Re: [sidr] Validation reconsidered and X.509v3 extension OIDs

t.petch <ietfc@btconnect.com> Tue, 02 August 2016 16:35 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFFB312D802 for <sidr@ietfa.amsl.com>; Tue, 2 Aug 2016 09:35:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ALVCKq0lnxUR for <sidr@ietfa.amsl.com>; Tue, 2 Aug 2016 09:35:49 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0131.outbound.protection.outlook.com [104.47.0.131]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED4CC12D0C7 for <sidr@ietf.org>; Tue, 2 Aug 2016 09:35:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=p5B+B1V/aGu3iocvKVe8McsHbjdqbkMWO4WTYNZolsA=; b=fYHlDgtzqK4XYPZ1xLZYF+iftCh/qMQlZ/VYGM2MIZIauI/9RHwRFIjhCCDyVlS1prXBlbWFK3/jxaBL4vBn5n+YiA+UUtn7guCAg/10H8CQn7ZSxr1zOZNx9ktfbebdmsbGy9WY2846n1qP6Z7Ibhny8Vs4TO+iagDAdW9cf9o=
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com;
Received: from pc6 (31.50.86.164) by DB5PR07MB1624.eurprd07.prod.outlook.com (10.166.12.151) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384) id 15.1.549.15; Tue, 2 Aug 2016 16:35:43 +0000
Message-ID: <00c201d1ecdb$8d45a640$4001a8c0@gateway.2wire.net>
From: t.petch <ietfc@btconnect.com>
To: Sean Turner <sean@sn3rd.com>
References: <20160719111830.12A97412B25E@minas-ithil.hactrn.net> <F64A0698-6461-489E-99B9-4A75421C04DA@vigilsec.com> <20160719131456.D0705412C916@minas-ithil.hactrn.net> <A76F3C48-64F0-48A3-938E-D2362A909664@vigilsec.com> <173EB2A5-1F28-4108-9D91-B3D1C2B3126C@ripe.net> <2F66A19D-8ADD-496A-A1A6-61D8277DAF4C@sn3rd.com> <00c501d1eca0$8fd24660$4001a8c0@gateway.2wire.net> <89AE2EA7-BF74-4A59-9C6C-9F50595458D8@sn3rd.com>
Date: Tue, 2 Aug 2016 17:32:52 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
X-Originating-IP: [31.50.86.164]
X-ClientProxiedBy: HE1PR0401CA0026.eurprd04.prod.outlook.com (10.166.116.164) To DB5PR07MB1624.eurprd07.prod.outlook.com (10.166.12.151)
X-MS-Office365-Filtering-Correlation-Id: 0b63546f-9139-4e27-9a3a-08d3baf30cdf
X-Microsoft-Exchange-Diagnostics: 1; DB5PR07MB1624; 2:h7rf8uIfNj2R+766gJDmlL3X+zi5N6NZs5Wur7wiM9B43Wim0S0q5b41UCw7QFwOBk/tA+sI0H+R4FvnHwwCYJLDeJsWFyLBPUAsTjYfhFAbqmMK4GRuFzyqTUsxsL2ACutS7n/DbL/8TNA0HsExWfjA+fm1yaGNt86vJf/6vhGkszi6VDID99gV9USP8ukj; 3:cyr9ICglMiAjutKT4I0XyPY3pjG37HhUhIZlaJu/nW2eFzQPWmLEwpA/XD2GWVPKiWwm9eQy8dYBooqSxqFL25W6okLfHF7iKcO3OSoDNPbaKtpOwDccn1tl9w8u8ViI
