Re: [sidr] Validation reconsidered and X.509v3 extension OIDs

t.petch <ietfc@btconnect.com> Tue, 02 August 2016 09:33 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC7D812D1BE for <sidr@ietfa.amsl.com>; Tue, 2 Aug 2016 02:33:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BcD2Lv1yV0Ki for <sidr@ietfa.amsl.com>; Tue, 2 Aug 2016 02:33:46 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0121.outbound.protection.outlook.com [104.47.0.121]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8081912D10F for <sidr@ietf.org>; Tue, 2 Aug 2016 02:33:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=/ZINeN66FYOE6LfHQYLQR+N3C2IriH2wE/ogf7pZ8aw=; b=RJ7rxwYpzNm11Nsf2iUqsx0pQBAOqoigTxunpA2SYbYAsd41ADviuQTidEiYKDfVqr0Y3ji0G+iaVqWBpC3nP6rQE+vtOIi21HY15tys8qUxptgU0ACwUWsZ/XQVHTqXDLQvgV8MWRnNPVKTJHdFmVudfUJCpGq3hSmf14r4PTw=
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com;
Received: from pc6 (31.50.86.164) by HE1PR07MB1625.eurprd07.prod.outlook.com (10.166.124.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.549.15; Tue, 2 Aug 2016 09:33:29 +0000
Message-ID: <00c501d1eca0$8fd24660$4001a8c0@gateway.2wire.net>
From: t.petch <ietfc@btconnect.com>
To: Sean Turner <sean@sn3rd.com>, Rob Austein <sra@hactrn.net>
References: <20160719111830.12A97412B25E@minas-ithil.hactrn.net> <F64A0698-6461-489E-99B9-4A75421C04DA@vigilsec.com> <20160719131456.D0705412C916@minas-ithil.hactrn.net> <A76F3C48-64F0-48A3-938E-D2362A909664@vigilsec.com> <173EB2A5-1F28-4108-9D91-B3D1C2B3126C@ripe.net> <2F66A19D-8ADD-496A-A1A6-61D8277DAF4C@sn3rd.com>
Date: Tue, 2 Aug 2016 10:30:44 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
X-Originating-IP: [31.50.86.164]
X-ClientProxiedBy: DB4PR05CA0037.eurprd05.prod.outlook.com (10.160.40.47) To HE1PR07MB1625.eurprd07.prod.outlook.com (10.166.124.21)
X-MS-Office365-Filtering-Correlation-Id: 7a770cdf-ab9b-451c-7755-08d3bab8105c
X-Microsoft-Exchange-Diagnostics: 1; HE1PR07MB1625; 2:7IjKgY6t6qhS/4aVAek2iFjY5Yvq6BTcN70a7E934b5ansHAbbc+5EqCoHHEMcyxCrzF4NiwrrMDHNugKOS5mDwuHnsiZOMepEoNzx/Jo6iqtLVUChsKN9bu6dmE4JkIbri310zmTYmlfZ9mQLnofyyV1H+XdfZBhB+z55hFa1WiGGajduQvXt9aINmxA7D8; 3:ksXnRTOPfYHmXLNigYwPfpCXbVrwf8aCVtKKT9/BrohSdV0LxhR0R4lEZ6Q75blfvwRjSBBbIGwEiMOXJJ/7nExODK7hOxVAp0SlNHc10S2MGwXssy5qXtc2fkKPhs6I
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:HE1PR07MB1625;
X-Microsoft-Exchange-Diagnostics: 1; HE1PR07MB1625; 25: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
