Origin Validation Signaling
draft-ymbk-sidrops-ov-signal-01
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Randy Bush , Keyur Patel | ||
| Last updated | 2018-12-29 (Latest revision 2018-06-27) | ||
| Stream | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Expired | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-ymbk-sidrops-ov-signal-01.txt
Abstract
Within a trust boundary, e.g. an operator's PoP, it may be useful to have only a few central devices do full Origin Validation using the Resource Public Key Infrastructure, and be able to signal to an internal sender that a received route fails Origin Validation. E.g. route reflectors could perform Origin Validation for a cluster and signal back to a sending client that it sent an invalid route. Routers capable of sending and receiving this signal can use the extended community described in [RFC8097]
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)