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DB5PR07MB1624;
X-Microsoft-Exchange-Diagnostics: 1; DB5PR07MB1624; 25:75lQDhQoBYODyAUm55vnF/tqEeTx9Ti1mqVjlNIrG0SRPGFULDuFQfGhlavahHXDJmcZxhIyFLf0cGI7pxHeh9Kqak41JlPd8eEAguGZyiv4ZtQluZyeZjQIH0MKbgxyJJo8XbPiZg0je5KrfFMgqoAHdDD2F6KnmGDd06Q4ts0nQXEwCrW33kYYwZO/NzXjbDUt5jc6zxbLgMgPY39EP1c52PWW0nHdZSKMK6awpS4vUt+C8Lyu8yoHG4BCCUozMBiOF/HqkwgldcrLAPAe8LNS3OTa23Jk0Wzsm3wpW0HMYnDa15MwJKhcPczr+xgEeTLVksyz++ljpSEF4o4qNviDWoI+NnM2mpr7DHJQV9zYZEOmk6Scsm5TqmvXx0v/ziveFB4/GXqElQqGDP7LSudv3/MI7RR50v5Najgu/mN1PfVrsGqP+R3xTnZBU1D7f9W6lBY4sQeqbvyBU6w1UmNeXsURp5Ek1PZHpW7EsuXD7df5bCySbpWFU6fPtRcoKKi/Ysvk17P3YhQ2m5EfFqBr6y8XZzW2illjxBqNBsKigBf1KBOJsJnfAMxJ01pqILbJk+33Jyt/HX+z3gdn3IfgwdC+cTJdN6IJBVgerTbQrQhClropjGpi+JlqWYCzhiNpKYElYd+aCSgANWAXKE/6jLEsnldT4WIAanhMSBbM9KYTKZPCyzARH2Rk+wSaHEdpHF4qGrlHv9rZNHsNuOHwfLvjdgCTutrrjal+52Rmy3gVOiPysZz5k0f8HJN22mEke3aQlboodPgQGSywVFVG+tK/SOGcCSe1qfc0sPsaWDIVomCvEzA1XOrqjjEokeEkyvY+pdwCOOOMMU9jqA==
X-Microsoft-Exchange-Diagnostics: 1; DB5PR07MB1624; 31:EagzNvhleTYeJEBMYlBlLkcmcrOWlt24PsqwhJS+4XirYBwjmRFEj71OaA8ecqYwMdAJNwrL/HgwoblzgdQFpdCZzxM+4P9jAddJzQB19gcBmwre6E4S0yeWWr5h3Bv227Ar4XEDkP9CdMiR6lnyO4qK0lyNI5adUcy2lvw2r/M8KmosaYHcAYLC5wRANcETBQIuJyWhrYrF7Rzsfq+RI1hYtDhLPXKARAI2aH32jUI=; 4:PDFWFVbdgnHhj7eoPA/wGE7YEU8XvY8ZjFhmhkolc8AbvTWJzWHqzAHk9owskXwGLbnmgh7aS/0YrPyhDCjxdXPfIhFNoLF/alIEG4Buy9XVcLWvKMnJcAns2u9cLKueMlI4XAif69Z+P5UJ80DElLxO+cqbHbDlWiFBFVUWfanBPtQevePHzoO18RBitFoOARRX1KQ/GVxrxc9m+dp4aSsn1Fl7zO0GoGjLlAfGDiMmDmcbtXvM0QH2qyBxX78+09HrAPpy4HfKSBMnj86zYkU6nan6YHIOeLcNRx28PS+TqCNpbJfQogcsTdcvKYZ2GCnf93nsTrT5UcFTnvnYEg4WlqR6+blW4BKoj6C8UYj8TLA+QmBXQD7FpQY3GPFhSVRjI+ugmHQaAXK6Vg94ds7MycI0gMsQKuYo27k9XjiFqV7v7K2EBwzLbOum50/XYhvjAISOVgtNwsQj5bKVMrqoqzlg4W0eGzo+fqR7sJo=
X-Microsoft-Antispam-PRVS: <DB5PR07MB1624BAE035CAEFBB02CA16BCA0050@DB5PR07MB1624.eurprd07.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(178726229863574)(192374486261705)(1591387915157);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046); SRVR:DB5PR07MB1624; BCL:0; PCL:0; RULEID:; SRVR:DB5PR07MB1624;
X-Forefront-PRVS: 0022134A87