X-Microsoft-Exchange-Diagnostics: 1; HE1PR07MB1625; 31:eWACwuzAonGQuFJWWGGeeY82fP2R1O1DnwCwfnYZj8eel6HVC7jHZVRQwGJKla+gm6sUKWvhL28vWA0yN1qnwwfyOkNlVOCpjFDcZHpqXXxNmRSDu6iWqTZd7hmBwuun1FK0VR5yUnQ7IcTnROmzEsjrAuGvU0GgHm8Ir71+yT4XwMQ3NwKlNXjAEDeX+G/TlzJRNTlIfektEKnmkSGcBmJzEBkFeMvWudAnFTr59x4=; 4:QXE53zGiLtxjldrSIJEqFsS9h/P5O/1rCYZdkeN7eaxPsasMjOLA4R1ii3ejDVEEfAN1Z/pdeaaJHOAuuxiumbg99JD2iPbnYdvoCK9XG0RmtDzzYNCC0AdYvYgQ81WYAWwAe4Eo6P4b/8yeLjPS6ZLcYJbt4h8fn2gvAA6TVqDb4yXJ+zCbSwdRoBPvE132XXFpzfQhtLkEc4WGFnSxD0Gr+1Co6daMyY9jJ14i89bMaKW+rpnMhHJsmrpHU6cChwc1yP9sE0NxXkdSym14Zzx37Sfcn/FdemjX9C4SLOHkWg2ru6PBhF9u0ZhnD2N2TW2vfCG5eL4/y34tDFSJre9z/E+26P+a9Sr8aaiXL3Ogk937prNzGVb2lBVtMYm+uJTk4DxQIG5Oa6CNDgHIi8EeqgZQjQy4R231ldiz1M3/xmSUEecneAN2VDv49rUQ
X-Microsoft-Antispam-PRVS: <HE1PR07MB162586679C08867C097EE208A0050@HE1PR07MB1625.eurprd07.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(1591387915157);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001); SRVR:HE1PR07MB1625; BCL:0; PCL:0; RULEID:; SRVR:HE1PR07MB1625;
X-Forefront-PRVS: 0022134A87
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(4630300001)(6009001)(7916002)(24454002)(377454003)(51444003)(189002)(13464003)(199003)(81166006)(33646002)(7846002)(586003)(3846002)(92566002)(5001770100001)(44736004)(7736002)(6116002)(116806002)(62236002)(2906002)(15975445007)(81156014)(305945005)(106356001)(44716002)(47776003)(23676002)(345774005)(50466002)(14496001)(8676002)(86362001)(97736004)(93886004)(50986999)(68736007)(9686002)(76176999)(189998001)(81686999)(105586002)(81816999)(4326007)(84392002)(66066001)(50226002)(1456003)(19580405001)(2870700001)(1556002)(19580395003)(42186005)(101416001)(77096005)(61296003)(74416001)(7726001)(4720700001)(19627235001); DIR:OUT; SFP:1102; SCL:1; SRVR:HE1PR07MB1625; H:pc6; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:0; LANG:en;
Received-SPF: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtIRTFQUjA3TUIxNjI1OzIzOjRadHdMRWV3eXBta3Z1N1ZRN2V3MzN4RXIr?= =?utf-8?B?WU1sUjhteVBULzIzQUJ4T2ErN3pQTDhoVUkxRkJIb0lxb3BlQ2QrSDhISlB5?= =?utf-8?B?NmRpd1Q5ZnlZZmthRktES3NURWROaURHQVJVdHBpMXJKTU5YZERnVVdHWit4?= =?utf-8?B?TXdscEV0S3ZsTy9CdEplVUlDTEF6OGxwQStHWFdYTk9PRnJQcmt5eE03WUhj?= =?utf-8?B?Qk01azdjYkd3bS9kZGRKekllWld0NVlZMHVUWUxabzExaDQ3d041QjZ0OHlt?= =?utf-8?B?STA2a1AzRkVBbTZzYm9PVnFqcmlYNzNFUXJhV1hyTWFQNENYUGFEQi84R3ly?= =?utf-8?B?b1BkUlcyNWxrUWMvWkw3bHFnVkZrMzN4UWpZTUtmV0tORVo2WlBJRmRmUEJH?= =?utf-8?B?VXdqKzI3RnRzNGZtUy9xQnpRWXU1Y0FrTjJDeExmaTYzL0MxaWN3eHFZeGJG?= =?utf-8?B?bEx4c1JMc0hCYkI2RUdHWFZTSGdISUlrbTFISXRZZ0M1eThCbldZb0hUZDBs?= =?utf-8?B?RlE5MmhtZlpPd0NkeHd3ZlFwcVQzb0QrbS93a29IdUhGVGdvWHM2ZGpROVVq?= =?utf-8?B?a0kxRHRDZUoyTVVmc1ROT05RK0IvTGw4YlV0alZRbW1jdVRZQUhVcDVBbW1y?= =?utf-8?B?RU4wWXlxZmlISHFzb3ZEek9aRG1KUjd3MEYzT3dyOEVreXBGZnM1eTFPb2pq?= =?utf-8?B?NUFVRVFxQWZudFliSWc0bFZZUitNaFBiaTVwWENmaEJvM2dVcDhBenFiOFhF?= =?utf-8?B?VUx6MlZsVGRlWCtqTWlDVW9NMGw5NE5GNXIzZElLWlN6VXhEaHhuR2NpNVJG?