019661 for <sidr@ietf.org>; Thu, 27 Sep 2012 08:39:26 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Thu, 27 Sep 2012 09:40:50 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: comments on recent as migration drafts
Thread-Index: Ac2ctbIPdaoE1bulQueNkM94bbvFjA==
Date: Thu, 27 Sep 2012 13:40:49 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEFD1A@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] comments on recent as migration drafts
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Sep 2012 13:39:28 -0000

Speaking as regular ol' member.=0A=
=0A=
Some comments about these drafts.=0A=
=0A=
It appears to me that the ga-idr-as-migration talks about a merger of AS 20=
0 and AS 300, with AS 200 being the eventually retained ASN but george-sidr=
-as-migration talks about a merger of AS 200 and AS 300 with AS 300 being t=
he eventually retained ASN.  If that is true, then those  reading both draf=
ts should keep that in mind when looking at the examples.=0A=
=0A=
In the idr-as-migration draft, from the discussion it appears that the impl=
ementation of the local-as feature on the PE router in AS supports the loca=
l-as as something like an ebgp session inside the router.  (like it adds th=
e old 300 ASN on AS_PATHs sent over ibgp sessions to AS 200 neighbors).  Am=
 I understanding the examples correctly?=0A=
=0A=
The goal is for the AS_PATH length to be the same length in the migration i=
nterval as it was before migration.  Does it matter if that effect is accom=
plished some other way than the knobs currently implemented?  IE the local-=
as knob has a side effect of getting the 300 ASN into the AS_PATH to ibgp n=
eighbors so the second knob no-prepend makes that go away.  Do you need bot=
h behaviors -- local-as AND local-as + no-prepend?  Would it be OK if the s=
ide effect did not happen and you got to the no-increase-in-path-length goa=
l without needing the no-prepend knob?=0A=
=0A=
wrt the replace-as technique.  The text says that "only the historical (or,=
 legacy) AS will be prepended in the outbound BGP UPDATE toward the custome=
r's network".  But the example says "After ISP A' changes PE-1 to include t=
he "Replace AS" feature, CE-1 would receive an AS_PATH of: 200 400. " That =
is indeed "the same AS_PATH length pre-AS migration" as the text says, whic=
h accomplishes that goal, but it would require configuration of the CE rout=
er to accept a first-as that was different from the one used in the OPEN.  =
I suspect that's a typo, that is after using replace-as the AS_PATH toward =
the CE would be "300 400".  But it is an important point so I'd like to mak=
e sure. =0A=
=0A=
About sidr-as-migration=0A=
=0A=
The discussion of origin validation seems to assume that multiple ROAs for =
the same prefix space is unusual and requires a limited overlap period.  Th=
at is not the case.  From time immemorial, multiple ROAs for the same prefi=
x have been anticipated and deliberately supported.  There can be *any numb=
er* of ROAs for a prefix at any time.  One ROA does not replace another for=
 the same prefix.=0A=
=0A=
The use of pcount=3D0 is rejected as requiring configuration on the CE rout=
er so that it authorizes and accepts the use of pcount=3D0 from the PE rout=
er.  Suppose that the use of pcount=3D0 was in an internal hop in the PE ro=
uter, so the AS accepting and authorizing the use of pcount=3D0 was one of =
AS 200 or AS 300, so all configuration happened on the PE router, and no co=
nfiguration happened on the CE router.  If that worked, would that be accep=
table?=0A=
=0A=
--Sandy, speaking as regular ol' member=0A=
=0A=

From sra@hactrn.net  Thu Sep 27 09:58:55 2012
Return-Path: <sra@hactrn.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7825921F859E for <sidr@ietfa.amsl.com>; Thu, 27 Sep 2012 09:58:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ic285WR0F6J7 for <sidr@ietfa.amsl.com>; Thu, 27 Sep 2012 09:58:54 -0700 (PDT)
Received: from cyteen.hactrn.net (cyteen.hactrn.net [66.92.66.68]) by ietfa.amsl.com (Postfix) with ESMTP id A1F8C21F859C for <sidr@ietf.org>; Thu, 27 Sep 2012 09:58:52 -0700 (PDT)
Received: from minas-ithil.hactrn.net (095-097-128-052.static.chello.nl [95.97.128.52]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "nargothrond.hactrn.net", Issuer "Grunchweather Associates" (verified OK)) by cyteen.hactrn.net (Postfix) with ESMTPS id 59CDE9B473 for <sidr@ietf.org>; Thu, 27 Sep 2012 16:58:50 +0000 (UTC)
Received: from minas-ithil.hactrn.net (localhost [127.0.0.1]) by minas-ithil.hactrn.net (Postfix) with ESMTP id 2BECA7DC673 for <sidr@ietf.org>; Thu, 27 Sep 2012 18:58:48 +0200 (CEST)
Date: Thu, 27 Sep 2012 18:58:48 +0200
From: Rob Austein <sra@hactrn.net>
To: sidr@ietf.org
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com>
User-Agent: Wanderlust/2.15.5 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset=US-ASCII
Message-Id: <20120927165848.2BECA7DC673@minas-ithil.hactrn.net>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Sep 2012 16:58:55 -0000

Another review of draft-ietf-sidr-bgpsec-protocol-05.

>  1.  Introduction
...
>     BGPSEC relies on the Resource Public Key Infrastructure (RPKI)
>     certificates that attest to the allocation of AS number and IP
>     address resources.  (For more information on the RPKI, see [6] and
>     the documents referenced therein.)  Any BGPSEC speaker who wishes to
>     send BGP update messages to external peers (eBGP) containing the
>     BGPSEC_Path_Signatures must have an RPKI end-entity certificate (as
>     well as the associated private signing key) corresponding to the
>     BGPSEC speaker's AS number.  Note, however, that a BGPSEC speaker
>     does not require such a certificate in order to validate update
>     messages containing the BGPSEC_Path_Signatures attribute.

The BGPSEC speaker doesn't need the certificate, only the private key.
The certificate needs to exist in the RPKI, but unless I'm missing
something the BGPSEC speaker need never see its own certificate.

>  2.  BGPSEC Negotiation
...
>                               Capability Value:
>  
>                      0        1        2  3       4 5 6 7
>                   +---------------------------------------+
>                   | Send | Receive | Reserved  |  Version |
>                   +---------------------------------------+
>                   |               AFI                     |
>                   +---------------------------------------+
>                   |                                       |
>                   +---------------------------------------+
>                   |             Reserved                  |
>                   +---------------------------------------+
>                   |               SAFI                    |
>                   +---------------------------------------+
...
>     The fifth octet in the capability contains the 8-bit Subsequent
>     Address Family Identifier (SAFI).  This value is encoded as in the
>     BGP multiprotocol extensions [2].

Is zero SAFI the same thing as null SAFI?  It's not in RFC 3779: an
OCTET STRING of length two is not the same as an OCTET STRING of
length three with the third octet zeroed.

I suspect that presence of SAFI may require a flag bit, unless we are
certain that zero SAFI always means the same thing as null SAFI.

>  3.  The BGPSEC_Path_Signatures Attribute
...
>  
>          High-Level Diagram of the BGPSEC_Path_Signatures Attribute
>                            BGPSEC_Path_Signatures

What's the doubled attribute name supposed to mean?

>          +---------------------------------------------------------+
>          |     +-----------------+                                 |
>          |     |   Secure Path   |        +-----------------+      |
>          |     +-----------------+        | Additional Info |      |
>          |     |    AS X         |        +-----------------+      |
>          |     |    pCount X     |        |  Info Type      |      |
>          |     |    Flags X      |        |  Info Length    |      |
>          |     |    AS Y         |        |  Info Value     |      |
>          |     |    pCount Y     |        +-----------------+      |
>          |     |    Flags Y      |                                 |
>          |     |      ...        |                                 |
>          |     +-----------------+                                 |
>          |                                                         |
>          |     +-----------------+       +-----------------+       |
>          |     | Sig Block 1     |       |  Sig Block 2    |       |
>          |     +-----------------+       +-----------------+       |
>          |     | Alg Suite 1     |       |  Alg Suite 2    |       |
>          |     | SKI X           |       |  SKI X          |       |
>          |     | Sig Length X    |       |  Sig Length X   |       |
>          |     | Signature X     |       |  Signature X    |       |
>          |     | SKI Length Y    |       |  SKI Length Y   |       |
>          |     | SKI Y           |       |  SKI Y          |       |
>          |     | Sig Length Y    |       |  Sig Length Y   |       |
>          |     | Signature Y     |       |  Signature Y    |       |
>          |     |      ...        |       |      ....       |       |
>          |     +-----------------+       +-----------------+       |
>          |                                                         |
>          +---------------------------------------------------------+

I did not find this picture very clear and I thought I knew this
protocol.  Generally, in diagrams of this type, one does not assume
row major ordering of internal boxes.

>     The following is a more detailed explanation of the format of the
>     BGPSEC_Path_Signatures attribute.
>
>                       BGPSEC_Path_Signatures Attribute
>  
>           +-------------------------------------------------------+
>           | Secure_Path                             (variable)    |
>           +-------------------------------------------------------+
>           | Additional_Info                         (variable)    |
>           +-------------------------------------------------------+
>           | Sequence of one or two Signature_Blocks (variable)    |
>           +-------------------------------------------------------+

It's not more detailed, but it is clearer, because at least it's
obvious how the sections match up with the following text.

