Rubens Kuhl (rubensk) writes:
> > In case you feel a BGP announcement should not be "RPKI Invalid" but 
> > something else, you do what's described on slide 15-17:
> >
> > https://ripe64.ripe.net/presentations/77-RIPE64-Plenery-RPKI.pdf
> 
> The same currently happens with DNSSEC, doing what Comcast calls
> "negative trust anchors":
> http://tools.ietf.org/html/draft-livingood-negative-trust-anchors-01

        Yes, NTAs was the comparison that came to my mind as well. Or even
        in classic DNS, overriding with stubs. You will get bitten by a bogus/
        flawed ROA, but you'll have to the chance to mitigate it. Any kind of
        centralized mechanism like this is subject to these risks, no matter
        what the distribution mechanism is.

Reply via email to