Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Comments from Paul Wouters to check in the context of registries #4

Open
boucadair opened this issue Jun 30, 2022 · 1 comment
Open

Comments

@boucadair
Copy link
Contributor

boucadair commented Jun 30, 2022

#1

Note that if the zone hhit.arpa is ultimately used, some
registrar
will need to manage this for all HHIT applications.

Regardless of what zone is used, someone needs to keep it
operational.
It might be an attractive target to attack, eg to try and avoid
drones
being shut down. I would feel much better if this zone was
optional,
not mandatory. (but if optional, one could also argue maybe not
have it
at all?)

If the HHITs cannot be
looked up with services provided by the registrar identified
via the
embedded hierarchical information or its registration validated
by
registration attestations messages [drip-authentication], then
the
HHIT is either fraudulent or revoked/expired.

That's quite catastrophic if there is a Registrar/Registry outage.
Would
all the drones get shot down or would they all be ignored (so they
can
fly to their terrorism target)

@kc2rxo
Copy link
Collaborator

kc2rxo commented Feb 21, 2023

This is a valid security concern I wish to bring up with the WG and discuss.

For me, this starts to slip into the enforcement policies of a given entity. This is something we should never make claims or recommendations to.

However it may be best to have something in the security section that gives the possible scenarios that an entity wishing to write legislation for enforcement can cite and build from. We can try to be as thorough as possible here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants