[sidr] draft-kent-sidr-adverse-actions-00.txt

Stephen Kent <kent@bbn.com> Mon, 01 June 2015 16:31 UTC

Return-Path: <kent@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43CDD1B2C8B for <sidr@ietfa.amsl.com>; Mon, 1 Jun 2015 09:31:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.811
X-Spam-Level:
X-Spam-Status: No, score=-2.811 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SKJSz4nZ12zc for <sidr@ietfa.amsl.com>; Mon, 1 Jun 2015 09:31:57 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E7F61B2CED for <sidr@ietf.org>; Mon, 1 Jun 2015 09:31:57 -0700 (PDT)
Received: from ssh.bbn.com ([192.1.122.15]:53858 helo=COMSEC.home) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1YzSd2-0001Ls-Cf for sidr@ietf.org; Mon, 01 Jun 2015 12:31:56 -0400
Message-ID: <556C88FC.3000409@bbn.com>
Date: Mon, 01 Jun 2015 12:31:56 -0400
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: sidr <sidr@ietf.org>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/Bkb6G9KPfXTzayJLBvYQwyn6R7g>
Subject: [sidr] draft-kent-sidr-adverse-actions-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jun 2015 16:31:59 -0000

Di Ma and I, with help from several folks at BBN, have generated this
document to try to characterize the set of attacks/errors that might
adversely impact INR holders in the RPKI context. As we discuss topics
like RPKI path validation, the Suspenders ideas, and Slurm, it seems 
appropriate to have a common background on the security issues in question.

We hope this is a suitable start for this sort of discussion, something
that might become a WG doc, maybe published as an informational RFC (or 
not).

https://datatracker.ietf.org/doc/draft-kent-sidr-adverse-actions/

Comments appreciated.

Thanks,

Steve