Re: [sidr] I-D Action: draft-ietf-sidr-rpki-tree-validation-00.txt

Oleg Muravskiy <oleg@ripe.net> Mon, 21 March 2016 22:38 UTC

Return-Path: <oleg@ripe.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6D8D12D101; Mon, 21 Mar 2016 15:38:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level:
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CPJdhVikgDGo; Mon, 21 Mar 2016 15:38:21 -0700 (PDT)
Received: from molamola.ripe.net (molamola.ripe.net [IPv6:2001:67c:2e8:11::c100:1371]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9266F12D163; Mon, 21 Mar 2016 15:38:16 -0700 (PDT)
Received: from titi.ripe.net ([193.0.23.11]) by molamola.ripe.net with esmtps (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.84) (envelope-from <oleg@ripe.net>) id 1ai8Sj-000Atk-KY; Mon, 21 Mar 2016 23:38:15 +0100
Received: from dog.ripe.net ([193.0.1.217] helo=[IPv6:::1]) by titi.ripe.net with esmtp (Exim 4.72) (envelope-from <oleg@ripe.net>) id 1ai8Si-0002n3-Ax; Mon, 21 Mar 2016 23:38:12 +0100
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
Content-Type: text/plain; charset="us-ascii"
From: Oleg Muravskiy <oleg@ripe.net>
In-Reply-To: <20160321202905.12223.80754.idtracker@ietfa.amsl.com>
Date: Mon, 21 Mar 2016 23:38:12 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <C6014066-9736-4A2F-AC2B-8413E7653316@ripe.net>
References: <20160321202905.12223.80754.idtracker@ietfa.amsl.com>
To: internet-drafts@ietf.org
X-Mailer: Apple Mail (2.1878.6)
X-ACL-Warn: Delaying message
X-RIPE-Spam-Level: /
X-RIPE-Spam-Report: Spam Total Points: -0.2 points pts rule name description ---- ---------------------- ------------------------------------ -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -0.0 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% [score: 0.5000]
X-RIPE-Signature: c408758d4ce2e8eb06762a65a3365b745f51068bd3836192bc0815672f9bd3e5
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/LP63BHc9j5HnvY9vgajXRQLilys>
Cc: sidr@ietf.org
Subject: Re: [sidr] I-D Action: draft-ietf-sidr-rpki-tree-validation-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2016 22:38:26 -0000

This is a WG-adopted version of the previous individual submission ID draft-tbruijnzeels-sidr-validation-local-cache-02. It includes feedback submitted so far, and some sections that were missing in the previous version.

Please read and comment!


Oleg


On 21 Mar 2016, at 21:29, internet-drafts@ietf.org wrote:

> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Secure Inter-Domain Routing of the IETF.
> 
>        Title           : RPKI Certificate Tree Validation by a Relying Party Tool
>        Authors         : Oleg Muravskiy
>                          Tim Bruijnzeels
> 	Filename        : draft-ietf-sidr-rpki-tree-validation-00.txt
> 	Pages           : 11
> 	Date            : 2016-03-21
> 
> Abstract:
>   This document currently describes the approach to validate the
>   content of the RPKI certificate tree, as used by the RIPE NCC RPKI
>   Validator.  This approach is independent of a particular object
>   retrieval mechanism.  This allows it to be used with repositories
>   available over the rsync protocol, the RPKI Repository Delta
>   Protocol, and repositories that use a mix of both.
> 
>   This algorithm does not rely on content of repository directories,
>   but uses the Authority Key Identifier (AKI) field of a manifest and a
>   certificate revocation list (CRL) objects to discover manifest and
>   CRL objects issued by a particular Certificate Authority (CA).  It
>   further uses the hashes of manifest entries to discover other objects
>   issued by the CA.
> 
>   If the working group finds that algorithm outlined here is useful for
>   other implementations, we may either update future revisions of this
>   document to be less specific to the RIPE NCC RPKI Validator
>   implementation, or we may use this document as a starting point of a
>   generic validation document and keep this as a detailed description
>   of the actual RIPE NCC RPKI Validator implementation.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sidr-rpki-tree-validation/
> 
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-ietf-sidr-rpki-tree-validation-00
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> 



Cheers,
Oleg