[sidr] Expected protocols in rpki-rtr

Paul Hoffman <paul.hoffman@vpnc.org> Tue, 02 August 2011 17:34 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F28511E8080 for <sidr@ietfa.amsl.com>; Tue, 2 Aug 2011 10:34:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.617
X-Spam-Level:
X-Spam-Status: No, score=-102.617 tagged_above=-999 required=5 tests=[AWL=-0.018, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jQVfdhB6Hc+0 for <sidr@ietfa.amsl.com>; Tue, 2 Aug 2011 10:34:01 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id B563711E807F for <sidr@ietf.org>; Tue, 2 Aug 2011 10:34:00 -0700 (PDT)
Received: from [10.20.30.101] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p72HXnUq019894 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <sidr@ietf.org>; Tue, 2 Aug 2011 10:33:50 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 02 Aug 2011 10:34:07 -0700
Message-Id: <84CE1DEB-76A8-4123-B20D-0AEB72CA694B@vpnc.org>
To: sidr wg list <sidr@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1244.3)
X-Mailer: Apple Mail (2.1244.3)
Subject: [sidr] Expected protocols in rpki-rtr
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2011 17:34:01 -0000

Greetings again. Section 7 of draft-ietf-sidr-rpki-rtr-14 has a list of supported transports. However, it does not list the one that some people have said that they expect it to be run under sometimes, namely bare TCP. If we all know that this is likely to be the case, we should have it listed in the document. I propose the following for the end of section 7, just before 7.1:

   Caches and routers MAY use unprotected TCP as a transport,
   even though this provides none of the security protections of
   the other protocols listed here. Unprotected TCP MUST only be
   used when there is other forms of trusted security in place.

Of course, we can also just ignore the fact that many users want to do this, but being honest in the document might be better than pretending otherwise.

--Paul Hoffman