Re: [sidr] WGLC for draft-ietf-sidr-pfx-validate-06

Tim Bruijnzeels <> Fri, 29 June 2012 16:03 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 3E1A621F862A for <>; Fri, 29 Jun 2012 09:03:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 4ZuHLARauL-p for <>; Fri, 29 Jun 2012 09:03:38 -0700 (PDT)
Received: from ( [IPv6:2001:67c:2e8:11::c100:1342]) by (Postfix) with ESMTP id 6719C21F859B for <>; Fri, 29 Jun 2012 09:03:38 -0700 (PDT)
Received: from ([]) by with esmtps (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from <>) id 1SkdfT-0001xA-2m; Fri, 29 Jun 2012 18:03:36 +0200
Received: from ([] by with esmtps (TLSv1:AES128-SHA:128) (Exim 4.72) (envelope-from <>) id 1SkdfS-0005wE-Mn; Fri, 29 Jun 2012 18:03:34 +0200
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Tim Bruijnzeels <>
In-Reply-To: <>
Date: Fri, 29 Jun 2012 18:03:34 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <> <> <> <> <> <>
To: Randy Bush <>
X-Mailer: Apple Mail (2.1084)
X-Anti-Virus: Kaspersky Anti-Virus for Linux Mail Server 5.6.48/RELEASE, bases: 20120425 #7816575, check: 20120629 clean
X-RIPE-Spam-Level: --
X-RIPE-Spam-Report: Spam Total Points: -2.9 points pts rule name description ---- ---------------------- ------------------------------------ -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover relay domain -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000]
X-RIPE-Signature: 784d7acfe6559f2a0b602ec6519a07194dc45b91c74a0713b5059d3c31ef02b6
Cc: sidr wg <>
Subject: Re: [sidr] WGLC for draft-ietf-sidr-pfx-validate-06
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 29 Jun 2012 16:03:39 -0000


On 29 Jun 2012, at 15:51, Randy Bush wrote:

>> With inconsistencies I did not mean that the validated cache is out of date, which I agree, will always be there even if it could be minimised.
>> The inconsistencies I refer to are different in nature. It's that the snapshot that the RP tool got when it validated is in itself inconsistent: surplus or missing ROAs, or the hash of 1 or more ROAs doesn't match. Longer discussion omitted, but at this point the RP just doesn't know for certain what to do and guidance is needed. This is where *explicitly* stating a strong requirement, rather than leaving it implicit, in pfx-validate comes in..
> would you like us to pull in the crucial paragraph from sec 6 of
> origin-ops?
>   Like the DNS, the global RPKI presents only a loosely consistent
>   view, depending on timing, updating, fetching, etc.  Thus, one cache
>   or router may have different data about a particular prefix than
>   another cache or router.  There is no 'fix' for this, it is the
>   nature of distributed data with distributed caches.

No, not exactly. I think it makes more sense to have this kind of guidance in an ops targeted document. Here I would just like to see it documented that the same kind of concerns raised with someone able to mess with the validated cache database (adding/removing records) apply to attacks or operational problems that happen before stuff goes into that database.

Addressing this to the best of our abilities in operations and relevant standards is another discussion. One that I would like to save for another thread, and which does not have to block pfx-validate as far as I am concerned.