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(4630300001)(6009001)(7916002)(377454003)(199003)(24454002)(13464003)(189002)(51444003)(42186005)(1456003)(61296003)(33646002)(93886004)(84392002)(77096005)(14496001)(116806002)(106356001)(86362001)(105586002)(15975445007)(92566002)(1556002)(44736004)(62236002)(81816999)(50986999)(44716002)(6116002)(101416001)(66066001)(50466002)(7846002)(110136002)(189998001)(3846002)(23676002)(81166006)(8676002)(68736007)(345774005)(47776003)(81156014)(81686999)(76176999)(19580405001)(9686002)(2870700001)(4326007)(97736004)(19580395003)(586003)(305945005)(50226002)(7736002)(2906002)(74416001)(7726001)(4720700001)(19627235001); DIR:OUT; SFP:1102; SCL:1; SRVR:DB5PR07MB1624; H:pc6; FPR:; SPF:None; PTR:InfoNoRecords; A:0; MX:1; LANG:en;
Received-SPF: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtEQjVQUjA3TUIxNjI0OzIzOjJzTkQ0RlVMaGxCbGxKYm5ENXhkQTQyV09w?= =?utf-8?B?STdUclp1S0NSVm9HaVlwQlMxQ09XaTZXOWthaHp0M3MzTU1QU1VkdkhwY1R6?= =?utf-8?B?RzQ0L2ZlUkJ0c0FXaHUwdmZuVTFXTW53NWdSblNJbkQrQ3gvZUY0VHc5SmRR?= =?utf-8?B?RTlGd3VsdytVNHZMODJYSXpWZmxTcCtnOUN2SUlyRU10WWZnMDJxQXFWbyta?= =?utf-8?B?TEoyUHhhYWFsb0RuNkxpaHJWK2JFKzNocG92ODROYUlaZStWT3RYSy9CallS?= =?utf-8?B?eGlnM3U4RXBxVHVhYUlwY2hqZnR6SVNLL2d2cGsyeU5Yb05sc2t6dm5KNm9R?= =?utf-8?B?bE1VRXM1RHNPeVgvSFE2a21iMlZ5UUlwcm5QVkMvZ1RFWlVUZzhObStlQ2ZG?= =?utf-8?B?Qkx6UDRTQWs5MlgyNlNJcGNVMmt6aldPcVRWdmh2L2RHYUxZNElHZFJyS1JD?= =?utf-8?B?TFh6Q05ENFRVSkxGNnR6K3JmaE0yREhHeTl6Vjl5RmRVVlhKNkV2N1A5U3dN?= =?utf-8?B?Znk3R3Y2L0kwbkU4U0JMZDBxQ0tZQ1dVNnFvWHo0bnNGS3pQcWRic1FmRlo2?= =?utf-8?B?eVNSM3dOdFQwWlpLSkRWS3NCOXFGQVA1Vm1EYjYzQ0JyZWw2SktwQzZQL1RQ?= =?utf-8?B?a2FOemJNbEczOXhVTitTWHNJNHJXSi9Yakd2TXNxN2NrT3c3ZzFWeUFwTnhT?= =?utf-8?B?dkJRTng3bnNVR3VuU2M0YU5QV01MZEpWZkMrQU12N3hoZzBJak43M1IzR1hE?= =?utf-8?B?VWdKZG5Ba2dHV3BYRXl0YXRobHUzZVJlVjUzRGlxUittNjk3SytmRXhxZlhH?= =?utf-8?B?RUhDU3owQlVob1UxMlJCN2ltWVdnd0NpSmY3aklwalphblNhTDFOdzNOUkxh?= =?utf-8?B?dis0eXNYSUt1a3Q4UzRTRXFWZ2RQRG5sVUk4V1A2ejJkcDhYOVFjUTVER051?= =?utf-8?B?aHlEd1RaU2FhRnlhRkQzQjRFMDliWFV6ODVRQ2t2eG4rWE9lN1h6eTZvSW16?= =?utf-8?B?WmNDYXFBK2YvcHpMcEtsQTl5VnB4ekhuV00wbDBFeDAxd0VzMjNtTGlVWmE4?= =?utf-8?B?eThXQlh2eVRob2VRaVJaQldyVGpBckxVNXhZcWhsanNvNDR0YVRLK3UzVEFK?= =?utf-8?B?cWtzUVRxQ2U4RU1VVjNwZEYwV08yK05seHVScFBKSjM5Uk5DcHhaSmMzVnFj?