= =?utf-8?B?S3JTVDVzNTgwVU81eHQzN2xjU0JLRUJ2VDgxNVVzUTQvZVBvRHc4Z1hoUFVY?= =?utf-8?B?bmZNbFBRc3lUeTVFR0Z1cWpycGEvTkROM1N2anpoYmFFNk9WUHZzWkZ5Sm1j?= =?utf-8?B?dXoySkRTNEN2Y2NoSnhHQVVyMjVZU3FmYkIzbGsvMDVYZHhpYkhsTTlJZGdi?= =?utf-8?B?NDZQUVFlWVVTeTgxZnRuSFdkelJwaGVST1JDUE92RkZmR0liUnN3NmM1dVUv?= =?utf-8?B?WTVNbzhNWnlBUkxtMkxFemwyaGFBR01UY2RCdmh6QldnRjR0b1VweG9mZjR6?= =?utf-8?B?d2hRT0FNYURpdmUxZFVhQkNnMWlUMWNJZ0E2NzVxdDNxL2Rya1lPRElvcTZY?= =?utf-8?B?dEVIV2JOaDM4dnRtMGdGbTVwckp6U0Q1Nld4OTczRno0WEx5Q25ZQWZzQlNP?= =?utf-8?B?a1RUdWRrVXRuUzZQNFdraVBrZFQ0RDZObksrSXIvWjgvaFUvckJoNEVDU2cw?= =?utf-8?B?Z3h2RFl5Mk5MN1VQeUlHYy9xb0FoemNmOWt6UE5SL3E3Q1BiQVlZZThpY2tp?= =?utf-8?B?NDJON3JjQTlSbitWR09kYnEvWEF0d3NCcEZOZ3EzaDlHc2dlejdIRUYwaHhs?= =?utf-8?B?aFZDNnZpYlAwN2Z0WUthbUFVTDRIdW5xeEJUUFVQYWYzd2d3Q3RKak5sK0sv?= =?utf-8?B?M3B4TkpSeXJYN0NEYzlXbXBoNExzTllXa25iM0lnRjFERUQ5ME1uWnA0ODNT?= =?utf-8?B?NVBFd3ZORmFjUXBlRVZQckRoRUZiOEVSV0NpV0Q5ais3Yi9CV01Gcmdhb1dJ?= =?utf-8?B?T1YyYTF4Q3pvN3JvUzR3RnhjVkQ2d2NmekZRUFFFZFJvNmJxOHFabmI2eXBo?= =?utf-8?B?dklFVkNGSVB5ckxYQXJTOWdrQ2VjbkdqK0FkN2NWeXQreGxHKy9DbXF2SFVQ?= =?utf-8?B?SnJoNDBsbGdkTngxL1BWajUzQ3NoZlpqbzF4L25JNlVtQ0M2Uko0VmxSbGcz?= =?utf-8?B?ZWlFQkRaRWFxcG9JamRxaU02bWp2WVkzTWlIaXhCQ25ITDBBTHpzd2oyc2FQ?= =?utf-8?B?OXptQVpqQzZxZVBPVG1UTjR3OHNDSTZUcWFYcXI1UDJLbjVtODRBOFdtU29k?= =?utf-8?B?bnptdE5GTXZ3Um5ER1hjaTIyM3F1eXRYNnBOMlVLUjJ0K21Wa1FqVGppenli?= =?utf-8?B?VWdJTnc4SUFyZE5xUkVQNTBoVHRtc0RaVXpEZz09?=
X-Microsoft-Exchange-Diagnostics: 1; HE1PR07MB1625; 6:Bw9C66I8MAWv6yv/NBUob2SYMNwuWr4kXAmPiiz12wN/Ej9TClx0ewOg1pUX0K/4ceM5k8rPGx7pxz6VuPj/Q/k7Wcsz4GIlWyxmujaBlmpgk785vaLDAMw7pKP0CbjVMGkKQ5+p8XGk2omY96KkrFeo/osfdBhwHp66nP04u5+l4M9nUHmF2w4jYWKBz5rAbdMKoIFf5dePTj493hdFGctERlFYHqDlumdi9LJKl/i1ACxrLhuknKH3WDN9g/jpCMe48AXT2U0Yf4e8tdHZ1xEqV2XZChzRF6KQhMNkWII=; 5:66XmEaJh7jy4pCoRKYlstQ7sDp5PBImyY95UHLDuTFhYHtJD65Iltw/S67QMNZ1eFUI4NtS83b+qvnYvUuBByEICLuzos0/2+3UW4Ln2GvVoVhrxVt2wQMqXE7f6WCsH4zhq0mPa4pSZDwk8eMnU3g==; 24:ZykMrtgvuALQbUQMUXw2MTiK+LadC3Vmy05/AtyIAltluTmbDZwSxDC9fDN29f47Yna/EziPeFhe0OfW7e6ID8W3Nmqd0a/i8cch/H8wb30=; 7:TXZeHMVzvsTPUxRxln/2cvU3WvIpwB+lPVV03jAyn1aJ4vo7JeFrWmgSfVMmHpwZ6KqhXIgzzMqM66E/KQQA7TTq8WMmxUd2qH8TLXENWAhGrJOL+YvwZaHFozmMoWqUyt409SicCfes7nP9sTU2n5LXcISqPE8u4z77qhjYcVIYNX4gYEDoBafZE5NR30Fzaeil0cFmcEKGfX5YdoC1WrynMSBb2JMFxj9X+Df81KbBZhow6aROS47sEeibWOmm
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Aug 2016 09:33:29.4970 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB1625
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidr/6OO6DF6m2TWjGPxzq6O0zr3Nhgs>
Cc: IETF SIDR <sidr@ietf.org>
Subject: Re: [sidr] Validation reconsidered and X.509v3 extension OIDs
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2016 09:33:49 -0000

