On Thu, Aug 15, 2024 at 02:28:46PM +0200, Tim Bruijnzeels wrote:
> It is unclear to me how section 9.3 of draft-ramseyer-grow-peering-api
> intends to use RPKI Signed Checklists (RSC) to prove authority for an
> ASN. 
>
> I think it would be beneficial to have a dedicated RPKI object for
> this instead of using RSC (even if the object is exchanged directly
> rather than published in the RPKI repository). It would remove the
> uncertainty around how this authorization works.

RSC can be used in a challenge/response process between two parties to
verify authority over an internet resource. This is exactly what the
Peering API needs.

> Furthermore, while RSC signing is easy to implement on a technical
> level, there are possible legal concerns around allowing any
> authorized user to make statements for resources outside of the
> context of routing (liability, terms and conditions, user
> authorization). Speaking as Principal Engineer / Product Owner RPKI at
> RIPE NCC I feel that dedicated objects with a clearly defined routing
> related context are much easier to understand and support in that
> regard.

Do you think yet another OID and yet another object type will somehow
resolve any self-imagined legal concerns? :-)

I don't think that starting from scratch (rather than using existing &
implemented technology) would help overcome potential future legal
concerns.

Kind regards,

Job

_______________________________________________
GROW mailing list -- grow@ietf.org
To unsubscribe send an email to grow-le...@ietf.org

Reply via email to