= =?utf-8?B?STlQZ3JvWldnWGErY2syTHlZeU1zdTF6eS9wVVBvVjB1U1dUU3crZ0YvcVlV?= =?utf-8?B?SWJVOS9Vb3dBR0YvNUZjZmp6TnBFSFhNL3gvYmtmZG5BTytBQndlMWo3cWEw?= =?utf-8?B?ckFrUUUvWXJHNWhpaGxjY3drR0tXNVFCTy9xVGRRTWJ6YlRGbDhiWDB5b3FB?= =?utf-8?B?SUFuc09ZMnVzRlR0Ni9qUDZNdXFraWhXaWwxbUI0SGxmelRvNjZUdGlpaTRO?= =?utf-8?B?U1dQa1pyYkdNdC9ISU5zT0ovM0VneWx2NWZieXYzaDU0S0x5QXZRSUZueEEv?= =?utf-8?B?WldZbmRDN2NBOGhlK3lGUmdrdnFsZ0JMK1BIRDU5TmJhWGJrZTlpUlFGOHo0?= =?utf-8?B?c1NDUkRiYmRncDk1SklhVW1GbEpNcWg5cVY0bEhHdCtqNFpoQkFrdDlERHJi?= =?utf-8?B?WUJmQyttSUI3QzBqOGhOSnM5U0NBd3dKZE9hVXJMZWtSNHpvSWdxME9jQThi?= =?utf-8?B?cjczQVVJY3JtSlIyYlZUWFhmcDJKTVVDUURKcUVtR1pjM3IvTVdEN3pHeTNw?= =?utf-8?B?d3JFbWFyS2NOU3h6TENlOVU2RTJQeC9VYkpLTUNQeXZ6SnBjWXBIQ053djdx?= =?utf-8?B?VFJYVEd5S1p0cnNLUWNZSDFwUnpLZ2xDSTVPbGxuUm94Yy9lbEkyNm1mcDRS?= =?utf-8?B?U3A4d2pSTlh3R0xpZ1Mzbmc0SHV4VDZUMENtTFd5a1lxWHJsY243YTdFU3o2?= =?utf-8?B?MVBOd2d3Ykl1UXhMczlZcUVJSHJnMTZ2Q1JzOXo3VGUxWFZKT1dmeVZEQWFq?= =?utf-8?Q?YEtQSd?=
X-Microsoft-Exchange-Diagnostics: 1; DB5PR07MB1624; 6:pJk6GAqERcZ4Xt7lv7TBn0OYezOIbXBADNgaRDBYhLxYikuIsVaF4HuwVKtUY7xhcnEFj79GdFNcBMv5KQnTBriapdFJVleisIndJ2v5V0zsa5ybE7+vZzjPLUlvcMNr0/64t1t6UYBxnh6NDoDYmextxlx5PiR+woq/Gjb8meGDuKg7bBrChg+afZxZq2AySWNUxCd4LQ2jA2pDJjeDvqLmXaH6nT7XWdxwyEnS1pA/GDvMcn5lwmQN1gtP9UMA5DcecVOed8L2zcHbT8WBg0ZGLmgC7B1l14dgSRv0w1g=; 5:7Z6sWlA4jC3M6ShGRhB7OG89eMoKr9sArBqur6SNiRorpo7Cr68TCyh1gAdpLBkcGaN0+lSAT36qHDhoho5IKgh8ZwEcMYR4z1f3CfodXVo2Ap6uIGtghXHBh7ZabO4jBXQVi8EVq3moiOZ4gACyuQ==; 24:1DRO/4YKYHi75cLAZ4Fj2q67uKL3L119nWeGm1ab/P5FdQkB7si7JBMNDPDbi9DW9J973rEMA3GyNW+QJLN+DK5yjiSYQEwBJkihYrOx68Q=; 7:TWBFgZwul595lXwEQeSkm5GxH6PVe1oN473bj0kBTOnOBXDWZBoVvZ+XNfeemltEZVfk1KgbVNYjBAIUtghRixyQ1zpVBQVJ2i4YV3quXPyY+SRZqMbkKvFfmpuApMyXBjrRFaM0o4H0Pkumj+jlp1rkGezghOtLAA2j+QgI2CuKJNzyg6X0LMnNXtzsElO5GDBkzOhDndQuvqfH2MAZlvMQFmYfXfQRuM7AtEUm+6c/Vnu7o46yH4HShZuLI6X0
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Aug 2016 16:35:43.8345 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB5PR07MB1624
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidr/5okR5eaNswooTs2gP3qRzh-RZEM>
Cc: Rob Austein <sra@hactrn.net>, IETF SIDR <sidr@ietf.org>
Subject: Re: [sidr] Validation reconsidered and X.509v3 extension OIDs
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 16:35:53 -0000