Sean

I am a fan of giving IANA as little a need to think as possible so would
prefer the IANA considerations to be more expansive.  With three
registries being updated, I would like to see three paragraphs and, with
five numbers, would like to see TBD1 to TBD5, not TBD times five, e.g.

IANA is asked to add to the SMI Security for PKIX Certificate Policies
registry.

Decimal  Description                       References

TBD1   id-cp-ipAddr-asNumber-v2  [this RFC]

coupled with

  id-cp-ipAddr-asNumber-v2 OBJECT IDENTIFIER ::= { iso(1)
                         identified-organization(3) dod(6) internet(1)
                         security(5) mechanisms(5) pkix(7) cp(14) TBD1 }

replacing the TBD1 if an early allocation succeeds.

Tom Petch

----- Original Message -----
From: "Sean Turner" <sean@sn3rd.com>
To: "Rob Austein" <sra@hactrn.net>et>; "Tim Bruijnzeels" <tim@ripe.net>et>;
"Russ Housley" <housley@vigilsec.com>
Cc: "IETF SIDR" <sidr@ietf.org>
Sent: Tuesday, August 02, 2016 12:28 AM

> On Jul 21, 2016, at 06:36, Tim Bruijnzeels <tim@ripe.net> wrote:
>
> Hi Russ,
>
> Thank you for the pointers. I am traveling now but I will get back to
it.
>
> Thanks
> Tim
>
>> On 21 Jul 2016, at 10:56, Russ Housley <housley@vigilsec.com> wrote:
>>
>>
>> On Jul 19, 2016, at 9:14 AM, Rob Austein <sra@hactrn.net> wrote:
>>
>>> At Tue, 19 Jul 2016 08:43:00 -0400, Russ Housley wrote:
>>>>
>>>> Does this apply to the Certificate Policy OID too?  If memory is
>>>> correct, the current CP has a normative pinter to RFC 3779.
>>>
>>> Good catch.
>>>
>>> Not sure a policy OID change is necessary, although might be
simplest.
>>> If there's a reference, we either need to change the OID or change
the
>>> definition of what the OID means.
>>>
>>> IIRC, the OpenSSL library code doesn't do anything RFC-3779-specific
>>> for the policy OID, it just follows the usual rules; it's the RP
code
>>> built on top of the library that demands that particular policy OID.
>>> So at least in the OpenSSL case, changing the policy OID may not
have
>>> any noticeable effect on correctness of software behavior.
>>
>> During the SIDR session today, there seemed to be some confusion
about which OIDs we are taking about.
>>
>> The first two are from RFC 3779.  They appear here in the IANA
registry:
>>
http://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#smi-number
s-1.3.6.1.5.5.7.1
>>
>> The two OIDs are:
>> 1.3.6.1.5.5.7.1.7 id-pe-ipAddrBlocks
>> 1.3.6.1.5.5.7.1.8 id-pe-autonomousSysIds
>>
>> In addition, RFC 6484 assigned an OID for the certificate policy.  It
appears here in the IANA registry:
>>
http://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#smi-number
s-1.3.6.1.5.5.7.14
>>
>> The OID is:
>> 1.3.6.1.5.5.7.14.2 id-cp-ipAddr-asNumber
>>
>> I think this is a very good candidate for early IANA code point
allocation.  I think that our AD can assist with that.
>>
>> Russ