>  3.2.  Additional_Info
>  
>     Here we provide a detailed description of the Additional_Info in the
>     BGPSEC_Path_Signatures attribute.
>  
>                                Additional_Info
>  
>                +---------------------------------------------+
>                | Info Type                      (1 octet)    |
>                +---------------------------------------------+
>                | Info Length                    (1 octet)    |
>                +---------------------------------------------+
>                | Info Value                     (variable)   |
>                +---------------------------------------------+
>  
>  
>     The Info Type field is a one-octet value that identifies the type of
>     additional information included in the Info Value field.  This
>     specification defines a single (null) type of Additional_Info.  The
>     Info Type for this null type is zero.
>  
>     The Info Length field contains the length in octets of the Info Value
>     field.  For the (null) Info Type zero specified in this document, the
>     Info Length MUST be zero.
>  
>     The syntax and semantics contained in the Info Value field depends on
>     the type contained in the Info Type field.  For the (null) Info Type
>     zero specified in this document, the Info Value field is empty (since
>     the Info Length field must be zero).
>  
>     Implementations compliant with this specification MUST set the Info
>     Type to zero in BGPSEC update messages for route advertisements that
>     they originate (see Section 4.1 for more details).  When an
>     implementation compliant with this specification receives a BGPSEC
>     update message with an Info Type field that it does not understand
>     (i.e., an Info Type other than zero), the implementation MUST use the
>     Additional_Info when it verifies digital signatures (as per Section
>     5.2).  However, other than signature verification, the implementation
>     MUST ignore the Info Value field when it does not understand the Info
>     Type.

So this is an expansion mechanism, fine, got that.  How many of these
appear in a message?  Looks like exactly one.  Not very flexible.  We
need to include this instead of just going to a new attribute type
because?

Overall, this extension format looks like it wants to be IPv4 header
options when it grows up, but the rest of the formats doom this to
being a singleton.  Kind of strange.

I don't really object, it's just more than a little odd as a
placeholder for we-have-no-real-idea-what.

>  4.1.  Originating a New BGPSEC Update
...
>     In particular, this AS number MUST match the AS number in
>     the AS number resource extension field of the Resource PKI end-entity
>     certificate(s) that will be used to verify the digital signature(s)
>     constructed by this BGPSEC speaker.

"The" or "an"?   Is it legal for the EE certificate to cover more RFC
3779 resources than just a single ASN?

>  4.2.  Propagating a Route Advertisement
...
>     The BGPSEC speaker next copies the Additional_Info portion of the
>     BGPSEC_Path_Signatures directly from the received update message to
>     the new update message (that it is constructing).  Note that the
>     BGPSEC speaker MUST NOT change the Additional_Info as any change to
>     Additional_Info will cause the new BGPSEC update message to fail
>     validation (see Section 5).

So Additional_Info is generated only by the originator.  It would have
been kind to mention this earlier in the document.

>     If the received BGPSEC update message contains two Signature_ Blocks
>     and the BGPSEC speaker supports both of the corresponding algorithms
>     suites, then the new update message generated by the BGPSEC speaker
>     SHOULD include both of the Signature_Blocks.  If the received BGPSEC
>     update message contains two Signature_Blocks and the BGPSEC speaker
>     only supports one of the two corresponding algorithm suites, then the
>     BGPSEC speaker MUST remove the Signature_Block corresponding to the
>     algorithm suite that it does not understand.  If the BGPSEC speaker
>     does not support the algorithm suites in any of the Signature_Blocks
>     contained in the received update message, then the BGPSEC speaker
>     MUST NOT propagate the route advertisement with the
>     BGPSEC_Path_Signatures attribute (i.e., propagate it as an unsigned
>     BGP update message).

Parenthetical phrase says opposite of what I suspect it was intended
to mean.  I suspect you meant something like:

"(i.e., if it chooses to propagate this route advertisement at all, it
MUST do so as an unsigned BGP update message)".

>  4.3.  Processing Instructions for Confederation Members
...
>     When a confederation member receives a BGPSEC update message from a
>     peer within the confederation and propagates it to a peer outside the
>     confederation, it must remove all of the Secure_Path Segments added
>     by confederation members as well as the corresponding Signature
>     Segments.  To do this, the confederation member propagating the route
>     outside the confederation does the following:
>  
>     o  First, starting with the least recently added Secure_Path
>        segments, remove all of the consecutive Secure_Path segments that
>        have the Confed_Segment flag set to one.  Stop this process once a
>        Scure_Path segment is reached which has its Confed_Segment flag
>        set to zero.  Keep a count of the number of segments removed in
>        this fashion.
>  
>     o  Second, starting with the most recently added Signature Segment,
>        remove a number of Signature Segments equal to the number of
>        Secure_Path Segments removed in the previous step.  (That is,
>        remove the K most recently added signature segments, where K is
>        the number of Secure_Path Segments removed in the previous step.)

Is "least recently added" in first bullet item a mistake?  Sure looks
like one.  If not, this seriously violates the Principal of Least
Astonishment, so the text needs a coherent explanation of why we
remove the least recent Secure_Path segments and the most recent
Signature Segments.

More generally, it would be nice if the document were clearer on the
circumstances under which there would ever be two or more blocks of
segments with the Confed_Segment flag turned on.  My guess is that
this should never happen, but, if so, the above description is an
awfully compled way of saying "strip out every Secure_Path segment
with the Confed_segment flag turned on, along with the corresponding
signature_segments."

>  5.  Processing a Received BGPSEC Update
...
>     Implementations that support such deferment of validation MUST
>     perform validation of these messages as soon as possible (i.e., as
>     soon as resources are available to perform validation) and MUST re-
>     run best path selection once the validation status of such update
>     messages is known.

Is it OK to do this incrementally if the implementation so desires, or
must the implementation only do this after catching up completely?  If
the latter, what should the implementation do if the flood continues
and the implementation doubts it will ever catch up?

>  5.2.  Validation Algorithm
>  
>     This section specifies an algorithm for validation of BGPSEC update
>     messages.  A conformant implementation MUST include a BGPSEC update
>     validation algorithm that is functionally equivalent to the external
>     behavior of this algorithm.

s/external/externally visible/

>     If there are two Signature_Blocks within the BGPSEC_Path_Signatures
>     attribute and one of them is poorly formed (or contains the wrong
>     number of Signature segments) , then the recipient should log that an
>     error occurred, strip off that particular Signature_Block and process
>     the update message as though it arrived with a single
>     Signature_Block.  If the BGPSEC_Path_Signatures attribute contains an
>     error that is not local to one of two Signature_Blocks, then the
>     recipient should log that an error occurred and drop the update
>     message containing the error.  (In particular, if any of checks 3-5
>     above fail, the recipient should log that an error occurred and drop
>     the update message containing the error.)

Do routers "log that an error occurred"?  Does incrementing a MIB
variable count?  What's the expected load from this logging?  What bad
thing (if any) happens if this logging is dropped or ignored?

>        signature is invalid, then mark the entire Signature-List Block as
>        'Not Good' and proceed to the next Signature_Block.  If the
>        signature validation algorithm determines that the signature is
>        valid, then continue processing Signature-Segments (within the
>        current Signature-List Block).

What's a "Signature-List Block"?  Never defined.

>     If all Signature-Segments within a Signature-List Block pass
>     validation (i.e., all segments are processed and the Signature-List
>     Block has not yet been marked 'Not Good'), then the Signature_Block
>     is marked as 'Good'.

What's a "Signature-Segment"?  Never defined.

>     If at least one Signature_Block is marked as 'Good', then the
>     validation algorithm terminates and the BGPSEC update message is
>     deemed to be 'Good'.  (That is, if a BGPSEC update message contains
>     two Signature_Blocks then the update message is deemed 'Good' if the
>     first Signature_Block is marked 'Good' OR the second Signature_Block
>     is marked 'Good'.)

I think this is saying that the validation algorithm requires that
there exist a complete valid chain for some single algorithm, ie, that
one cannot construct a valid chain by hopping between algorithms in
the middle of the chain.  This makes sense, since otherwise the
signature chaining won't work.  Might want to say so.

>  6.1.  Algorithm Suite Considerations
...
>     To this end, a mandatory algorithm suites document will be created
>     which specifies a mandatory-to-use 'current' algorithm suite for use
>     by all BGPSEC speakers [12].  Additionally, the document specifies an
>     additional 'new' algorithm suite that is recommended to implement.

Badly phrased, unless the real intent here is to say that we're going
to pick both the current and next algorithms right off the bat, which
seems unlikely to me.   I think it would be more correct to say that
we will specify an initial mandatory algorithm suite, and, once we
have some idea of what the next algorithm should be, we will publish
a series of updated documents phasing in the new one and (eventually,
years later) phasing out the old one.

>     It is anticipated

By whom?
                        
>     Once the transition has successfully been completed in this manner,
>     BGPSEC speakers SHOULD include only a single Signature_Block
>     (corresponding to the 'new' algorithm).

So we're going to start out with only one, right?

>  6.2.  Extensibility Considerations
...
>     At this point a transition would begin which is analogous to the
>     algorithm transition discussed in Section 6.2.

Specifying section numbers manually instead of using <xref/>, are we?

>  7.  Security Considerations
...
>     (It should be noted that BGPSEC does not offer a precise
>     guarantee that the data packets would propagate along the
>     indicated path; it only guarantees that the BGP update conveying
>     the path indeed propagated along the indicated path.)

"Precise guarantee", hell.  It provides no guarantee of any kind on
this point.  AFAIK nobody knows how to do that (yet).