----- Original Message -----
From: "Sean Turner" <sean@sn3rd.com>
To: "t.petch" <ietfc@btconnect.com>
Cc: "Rob Austein" <sra@hactrn.net>et>; "IETF SIDR" <sidr@ietf.org>
Sent: Tuesday, August 02, 2016 2:20 PM
On Aug 02, 2016, at 05:30, t.petch <ietfc@btconnect.com> wrote:
>
> Sean
>
> I am a fan of giving IANA as little a need to think as possible so
would
> prefer the IANA considerations to be more expansive.  With three
> registries being updated, I would like to see three paragraphs and,
with
> five numbers, would like to see TBD1 to TBD5, not TBD times five, e.g.

I guess I’m not as paranoid as you, but #ing the TBDs would definitely
make it clearer to IANA and the RFC where the values are supposed to go.

If “TBD1" is replaces the “TBD" in the 6484 updates section then the 2 &
3 are the modules and 4 and 5 are the extensions.  Revised modules
follow what I think you’re asking for wrt the IANA considerations
section:

<tp>

Sean

Yes, I am paranoid and yes, this looks good to my eyes,

Tom Petch

#.# IANA Considerations

IANA is to add the following to the SMI Security for PKIX Certificate
Policies registry:

Decimal  Description                       References

TBD1   id-cp-ipAddr-asNumber-v2  [this RFC]

IANA is to add the following to the SMI Security for PKIX Module
Identifier registry:

Decimal  Description                       References

TBD2   IPAddrAndASCertExtn-v2  [this RFC]
TBD3   IPAddrAndASCertExtn-2010v2  [this RFC]

IANA is to add the following to the SMI Security for PKIX Certificate
Extension registry:

Decimal  Description                       References

TBD4   id-pe-ipAddrBlocks-v2  [this RFC]
TBD5   id-pe-autonomousSysIds-v2  [this RFC]

#.#  ’88 ASN.1 Module

IPAddrAndASCertExtn-v2 { iso(1) identified-organization(3) dod(6)
            internet(1) security(5) mechanisms(5) pkix(7) mod(0)
            id-mod-ip-addr-and-as-ident-v2(TBD2) }

   DEFINITIONS EXPLICIT TAGS ::=

   BEGIN

   -- EXPORTS ALL --

   IMPORTS

   -- PKIX specific OIDs and arcs --

       id-pe FROM PKIX1Explicit88 { iso(1) identified-organization(3)
                  dod(6) internet(1) security(5) mechanisms(5) pkix(7)
                  id-mod(0) id-pkix1-explicit(18) }

   -- IP Address Block and AS Identifiers Syntax --

IPAddrBlocks, ASIdentifiers FROM  IPAddrAndASCertExtn { iso(1)
            identified-organization(3) dod(6) internet(1) security(5)
            mechanisms(5) pkix(7) mod(0)
id-mod-ip-addr-and-as-ident(30) }
    ;

   -- Validation Reconsidered IP Address Delegation Extension OID --

id-pe-ipAddrBlocks-v2  OBJECT IDENTIFIER ::= { id-pe TBD4 }

   -- Validation Reconsidered IP Address Delegation Extension Syntax --
   -- Syntax is imported from [RFC3779] --

   -- Validation Reconsidered Autonomous System Identifier Delegation
Extension OID --

   id-pe-autonomousSysIds-v2  OBJECT IDENTIFIER ::= { id-pe TBD5 }

   -- Validation Reconsidered Autonomous System Identifier Delegation
Extension Syntax --
   -- Syntax is imported from [RFC3779] --

   END


#.#  ’08 ASN.1 Module

IPAddrAndASCertExtn-2010v2 { iso(1) identified-organization(3) dod(6)
            internet(1) security(5) mechanisms(5) pkix(7) mod(0)
            id-mod-ip-addr-and-as-ident-2v2(TBD3) }

   DEFINITIONS EXPLICIT TAGS ::=

   BEGIN

      EXPORTS ALL;
      IMPORTS

      -- PKIX specific OIDs and arcs —

      id-pe
      FROM PKIX1Explicit-2009
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-mod(0)
          id-mod-pkix1-explicit-02(51)}

      EXTENSION
      FROM PKIX-CommonTypes-2009
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-mod(0)
          id-mod-pkixCommon-02(57)}

   -- IP Address Block and AS Identifiers Syntax --

      IPAddrBlocks, ASIdentifiers
      FROM IPAddrAndASCertExtn-2010
         { iso(1) identified-organization(3) dod(6)
           internet(1) security(5) mechanisms(5) pkix(7) mod(0)
           id-mod-ip-addr-and-as-ident-2(72) }
      ;

      --
      -- Extensions contains the set of extensions defined in this
      -- module
      --
      -- These are intended to be placed in public key certificates
      -- and thus should be added to the CertExtensions extension
      -- set in PKIXImplicit-2009 defined for [RFC5280]
      --

      Extensions EXTENSION ::= {
         ext-pe-ipAddrBlocks-v2 | ext-pe-autonomousSysIds-v2
      }

      -- Validation Reconsidered IP Address Delegation Extension OID —

      ext-pe-ipAddrBlocks-v2 EXTENSION ::= {
        SYNTAX IPAddrBlocks
        IDENTIFIED BY id-pe-ipAddrBlocks-v2
      }

      id-pe-ipAddrBlocks-v2  OBJECT IDENTIFIER ::= { id-pe TBD4 }

      -- IP Address Delegation Extension Syntax —
      -- Syntax is imported from [RFC6268] —

      -- Validation Reconsidered Autonomous System Identifier Delegation
Extension OID —

      ext-pe-autonomousSysIds-v2 EXTENSION ::= {
        SYNTAX ASIdentifiers
        IDENTIFIED BY id-pe-autonomousSysIds-v2
      }

      id-pe-autonomousSysIds OBJECT IDENTIFIER ::= { id-pe TBD5 }

   -- Validation Reconsidered Autonomous System Identifier Delegation
Extension Syntax --
   -- Syntax is imported from [RFC6268] --

