Re: [sidr] I-D Action: draft-ietf-sidr-slurm-01.txt

David Mandelberg <david@mandelberg.org> Wed, 13 April 2016 21:21 UTC

Return-Path: <david@mandelberg.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B8A012D990 for <sidr@ietfa.amsl.com>; Wed, 13 Apr 2016 14:21:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yahoo.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xbNLioGH4qHp for <sidr@ietfa.amsl.com>; Wed, 13 Apr 2016 14:21:19 -0700 (PDT)
Received: from nm26-vm7.access.bullet.mail.bf1.yahoo.com (nm26-vm7.access.bullet.mail.bf1.yahoo.com [216.109.115.214]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFF6712D924 for <sidr@ietf.org>; Wed, 13 Apr 2016 14:21:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1460582476; bh=0dz+YM2RQncmJ8gQqJZxVBxNN/KSUiC6YNzVyglx90Q=; h=Date:From:To:Subject:In-Reply-To:References:From:Subject; b=K2Rw0bzTwxtgSot/ZaG8nrf70fX5z/r+N1h7LcF6VgBSFRYrM/FTQho7wZaMDqE/EvigdwwErGB0BMz2uKia8RRzbDkoa/xwUYx+igr1oROJWNOAfz1A+HXb3th9MJI/SzaobdrQEQ9jOclfjBYcuwdphbDW9K3II7OREgOvTSyZo/1XYfARau2uueoamDgX3LiN9L1ZuoEmIJKfZXTq7itTMjueh4uiP0fwWAgMuS+zNb3muFA/2Tn83cYWleuFF5+ntJDcKuv3g/xXP7K5yr5h+0wduU5xejDQ5c6xjFZJECOXAAHh32SpWOQrC1YyqLiTpXpDt+URNYZ+XydQLg==
Received: from [66.196.81.160] by nm26.access.bullet.mail.bf1.yahoo.com with NNFMP; 13 Apr 2016 21:21:16 -0000
Received: from [98.138.226.240] by tm6.access.bullet.mail.bf1.yahoo.com with NNFMP; 13 Apr 2016 21:21:16 -0000
Received: from [127.0.0.1] by smtp111.sbc.mail.ne1.yahoo.com with NNFMP; 13 Apr 2016 21:21:16 -0000
X-Yahoo-Newman-Id: 795930.17079.bm@smtp111.sbc.mail.ne1.yahoo.com
X-Yahoo-Newman-Property: ymail-3
X-YMail-OSG: 4KGcbW0VM1lP2Q07.2CUCnoRNXKmAATeuM1vg_62iE.MXc3 le1Bapgk5zdslf25Cl.af4UpkDjKJAMN5C9HGg4Strm1G4ZfrjrCblTel7.X VkGaGBF2_8pJQ6haEzPm7RBGVCL5lm6yxyF9qDxXO.q6VjeqZvwC09y6eZ_G tKxPnoNVU5MHLfVGniO1cLQPA_iTan3KTRjBgWauDqYqr7pyqfsTeC9FcQ6M Y0cSA3O1RV9FyPG0qboa.U9GJliTcBrgIYeKywCQRbw1JbvDxeg6jWbZ.Zmz 7itVdzefX66ybOz9qOWQYzqBK2H1yLnCYDw7_N2dlERAImKk_oaBBuo0df_3 LCR575Lht.r7EkGiPgxyffJhHdVjAVGJsTIl9HUblaUiCfJdfUaPfC7BS27W oSB9rFjQkajtSs_MjxO8IDf6u1qa3EZtg1DXxqnHdo44.dnB3RaZRulAUR_n zQvZSqZGE4te1LUuSPqm91y2I6ovUVeoxTk2EQB2mlu4XuDXZp7lZFQbLf6s yAdwYbNOZENsWJYnY8gFofoFtZ38-
X-Yahoo-SMTP: 4kJJK.qswBDPuwyc5wW.BPAQqNXdy5j09UNyeAS0pyOQ708-
Received: from secure.mandelberg.org (c-76-24-31-176.hsd1.ma.comcast.net [76.24.31.176]) by uriel.mandelberg.org (Postfix) with ESMTPSA id 7A6BD1C6006 for <sidr@ietf.org>; Wed, 13 Apr 2016 17:21:15 -0400 (EDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Date: Wed, 13 Apr 2016 17:21:15 -0400
From: David Mandelberg <david@mandelberg.org>
To: sidr@ietf.org
In-Reply-To: <20160413210956.17329.84437.idtracker@ietfa.amsl.com>
References: <20160413210956.17329.84437.idtracker@ietfa.amsl.com>
Message-ID: <62e87ac555c59fd5d3cde4f52b89b69b@mail.mandelberg.org>
X-Sender: david@mandelberg.org
User-Agent: Roundcube Webmail/0.7.2
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/DUXMBVmjRkLeEtNT96b1dXEtNtc>
Subject: Re: [sidr] I-D Action: draft-ietf-sidr-slurm-01.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 21:21:21 -0000

Hi all,

I believe this draft addresses all of the comments I've received so 
far, and is ready for WGLC. Chairs, please consider this a formal 
request.

Here's a summary of changes from the previous version:

  * In Validation Output Filtering, an origin validation assertion where 
the prefix covers the locally reserved prefix, is no longer removed from 
the RP's output. For private-use prefixes, this change shouldn't be 
significant because there are no public covering routes. For other 
prefixes (e.g., stolen/borrowed public ones), this reduces the 
likelihood of accidentally invalidating an important covering route.
  * The document is now more clear and consistent about use of SLURM 
with non-private INRs.
  * The intended status is now STD instead of BCP. (I think it was BCP 
by mistake.)
  * I removed references to LTAM because LTAM is now dead.
  * I removed references to Suspenders because I think SLURM is ready 
for WGLC and Suspenders is still an individual draft.

On 2016-04-13 17:09, internet-drafts@ietf.org wrote:
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Secure Inter-Domain Routing of the 
> IETF.
>
>         Title           : Simplified Local internet nUmber Resource
> Management with the RPKI
>         Author          : David Mandelberg
> 	Filename        : draft-ietf-sidr-slurm-01.txt
> 	Pages           : 11
> 	Date            : 2016-04-13
>
> Abstract:
>    The Resource Public Key Infrastructure (RPKI) is a global
>    authorization infrastructure that allows the holder of Internet
>    Number Resources (INRs) to make verifiable statements about those
>    resources.  Network operators, e.g., Internet Service Providers
>    (ISPs), can use the RPKI to validate BGP route origination
>    assertions.  In the future, ISPs also will be able to use the RPKI 
> to
>    validate the path of a BGP route.  Some ISPs locally use BGP with
>    private address space or private AS numbers (see RFC6890).  These
>    local BGP routes cannot be verified by the global RPKI, and SHOULD 
> be
>    considered invalid based on the global RPKI (see RFC6491).  The
>    mechanisms described below provide ISPs with a way to make local
>    assertions about private (reserved) INRs while using the RPKI's
>    assertions about all other INRs.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sidr-slurm/
>
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-ietf-sidr-slurm-01
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sidr-slurm-01
>
>
> Please note that it may take a couple of minutes from the time of 
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr

-- 
David Eric Mandelberg / dseomn
http://david.mandelberg.org/