From wesley.george@twcable.com  Thu Sep 27 11:13:34 2012
Return-Path: <wesley.george@twcable.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0DAF21F855D for <sidr@ietfa.amsl.com>; Thu, 27 Sep 2012 11:13:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.473
X-Spam-Level: 
X-Spam-Status: No, score=-0.473 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j+ge3B8Rgvw9 for <sidr@ietfa.amsl.com>; Thu, 27 Sep 2012 11:13:34 -0700 (PDT)
Received: from cdpipgw02.twcable.com (cdpipgw02.twcable.com [165.237.59.23]) by ietfa.amsl.com (Postfix) with ESMTP id CECDD21F855A for <sidr@ietf.org>; Thu, 27 Sep 2012 11:13:33 -0700 (PDT)
X-SENDER-IP: 10.136.163.15
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.80,496,1344225600"; d="scan'208";a="426947750"
Received: from unknown (HELO PRVPEXHUB06.corp.twcable.com) ([10.136.163.15]) by cdpipgw02.twcable.com with ESMTP/TLS/RC4-MD5; 27 Sep 2012 14:12:25 -0400
Received: from PRVPEXVS15.corp.twcable.com ([10.136.163.79]) by PRVPEXHUB06.corp.twcable.com ([10.136.163.15]) with mapi; Thu, 27 Sep 2012 14:13:32 -0400
From: "George, Wes" <wesley.george@twcable.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>, "sidr@ietf.org" <sidr@ietf.org>
Date: Thu, 27 Sep 2012 14:13:31 -0400
Thread-Topic: comments on recent as migration drafts
Thread-Index: Ac2ctbIPdaoE1bulQueNkM94bbvFjAACqR1A
Message-ID: <2671C6CDFBB59E47B64C10B3E0BD5923602AB34B@PRVPEXVS15.corp.twcable.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEFD1A@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEFD1A@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] comments on recent as migration drafts
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Sep 2012 18:13:35 -0000

Thanks for the quick review. Responses below inline.


> From: sidr-bounces@ietf.org [mailto:sidr-bounces@ietf.org] On Behalf Of
> Murphy, Sandra
>
> It appears to me that the ga-idr-as-migration talks about a merger of AS
> 200 and AS 300, with AS 200 being the eventually retained ASN but
> george-sidr-as-migration talks about a merger of AS 200 and AS 300 with
> AS 300 being the eventually retained ASN.  If that is true, then those
> reading both drafts should keep that in mind when looking at the
> examples.
[WEG] oops. Sigh. I'll get that corrected in subsequent versions of george-=
sidr so that the two agree.
>
> In the idr-as-migration draft, from the discussion it appears that the
> implementation of the local-as feature on the PE router in AS supports
> the local-as as something like an ebgp session inside the router.  (like
> it adds the old 300 ASN on AS_PATHs sent over ibgp sessions to AS 200
> neighbors).  Am I understanding the examples correctly?
[WEG] Not exactly no. There's no additional internal eBGP session between t=
he two ASNs on the PE, and remember that the PE has been reconfigured to be=
 in the retained AS, not the legacy one, so this local-as and its related s=
witches are used on the PE-CE sessions and their associated updates, not PE=
-PE. All it's doing is overriding the values from the global config that wo=
uld normally be used to populate "MY ASN" and "AS_PATH" when generating BGP=
 messages to a specific neighbor.

>
> The goal is for the AS_PATH length to be the same length in the
> migration interval as it was before migration.  Does it matter if that
> effect is accomplished some other way than the knobs currently
> implemented?
[WEG] the implementation details probably don't matter if the result is the=
 same, other than the fact that this one exists and is in lots of code, whi=
le a different approach may not be widely implemented. You could make the a=
rgument that since we're talking about trying to make this work on BGPSec-c=
apable routers, you could also assume that a BGPSec-friendly AS-migration m=
ethod would also be supported in the same code I guess, but that's only if =
it's a required feature as a part of the BGPSec implementation. If it's a s=
tandalone, it might require code upgrades that may not be possible for a nu=
mber of different reasons.

 IE the local-as knob has a side effect of getting the 300
> ASN into the AS_PATH to ibgp neighbors so the second knob no-prepend
> makes that go away.  Do you need both behaviors -- local-as AND local-as
> + no-prepend?  Would it be OK if the side effect did not happen and you
> got to the no-increase-in-path-length goal without needing the no-
> prepend knob?
[WEG] different use cases require different configurations. Local-AS no-pre=
pend ensures that the AS_PATH length doesn't change, which is critical to t=
his migration technique, so I guess it's safe to say that you don't need th=
e local-as behavior by itself, but that if you don't care about the AS-path=
 length, using only local-as will still enable you to change the global BGP=
 AS of the PE for migrations, and will be less complex/risky since you're n=
ot manipulating the AS_PATH in ways that could result in route loops.
>
> wrt the replace-as technique.  The text says that "only the historical
> (or, legacy) AS will be prepended in the outbound BGP UPDATE toward the
> customer's network".  But the example says "After ISP A' changes PE-1 to
> include the "Replace AS" feature, CE-1 would receive an AS_PATH of: 200
> 400. " That is indeed "the same AS_PATH length pre-AS migration" as the
> text says, which accomplishes that goal, but it would require
> configuration of the CE router to accept a first-as that was different
> from the one used in the OPEN.  I suspect that's a typo, that is after
> using replace-as the AS_PATH toward the CE would be "300 400".  But it
> is an important point so I'd like to make sure.
[WEG] I think you're right that it's a typo, I'll doublecheck with my co-au=
thor.
>From the referenced cisco doc: "The replace-as keyword is used to prepend o=
nly the local autonomous-system number (as configured with the ip-address a=
rgument) to the AS_PATH attribute. The autonomous-system number from the lo=
cal BGP routing process is not prepended."

However...
4271 6.3 lists the requirement you mention for the Open "My ASN" value and =
AS_Path to match as a MAY:
   "If the UPDATE message is received from an external peer, the local
   system MAY check whether the leftmost (with respect to the position
   of octets in the protocol message) AS in the AS_PATH attribute is
   equal to the autonomous system number of the peer that sent the
   message.  If the check determines this is not the case, the Error
   Subcode MUST be set to Malformed AS_PATH."
I don't know if most common implementations perform this check. In fact, th=
at's why I point out that the question needs to be answered as far as path =
validation is concerned - does the ASN of the established neighborship have=
 to match the AS_Path or PATH_signatures or does it not matter as long as t=
he signatures are all valid? Does that MAY need to be a MUST in BGPSec land=
?

>
> About sidr-as-migration
>
> The discussion of origin validation seems to assume that multiple ROAs
> for the same prefix space is unusual and requires a limited overlap
> period.  That is not the case.  From time immemorial, multiple ROAs for
> the same prefix have been anticipated and deliberately supported.  There
> can be *any number* of ROAs for a prefix at any time.  One ROA does not
> replace another for the same prefix.
[WEG] ok. I knew they were possible, but I guess I didn't realize that this=
 wasn't expected to be a temporary situation. I just reread 6480 3.2 and I =
see what you mean. I'll fix. Any other portions of the spec you recommend t=
hat I reference that covers the presence of multiple ROAs for the same pref=
ix/length more explicitly or is that the right thing to reference?
>
> The use of pcount=3D0 is rejected as requiring configuration on the CE
> router so that it authorizes and accepts the use of pcount=3D0 from the P=
E
> router.  Suppose that the use of pcount=3D0 was in an internal hop in the
> PE router, so the AS accepting and authorizing the use of pcount=3D0 was
> one of AS 200 or AS 300, so all configuration happened on the PE router,
> and no configuration happened on the CE router.  If that worked, would
> that be acceptable?
[WEG] hmm... that's an interesting way to play it and worth exploring some =
more I think. However, as far as requirements go: it MUST NOT require the r=
outer to actually establish and maintain a second set of eBGP sessions (eve=
n internally/behind the scenes) such that it has to do 2x the update genera=
tion, 2x the processing, etc. 2x the signatures is likely unavoidable, beca=
use if you didn't require the implementer to be in possession of signatures=
 for both ASNs you would have the potential for a path-shortening attack. B=
ut generally what I'm saying is that this can't be something that creates a=
 major scale drag for every session that has it enabled, since we're talkin=
g about something that might be enabled on hundreds of PE-CE neighbor sessi=
ons during an active migration.

Wes George


This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.

From Sandra.Murphy@sparta.com  Thu Sep 27 16:55:20 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5885121F8594 for <sidr@ietfa.amsl.com>; Thu, 27 Sep 2012 16:55:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.478
X-Spam-Level: 
X-Spam-Status: No, score=-102.478 tagged_above=-999 required=5 tests=[AWL=0.121, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y83rrIJuo9Qw for <sidr@ietfa.amsl.com>; Thu, 27 Sep 2012 16:55:19 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id E26EA21F8599 for <sidr@ietf.org>; Thu, 27 Sep 2012 16:55:18 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8RNtGNm017076; Thu, 27 Sep 2012 18:55:16 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8RNtGMd003835; Thu, 27 Sep 2012 18:55:16 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Thu, 27 Sep 2012 19:56:39 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "George, Wes" <wesley.george@twcable.com>, "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: comments on recent as migration drafts
Thread-Index: Ac2ctbIPdaoE1bulQueNkM94bbvFjAACqR1AABF7IOs=
Date: Thu, 27 Sep 2012 23:56:38 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEFF04@Hermes.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEFD1A@Hermes.columbia.ads.sparta.com>, <2671C6CDFBB59E47B64C10B3E0BD5923602AB34B@PRVPEXVS15.corp.twcable.com>
In-Reply-To: <2671C6CDFBB59E47B64C10B3E0BD5923602AB34B@PRVPEXVS15.corp.twcable.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] comments on recent as migration drafts
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Sep 2012 23:55:20 -0000

