[sidr] FW: New Version Notification for draft-fu-sidr-unexpected-scenarios-00.txt

"Yu Fu" <fuyu@cnnic.cn> Wed, 09 September 2015 02:03 UTC

Return-Path: <fuyu@cnnic.cn>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 145611A6FC4 for <sidr@ietfa.amsl.com>; Tue, 8 Sep 2015 19:03:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.612
X-Spam-Level:
X-Spam-Status: No, score=-2.612 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dzq2ibLtga6S for <sidr@ietfa.amsl.com>; Tue, 8 Sep 2015 19:03:43 -0700 (PDT)
Received: from cnnic.cn (smtp13.cnnic.cn [218.241.118.13]) by ietfa.amsl.com (Postfix) with ESMTP id 0CCD91A9096 for <sidr@ietf.org>; Tue, 8 Sep 2015 19:03:42 -0700 (PDT)
Received: from LIUXD (unknown [218.241.103.6]) by ocmail02.zx.nicx.cn (Coremail) with SMTP id AQAAf0BZYIR4k+9VV1LCBw--.601S3; Wed, 09 Sep 2015 10:03:36 +0800 (CST)
From: Yu Fu <fuyu@cnnic.cn>
To: sidr@ietf.org
Date: Wed, 09 Sep 2015 10:03:45 +0800
Message-ID: <000c01d0eaa3$c2bd0240$483706c0$@cn>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: AdDqFjYBd600LbRLSgiB2hJj5gN/FAAhaoUA
Content-Language: zh-cn
X-CM-TRANSID: AQAAf0BZYIR4k+9VV1LCBw--.601S3
X-Coremail-Antispam: 1UD129KBjvJXoW7ZF1DZrWUXw4UtFyDur1ftFb_yoW8Gr4Upa 93ua13tF18JFn3tay7Jw4qvw4Iva9xCaykXryaqw15Zan8Gryaqrn3KFW5Xr98Crn0kFZ0 qF12v3WUtry8ZFJanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUkab7Iv0xC_tr1lb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I2 0VC2zVCF04k26cxKx2IYs7xG6rWj6s0DM7CIcVAFz4kK6r1j6r18M28lY4IEw2IIxxk0rw A2F7IY1VAKz4vEj48ve4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Ar0_tr1l84ACjcxK6xII jxv20xvEc7CjxVAFwI0_Cr0_Gr1UM28EF7xvwVC2z280aVAFwI0_Gr1j6F4UJwA2z4x0Y4 vEx4A2jsIEc7CjxVAFwI0_Cr1j6rxdM2AIxVAIcxkEcVAq07x20xvEncxIr21l5I8CrVAC Y4xI64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r1j6r18McIj6I8E87Iv67AKxVWUJV W8JwAm72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vIr41lc2xSY4AK67AK6r4UMxAI w28IcxkI7VAKI48JMxC20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr 4lx2IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVWUJVWUXwCIc40Y0x0EwIxG rwCI42IY6xIIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVWUJVW8Jw CI42IY6xAIw20EY4v20xvaj40_WFyUJVCq3wCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY 6I8E87Iv6xkF7I0E14v26r1j6r4UYxBIdaVFxhVjvjDU0xZFpf9x07jYNtxUUUUU=
X-CM-SenderInfo: pix13q5fqqxugofq/
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/1_9QgwIxFq4uDJdqEvCFb2dvOQk>
Subject: [sidr] FW: New Version Notification for draft-fu-sidr-unexpected-scenarios-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Sep 2015 02:03:45 -0000

Hi all,

We have submitted a new draft to describe some unexpected scenarios where a CA allocates resources to
the sub-node caused by misoperation or malicious operation in RPKI. Some experimental results are also presented
to simulate these scenarios. In order to avoid the issues or reduce the related side- effects described in the draft, 
some solutions may be needed.

Your comments are appreciated.

BR
Yu


A new version of I-D, draft-fu-sidr-unexpected-scenarios-00.txt
has been successfully submitted by Yu Fu and posted to the IETF repository.

Name:		draft-fu-sidr-unexpected-scenarios
Revision:	00
Title:		Scenarios of unexpected resource assignment in RPKI
Document date:	2015-09-08
Group:		Individual Submission
Pages:		17
URL:            https://www.ietf.org/internet-drafts/draft-fu-sidr-unexpected-scenarios-00.txt
Status:         https://datatracker.ietf.org/doc/draft-fu-sidr-unexpected-scenarios/
Htmlized:       https://tools.ietf.org/html/draft-fu-sidr-unexpected-scenarios-00


Abstract:
   There are some unexpected scenarios where a CA allocates resources to
   the sub-node caused by misoperation or malicious operation of CA in
   RPKI.  Then some mechanisms may be needed to avoid these scenarios to
   happen.  This document describes these scenarios and related
   experiments are presented.