[86945] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BGP Security and PKI Hierarchies (was: Re: Wifi Security)

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Wed Nov 23 20:45:17 2005

From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: George Michaelson <ggm@apnic.net>
Cc: Randy Bush <randy@psg.com>, Sandy Murphy <sandy@tislabs.com>,
	nanog@nanog.org
In-Reply-To: Your message of "Thu, 24 Nov 2005 11:31:04 +1000."
             <20051124113104.0bd275d2@garlic.apnic.net> 
Date: Wed, 23 Nov 2005 20:44:42 -0500
Errors-To: owner-nanog@merit.edu


In message <20051124113104.0bd275d2@garlic.apnic.net>, George Michaelson writes
:
>
>
>According to what I understand, there have to be two certificates per
>entity:
>
>	one is the CA-bit enabled certificate, used to sign subsidiary
>	certificates about resources being given to other people to use.
>
>	the other is a self-signed NON-CA certificate, used to sign
>	route assertions you are attesting to yourself: you make this
>	cert using the CA cert you get from your logical parent.
>
Or your parent could have a CA and issue you two certs, one for signing 
route assertions and one for signing certificates you issue to your 
downstreams.  That in turn has another interesting implication: an ISP 
can *enforce* a contract that prohibits a downstream from reselling 
connectivity, at least if the resold connectivity includes a BGP 
announcement -- the ISP would simply decline to sign a CA certificate 
for its customer, thereby depriving it of the ability to delegate 
portions of its address space.  (N.B.  Certificates include usage 
fields that say what the cert is good for.)

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



home help back first fref pref prev next nref lref last post