To make sure I’m following along, to address the "Updates: 3779, 6484,
6487 (if approved)" changes would the follow changes work:

0) RFC6484-related changes

If we’re going with two OIDs (one for the original “strict" validation
and one for new “relaxed” validation), then I’m hoping that we can just
define a new OID in s1.2 of RFC 6484 and be done with it (i.e., I hope
we don’t also have to update s4.1.1, s4.5.1, and s4.7.1 where RFC 3779
is mentioned).  Here’s some text for a new section:

#.#  Updates to RFC 6484

This section replaces s1.2 of [RFC6484] with the following:

The name of this document is "Certificate Policy (CP) for the Resource
PKI (RPKI)”.

This policy has been assigned the following two OIDs:

   id-cp-ipAddr-asNumber OBJECT IDENTIFIER ::= { iso(1)
                         identified-organization(3) dod(6) internet(1)
                         security(5) mechanisms(5) pkix(7) cp(14) 2 }

   id-cp-ipAddr-asNumber-v2 OBJECT IDENTIFIER ::= { iso(1)
                         identified-organization(3) dod(6) internet(1)
                         security(5) mechanisms(5) pkix(7) cp(14) TBD }

id-cp-ipAddr-asNumber and the extensions defined in [RFC3779] indicate
that the original certification path validation rules are to be used.
id-cp-ipAddr-asNumber-v2 and the extensions defined in [this document]
indicate that the validation reconsidered certification path validation
rules defined in [this document] are to be used.


1) IANA registrations

We need to register some OIDs with IANA.  Here’s an IANA considerations
section (assumes we’re registering a new CP OID - [] references will be
to whatever section # it ends up being):

6. IANA Considerations

IANA is to register the following five OIDs:

- id-cp-ipAddr-asNumber-v2 from [insert Section and #] in the SMI
Security for PKIX Certificate Policies registry.

- id-pe-ipAddrBlocks-v2 and id-pe-autonomousSysIds-v2 from [insert
Section and #] in the SMI Security for PKIX Certificate Extension
registry.

- IPAddrAndASCertExtn-v2 and IPAddrAndASCertExtn-2010v2 from [insert
Section and #] in the SMI Security for PKIX Module Identifier registry.

RFC EDITOR: There are two ASN.1 modules both include the same
assignments for id-pe-ipAddrBlocks-v2 and id-pe-autonomousSysIds-v2,
i.e., the assignments are made by IANA once and the values are included
in the two modules.  Please delete this prior to publication.


2) RFC3799-related changes

As far as RFC 3779 updates go, we probably need to update s2.3 and s3.3
as well as add new ASN.1 modules.


2.1) I haven’t got text off the top of my head for the s2.3 and s3.3
changes.


2.2) As far as the ASN.1-related changes go here’s two ASN.1 module(s).
The modules define the new OIDs and imports the syntax from
RFC3779/RFC6268.  The basic idea is to keep the modules as short as
possible.  The 2nd module is for the ’08 ASN.1 that was defined in RFC
6268 to be used with RFC5911/5912.

