Re: [sidr] Some test results of ROA issuing for sharing

Rob Austein <sra@hactrn.net> Thu, 24 September 2015 21:10 UTC

Return-Path: <sra@hactrn.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7394A1B39F3 for <sidr@ietfa.amsl.com>; Thu, 24 Sep 2015 14:10:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.011
X-Spam-Level:
X-Spam-Status: No, score=-0.011 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jMRZhFSytNJj for <sidr@ietfa.amsl.com>; Thu, 24 Sep 2015 14:10:53 -0700 (PDT)
Received: from adrilankha.hactrn.net (adrilankha.hactrn.net [147.28.0.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B7DD1B39F0 for <sidr@ietf.org>; Thu, 24 Sep 2015 14:10:53 -0700 (PDT)
Received: from minas-ithil.hactrn.net (c-24-34-34-101.hsd1.ma.comcast.net [24.34.34.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "nargothrond.hactrn.net", Issuer "Grunchweather Associates" (verified OK)) by adrilankha.hactrn.net (Postfix) with ESMTPS id 7E3A139864 for <sidr@ietf.org>; Thu, 24 Sep 2015 21:10:52 +0000 (UTC)
Received: from minas-ithil.hactrn.net (localhost [IPv6:::1]) by minas-ithil.hactrn.net (Postfix) with ESMTP id 1D5D81BB00C5 for <sidr@ietf.org>; Thu, 24 Sep 2015 17:10:36 -0400 (EDT)
Date: Thu, 24 Sep 2015 17:10:36 -0400
From: Rob Austein <sra@hactrn.net>
To: sidr@ietf.org
In-Reply-To: <000901d0f59e$2b696630$823c3290$@cn>
References: <000901d0f59e$2b696630$823c3290$@cn>
User-Agent: Wanderlust/2.15.5 (Almost Unreal) Emacs/22.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset="US-ASCII"
Message-Id: <20150924211036.1D5D81BB00C5@minas-ithil.hactrn.net>
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/WpWPIF7Hm6s0wKuPQnzW5I61SAI>
Subject: Re: [sidr] Some test results of ROA issuing for sharing
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Sep 2015 21:10:54 -0000

At Wed, 23 Sep 2015 09:21:26 +0800, Yu Fu wrote:
...
> The test results show that ROA2 will overwrite the original ROA1 unless
> reissue the ROA1 again companied with ROA2 at the same time.
...
> As the second case is a problem for the ROA issuing, we think it is a bug
> for the software of the RPKI.net or improve the RPKI protocol to avoid this
> problem.

For those who only saw this message and not see the follow-up on the
rpki@rpki.net mailing list: my current understanding is that this is
not a protocol issue.