[sidr] I-D Action: draft-ietf-sidr-rpki-ltamgmt-00.txt

internet-drafts@ietf.org Tue, 10 July 2012 01:37 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B0FF11E80F4; Mon, 9 Jul 2012 18:37:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.556
X-Spam-Level:
X-Spam-Status: No, score=-102.556 tagged_above=-999 required=5 tests=[AWL=0.043, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d8641dnkuzzf; Mon, 9 Jul 2012 18:37:04 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FF8A11E80B8; Mon, 9 Jul 2012 18:37:04 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.30p3
Message-ID: <20120710013704.10586.60280.idtracker@ietfa.amsl.com>
Date: Mon, 09 Jul 2012 18:37:04 -0700
Cc: sidr@ietf.org
Subject: [sidr] I-D Action: draft-ietf-sidr-rpki-ltamgmt-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2012 01:37:05 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Secure Inter-Domain Routing Working Group of the IETF.

	Title           : Local Trust Anchor Management for the Resource Public Key Infrastructure
	Author(s)       : Stephen Kent
                          Mark Reynolds
	Filename        : draft-ietf-sidr-rpki-ltamgmt-00.txt
	Pages           : 27
	Date            : 2010-02-24

Abstract:
This document describes a facility to enable a relying party (RP) to
manage trust anchors (TAs) in the context of the Resource Public Key
Infrastructure (RPKI). It is common to allow an RP to import TA
material in the form of self-signed certificates. The facility
described in this document allows an RP to impose constraints on such
TAs. Because this mechanism is designed to operate in the RPKI
context, the relevant constraints are the RFC 3779 extensions that
bind address spaces and/or autonomous system (AS) numbers to
entities. The primary motivation for this facility is to enable an RP
to ensure that resource allocation information that it has acquired
via some trusted channel is not overridden by the information
acquired from the RPKI repository system or by the putative TAs that
the RP imports. Specifically, the mechanism allows an RP to specify a
set of bindings between public key identifiers and RFC 3779 extension
data and will override any conflicting bindings expressed via the
putative TAs and the certificates downloaded from the RPKI repository
system. Although this mechanism is designed for local use by an RP,
an entity that is accorded administrative control over a set of RPs
may use this mechanism to convey its view of the RPKI to a set of RPs
within its jurisdiction. The means by which this latter use case is
effected is outside the scope of this document.

The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidr-rpki-ltamgmt

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-sidr-rpki-ltamgmt-00


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/