[153385] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ROVER routing security - its not enumeration

daemon@ATHENA.MIT.EDU (Shane Amante)
Tue Jun 5 15:27:26 2012

From: Shane Amante <shane@castlepoint.net>
In-Reply-To: <B394E03B-B833-4824-9ED5-C84D2B35F8F7@cs.colostate.edu>
Date: Tue, 5 Jun 2012 13:26:32 -0600
To: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

One correction below.

On Jun 5, 2012, at 12:42 PM, Daniel Massey wrote:
[--snip--]
> I think the first step is to step back and ask whether every =
operational model needs=20
> enumeration.   For example,   the talk yesterday by Level3 used the =
DNS and IRR=20
> did not need such an enumeration.

To clarify the above, the IRR _does_ provide an enumerated list of =
"Candidate" (IP prefix + Origin_AS) pairs.  The second step is to walk =
through those "Candidate" pairs and ask DNSSEC, in question/answer =
process, to validate that the "Candidate" IRR (IP prefix, Origin_AS) =
pairs are authentic, or not.  So, considering each step independently: =
the former (IRR data) is enumeration, the second is not.  However, in =
the context of this specific operational model, the end result is an =
enumerated list of validated (IP Prefix, Origin_AS) pairs.

-shane=


home help back first fref pref prev next nref lref last post