Re: [sidr] WGLC: draft-ietf-sidr-rtr-keying - finishes - 10/16/2017 - Oct 16, 2017

"Borchert, Oliver (Fed)" <> Tue, 17 October 2017 19:50 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 68C4A132705; Tue, 17 Oct 2017 12:50:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id at0ICinG9BgI; Tue, 17 Oct 2017 12:49:50 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 18C25132355; Tue, 17 Oct 2017 12:49:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=6SJiJzOcxc5/jFvUu10m9ycSnjkZvgsUfYYJyRbGdKo=; b=XuMOAg2pVPTwmjX8laiWnIaEnz6R5pEEWWvh29vR39iJ51bTS5N5k2WHvw6k4ZGRrEHrGvSKKvlZeAqFswmjyTn65VhRJQ4b98gJOyb1p6d1u4+MYQmdhd8rU+gqZQcLzzhHwNqaQTMnUxEUD3N7vtvHPOnEcZ4CO2p2V7TFOWg=
Received: from ( by ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id; Tue, 17 Oct 2017 19:49:47 +0000
Received: from ([]) by ([]) with mapi id 15.20.0077.022; Tue, 17 Oct 2017 19:49:39 +0000
From: "Borchert, Oliver (Fed)" <>
To: Sean Turner <>
CC: Christopher Morrow <>, "" <>, "" <>, "" <>, "" <>, "Sriram, Kotikalapudi (Fed)" <>
Thread-Topic: [sidr] WGLC: draft-ietf-sidr-rtr-keying - finishes - 10/16/2017 - Oct 16, 2017
Thread-Index: AQHTO/XHsEI5Kg29XkCJzevG1oYEE6LgzLyAgAUCtgCAArrDAA==
Date: Tue, 17 Oct 2017 19:49:39 +0000
Message-ID: <>
References: <> <> <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
user-agent: Microsoft-MacOutlook/f.26.0.170902
authentication-results: spf=none (sender IP is );
x-originating-ip: []
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR0901MB2163; 6:94Rwssh0jU+4z3HLIEsxIOdA8y7utHrxP5jqhto3HstjSvbSJS58pGAu1d9l7pYBYTOGGMcrRe+f7OmFjMV76rgsDiAgkK89tpCaTTqLwmhZ+2ksI8CtQ7CW/X2zFIcRxBY/XnQkxgSKNCq7vbfcm5UHpPMOW0DpAWasmrZaOQ/PVEB8ciFVkYFdbFrteNIm/b6x209lKL53OWr1rJ/0gfRAOHxF9suq4k0C6fofcnF/5bqaxCNUL+xjUJPGmBQFH38c8QY7dB21QQS5S3JqGpQpt3n6x7kqsUKPdrF37kqaE9sYuow9wlpzycz2McSa87F5S3s+UZNCs9iJVQqF2Q==; 5:1I2JA84jYbfFsRyDR8NFdwhW/VUqSu+ghLywTVuRqmfsNWppJ0x8xRmKAOPnEbxmLSokoGRpMWQyazEnfO5m+Rc3K73+KpPxfI/TZtCCDMMOcEQu+sP/lLQn3DCy6pMAZycSffU0RSbaTTCrMU7doQ==; 24:B25lDWdMe5YaDsQCXQXGNCmPOFKSivMSYfBPJwkq1ReCBZkun82nAWuuvoqo/A3/qvIICDtGaxo8Meum7IbkVKrvlU7h/xHzSolFMwuxQnI=; 7:J2VGFn9Z2uxCxEEian/l+o7LYBirn4LAtjHhP8zonTDZkbYgvePobYBDl1HDcCWrEDuzaYFAW1k8ITzlqNxdImJv7w/GZli7OKOSzWzEG5VgXgzpl3ICraKreG72aSou1j/RnW1nmLTCW9wG1sSQzUv3JSuFDF8nX5GgIT6gTerXOyDmPdnn4jdLh8VNPnVkp8iosRMTAFizP5aqD0DnBCorBnhWRAWFLcztidhNREM=
x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR;
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10019020)(6009001)(39860400002)(376002)(346002)(5423002)(24454002)(377454003)(199003)(189002)(82746002)(97736004)(6512007)(83506001)(2950100002)(2906002)(305945005)(50986999)(478600001)(6916009)(39060400002)(54906003)(33656002)(6306002)(77096006)(6486002)(316002)(229853002)(5660300001)(54356999)(83716003)(4326008)(76176999)(45080400002)(966005)(58126008)(3280700002)(3660700001)(101416001)(189998001)(2900100001)(575784001)(86362001)(36756003)(14454004)(107886003)(102836003)(81156014)(68736007)(230783001)(53546010)(66066001)(8936002)(7736002)(6436002)(6116002)(105586002)(3846002)(6246003)(8676002)(53936002)(106356001)(5890100001)(25786009)(99286003)(6506006)(81166006); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR0901MB2163;; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
x-ms-office365-filtering-correlation-id: 9a8d4223-27f2-401f-9b41-08d51598343b
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254152)(48565401081)(2017052603199)(201703131423075)(201703031133081)(201702281549075); SRVR:CY4PR0901MB2163;
x-ms-traffictypediagnostic: CY4PR0901MB2163:
x-exchange-antispam-report-test: UriScan:(65766998875637)(192374486261705)(189930954265078)(219752817060721);