#.#  ’88 ASN.1 Module

IPAddrAndASCertExtn-v2 { iso(1) identified-organization(3) dod(6)
            internet(1) security(5) mechanisms(5) pkix(7) mod(0)
            id-mod-ip-addr-and-as-ident-v2(TBD) }

   DEFINITIONS EXPLICIT TAGS ::=

   BEGIN

   -- EXPORTS ALL --

   IMPORTS

   -- PKIX specific OIDs and arcs --

       id-pe FROM PKIX1Explicit88 { iso(1) identified-organization(3)
                  dod(6) internet(1) security(5) mechanisms(5) pkix(7)
                  id-mod(0) id-pkix1-explicit(18) }

   -- IP Address Block and AS Identifiers Syntax --

IPAddrBlocks, ASIdentifiers FROM  IPAddrAndASCertExtn { iso(1)
            identified-organization(3) dod(6) internet(1) security(5)
            mechanisms(5) pkix(7) mod(0)
id-mod-ip-addr-and-as-ident(30) }
    ;

   -- Validation Reconsidered IP Address Delegation Extension OID --

id-pe-ipAddrBlocks-v2  OBJECT IDENTIFIER ::= { id-pe TBD }

   -- Validation Reconsidered IP Address Delegation Extension Syntax --
   -- Syntax is imported from [RFC3779] --

   -- Validation Reconsidered Autonomous System Identifier Delegation
Extension OID --

   id-pe-autonomousSysIds-v2  OBJECT IDENTIFIER ::= { id-pe TBD }

   -- Validation Reconsidered Autonomous System Identifier Delegation
Extension Syntax --
   -- Syntax is imported from [RFC3779] --

   END


#.#  ’08 ASN.1 Module

IPAddrAndASCertExtn-2010v2 { iso(1) identified-organization(3) dod(6)
            internet(1) security(5) mechanisms(5) pkix(7) mod(0)
            id-mod-ip-addr-and-as-ident-2v2(TBD) }

   DEFINITIONS EXPLICIT TAGS ::=

   BEGIN

      EXPORTS ALL;
      IMPORTS

      -- PKIX specific OIDs and arcs —

      id-pe
      FROM PKIX1Explicit-2009
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-mod(0)
          id-mod-pkix1-explicit-02(51)}

      EXTENSION
      FROM PKIX-CommonTypes-2009
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-mod(0)
          id-mod-pkixCommon-02(57)}

   -- IP Address Block and AS Identifiers Syntax --

      IPAddrBlocks, ASIdentifiers
      FROM IPAddrAndASCertExtn-2010
         { iso(1) identified-organization(3) dod(6)
           internet(1) security(5) mechanisms(5) pkix(7) mod(0)
           id-mod-ip-addr-and-as-ident-2(72) }
      ;

      --
      -- Extensions contains the set of extensions defined in this
      -- module
      --
      -- These are intended to be placed in public key certificates
      -- and thus should be added to the CertExtensions extension
      -- set in PKIXImplicit-2009 defined for [RFC5280
<https://tools.ietf.org/html/rfc5280>]
      --

      Extensions EXTENSION ::= {
         ext-pe-ipAddrBlocks-v2 | ext-pe-autonomousSysIds-v2
      }

      -- Validation Reconsidered IP Address Delegation Extension OID —

      ext-pe-ipAddrBlocks-v2 EXTENSION ::= {
        SYNTAX IPAddrBlocks
        IDENTIFIED BY id-pe-ipAddrBlocks-v2
      }

      id-pe-ipAddrBlocks-v2  OBJECT IDENTIFIER ::= { id-pe TBD }

      -- IP Address Delegation Extension Syntax —
      -- Syntax is imported from [RFC6268] —

      -- Validation Reconsidered Autonomous System Identifier Delegation
Extension OID —

      ext-pe-autonomousSysIds-v2 EXTENSION ::= {
        SYNTAX ASIdentifiers
        IDENTIFIED BY id-pe-autonomousSysIds-v2
      }

      id-pe-autonomousSysIds OBJECT IDENTIFIER ::= { id-pe TBD }
   -- Validation Reconsidered Autonomous System Identifier Delegation
Extension Syntax --
   -- Syntax is imported from [RFC6268] --

   END

2.3) If we want to be really ambitious, then right after the ASN.1
modules are included in the draft we could request the WG chairs start
an early IANA allocation request for these OID ;)

Cheers,

spt




------------------------------------------------------------------------
--------


> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
>