Thanks for the quick response!=0A=
=0A=
wrt:=0A=
>[WEG] oops. =0A=
=0A=
No problem.  And don't bother with this right now.  I only wanted to be sur=
e people noticed, as they might read both drafts.=0A=
=0A=
wrt:=0A=
=0A=
>> In the idr-as-migration draft, from the discussion it appears that the=
=0A=
>> implementation of the local-as feature on the PE router in AS supports=
=0A=
>> the local-as as something like an ebgp session inside the router.  (like=
=0A=
>> it adds the old 300 ASN on AS_PATHs sent over ibgp sessions to AS 200=0A=
>> neighbors).  Am I understanding the examples correctly?=0A=
>[WEG] Not exactly no. There's no additional internal eBGP session between =
the =0A=
>two ASNs on the PE, and remember that the PE has been reconfigured to be i=
n =0A=
>the retained AS, not the legacy one, so this local-as and its related swit=
ches are =0A=
>used on the PE-CE sessions and their associated updates, not PE-PE. All it=
's =0A=
>doing is overriding the values from the global config that would normally =
be =0A=
>used to populate "MY ASN" and "AS_PATH" when generating BGP messages =0A=
>to a specific neighbor.=0A=
=0A=
=0A=
No, I did not mean to suggest that there was an actual ebgp session.  I thi=
nk maybe I was reading the replace-as example incorrectly.  I am not sure w=
hat the AS_PATH is when it is transmitted between PE1 and PE2 and it looked=
 like PE1 might be adding ASNs to the AS_PATH it sent over the ibgp session=
 to PE2.=0A=
=0A=
>> from the one used in the OPEN.  I suspect that's a typo, that is after=
=0A=
>> using replace-as the AS_PATH toward the CE would be "300 400".  But it=
=0A=
>> is an important point so I'd like to make sure.=0A=
>[WEG] I think you're right that it's a typo, I'll doublecheck with my co-a=
uthor.=0A=
<skip>=0A=
>   message.  If the check determines this is not the case, the Error=0A=
>   Subcode MUST be set to Malformed AS_PATH."=0A=
>I don't know if most common implementations perform this check. In fact, =
=0A=
>that's why I point out that the question needs to be answered as far as pa=
th =0A=
>validation is concerned - does the ASN of the established neighborship hav=
e =0A=
>to match the AS_Path or PATH_signatures or does it not matter as long as t=
he =0A=
>signatures are all valid? Does that MAY need to be a MUST in BGPSec land?=
=0A=
=0A=
>From http://www.cisco.com/en/US/docs/ios/12_3t/ip_route/command/reference/i=
p2_b1gt.html#wp1080615, "bgp enforce-first-as" default is enabled and it me=
ans=0A=
To configure a router to deny an update received from an external BGP (eBGP=
) peer that does not list its autonomous system (AS) number at the beginnin=
g of the AS_PATH in the incoming update, use the bgp enforce-first-as comma=
nd in router configuration mode.=0A=
=0A=
I think this is already a MUST in the protocol because the protocol makes s=
ure the AS listed are the ones that the packet came through.  If the update=
 came from the neighbor and the first AS in the path is not the neighbor's =
AS, then the validation will fail.  (Unless the neighbor has the keys to tw=
o ASs and uses an AS other than is used in the OPEN packet.  It's all about=
 the keys.)=0A=
=0A=
=0A=
>> The use of pcount=3D0 is rejected as requiring configuration on the CE=
=0A=
>> router so that it authorizes and accepts the use of pcount=3D0 from the =
PE=0A=
>> router.  Suppose that the use of pcount=3D0 was in an internal hop in th=
e=0A=
>> PE router, so the AS accepting and authorizing the use of pcount=3D0 was=
=0A=
>> one of AS 200 or AS 300, so all configuration happened on the PE router,=
=0A=
>> and no configuration happened on the CE router.  If that worked, would=
=0A=
>> that be acceptable?=0A=
>[WEG] hmm... that's an interesting way to play it and worth exploring some=
 =0A=
>more I think. However, as far as requirements go: it MUST NOT require the =
=0A=
>router to actually establish and maintain a second set of eBGP sessions (e=
ven =0A=
>internally/behind the scenes) such that it has to do 2x the update generat=
ion, =0A=
>2x the processing, etc. 2x the signatures is likely unavoidable, because i=
f you =0A=
>didn't require the implementer to be in possession of signatures for both =
ASNs =0A=
>you would have the potential for a path-shortening attack. =0A=
=0A=
=0A=
No, I did not mean to indicate that there would be an actual ebgp session. =
 But as you say two signatures (tho not two updates) are probably unavoidab=
le.=0A=
=0A=
--Sandy, speaking as regular ol' member=0A=
=0A=
________________________________________=0A=
From: George, Wes [wesley.george@twcable.com]=0A=
Sent: Thursday, September 27, 2012 2:13 PM=0A=
To: Murphy, Sandra; sidr@ietf.org=0A=
Subject: RE: comments on recent as migration drafts=0A=
=0A=
Thanks for the quick review. Responses below inline.=0A=
=0A=
=0A=
> From: sidr-bounces@ietf.org [mailto:sidr-bounces@ietf.org] On Behalf Of=
=0A=
> Murphy, Sandra=0A=
>=0A=
> It appears to me that the ga-idr-as-migration talks about a merger of AS=
=0A=
> 200 and AS 300, with AS 200 being the eventually retained ASN but=0A=
> george-sidr-as-migration talks about a merger of AS 200 and AS 300 with=
=0A=
> AS 300 being the eventually retained ASN.  If that is true, then those=0A=
> reading both drafts should keep that in mind when looking at the=0A=
> examples.=0A=
[WEG] oops. Sigh. I'll get that corrected in subsequent versions of george-=
sidr so that the two agree.=0A=
>=0A=
> In the idr-as-migration draft, from the discussion it appears that the=0A=
> implementation of the local-as feature on the PE router in AS supports=0A=
> the local-as as something like an ebgp session inside the router.  (like=
=0A=
> it adds the old 300 ASN on AS_PATHs sent over ibgp sessions to AS 200=0A=
> neighbors).  Am I understanding the examples correctly?=0A=
[WEG] Not exactly no. There's no additional internal eBGP session between t=
he two ASNs on the PE, and remember that the PE has been reconfigured to be=
 in the retained AS, not the legacy one, so this local-as and its related s=
witches are used on the PE-CE sessions and their associated updates, not PE=
-PE. All it's doing is overriding the values from the global config that wo=
uld normally be used to populate "MY ASN" and "AS_PATH" when generating BGP=
 messages to a specific neighbor.=0A=
=0A=
>=0A=
> The goal is for the AS_PATH length to be the same length in the=0A=
> migration interval as it was before migration.  Does it matter if that=0A=
> effect is accomplished some other way than the knobs currently=0A=
> implemented?=0A=
[WEG] the implementation details probably don't matter if the result is the=
 same, other than the fact that this one exists and is in lots of code, whi=
le a different approach may not be widely implemented. You could make the a=
rgument that since we're talking about trying to make this work on BGPSec-c=
apable routers, you could also assume that a BGPSec-friendly AS-migration m=
ethod would also be supported in the same code I guess, but that's only if =
it's a required feature as a part of the BGPSec implementation. If it's a s=
tandalone, it might require code upgrades that may not be possible for a nu=
mber of different reasons.=0A=
=0A=
 IE the local-as knob has a side effect of getting the 300=0A=
> ASN into the AS_PATH to ibgp neighbors so the second knob no-prepend=0A=
> makes that go away.  Do you need both behaviors -- local-as AND local-as=
=0A=
> + no-prepend?  Would it be OK if the side effect did not happen and you=
=0A=
> got to the no-increase-in-path-length goal without needing the no-=0A=
> prepend knob?=0A=
[WEG] different use cases require different configurations. Local-AS no-pre=
pend ensures that the AS_PATH length doesn't change, which is critical to t=
his migration technique, so I guess it's safe to say that you don't need th=
e local-as behavior by itself, but that if you don't care about the AS-path=
 length, using only local-as will still enable you to change the global BGP=
 AS of the PE for migrations, and will be less complex/risky since you're n=
ot manipulating the AS_PATH in ways that could result in route loops.=0A=
>=0A=
> wrt the replace-as technique.  The text says that "only the historical=0A=
> (or, legacy) AS will be prepended in the outbound BGP UPDATE toward the=
=0A=
> customer's network".  But the example says "After ISP A' changes PE-1 to=
=0A=
> include the "Replace AS" feature, CE-1 would receive an AS_PATH of: 200=
=0A=
> 400. " That is indeed "the same AS_PATH length pre-AS migration" as the=
=0A=
> text says, which accomplishes that goal, but it would require=0A=
> configuration of the CE router to accept a first-as that was different=0A=
> from the one used in the OPEN.  I suspect that's a typo, that is after=0A=
> using replace-as the AS_PATH toward the CE would be "300 400".  But it=0A=
> is an important point so I'd like to make sure.=0A=
[WEG] I think you're right that it's a typo, I'll doublecheck with my co-au=
thor.=0A=
>From the referenced cisco doc: "The replace-as keyword is used to prepend o=
nly the local autonomous-system number (as configured with the ip-address a=
rgument) to the AS_PATH attribute. The autonomous-system number from the lo=
cal BGP routing process is not prepended."=0A=
=0A=
However...=0A=
4271 6.3 lists the requirement you mention for the Open "My ASN" value and =
AS_Path to match as a MAY:=0A=
   "If the UPDATE message is received from an external peer, the local=0A=
   system MAY check whether the leftmost (with respect to the position=0A=
   of octets in the protocol message) AS in the AS_PATH attribute is=0A=
   equal to the autonomous system number of the peer that sent the=0A=
   message.  If the check determines this is not the case, the Error=0A=
   Subcode MUST be set to Malformed AS_PATH."=0A=
I don't know if most common implementations perform this check. In fact, th=
at's why I point out that the question needs to be answered as far as path =
validation is concerned - does the ASN of the established neighborship have=
 to match the AS_Path or PATH_signatures or does it not matter as long as t=
he signatures are all valid? Does that MAY need to be a MUST in BGPSec land=
?=0A=
=0A=
>=0A=
> About sidr-as-migration=0A=
>=0A=
> The discussion of origin validation seems to assume that multiple ROAs=0A=
> for the same prefix space is unusual and requires a limited overlap=0A=
> period.  That is not the case.  From time immemorial, multiple ROAs for=
=0A=
> the same prefix have been anticipated and deliberately supported.  There=
=0A=
> can be *any number* of ROAs for a prefix at any time.  One ROA does not=
=0A=
> replace another for the same prefix.=0A=
[WEG] ok. I knew they were possible, but I guess I didn't realize that this=
 wasn't expected to be a temporary situation. I just reread 6480 3.2 and I =
see what you mean. I'll fix. Any other portions of the spec you recommend t=
hat I reference that covers the presence of multiple ROAs for the same pref=
ix/length more explicitly or is that the right thing to reference?=0A=
>=0A=
> The use of pcount=3D0 is rejected as requiring configuration on the CE=0A=
> router so that it authorizes and accepts the use of pcount=3D0 from the P=
E=0A=
> router.  Suppose that the use of pcount=3D0 was in an internal hop in the=
=0A=
> PE router, so the AS accepting and authorizing the use of pcount=3D0 was=
=0A=
> one of AS 200 or AS 300, so all configuration happened on the PE router,=
=0A=
> and no configuration happened on the CE router.  If that worked, would=0A=
> that be acceptable?=0A=
[WEG] hmm... that's an interesting way to play it and worth exploring some =
more I think. However, as far as requirements go: it MUST NOT require the r=
outer to actually establish and maintain a second set of eBGP sessions (eve=
n internally/behind the scenes) such that it has to do 2x the update genera=
tion, 2x the processing, etc. 2x the signatures is likely unavoidable, beca=
use if you didn't require the implementer to be in possession of signatures=
 for both ASNs you would have the potential for a path-shortening attack. B=
ut generally what I'm saying is that this can't be something that creates a=
 major scale drag for every session that has it enabled, since we're talkin=
g about something that might be enabled on hundreds of PE-CE neighbor sessi=
ons during an active migration.=0A=
=0A=
Wes George=0A=
=0A=
=0A=
This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.=0A=