x-microsoft-antispam-prvs: <>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(3002001)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123564025)(20161123558100)(20161123560025)(20161123555025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY4PR0901MB2163; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY4PR0901MB2163;
x-forefront-prvs: 04631F8F77
received-spf: None ( does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Oct 2017 19:49:39.6295 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR0901MB2163
Archived-At: <>
Subject: Re: [sidr] WGLC: draft-ietf-sidr-rtr-keying - finishes - 10/16/2017 - Oct 16, 2017
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Secure Interdomain Routing <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 17 Oct 2017 19:50:02 -0000


Thanks for addressing our concerns. With the new changes in place I believe it is ready to advance,
“ship it”


On 10/15/17, 10:08 PM, "Sean Turner" <> wrote:

    Just going to run through them in order but grouping some together.
      In the operator-driven method, the operator generates the private/
      public key-pair and sends it to the router, perhaps in a PKCS#8
    [ob] "perhaps" As implementer, this is somewhat confusing.
       package [RFC5958].
    [spt] sure I changed “perhaps” to "e.g.” ;)
      In the router-driven method, the router generates its own public/
      private key-pair.
    [ob] End the sentence here
    [ob] -------- The paragraph below contains too much detail for the introduction
    [spt] The introduction just kind of kept growing.  And, I think somebody asked for concrete references somewhere along the way.  The references are   elsewhere in the document so maybe we can drop the super technical bits from the intro If we’re going to change this sentence to make it that short I’ll likely that the e.g., bit out of the previous paragraph.
    2) update references
    [spt] Yep - and done
    3) s3 Intro
    [ob] Maybe more than one sentences make it clearer. Not easy to
    [ob] understand.
    [spt] it is kind of a mouthful, how about:
      A number of options exist for the operator management
      station to exchange PKI-related information with routers
      and with the RPKI including:
      - Use application/pkcs10 media type [RFC5967]  to
        extract certificate requests and application/pkcs7-mime
        [RFC5751] to return the issued certificate
      - Use FTP or HTTP per [RFC2585], or
      - Use the Enrollment over Secure Transport (EST) protocol
        per [RFC7030].
    4) router burden in s4, s6 (now s7), and s7, etc
       To start, the operator uses the communication channel to
       install the appropriate RPKI Trust Anchor' Certificate (TA Cert)
       in the router. This will later enable the router to validate the
       router certificate returned in the PKCS#7.
    [ob] Section 8.1 specifies that the operator is responsible to assure
    [ob] that the router has valid keys. Therefore, it is not clear why this
    [ob] above paragraph necessary.
    [ob] Maybe the above paragraph could be a feature of the “Advanced
    [ob] Deployment [ob] Scenarios” in section 7
    [ob] This is again back to trust. The operator should verify the
    [ob] certificate, not the router.The operator MUST verify the
    [ob] certificate prior publishing it. This is outside of the scope of the
    [ob] router.
    [spt] I agree with your point that it’s up to the operator to ensure the router’s keys are valid.  But, operators are humans and they make mistakes.
    [spt] While s8.1 does include text stating that the operator is responsible to ensure valid keys are used, it’s in s8.1 much later in the document.  We placed this here to avoid a back pointer.