   END


> ----- Original Message -----
> From: "Sean Turner" <sean@sn3rd.com>
> To: "Rob Austein" <sra@hactrn.net>et>; "Tim Bruijnzeels" <tim@ripe.net>et>;
> "Russ Housley" <housley@vigilsec.com>
> Cc: "IETF SIDR" <sidr@ietf.org>
> Sent: Tuesday, August 02, 2016 12:28 AM
>
>> On Jul 21, 2016, at 06:36, Tim Bruijnzeels <tim@ripe.net> wrote:
>>
>> Hi Russ,
>>
>> Thank you for the pointers. I am traveling now but I will get back to
> it.
>>
>> Thanks
>> Tim
>>
>>> On 21 Jul 2016, at 10:56, Russ Housley <housley@vigilsec.com> wrote:
>>>
>>>
>>> On Jul 19, 2016, at 9:14 AM, Rob Austein <sra@hactrn.net> wrote:
>>>
>>>> At Tue, 19 Jul 2016 08:43:00 -0400, Russ Housley wrote:
>>>>>
>>>>> Does this apply to the Certificate Policy OID too?  If memory is
>>>>> correct, the current CP has a normative pinter to RFC 3779.
>>>>
>>>> Good catch.
>>>>
>>>> Not sure a policy OID change is necessary, although might be
> simplest.
>>>> If there's a reference, we either need to change the OID or change
> the
>>>> definition of what the OID means.
>>>>
>>>> IIRC, the OpenSSL library code doesn't do anything
RFC-3779-specific
>>>> for the policy OID, it just follows the usual rules; it's the RP
> code
>>>> built on top of the library that demands that particular policy
OID.
>>>> So at least in the OpenSSL case, changing the policy OID may not
> have
>>>> any noticeable effect on correctness of software behavior.
>>>
>>> During the SIDR session today, there seemed to be some confusion
> about which OIDs we are taking about.
>>>
>>> The first two are from RFC 3779.  They appear here in the IANA
> registry:
>>>
>
http://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#smi-number
> s-1.3.6.1.5.5.7.1
>>>
>>> The two OIDs are:
>>> 1.3.6.1.5.5.7.1.7 id-pe-ipAddrBlocks
>>> 1.3.6.1.5.5.7.1.8 id-pe-autonomousSysIds
>>>
>>> In addition, RFC 6484 assigned an OID for the certificate policy.
It
> appears here in the IANA registry:
>>>
>
http://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#smi-number
> s-1.3.6.1.5.5.7.14
>>>
>>> The OID is:
>>> 1.3.6.1.5.5.7.14.2 id-cp-ipAddr-asNumber
>>>
>>> I think this is a very good candidate for early IANA code point
> allocation.  I think that our AD can assist with that.
>>>
>>> Russ
>
> To make sure I’m following along, to address the "Updates: 3779, 6484,
> 6487 (if approved)" changes would the follow changes work:
>
> 0) RFC6484-related changes
>
> If we’re going with two OIDs (one for the original “strict" validation
> and one for new “relaxed” validation), then I’m hoping that we can
just
> define a new OID in s1.2 of RFC 6484 and be done with it (i.e., I hope
> we don’t also have to update s4.1.1, s4.5.1, and s4.7.1 where RFC 3779
> is mentioned).  Here’s some text for a new section:
>
> #.#  Updates to RFC 6484
>
> This section replaces s1.2 of [RFC6484] with the following:
>
> The name of this document is "Certificate Policy (CP) for the Resource
> PKI (RPKI)”.
>
> This policy has been assigned the following two OIDs:
>
>   id-cp-ipAddr-asNumber OBJECT IDENTIFIER ::= { iso(1)
>                         identified-organization(3) dod(6) internet(1)
>                         security(5) mechanisms(5) pkix(7) cp(14) 2 }
>
>   id-cp-ipAddr-asNumber-v2 OBJECT IDENTIFIER ::= { iso(1)
>                         identified-organization(3) dod(6) internet(1)
>                         security(5) mechanisms(5) pkix(7) cp(14) TBD }
>
> id-cp-ipAddr-asNumber and the extensions defined in [RFC3779] indicate
> that the original certification path validation rules are to be used.
> id-cp-ipAddr-asNumber-v2 and the extensions defined in [this document]
> indicate that the validation reconsidered certification path
validation
> rules defined in [this document] are to be used.
>
>
> 1) IANA registrations
>
> We need to register some OIDs with IANA.  Here’s an IANA
considerations
> section (assumes we’re registering a new CP OID - [] references will
be
> to whatever section # it ends up being):
>
> 6. IANA Considerations
>
> IANA is to register the following five OIDs:
>
> - id-cp-ipAddr-asNumber-v2 from [insert Section and #] in the SMI
> Security for PKIX Certificate Policies registry.
>
> - id-pe-ipAddrBlocks-v2 and id-pe-autonomousSysIds-v2 from [insert
> Section and #] in the SMI Security for PKIX Certificate Extension
> registry.
>
> - IPAddrAndASCertExtn-v2 and IPAddrAndASCertExtn-2010v2 from [insert
> Section and #] in the SMI Security for PKIX Module Identifier
registry.
>
> RFC EDITOR: There are two ASN.1 modules both include the same
> assignments for id-pe-ipAddrBlocks-v2 and id-pe-autonomousSysIds-v2,
> i.e., the assignments are made by IANA once and the values are
included
> in the two modules.  Please delete this prior to publication.
