Re: [Sidrops] 6486bis: Failed Fetches

George Michaelson <ggm@algebras.org> Wed, 19 August 2020 22:15 UTC

Return-Path: <ggm@algebras.org>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE3AD3A0D05 for <sidrops@ietfa.amsl.com>; Wed, 19 Aug 2020 15:15:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=algebras-org.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rlJWkzZmCJ96 for <sidrops@ietfa.amsl.com>; Wed, 19 Aug 2020 15:15:29 -0700 (PDT)
Received: from mail-io1-xd30.google.com (mail-io1-xd30.google.com [IPv6:2607:f8b0:4864:20::d30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11F1B3A0D0B for <sidrops@ietf.org>; Wed, 19 Aug 2020 15:15:28 -0700 (PDT)
Received: by mail-io1-xd30.google.com with SMTP id g19so330326ioh.8 for <sidrops@ietf.org>; Wed, 19 Aug 2020 15:15:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=algebras-org.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=p9oS8zZqdXARxHJwbg27xRYL2ihxyUCLenMugVkcqME=; b=qqENcHtXMxGAfYnLyaInXsx1+urJH6haYIuq0z8co/jh7vyQqJXvEY2afDSwEcOvOZ VJCfdHztyDzakESVO6Fa9zVeRLj/g0x3nn58yjL0nOV1ZcPB0mm+4vZlSMVjwEMiujyH bW/5LdTqfuJ2SmiNT6AO4imxvzzjCwZnVh8NAGRff16jpp1qUfPA3vBWaj/7HyOPdERc jlwKyg1u7rQkrZdzhtuichr2gXRZ2em6JDeMbuUFM4teGS0ZDbtU+bazyfHmk9hkZBuh Bl+KU51SxyDvtkWpEEAkFwPjm+6cEVvkWU7XmoN23RHQbgynpKCaNOTjeM7S+zZ3sfwU /EFw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=p9oS8zZqdXARxHJwbg27xRYL2ihxyUCLenMugVkcqME=; b=aJOkgsfvkiuF6MUVAfT3WErKg+9DSCg1FLfcg4d3zXa/YQW+BgMF/EwUUPRDXR7pAb tFnnappZg2r9ldMhD29+qgVY7ayXZzRy/AED0qf9wryIKMEcmvLFy0Rv57dOoruu7yti hNX9ND8tto+/5pUwPmkAjG9366dhVp8NJuHWddl6lBqjDqNO+cQPEnUzCycWIsVn54C5 jASCWZTItgbobapckssANSZlSNDjDgJ3C74yuwfBi+oWvlDROIFOm8ix56XXkE8d/sfL nJY0WNftloJzX0CPfY6le61iLqFNWQOHfDzzfwmnUq2BzEihAw1ZwJqVqs2mgdGk53Gt HOeA==
X-Gm-Message-State: AOAM533i90M1mKaql4ViMrMLdrq/n/3gOP5tnA1Y30j+s0h0N/6XGK2I EuVslSCu84uZYw/TK61OfOHzH4Mztt6xHw6Gy5aG9MD2PIijKA==
X-Google-Smtp-Source: ABdhPJzHxYerfOB7kXC/OErCWqSYbGevrrxwDNxu7yNNzcWc67YSpR2kov+X0dka6oCbj98BGHX1t/Syz0kO0xcsDQY=
X-Received: by 2002:a6b:6204:: with SMTP id f4mr94539iog.56.1597875327642; Wed, 19 Aug 2020 15:15:27 -0700 (PDT)
MIME-Version: 1.0
References: <20200817163134.29aa1a6b@glaurung.nlnetlabs.nl> <c1a8fffb-9106-d08e-4254-44ddf1a0115a@verizon.net> <20200818083659.1922a98c@grisu.home.partim.org> <CAKr6gn2Ai0jM+ZPE86Nnw-Y4p7qnoY4Ce2TKqVDde5R0aC4-zw@mail.gmail.com> <4A06A42E-8379-4E28-8539-73B61F78A261@rpstir.net>
In-Reply-To: <4A06A42E-8379-4E28-8539-73B61F78A261@rpstir.net>
From: George Michaelson <ggm@algebras.org>
Date: Thu, 20 Aug 2020 08:15:16 +1000
Message-ID: <CAKr6gn1Hhzc13P4B82DSK_898g=BEKqiP8J5mRY604DA2wQ4nw@mail.gmail.com>
To: Di Ma <madi@rpstir.net>
Cc: Martin Hoffmann <martin@opennetlabs.com>, Stephen Kent <stkent=40verizon.net@dmarc.ietf.org>, SIDR Operations WG <sidrops@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/LXgryOX1KsXdCeaI1KVwiniCmhg>
Subject: Re: [Sidrops] 6486bis: Failed Fetches
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Aug 2020 22:15:31 -0000

Yes. This is what I mean.

The fly in the ointment is the CRL. I think we need to be very sure
about how you source a CRL which invalidates things being used to
validate a bundle. Is it acceptable to use a CRL which was applicable
when the object was constructed? I think this is weaker than requiring
the CRL to be checked for applicability at the time you validate. To
do that, you have to be online and have access to all CRL from all
Repo along the validation path.

-G


On Wed, Aug 19, 2020 at 10:29 PM Di Ma <madi@rpstir.net> wrote:
>
> George,
>
> > 2020年8月19日 03:50,George Michaelson <ggm@algebras.org> 写道:
> >
> > FYI we fully intend resubmitting RTA, we were waiting for the second
> > implementation (the work Martin is doing) to have input of merit to
> > spin the new version. It would be plausible to resubmit for the
> > November IETF. Two running code!
> >
> > We designed RTA to be complete outside of a repo, so it can be used
> > privately between B2B partners. Not that its things cannot "be" on the
> > manifest, but that there is no dependency on the repo framework beyond
> > the TA, because the passed data is the chain for validation. This
> > matters to people who want to conduct activity outside of the BGP
> > validation problem, which is an 'all data needed' problem. B2B uses of
> > RTA are not directly about all data. Its different. (provisioning is
> > typically the use case here and the intent is to show the request to
> > route, originate, provision is valid, because control of the resource
> > can be demonstrated. its inherently a one-to-one conversation)
>
> Do you mean RTA validator has nothing to do with RPKI repository sync, given the RTA use-case just requires the INR holder to provide all the necessary certificates to construct the validation path down to TA?
>
> It reminds me of the similar model in RFC 6494 where the RPKI is used for IPv6 SeND.
>
> Di
>