Re: [sidr] Terry Manderson's Discuss on draft-ietf-sidr-rfc6485bis-04: (with DISCUSS)

Sandra Murphy <sandy@tislabs.com> Sat, 05 December 2015 05:29 UTC

Return-Path: <sandy@tislabs.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB2EF1A0334; Fri, 4 Dec 2015 21:29:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6i-qhV-sehI1; Fri, 4 Dec 2015 21:29:32 -0800 (PST)
Received: from walnut.tislabs.com (walnut.tislabs.com [192.94.214.200]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E40C51A0338; Fri, 4 Dec 2015 21:29:31 -0800 (PST)
Received: from nova.tislabs.com (unknown [10.66.1.77]) by walnut.tislabs.com (Postfix) with ESMTP id 2321D28B0041; Sat, 5 Dec 2015 00:29:31 -0500 (EST)
Received: from [IPv6:::1] (localhost.localdomain [127.0.0.1]) by nova.tislabs.com (Postfix) with ESMTP id A9BB41F801E; Sat, 5 Dec 2015 00:29:30 -0500 (EST)
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
Content-Type: multipart/signed; boundary="Apple-Mail=_B524D8EB-448B-4220-BD9A-3801BB67DE2A"; protocol="application/pgp-signature"; micalg="pgp-sha512"
X-Pgp-Agent: GPGMail 2.5.1
From: Sandra Murphy <sandy@tislabs.com>
In-Reply-To: <D274CFE7.7267B%terry.manderson@icann.org>
Date: Sat, 05 Dec 2015 00:29:29 -0500
Message-Id: <34A163BE-44D1-4994-AEFA-9F09CD0C28AE@tislabs.com>
References: <20151118020907.790.34242.idtracker@ietfa.amsl.com> <938892D5-919F-4C61-B518-7145CB40A05B@tislabs.com> <D274CFE7.7267B%terry.manderson@icann.org>
To: sidr <sidr@ietf.org>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/9E0dcM1S6RdLtbAWRJNd0XBHkmM>
Cc: "draft-ietf-sidr-rfc6485bis@ietf.org" <draft-ietf-sidr-rfc6485bis@ietf.org>, "sidr-chairs@ietf.org" <sidr-chairs@ietf.org>, Sandra Murphy <sandy@tislabs.com>
Subject: Re: [sidr] Terry Manderson's Discuss on draft-ietf-sidr-rfc6485bis-04: (with DISCUSS)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Dec 2015 05:29:34 -0000

The AD, the chairs and the authors have discussed the draft change suggested below.

To summarize:  The language Terry’s DISCUSS objects to is SHOULD recommendations of how to handle algorithm transitions, and being SHOULD only, leads to potential differences in implementation and operation choice.  RFC6916 made much more stringent descriptions of algorithm transition and mandates certain actions.  RFC6916 was published a year after RFC6485 and rfc6485bis attempts to meld the two by pointing to it, but leaves the SHOULD language in place.

The decision of AD, chairs and authors is that the wg consensus for rfc6485bis was focussed on the OID problem, so it could not be said that this section was carefully considered by the wg.

So the draft draft-ietf-sidr-rfc6485bis-04 is being returned to the wg to address this problem and then to do a wglc (and IETF Last Call) before it is returned to the IESG.


—Sandy, speaking as one of the co-chairs


On Nov 19, 2015, at 10:59 PM, Terry Manderson <terry.manderson@icann.org> wrote:

> Hi Sandy,
> 
> 
> On 20/11/2015 4:27 am, "Sandra Murphy" <sandy@tislabs.com> wrote:
> 
>> A bit of history here.
>> 
>> After RFC6485 was published, it was discovered that it incorrectly used
>> the same OID for all RPKI crypto uses, which conflicts with CMS specs and
>> is inconsistent with known implementations.
> 
> I am aware of that.
> 
>> 
>> The wg decided to create RFC6485bis, to correct the OID problem and the
>> OID problem only, with emphasis on the ³only².
> 
> Timeline leap is not your friend here. 6485 pre-dates 6916. 6485 is
> minimalist (and from a point of view, wrong) about algorithm changes.
> 
>> 
>> The ³SHOULD² language in section 5 is inherited from RFC6485, except for:
>> 
>>  The recommended
>>  procedures to implement such a transition of key sizes and algorithms
>>  is specified in [RFC6916]
>> 
>> RFC6916, which was published a year after RFC6485, is "Algorithm Agility
>> Procedure for the Resource Public Key Infrastructure (RPKI)².  It
>> describes the procedure to follow in transitioning from one algorithm/key
>> size to another.
> 
> Correct. It was this text that drew me to the section. And since the text
> pre-dates 6916, which takes a more encompassing view of an
> algorithm/profile change with a security section that adequately warns of
> invalidity due to a RP not supporting the new certificate profile, I view
> 6916 as more 'with the times' (YMMV).
> 
> 
>> 
>> Does RFC6916 satisfy your concerns about a change of algorithm?
> 
> It does a better job that allowing a CA or RP to opt out and fracture the
> RPKI.
> 
>> 
>> Would you prefer that RFC6485bis remove the inherited ³SHOULD² language
>> and point only to RFC6916?
> 
> Yes, That is certainly one way to address this. And I would be OK with
> that.
> 
> 
> Cheers
> Terry
> 
>> 
>> ‹Sandy
>> 
>> On Nov 17, 2015, at 9:09 PM, Terry Manderson <terry.manderson@icann.org>
>> wrote:
>> 
>>> Terry Manderson has entered the following ballot position for
>>> draft-ietf-sidr-rfc6485bis-04: Discuss
>>> 
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>> 
>>> 
>>> Please refer to
>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>> for more information about IESG DISCUSS and COMMENT positions.
>>> 
>>> 
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/
>>> 
>>> 
>>> 
>>> ----------------------------------------------------------------------
>>> DISCUSS:
>>> ----------------------------------------------------------------------
>>> 
>>> I'm not so sure that this will be an easy DISCUSS to work through as I
>>> view this in light of future sustainability/deployability of RPKI and
>>> any
>>> protocol wedded to it (eg BGPSEC).
>>> 
>>> Section 5 "Additional Requirements" suggests that both CAs and RPs
>>> "SHOULD" be capable of supporting a transition and thus able to support
>>> multiple RPKI alg. and key profiles. To me this "SHOULD" seems like it
>>> invites fragility in any such transition. An immediate example would be
>>> the root DNSSEC ksk rollover. An rather large amount of work is underway
>>> to ascertain the impact. By leaving the SHOULDs in place is this walking
>>> the same path?
>>> 
>>> Let me ask another way. Under what situations is it actually appropriate
>>> for a CA or RP to be able to ignore the requirement of being able to
>>> support a phased introduction/deprecation of new/different RPKI
>>> algorithm
>>> and key profiles? And if they ignore such a recommendation does this
>>> make
>>> the entire RPKI infrastructure a fractured PKI by algorithm?
>>> 
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> sidr mailing list
>>> sidr@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sidr
>> 
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr