Re: [sidr] Key sizes in CP and CERT document.

Geoff Huston <gih@apnic.net> Thu, 30 July 2009 01:28 UTC

Return-Path: <gih@apnic.net>
X-Original-To: sidr@core3.amsl.com
Delivered-To: sidr@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3F0823A7128 for <sidr@core3.amsl.com>; Wed, 29 Jul 2009 18:28:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kSWR3nQZnoaP for <sidr@core3.amsl.com>; Wed, 29 Jul 2009 18:28:19 -0700 (PDT)
Received: from asmtp.apnic.net (oregano.apnic.net [IPv6:2001:dc0:2001:a:4608::60]) by core3.amsl.com (Postfix) with ESMTP id 38EAE3A7126 for <sidr@ietf.org>; Wed, 29 Jul 2009 18:28:19 -0700 (PDT)
Received: from [IPv6:2001:dc0:2001:10:217:f2ff:fec9:1b10] (unknown [IPv6:2001:dc0:2001:10:217:f2ff:fec9:1b10]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by asmtp.apnic.net (Postfix) with ESMTP id 0283F110065; Thu, 30 Jul 2009 11:28:18 +1000 (EST)
Message-Id: <091B05BF-19CA-4EB1-8BD6-2F9B0FDABCAF@apnic.net>
From: Geoff Huston <gih@apnic.net>
To: sidr@ietf.org
In-Reply-To: <DA35F93B-8A9D-4764-8C96-231D24125822@fing.edu.uy>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v935.3)
Date: Thu, 30 Jul 2009 11:28:18 +1000
References: <DCB74E4C-D52C-437F-9F3F-ECD8DB0CB109@lacnic.net> <6C3F5BAE-6841-461E-AB4C-4F84DF58B5F4@apnic.net> <p06240805c68bcef8af06@[192.1.255.210]> <6B15688C-1583-43B2-ACE7-D10FBE434AD6@apnic.net> <p0624080cc68bf0136ce7@[192.1.255.210]> <7E15ED69-4CAE-499A-8C31-2FF2E1190735@apnic.net> <p06240802c68d3dc23d38@[10.0.136.158]> <1CE24E5F-AD6E-4A7A-8640-7B7D049C760D@apnic.net> <p06240810c695c262ea02@[130.129.18.170]> <6C7EBC58-6824-48BA-809F-F01487310C63@apnic.net> <DA35F93B-8A9D-4764-8C96-231D24125822@fing.edu.uy>
X-Mailer: Apple Mail (2.935.3)
Subject: Re: [sidr] Key sizes in CP and CERT document.
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 01:28:20 -0000

WG chair hat off

In the light of the comments made in the past couple of days in favor  
of a separate document that specifies algorithms and key sizes for  
RPKI signatures, I have submitted an individual draft, draft-huston- 
sidr-rpki-algs-00.txt that is intended to undertake this role. WG  
comment is invited on this draft.


    Geoff

----------------

A new version of I-D, draft-huston-sidr-rpki-algs-00.txt has been  
successfuly submitted by Geoff Huston and posted to the IETF repository.

Filename:	 draft-huston-sidr-rpki-algs
Revision:	 00
Title:		 A Profile for Algorithms and Key Sizes for use in the  
Resource Public Key Infrastructure
Creation_date:	 2009-07-30
WG ID:		 Independent Submission
Number_of_pages: 4

Abstract:
This document defines a profile for the algorithm and key size to be
used for signatures applied to certificates, Certificate Revocation
Lists, and signed objects in the context of the Resource Public Key
Infrastructure.



The IETF Secretariat.