ietf
[Top] [All Lists]

Re: Last Call: <draft-ietf-sidr-rpki-rtr-19.txt> (The RPKI/Router Protocol) to Proposed Standard

2011-12-21 07:24:25
On Wed, Dec 21, 2011 at 08:01:49AM -0500,
 Russ Housley <housley(_at_)vigilsec(_dot_)com> wrote 
 a message of 22 lines which said:

Since all of the objects that are transferred over this protocol are
digitally signed,

Over RTR? It is not mentioned in the I-D, quite the contrary.

I think the Security Considerations section (Section 11) does a good
job explaining the situation

Precisely, it explains that the link router<->cache must be secured
because the data is *not* signed:

      But this protocol document assumes that the routers can not do the
      validation cryptography.  Hence the last link, from cache to
      router, is secured by server authentication and transport level
      security.  This is dangerous, as server authentication and
      transport have very different threat models than object security.

      So the strength of the trust relationship and the transport
      between the router(s) and the cache(s) are critical.  You're
      betting your routing on this.

      
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf

<Prev in Thread] Current Thread [Next in Thread>