From aservin@lacnic.net  Fri Sep 28 05:30:15 2012
Return-Path: <aservin@lacnic.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13B3521F8624 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 05:30:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.95
X-Spam-Level: 
X-Spam-Status: No, score=-2.95 tagged_above=-999 required=5 tests=[AWL=-0.350,  BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0B6WoBj1jn4q for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 05:30:14 -0700 (PDT)
Received: from mail.lacnic.net.uy (mail.lacnic.net.uy [IPv6:2001:13c7:7001:4000::3]) by ietfa.amsl.com (Postfix) with ESMTP id 7314921F8623 for <sidr@ietf.org>; Fri, 28 Sep 2012 05:30:14 -0700 (PDT)
Received: from 85-7-200.lacnic.net.uy (unknown [IPv6:2001:13c7:7001:5128:d011:eb92:96d5:d581]) by mail.lacnic.net.uy (Postfix) with ESMTP id E7A2E30841C for <sidr@ietf.org>; Fri, 28 Sep 2012 09:30:09 -0300 (UYT)
Message-ID: <50659852.4010405@lacnic.net>
Date: Fri, 28 Sep 2012 09:30:10 -0300
From: Arturo Servin <aservin@lacnic.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: sidr@ietf.org
References: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEBAB9@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEBAB9@Hermes.columbia.ads.sparta.com>
X-Enigmail-Version: 1.4.4
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-LACNIC.uy-MailScanner-Information: Please contact the ISP for more information
X-LACNIC.uy-MailScanner: Found to be clean
X-LACNIC.uy-MailScanner-SpamCheck: 
X-LACNIC.uy-MailScanner-From: aservin@lacnic.net
Subject: Re: [sidr] agenda update
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 12:30:15 -0000

	The links for remote participation seems to be here:

http://ietf-lim.conf.meetecho.com/

regards,
as

On 26/09/2012 12:43, Murphy, Sandra wrote:
> I updated the agenda on the wiki page to move discussion of as aliasing to the end of our time to accommodate the authors of the as aliasing writeups who are not going to be present in person.  No guarantees of participation but at least the time move makes it not impossible.
> 
> I do not know for sure that the IETF will provide refreshments at some break schedule, but even if not, we will take breaks in mid morning and afternoon.
> 
> If there are other topics that people want to discuss, please please do mention them so they can be added to the agenda.
> 
> 0900-1130 bgpsec protocol draft -05
> 1130-1330 Lunch
> 1330-1530 bgpsec protocol draft -05
> 1530-1700 provision for AS aliasing 
> 
> --Sandy
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> 


From Sandra.Murphy@sparta.com  Fri Sep 28 06:15:37 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C777A21F84EB for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 06:15:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.471
X-Spam-Level: 
X-Spam-Status: No, score=-102.471 tagged_above=-999 required=5 tests=[AWL=0.128, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 63qq3IPJVLWf for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 06:15:37 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 0BC3A21F8512 for <sidr@ietf.org>; Fri, 28 Sep 2012 06:15:36 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8SDFZTE019332; Fri, 28 Sep 2012 08:15:35 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8SDFY1L011455; Fri, 28 Sep 2012 08:15:34 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Fri, 28 Sep 2012 09:16:57 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: Arturo Servin <aservin@lacnic.net>, "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: [sidr] agenda update
Thread-Index: Ac2b/YVVihi3CaXPQIGngQ7iRGBfPABmQG0A///IzSo=
Date: Fri, 28 Sep 2012 13:16:56 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEF1027@Hermes.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEBAB9@Hermes.columbia.ads.sparta.com>, <50659852.4010405@lacnic.net>
In-Reply-To: <50659852.4010405@lacnic.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] agenda update
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 13:15:37 -0000

Thanks Arturo.  =0A=
=0A=
That agrees with what I received from the Meetecho support.  But I lost the=
 RIPE wifi before I could send it out.=0A=
=0A=
Here is the word from Meetecho.  A member of the Meetecho team will be on s=
ite tomorrow (Sat) to assist.=0A=
=0A=
     I would suggest to post the link http://ietf-lim.conf.meetecho.com. =
=0A=
     By following the "Join Meetecho Session" link, people will be able =0A=
     to remotely participate to the meeting.=0A=
=0A=
--Sandy=0A=
________________________________________=0A=
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Arturo Ser=
vin [aservin@lacnic.net]=0A=
Sent: Friday, September 28, 2012 8:30 AM=0A=
To: sidr@ietf.org=0A=
Subject: Re: [sidr] agenda update=0A=
=0A=
        The links for remote participation seems to be here:=0A=
=0A=
http://ietf-lim.conf.meetecho.com/=0A=
=0A=
regards,=0A=
as=0A=
=0A=
On 26/09/2012 12:43, Murphy, Sandra wrote:=0A=
> I updated the agenda on the wiki page to move discussion of as aliasing t=
o the end of our time to accommodate the authors of the as aliasing writeup=
s who are not going to be present in person.  No guarantees of participatio=
n but at least the time move makes it not impossible.=0A=
>=0A=
> I do not know for sure that the IETF will provide refreshments at some br=
eak schedule, but even if not, we will take breaks in mid morning and after=
noon.=0A=
>=0A=
> If there are other topics that people want to discuss, please please do m=
ention them so they can be added to the agenda.=0A=
>=0A=
> 0900-1130 bgpsec protocol draft -05=0A=
> 1130-1330 Lunch=0A=
> 1330-1530 bgpsec protocol draft -05=0A=
> 1530-1700 provision for AS aliasing=0A=
>=0A=
> --Sandy=0A=
> _______________________________________________=0A=
> sidr mailing list=0A=
> sidr@ietf.org=0A=
> https://www.ietf.org/mailman/listinfo/sidr=0A=
>=0A=
=0A=
_______________________________________________=0A=
sidr mailing list=0A=
sidr@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/sidr=0A=

From Sandra.Murphy@sparta.com  Fri Sep 28 06:47:48 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 001F421F85EA for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 06:47:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.473
X-Spam-Level: 
X-Spam-Status: No, score=-102.473 tagged_above=-999 required=5 tests=[AWL=0.126, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3o2i+iUsgP-K for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 06:47:47 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id E618521F85C3 for <sidr@ietf.org>; Fri, 28 Sep 2012 06:47:46 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8SDlkBJ019637 for <sidr@ietf.org>; Fri, 28 Sep 2012 08:47:46 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8SDljN7012207 for <sidr@ietf.org>; Fri, 28 Sep 2012 08:47:46 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Fri, 28 Sep 2012 09:49:08 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: a suggsetion of as aliasing
Thread-Index: Ac2df/xVKVL+fyMRQi+RgwtQS5VIVQ==
Date: Fri, 28 Sep 2012 13:49:07 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEF107E@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: multipart/mixed; boundary="_002_24B20D14B2CD29478C8D5D6E9CBB29F62BEF107EHermescolumbiaa_"
MIME-Version: 1.0
Subject: [sidr] a suggsetion of as aliasing
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 13:47:48 -0000

--_002_24B20D14B2CD29478C8D5D6E9CBB29F62BEF107EHermescolumbiaa_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Below is a description of doing as aliasing based on the vague idea express=
ed in my reply to Wes.=0A=
=0A=
This is a first try.  It probably has lots of holes and "but this will brea=
k X".=0A=
=0A=
It might spark some discussion (of my sanity, whatever).=0A=
=0A=
--Sandy, speaking as regular ol' member=0A=
=0A=
=0A=
=0A=
=0A=
=0A=
=0A=

--_002_24B20D14B2CD29478C8D5D6E9CBB29F62BEF107EHermescolumbiaa_
Content-Type: text/plain; name="asalias.txt"
Content-Description: asalias.txt
Content-Disposition: attachment; filename="asalias.txt"; size=4683;
	creation-date="Fri, 28 Sep 2012 13:48:49 GMT";
	modification-date="Fri, 28 Sep 2012 13:48:49 GMT"
Content-ID: <03aa9e3a-9c98-4e6a-8821-885f904fb7fe>
Content-Transfer-Encoding: base64
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--_002_24B20D14B2CD29478C8D5D6E9CBB29F62BEF107EHermescolumbiaa_--

