On (2014-09-02 14:44 +0000), Sriram, Kotikalapudi wrote:

Hi Sriram,

> Importantly, C has a created a ROA for 192.0.2.0/23 only to protect 
> its address space, but currently *does not advertise* this prefix or any part 
> of it.
> So D's more specific announcement (hijack) is 'Invalid' in this scenario but 
> the 'Loose' mode operation would accept/install D's route.
> Am I right about that? If yes, that is the side effect or CON that I was 
> trying to highlight.

Absolutely, thanks I now understood you and we're on the same page. Loose only
protects routed networks, it do not protect hijacked non-routed prefixes.

> Further, later in a mature stage of RPKI, when nearly all operators have 
> implemented the paragraph I cited from RFC 7115, then routers can drop 
> 'Loose' mode.    

Yes, many may have sufficient confidence to turn off loose mode at later time.
All of them would be able to gather data during loose-period about actual
occurrence of false positives. Perhaps that is always 0 or at least has been 0
for past several years, this might be make it easy to give accurate data of
factual business risks.

-- 
  ++ytti

Reply via email to