<div dir="ltr"><div dir="ltr"><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, 11 Oct 2021 at 12:29, Randy Bush <<a href="mailto:randy@psg.com">randy@psg.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">> ASPA is orthogonal to BGPSec. It lets AS holders declare who their upstreams are<br>
> (in the context of BGP Path, not business relation). Even if this information is<br>
> not yet used in routers in an automated way, a clear text validated output with<br>
> this information can already be valuable to operators, e.g. for provisioning.<br>
> (This is also how ROAs were oftentimes used in the early days).<br>
<br>
yup. and much more easily deployed than bgpsec. and small resource<br>
consumption by the ncc.<br></blockquote><div><br></div><div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">Could you explain this further for me? AIUI, the requirements on the RPKI repo for BGPsec is just the signing keys being uploaded, with an attestation as to the ASNs that they are permitted to sign for. ASPA requires a relatively huge amount of stuff to be specified (specifying your upstreams etc) in comparison that requires frequent updates, whereas router signing keys will be dwarfed by ROAs etc, there being far more prefixes than there are border routers.</div></div><div><br></div><div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">Or have I missed something here? (I'm not trolling, I genuinely want to understand if I'm overlooking some major part).</div></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">Matthew Walster</div></div></div>