From kent@bbn.com  Fri Sep 28 06:54:07 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B5CB21F85A2 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 06:54:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ghpouESNZ0y1 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 06:54:06 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id A080021F859A for <sidr@ietf.org>; Fri, 28 Sep 2012 06:54:06 -0700 (PDT)
Received: from dommiel.bbn.com ([192.1.122.15]:33449 helo=fritz.local) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1THb0z-000DJc-Jb; Fri, 28 Sep 2012 09:54:01 -0400
Message-ID: <5065ABF9.6050303@bbn.com>
Date: Fri, 28 Sep 2012 09:54:01 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: Rob Austein <sra@hactrn.net>, sidr <sidr@ietf.org>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <20120927165848.2BECA7DC673@minas-ithil.hactrn.net>
In-Reply-To: <20120927165848.2BECA7DC673@minas-ithil.hactrn.net>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 13:54:07 -0000

Rob,

A reply to a couple of your comments:

>
>>   4.1.  Originating a New BGPSEC Update
> ...
>>      In particular, this AS number MUST match the AS number in
>>      the AS number resource extension field of the Resource PKI end-entity
>>      certificate(s) that will be used to verify the digital signature(s)
>>      constructed by this BGPSEC speaker.
> "The" or "an"?   Is it legal for the EE certificate to cover more RFC
> 3779 resources than just a single ASN?
yes, an EE cert can contain multiple ASNs, if they were allocated to the
cert holder by the same parent.
>
>>   6.1.  Algorithm Suite Considerations
> ...
>>      To this end, a mandatory algorithm suites document will be created
>>      which specifies a mandatory-to-use 'current' algorithm suite for use
>>      by all BGPSEC speakers [12].  Additionally, the document specifies an
>>      additional 'new' algorithm suite that is recommended to implement.
> Badly phrased, unless the real intent here is to say that we're going
> to pick both the current and next algorithms right off the bat, which
> seems unlikely to me.   I think it would be more correct to say that
> we will specify an initial mandatory algorithm suite, and, once we
> have some idea of what the next algorithm should be, we will publish
> a series of updated documents phasing in the new one and (eventually,
> years later) phasing out the old one.
that would be consistent with the alg migration strategy described in
draft-ietf-sidr-algorithm-agility-07

Steve


From mlepinski.ietf@gmail.com  Fri Sep 28 07:06:52 2012
Return-Path: <mlepinski.ietf@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24AE221F8573 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 07:06:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.64
X-Spam-Level: 
X-Spam-Status: No, score=-4.64 tagged_above=-999 required=5 tests=[AWL=0.958,  BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HZB+jWCK0ImC for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 07:06:51 -0700 (PDT)
Received: from mail-ie0-f172.google.com (mail-ie0-f172.google.com [209.85.223.172]) by ietfa.amsl.com (Postfix) with ESMTP id 83BAE21F8491 for <sidr@ietf.org>; Fri, 28 Sep 2012 07:06:51 -0700 (PDT)
Received: by iec9 with SMTP id 9so8440954iec.31 for <sidr@ietf.org>; Fri, 28 Sep 2012 07:06:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=Tx1JpjEg8kaHzZnh81YHXJOEnqkSsCrZtq4n7vLM300=; b=REMMGNKV/ktLbD+EWp82BTyzJzI0XWu6NubTRvUPMbmmk8H0sLwFsEVjWfc8VwMvN9 MzRtZFIivj49Cqgem8scGgoJ3aErX/fhJ4J3Xf+qKAJXYfceZOkkvsZ/YxVFFmyP40E7 nFZieecHwqikTbafwC3igTSCM+KcuACR3+eet8MmZOPuXwn8pDb/3I1sY2IsVOvIt11b 40tZneX9bqQ3MKHlgWv9ozJWH3UzC24diAT48Jy/2tYciMTKaXZcdCp6ztctOQBJF5Oh DD5kwmMZ1bPUo4qWqW5lQspUE9Uk7yepntgcCLNK+27C0c+c3uNpmwC3zXsGGJcc44Vf XkVw==
MIME-Version: 1.0
Received: by 10.50.17.230 with SMTP id r6mr1743424igd.16.1348841210920; Fri, 28 Sep 2012 07:06:50 -0700 (PDT)
Received: by 10.231.76.82 with HTTP; Fri, 28 Sep 2012 07:06:50 -0700 (PDT)
Date: Fri, 28 Sep 2012 10:06:50 -0400
Message-ID: <CANTg3aCKtAqV25Pa=8Vj6JCH-KsVTnf2z_oUHQukVvAixwunBg@mail.gmail.com>
From: Matthew Lepinski <mlepinski.ietf@gmail.com>
To: sidr@ietf.org
Content-Type: multipart/alternative; boundary=14dae93411653c3ef204cac39134
Subject: [sidr] Reviews of draft-ietf-sidr-bgpsec-protocol
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 14:06:52 -0000

--14dae93411653c3ef204cac39134
Content-Type: text/plain; charset=ISO-8859-1

I am going to ignore the process questions related to whether or not "WGLC"
were appropriate letters in conjunction with
draft-ietf-sidr-bgpsec-protocol.

Instead, I would like to focus on thanking Sean, Randy, and Sandy for
producing incredibly detailed reviews of the protocol document, and I would
like to thank Wes for his comments as well.

I am currently in the process of going through the reviews and making those
changes to the protocol document that are obvious fixes. Additionally, I am
collecting the open issues from these reviews that require working group
attention. I will present those open issues at the interim meeting tomorrow.

Thanks again

--14dae93411653c3ef204cac39134
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I am going to ignore the process questions related to whether or not &quot;=
WGLC&quot; were appropriate letters in conjunction with draft-ietf-sidr-bgp=
sec-protocol.=A0<br><br>Instead, I would like to focus on thanking Sean, Ra=
ndy, and Sandy for producing incredibly detailed reviews of the protocol do=
cument, and I would like to thank Wes for his comments as well.<div>
<br></div><div>I am currently in the process of going through the reviews a=
nd making those changes to the protocol document that are obvious fixes. Ad=
ditionally, I am collecting the open issues from these reviews that require=
 working group attention. I will present those open issues at the interim m=
eeting tomorrow.</div>
<div><br>Thanks again=A0</div>

--14dae93411653c3ef204cac39134--

From sra@hactrn.net  Fri Sep 28 07:17:23 2012
Return-Path: <sra@hactrn.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5069E21F8630 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 07:17:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.67
X-Spam-Level: 
X-Spam-Status: No, score=-99.67 tagged_above=-999 required=5 tests=[AWL=-2.929, BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, HELO_MISMATCH_NET=0.611, HOST_EQ_NL=1.545, HOST_EQ_STATIC=1.172, RCVD_IN_SORBS_DUL=0.877, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fMjSAYm2lU-c for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 07:17:22 -0700 (PDT)
Received: from cyteen.hactrn.net (cyteen.hactrn.net [IPv6:2002:425c:4242:0:210:5aff:fe86:1f54]) by ietfa.amsl.com (Postfix) with ESMTP id 72A7621F8622 for <sidr@ietf.org>; Fri, 28 Sep 2012 07:17:22 -0700 (PDT)
Received: from minas-ithil.hactrn.net (095-097-128-052.static.chello.nl [95.97.128.52]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "nargothrond.hactrn.net", Issuer "Grunchweather Associates" (verified OK)) by cyteen.hactrn.net (Postfix) with ESMTPS id BF7559B429 for <sidr@ietf.org>; Fri, 28 Sep 2012 14:17:20 +0000 (UTC)
Received: from minas-ithil.hactrn.net (localhost [127.0.0.1]) by minas-ithil.hactrn.net (Postfix) with ESMTP id 662857DD08D for <sidr@ietf.org>; Fri, 28 Sep 2012 16:17:19 +0200 (CEST)
Date: Fri, 28 Sep 2012 16:17:19 +0200
From: Rob Austein <sra@hactrn.net>
To: sidr <sidr@ietf.org>
In-Reply-To: <5065ABF9.6050303@bbn.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <20120927165848.2BECA7DC673@minas-ithil.hactrn.net> <5065ABF9.6050303@bbn.com>
User-Agent: Wanderlust/2.15.5 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset=US-ASCII
Message-Id: <20120928141719.662857DD08D@minas-ithil.hactrn.net>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 14:17:23 -0000

At Fri, 28 Sep 2012 09:54:01 -0400, Stephen Kent wrote:
> 
> >>   4.1.  Originating a New BGPSEC Update
> > ...
> >>      In particular, this AS number MUST match the AS number in
> >>      the AS number resource extension field of the Resource PKI end-entity
> >>      certificate(s) that will be used to verify the digital signature(s)
> >>      constructed by this BGPSEC speaker.
> > "The" or "an"?   Is it legal for the EE certificate to cover more RFC
> > 3779 resources than just a single ASN?
> yes, an EE cert can contain multiple ASNs, if they were allocated to the
> cert holder by the same parent.

I know that RFC 3779 allows multiple ASNs, having implemented it. :)

What I'm asking is whether it was Matt's intent to restrict BGPSEC to
requiring that only a single ASN be certified in the relevant EE
certificate.  I do not recall any such restriction during earlier
discussions of this protocol, which is why I flagged it.

> >>   6.1.  Algorithm Suite Considerations
> > ...
> >>      To this end, a mandatory algorithm suites document will be created
> >>      which specifies a mandatory-to-use 'current' algorithm suite for use
> >>      by all BGPSEC speakers [12].  Additionally, the document specifies an
> >>      additional 'new' algorithm suite that is recommended to implement.
> > Badly phrased, unless the real intent here is to say that we're going
> > to pick both the current and next algorithms right off the bat, which
> > seems unlikely to me.   I think it would be more correct to say that
> > we will specify an initial mandatory algorithm suite, and, once we
> > have some idea of what the next algorithm should be, we will publish
> > a series of updated documents phasing in the new one and (eventually,
> > years later) phasing out the old one.
> that would be consistent with the alg migration strategy described in
> draft-ietf-sidr-algorithm-agility-07

I assume (please correct if wrong) that your comment refers to my
suggested rephrasing being consistent with the algorithm migration
strategy.