>
>
> 2) RFC3799-related changes
>
> As far as RFC 3779 updates go, we probably need to update s2.3 and
s3.3
> as well as add new ASN.1 modules.
>
>
> 2.1) I haven’t got text off the top of my head for the s2.3 and s3.3
> changes.
>
>
> 2.2) As far as the ASN.1-related changes go here’s two ASN.1
module(s).
> The modules define the new OIDs and imports the syntax from
> RFC3779/RFC6268.  The basic idea is to keep the modules as short as
> possible.  The 2nd module is for the ’08 ASN.1 that was defined in RFC
> 6268 to be used with RFC5911/5912.
>
> #.#  ’88 ASN.1 Module
>
> IPAddrAndASCertExtn-v2 { iso(1) identified-organization(3) dod(6)
>            internet(1) security(5) mechanisms(5) pkix(7) mod(0)
>            id-mod-ip-addr-and-as-ident-v2(TBD) }
>
>   DEFINITIONS EXPLICIT TAGS ::=
>
>   BEGIN
>
>   -- EXPORTS ALL --
>
>   IMPORTS
>
>   -- PKIX specific OIDs and arcs --
>
>       id-pe FROM PKIX1Explicit88 { iso(1) identified-organization(3)
>                  dod(6) internet(1) security(5) mechanisms(5) pkix(7)
>                  id-mod(0) id-pkix1-explicit(18) }
>
>   -- IP Address Block and AS Identifiers Syntax --
>
> IPAddrBlocks, ASIdentifiers FROM  IPAddrAndASCertExtn { iso(1)
>            identified-organization(3) dod(6) internet(1) security(5)
>            mechanisms(5) pkix(7) mod(0)
> id-mod-ip-addr-and-as-ident(30) }
>    ;
>
>   -- Validation Reconsidered IP Address Delegation Extension OID --
>
> id-pe-ipAddrBlocks-v2  OBJECT IDENTIFIER ::= { id-pe TBD }
>
>   -- Validation Reconsidered IP Address Delegation Extension Syntax --
>   -- Syntax is imported from [RFC3779] --
>
>   -- Validation Reconsidered Autonomous System Identifier Delegation
> Extension OID --
>
>   id-pe-autonomousSysIds-v2  OBJECT IDENTIFIER ::= { id-pe TBD }
>
>   -- Validation Reconsidered Autonomous System Identifier Delegation
> Extension Syntax --
>   -- Syntax is imported from [RFC3779] --
>
>   END
>
>
> #.#  ’08 ASN.1 Module
>
> IPAddrAndASCertExtn-2010v2 { iso(1) identified-organization(3) dod(6)
>            internet(1) security(5) mechanisms(5) pkix(7) mod(0)
>            id-mod-ip-addr-and-as-ident-2v2(TBD) }
>
>   DEFINITIONS EXPLICIT TAGS ::=
>
>   BEGIN
>
>      EXPORTS ALL;
>      IMPORTS
>
>      -- PKIX specific OIDs and arcs —
>
>      id-pe
>      FROM PKIX1Explicit-2009
>        { iso(1) identified-organization(3) dod(6) internet(1)
>          security(5) mechanisms(5) pkix(7) id-mod(0)
>          id-mod-pkix1-explicit-02(51)}
>
>      EXTENSION
>      FROM PKIX-CommonTypes-2009
>        { iso(1) identified-organization(3) dod(6) internet(1)
>          security(5) mechanisms(5) pkix(7) id-mod(0)
>          id-mod-pkixCommon-02(57)}
>
>   -- IP Address Block and AS Identifiers Syntax --
>
>      IPAddrBlocks, ASIdentifiers
>      FROM IPAddrAndASCertExtn-2010
>         { iso(1) identified-organization(3) dod(6)
>           internet(1) security(5) mechanisms(5) pkix(7) mod(0)
>           id-mod-ip-addr-and-as-ident-2(72) }
>      ;
>
>      --
>      -- Extensions contains the set of extensions defined in this
>      -- module
>      --
>      -- These are intended to be placed in public key certificates
>      -- and thus should be added to the CertExtensions extension
>      -- set in PKIXImplicit-2009 defined for [RFC5280
> <https://tools.ietf.org/html/rfc5280>]
>      --
>
>      Extensions EXTENSION ::= {
>         ext-pe-ipAddrBlocks-v2 | ext-pe-autonomousSysIds-v2
>      }
>
>      -- Validation Reconsidered IP Address Delegation Extension OID —
>
>      ext-pe-ipAddrBlocks-v2 EXTENSION ::= {
>        SYNTAX IPAddrBlocks
>        IDENTIFIED BY id-pe-ipAddrBlocks-v2
>      }
>
>      id-pe-ipAddrBlocks-v2  OBJECT IDENTIFIER ::= { id-pe TBD }
>
>      -- IP Address Delegation Extension Syntax —
>      -- Syntax is imported from [RFC6268] —
>
>      -- Validation Reconsidered Autonomous System Identifier
Delegation
> Extension OID —
>
>      ext-pe-autonomousSysIds-v2 EXTENSION ::= {
>        SYNTAX ASIdentifiers
>        IDENTIFIED BY id-pe-autonomousSysIds-v2
>      }
>
>      id-pe-autonomousSysIds OBJECT IDENTIFIER ::= { id-pe TBD }
>   -- Validation Reconsidered Autonomous System Identifier Delegation
> Extension Syntax --
>   -- Syntax is imported from [RFC6268] --
>
>   END
>
> 2.3) If we want to be really ambitious, then right after the ASN.1
> modules are included in the draft we could request the WG chairs start
> an early IANA allocation request for these OID ;)
>
> Cheers,
>
> spt
>
>
>
>
> ----------------------------------------------------------------------
--
> --------
>
>
>> _______________________________________________
>> sidr mailing list
>> sidr@ietf.org
>> https://www.ietf.org/mailman/listinfo/sidr
>>
>