    [spt] WRT burdening the router with verifying the private key corresponds to the returned public key: You’re right it’s the operator’s job, but operator’s make mistakes.  If the router also checks that the private key corresponds to the returned public key, it’s goodness all around.
    6) Comments on restructuring s5-7.
    [spt] Some of this I think might make sense, but not all of it ;)
    7) s5
    [spt] In the choose your own adventure of s5, I’d prefer to the leave the AS inclusion text in sub-sections.  Sure it’s repeated twice, but then each section is self-contained.
    [spt] The 2nd para in s5.1 is there to address some comment we got long ago.  I’d like to leave the text, but add “NOTE:” in the front of it so people get that something has to happen for the RPKI to authenitcate the router.
    8) new s7
    [spt] I’m not sure why we’d move the paragraph that talks about checking the sig on the PKCS#8 and Certificate to s5.2.1.  The certificate isn’t yet in the picture yet so to me it seems to fit best where it is.
    9) s7 (now s8)
    [spt] We can’t move it to an informative appendix because s7 was a grand compromise between Max and the authors.  He assertion is that the manual process is weak security and it really ought to be more automated.
    [spt] WRT “More PKI-capable router” there’s no really a reference.  It’s really just that the router supports some of the things listed in the remainder of the paragraph.  But, the basic idea is that the operator won’t be messing with the CLI.
    [ob] How is this with RouterID 0 for shared keys within an AS? Could this
    [ob] cause conflicts? Same for multiple keys for same router with
    [ob] RouterID?
    [spt] I’m trying to figure out whether this comment just applies to the advanced scenarios or more generally?
    [spt] Here’s how I see it: Operator has two routers each with IEEE 802.1 AR certificates.  They communicate the subject names (and maybe the public keys) from the AR certificates to the CA.  The CA then accepts requests from these two routers and no others.  If the operator tells the CA to give them the same AS number it does if not it doesn’t.  Makes sense?
    10) s8 (now s9)
    [spt] I’m okay with the re-write of the intro, but I kind of want to keep the part about it being the operator’s responsibility to maintain the key for their entire lifetime.
    [spt] WRT another ops RFC reference are thinking about something like ghostbusters?  Other than that I’m not sure what else we’d refer to.
    [spt] I’m happy to point to the keyroll over spec.
    [spt] re mentioning BG4 fallback isn't that kind of implied with disabling BGPsec?  I mean guess not, but would love for you to propose some text ;)
    > On Oct 12, 2017, at 17:43, Borchert, Oliver (Fed) <> wrote:
    > Hi,
    > I  believe this draft is important. Said that, I also believe that it needs some more work before it is ready to advance to IESG review.
    > Sriram and I were reading the draft carefully and after some discussion, I added our findings into the document itself.
    > For easier reading, I added the comments as attachment in pdf form.
    > The main issues we identified were in sections 5, 6, and 8 of the document.
    > The sections 5 and 6 are not easy to understand and the flow is somewhat confusing. We propose to restructure the sections 5 and 6 into three sections,  each section having a well-defined outcome.
    > This makes it easier for an implementer to understand what to do and what is expected.
    > Also in section 8, we identified some overlapping with draft-ietf-sidrops-bgpsec-rollover-02. We propose some changes and references to mitigate the overlaps.
    > Once our concerns are addressed, we believe that the document should advance to IESG.
    > We are willing to help out in any capacity,
    > Thanks,
    > Oliver
    > From: sidr [] On Behalf Of Christopher Morrow
    > Sent: Monday, October 02, 2017 11:14 PM
    > To:;;
    > Subject: [sidr] WGLC: draft-ietf-sidr-rtr-keying - finishes - 10/16/2017 - Oct 16, 2017
    > WG Folk,
    > I thought I had sent this note our previously, but... better late then never sent:
    > Please consider this the WGLC for:
    > Abstract:
    >   "BGPsec-speaking routers are provisioned with private keys in order to
    >    sign BGPsec announcements.  The corresponding public keys are
    >    published in the global Resource Public Key Infrastructure, enabling
    >    verification of BGPsec messages.  This document describes two methods
    >    of generating the public-private key-pairs: router-driven and
    >    operator-driven."
    > Please send along comments/complaints/issues/kudos (to the authors), to the list and I'll see you all in ~14 or so days.
    > Thanks!
    > -chris
    > co-chair
    > <Review-v3-Router-Keying-for-BGPsec.pdf>