From mlepinski.ietf@gmail.com  Fri Sep 28 08:07:33 2012
Return-Path: <mlepinski.ietf@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7029E21F8658 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 08:07:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.678
X-Spam-Level: 
X-Spam-Status: No, score=-4.678 tagged_above=-999 required=5 tests=[AWL=0.920,  BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ORNqBXOORAZP for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 08:07:32 -0700 (PDT)
Received: from mail-ie0-f172.google.com (mail-ie0-f172.google.com [209.85.223.172]) by ietfa.amsl.com (Postfix) with ESMTP id 3D84321F864D for <sidr@ietf.org>; Fri, 28 Sep 2012 08:07:25 -0700 (PDT)
Received: by iec9 with SMTP id 9so8637626iec.31 for <sidr@ietf.org>; Fri, 28 Sep 2012 08:07:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=LEHAIvvGHeBHzxPAKxk/rESOl8nRRYxP1k4f4KXudMo=; b=ANoIbOX7cFlyLlXxfMwOuzFwJC2ykK7lyHs26V58BfouXIYUHDQzUN56ldMvQcecJV pHfPeUR0oVfF7eX4vUmfanWUgjntISkulNU5G0NnNpXZmRhqXuQX8CE9TJd3g8iekLxQ O2bceWu5sSM6YLUSmn7ie8adbZIYvBuVdMeRLAQmO0Fje+5eEYPt//bbwqEhpi5bnCmi OlHnfaZub1PIYXB69SGZLDVKbXTXb0t4dT8itMTy2A3VPpu5ypZqve/I5+sg1ilFu4qs /sRzGL3UVOHTQr4OqNjtf2tX5lQ51axO+t0cBORwQ4DcWZcp12+GZ85GhtH7cH0RM9oW f6cg==
MIME-Version: 1.0
Received: by 10.50.188.199 with SMTP id gc7mr1983519igc.4.1348844844576; Fri, 28 Sep 2012 08:07:24 -0700 (PDT)
Received: by 10.231.76.82 with HTTP; Fri, 28 Sep 2012 08:07:24 -0700 (PDT)
In-Reply-To: <CANTg3aCKtAqV25Pa=8Vj6JCH-KsVTnf2z_oUHQukVvAixwunBg@mail.gmail.com>
References: <CANTg3aCKtAqV25Pa=8Vj6JCH-KsVTnf2z_oUHQukVvAixwunBg@mail.gmail.com>
Date: Fri, 28 Sep 2012 11:07:24 -0400
Message-ID: <CANTg3aCW+X366k9VJboqUC-1cgvAxoVs-Gwm+r=tN9O43+CPLQ@mail.gmail.com>
From: Matthew Lepinski <mlepinski.ietf@gmail.com>
To: sidr@ietf.org
Content-Type: multipart/alternative; boundary=14dae93406f3d16f0604cac469dc
Subject: Re: [sidr] Reviews of draft-ietf-sidr-bgpsec-protocol
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 15:07:33 -0000

--14dae93406f3d16f0604cac469dc
Content-Type: text/plain; charset=ISO-8859-1

Okay, I have now caught up on my incoming mail and I am going to add Rob
Austein to my Thank You list. Thanks a lot, Rob, appreciate the review.

On Fri, Sep 28, 2012 at 10:06 AM, Matthew Lepinski <mlepinski.ietf@gmail.com
> wrote:

> I am going to ignore the process questions related to whether or not
> "WGLC" were appropriate letters in conjunction with
> draft-ietf-sidr-bgpsec-protocol.
>
> Instead, I would like to focus on thanking Sean, Randy, and Sandy for
> producing incredibly detailed reviews of the protocol document, and I would
> like to thank Wes for his comments as well.
>
> I am currently in the process of going through the reviews and making
> those changes to the protocol document that are obvious fixes.
> Additionally, I am collecting the open issues from these reviews that
> require working group attention. I will present those open issues at the
> interim meeting tomorrow.
>
> Thanks again
>

--14dae93406f3d16f0604cac469dc
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Okay, I have now caught up on my incoming mail and I am going to add Rob Au=
stein to my Thank You list. Thanks a lot, Rob, appreciate the review.<br><b=
r><div class=3D"gmail_quote">On Fri, Sep 28, 2012 at 10:06 AM, Matthew Lepi=
nski <span dir=3D"ltr">&lt;<a href=3D"mailto:mlepinski.ietf@gmail.com" targ=
et=3D"_blank">mlepinski.ietf@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">I am going to ignore the process questions r=
elated to whether or not &quot;WGLC&quot; were appropriate letters in conju=
nction with draft-ietf-sidr-bgpsec-protocol.=A0<br>
<br>Instead, I would like to focus on thanking Sean, Randy, and Sandy for p=
roducing incredibly detailed reviews of the protocol document, and I would =
like to thank Wes for his comments as well.<div>
<br></div><div>I am currently in the process of going through the reviews a=
nd making those changes to the protocol document that are obvious fixes. Ad=
ditionally, I am collecting the open issues from these reviews that require=
 working group attention. I will present those open issues at the interim m=
eeting tomorrow.</div>

<div><br>Thanks again=A0</div>
</blockquote></div><br>

--14dae93406f3d16f0604cac469dc--

From kent@bbn.com  Fri Sep 28 08:09:55 2012
Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAAA721F84F1 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 08:09:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ztba+GAYvIVk for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 08:09:55 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 28C2D21F8466 for <sidr@ietf.org>; Fri, 28 Sep 2012 08:09:55 -0700 (PDT)
Received: from dommiel.bbn.com ([192.1.122.15]:52804 helo=fritz.local) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1THcCP-000EH5-Us for sidr@ietf.org; Fri, 28 Sep 2012 11:09:54 -0400
Message-ID: <5065BDC1.4040203@bbn.com>
Date: Fri, 28 Sep 2012 11:09:53 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: sidr@ietf.org
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F706AF@CMA-MB003.columbia.ads.sparta.com> <20120927165848.2BECA7DC673@minas-ithil.hactrn.net> <5065ABF9.6050303@bbn.com> <20120928141719.662857DD08D@minas-ithil.hactrn.net>
In-Reply-To: <20120928141719.662857DD08D@minas-ithil.hactrn.net>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [sidr] WGLC for draft-ietf-sidr-bgpsec-protocol-05
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 15:09:55 -0000

Rob,

On 9/28/12 10:17 AM, Rob Austein wrote:
> At Fri, 28 Sep 2012 09:54:01 -0400, Stephen Kent wrote:
>>>>    4.1.  Originating a New BGPSEC Update
>>> ...
>>>>       In particular, this AS number MUST match the AS number in
>>>>       the AS number resource extension field of the Resource PKI end-entity
>>>>       certificate(s) that will be used to verify the digital signature(s)
>>>>       constructed by this BGPSEC speaker.
>>> "The" or "an"?   Is it legal for the EE certificate to cover more RFC
>>> 3779 resources than just a single ASN?
>> yes, an EE cert can contain multiple ASNs, if they were allocated to the
>> cert holder by the same parent.
> I know that RFC 3779 allows multiple ASNs, having implemented it. :)
and I wrote it, so ...
>
> What I'm asking is whether it was Matt's intent to restrict BGPSEC to
> requiring that only a single ASN be certified in the relevant EE
> certificate.  I do not recall any such restriction during earlier
> discussions of this protocol, which is why I flagged it.
OK, that was not clear from you question.
>
>>>>    6.1.  Algorithm Suite Considerations
>>> ...
>>>>       To this end, a mandatory algorithm suites document will be created
>>>>       which specifies a mandatory-to-use 'current' algorithm suite for use
>>>>       by all BGPSEC speakers [12].  Additionally, the document specifies an
>>>>       additional 'new' algorithm suite that is recommended to implement.
>>> Badly phrased, unless the real intent here is to say that we're going
>>> to pick both the current and next algorithms right off the bat, which
>>> seems unlikely to me.   I think it would be more correct to say that
>>> we will specify an initial mandatory algorithm suite, and, once we
>>> have some idea of what the next algorithm should be, we will publish
>>> a series of updated documents phasing in the new one and (eventually,
>>> years later) phasing out the old one.
>> that would be consistent with the alg migration strategy described in
>> draft-ietf-sidr-algorithm-agility-07
> I assume (please correct if wrong) that your comment refers to my
> suggested rephrasing being consistent with the algorithm migration
> strategy.
>
yes.

