Re: [sidr] RPKI and private keys (was RE: Interim Meeting Draft Agenda: 04-30-2012 (April 30, 2012)))

Chris Morrow <morrowc@ops-netman.net> Sat, 05 May 2012 02:58 UTC

Return-Path: <morrowc@ops-netman.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BF2F21F846E for <sidr@ietfa.amsl.com>; Fri, 4 May 2012 19:58:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.539
X-Spam-Level:
X-Spam-Status: No, score=-2.539 tagged_above=-999 required=5 tests=[AWL=0.060, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NltpZqZGnSKY for <sidr@ietfa.amsl.com>; Fri, 4 May 2012 19:58:04 -0700 (PDT)
Received: from mailserver.ops-netman.net (mailserver.ops-netman.net [IPv6:2001:470:e495:fade:5054:ff:fe79:69db]) by ietfa.amsl.com (Postfix) with ESMTP id 0A2DC21F846D for <sidr@ietf.org>; Fri, 4 May 2012 19:58:03 -0700 (PDT)
Received: from [192.168.1.125] (c-98-204-226-233.hsd1.va.comcast.net [98.204.226.233]) (Authenticated sender: morrowc@OPS-NETMAN.NET) by mailserver.ops-netman.net (Postfix) with ESMTPSA id ABCFA32008E; Sat, 5 May 2012 02:57:57 +0000 (UTC)
Message-ID: <4FA49734.5090504@ops-netman.net>
Date: Fri, 04 May 2012 22:57:56 -0400
From: Chris Morrow <morrowc@ops-netman.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:11.0) Gecko/20120410 Thunderbird/11.0.1
MIME-Version: 1.0
To: "Osterweil, Eric" <eosterweil@verisign.com>
References: <CE0C4A314044C843AEE900875D90D54E1084E0@BRN1WNEXMBX01.vcorp.ad.vrsn.com>
In-Reply-To: <CE0C4A314044C843AEE900875D90D54E1084E0@BRN1WNEXMBX01.vcorp.ad.vrsn.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: "'sidr-chairs@tools.ietf.org'" <sidr-chairs@tools.ietf.org>, "'Sandra.Murphy@sparta.com'" <Sandra.Murphy@sparta.com>, "'sidr-ads@tools.ietf.org'" <sidr-ads@tools.ietf.org>, "'sidr@ietf.org'" <sidr@ietf.org>
Subject: Re: [sidr] RPKI and private keys (was RE: Interim Meeting Draft Agenda: 04-30-2012 (April 30, 2012)))
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 May 2012 02:58:04 -0000

On 05/04/2012 10:30 PM, Osterweil, Eric wrote:
>
>
> Well, when u compared the key mgmt that is done today w/ the key mgmt
> that will need to be done with bgpsec keys on routers, I think there
> was an strained analogy. I'm talking about the latter, but I was
> trying to indulge the discussion. ;)

tis late on a friday... and this has a tiny screen... but:

I was under the impression that Danny was originally asking about how to 
get the AS or ROUTER key material (used to sign updates as the pass by) 
onto the device in question.

Take for example a router of in the disputed territory of crapinderburg:
  1) you either shipped a device with a person to install it (or a 
person with secure comms and a router arrived separately)
  2) that person would install the requisite cert material/key at 
installation time.

Alternately that person does basic config (or the device is drop-shipped 
with basic config) and a remote/NOC/automation-job does the rest over a 
secure (I hope) channel, ie: ssh/scp. This would include installing the 
cert/key on the device (in some form of protected storage)

There was mention in danny's note of 'the rpki distribution system...' 
and both sandy and I (and randy?) noted that the rpki-to-rtr (or like) 
protocol was never meant to handle this sort of thing, that other normal 
router configuration/management systems were meant to do it.

Are we crossed up on the rpki-rtr vs 'other means' discussion currently?

For reference, here's danny's quote that got the crossed up conversation 
started:

"From there, we can discuss the issue of, for example, HOW TO onboard
  and purge signing and validating certificates to routers from the RPKI
  [I suspect the intention was to use rpki-rtr protocol for this, but it
doesn't currently support it, nor are the security implications clear]."

-chris