Steve

From wesley.george@twcable.com  Fri Sep 28 12:14:47 2012
Return-Path: <wesley.george@twcable.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5153021F855B for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 12:14:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.473
X-Spam-Level: 
X-Spam-Status: No, score=-0.473 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1gxTEIBkcHkV for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 12:14:46 -0700 (PDT)
Received: from cdpipgw02.twcable.com (cdpipgw02.twcable.com [165.237.59.23]) by ietfa.amsl.com (Postfix) with ESMTP id 8783321F8554 for <sidr@ietf.org>; Fri, 28 Sep 2012 12:14:46 -0700 (PDT)
X-SENDER-IP: 10.136.163.14
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.80,503,1344225600"; d="scan'208";a="427585281"
Received: from unknown (HELO PRVPEXHUB05.corp.twcable.com) ([10.136.163.14]) by cdpipgw02.twcable.com with ESMTP/TLS/RC4-MD5; 28 Sep 2012 15:14:42 -0400
Received: from PRVPEXVS15.corp.twcable.com ([10.136.163.79]) by PRVPEXHUB05.corp.twcable.com ([10.136.163.14]) with mapi; Fri, 28 Sep 2012 15:14:43 -0400
From: "George, Wes" <wesley.george@twcable.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>, "sidr@ietf.org" <sidr@ietf.org>
Date: Fri, 28 Sep 2012 15:14:41 -0400
Thread-Topic: comments on recent as migration drafts
Thread-Index: Ac2ctbIPdaoE1bulQueNkM94bbvFjAACqR1AABF7IOsAKE+asA==
Message-ID: <2671C6CDFBB59E47B64C10B3E0BD592360399FB1@PRVPEXVS15.corp.twcable.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEFD1A@Hermes.columbia.ads.sparta.com>, <2671C6CDFBB59E47B64C10B3E0BD5923602AB34B@PRVPEXVS15.corp.twcable.com> <24B20D14B2CD29478C8D5D6E9CBB29F62BEEFF04@Hermes.columbia.ads.sparta.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F62BEEFF04@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sidr] comments on recent as migration drafts
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2012 19:14:47 -0000

> From: Murphy, Sandra [mailto:Sandra.Murphy@sparta.com]
>
> No, I did not mean to suggest that there was an actual ebgp session.  I
> think maybe I was reading the replace-as example incorrectly.  I am not
> sure what the AS_PATH is when it is transmitted between PE1 and PE2 and
> it looked like PE1 might be adding ASNs to the AS_PATH it sent over the
> ibgp session to PE2.
[WEG] I think maybe the confusion comes from the fact that these commands h=
ave to interact with BGP route updates in both directions (PE-> CE and CE -=
> PE). In the routes that the PE receives from the CE, it has to make the c=
hange in AS in the AS_PATH so that the rest of the routers in its global AS=
N don't see routes with the configured local ASN in the path, but the way I=
 think of it is that it's doing this when it receives and processes the rou=
tes from the CE before it installs them into its RIB, not when it generates=
 the updates towards its neighbors, since this is a neighbor-specific confi=
guration rather than a global one.

>
> I think this is already a MUST in the protocol because the protocol
> makes sure the AS listed are the ones that the packet came through.  If
> the update came from the neighbor and the first AS in the path is not
> the neighbor's AS, then the validation will fail.  (Unless the neighbor
> has the keys to two ASs and uses an AS other than is used in the OPEN
> packet.  It's all about the keys.)
[WEG] Understand that. I was specifically asking about the case where the P=
E is in possession of keys for both ASNs and therefore can choose which of =
the two valid ASNs to sign with. Does it fail if the signature is valid but=
 the AS in the OPEN message is different from the one in the signature? If =
not, should it, or are we expecting similar behavior to the "enforce-first-=
AS" keyword, where by default it fails, but you can twist a knob to make it=
 acceptable? I think this is one of those things that we have to be clear a=
bout which way we want the behavior to be, since it's a MAY in BGP. It is e=
ven more important to specify if it has to be a certain way in order to pre=
vent security concerns in BGPSec.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable propri=
etary information, which is privileged, confidential, or subject to copyrig=
ht belonging to Time Warner Cable. This E-mail is intended solely for the u=
se of the individual or entity to which it is addressed. If you are not the=
 intended recipient of this E-mail, you are hereby notified that any dissem=
ination, distribution, copying, or action taken in relation to the contents=
 of and attachments to this E-mail is strictly prohibited and may be unlawf=
ul. If you have received this E-mail in error, please notify the sender imm=
ediately and permanently delete the original and any copy of this E-mail an=
d any printout.

From Sandra.Murphy@sparta.com  Fri Sep 28 21:55:38 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE13121F84C8 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 21:55:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.486
X-Spam-Level: 
X-Spam-Status: No, score=-102.486 tagged_above=-999 required=5 tests=[AWL=0.112, BAYES_00=-2.599, USER_IN_WHITELIST=-100, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CkRwj5lVqU76 for <sidr@ietfa.amsl.com>; Fri, 28 Sep 2012 21:55:38 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 2B9D721F849B for <sidr@ietf.org>; Fri, 28 Sep 2012 21:55:38 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8T4tbC9025737 for <sidr@ietf.org>; Fri, 28 Sep 2012 23:55:37 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8T4tWun029640 for <sidr@ietf.org>; Fri, 28 Sep 2012 23:55:32 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Sat, 29 Sep 2012 00:55:32 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: meeting materials
Thread-Index: Ac2d/qdfs3lbVm8JRRKoBlKC/cY1uQ==
Date: Sat, 29 Sep 2012 04:55:31 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEF12B4@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] meeting materials
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Sep 2012 04:55:38 -0000

The slides for today's meeting are uploaded to the interim meeting proceedi=
ngs page:=0A=
=0A=
http://www.ietf.org/proceedings/interim/2012/09/29/sidr/proceedings.html=0A=
=0A=
As previously reported, remote participation will be supported by Meetecho:=
=0A=
=0A=
http://ietf-lim.conf.meetecho.com=0A=
Follow the "Join Meetecho Session" link=0A=
=0A=
The other usual resources will be available as well:=0A=
=0A=
=0A=
Online Agenda and Slides at:=0A=
=96 http://www.ietf.org/proceedings/interim/2012/09/29/sidr/proceedin=0A=
gs.html=0A=
=95 Mailing list:=0A=
http://www.ietf.org/mail-archive/web/sidr/index.html=0A=
=95 Jabber room: sidr@jabber.ietf.org=0A=
=95 Etherpad: http://grenache.tools.ietf.org:9001/p/notesinterim-=0A=
2012-sidr-6=0A=
=95 Charter page: http://www.ietf.org/html.charters/sidrcharter.=0A=
html=0A=
=95 Drafts: http://tools.ietf.org/wg/sidr/=0A=
(tools page also has links to drafts, wiki, jabber room, etc.)=0A=
=0A=
--Sandy=

From housley@vigilsec.com  Sat Sep 29 05:49:47 2012
Return-Path: <housley@vigilsec.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CCF621F84EA for <sidr@ietfa.amsl.com>; Sat, 29 Sep 2012 05:49:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.562
X-Spam-Level: 
X-Spam-Status: No, score=-102.562 tagged_above=-999 required=5 tests=[AWL=0.036, BAYES_00=-2.599, USER_IN_WHITELIST=-100, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cnCfUobPj4Fq for <sidr@ietfa.amsl.com>; Sat, 29 Sep 2012 05:49:46 -0700 (PDT)
Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by ietfa.amsl.com (Postfix) with ESMTP id 9323321F84C9 for <sidr@ietf.org>; Sat, 29 Sep 2012 05:49:46 -0700 (PDT)
Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id BC7929A4004; Sat, 29 Sep 2012 08:49:50 -0400 (EDT)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id 3jzOFMh4oG3b; Sat, 29 Sep 2012 08:49:36 -0400 (EDT)
Received: from [192.168.2.100] (pool-96-255-37-162.washdc.fios.verizon.net [96.255.37.162]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id C76579A4002; Sat, 29 Sep 2012 08:49:45 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=windows-1252
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F62BEF12B4@Hermes.columbia.ads.sparta.com>
Date: Sat, 29 Sep 2012 08:49:37 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <5B45DBD1-11CE-478F-94A9-B37AF701A047@vigilsec.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F62BEF12B4@Hermes.columbia.ads.sparta.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
X-Mailer: Apple Mail (2.1084)
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] meeting materials
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Sep 2012 12:49:47 -0000

I participated in the meetecho session after lunch.  The sound quality =
was excellent when people used the mic.  Thanks to the meetecho team!

Russ


On Sep 29, 2012, at 12:55 AM, Murphy, Sandra wrote:

> The slides for today's meeting are uploaded to the interim meeting =
proceedings page:
>=20
> =
http://www.ietf.org/proceedings/interim/2012/09/29/sidr/proceedings.html
>=20
> As previously reported, remote participation will be supported by =
Meetecho:
>=20
> http://ietf-lim.conf.meetecho.com
> Follow the "Join Meetecho Session" link
>=20
> The other usual resources will be available as well:
>=20
>=20
> Online Agenda and Slides at:
> =96 http://www.ietf.org/proceedings/interim/2012/09/29/sidr/proceedin
> gs.html
> =95 Mailing list:
> http://www.ietf.org/mail-archive/web/sidr/index.html
> =95 Jabber room: sidr@jabber.ietf.org
> =95 Etherpad: http://grenache.tools.ietf.org:9001/p/notesinterim-
> 2012-sidr-6
> =95 Charter page: http://www.ietf.org/html.charters/sidrcharter.
> html
> =95 Drafts: http://tools.ietf.org/wg/sidr/
> (tools page also has links to drafts, wiki, jabber room, etc.)
>=20
> --Sandy
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr


From Sandra.Murphy@sparta.com  Sat Sep 29 06:24:40 2012
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1ED1A21F84D8 for <sidr@ietfa.amsl.com>; Sat, 29 Sep 2012 06:24:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.489
X-Spam-Level: 
X-Spam-Status: No, score=-102.489 tagged_above=-999 required=5 tests=[AWL=0.110, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z+7QYoMPUAds for <sidr@ietfa.amsl.com>; Sat, 29 Sep 2012 06:24:39 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 81CE821F84CD for <sidr@ietf.org>; Sat, 29 Sep 2012 06:24:39 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q8TDOc87026687 for <sidr@ietf.org>; Sat, 29 Sep 2012 08:24:38 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q8TDOcqA000604 for <sidr@ietf.org>; Sat, 29 Sep 2012 08:24:38 -0500
Received: from HERMES.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5]) by Hermes.columbia.ads.sparta.com ([fe80::e4a8:a383:2128:c0e5%21]) with mapi id 14.01.0379.000; Sat, 29 Sep 2012 09:24:38 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: meeting ended early
Thread-Index: Ac2eRHPUrhT4979BR9+effF+HBtgzw==
Date: Sat, 29 Sep 2012 13:24:37 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F62BEF133A@Hermes.columbia.ads.sparta.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.185.63.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] meeting ended early
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Sep 2012 13:24:40 -0000

The meeting finished discussion early, so anyone who was thinking of joinin=
g late, sorry.=0A=
=0A=
When the meeting recording information is available, I'll send it to the li=
st.  And minutes will be available soon.=0A=
=0A=
--Sandy=0A=
