[sidr] Certificate Policy for the RPKI -- new draft submitted

Karen Seo <kseo@bbn.com> Tue, 04 November 2008 15:46 UTC

Return-Path: <sidr-bounces@ietf.org>
X-Original-To: sidr-archive@megatron.ietf.org
Delivered-To: ietfarch-sidr-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7F79F3A69AF; Tue, 4 Nov 2008 07:46:12 -0800 (PST)
X-Original-To: sidr@core3.amsl.com
Delivered-To: sidr@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DE4543A69AF for <sidr@core3.amsl.com>; Tue, 4 Nov 2008 07:46:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gXJiU+g2OW9j for <sidr@core3.amsl.com>; Tue, 4 Nov 2008 07:46:09 -0800 (PST)
Received: from mx3.bbn.com (mx3.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id 323753A69A4 for <sidr@ietf.org>; Tue, 4 Nov 2008 07:46:09 -0800 (PST)
Received: from tamerlane.bbn.com ([128.89.88.22]) by mx3.bbn.com with esmtp (Exim 4.63) (envelope-from <kseo@bbn.com>) id 1KxO6X-0004PE-Av; Tue, 04 Nov 2008 10:46:05 -0500
Mime-Version: 1.0
Message-Id: <p062102d8c535fa932819@[128.89.88.22]>
Date: Tue, 04 Nov 2008 10:29:01 -0400
To: "sidr@ietf.org" <sidr@ietf.org>, Resource Cert List <rescert@apnic.net>
From: Karen Seo <kseo@bbn.com>
Subject: [sidr] Certificate Policy for the RPKI -- new draft submitted
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1934639391=="
Sender: sidr-bounces@ietf.org
Errors-To: sidr-bounces@ietf.org

Folks,

We just submitted a revised version of the following I-D:
	Certificate Policy (CP) for the Resource PKI (RPKI)
	draft-ietf-sidr-cp-04.txt

Thanks go to Geoff Huston, Randy Bush, and Tim Christensen for their 
feedback.  The main changes from the 03 version are listed below (not 
including date changes, typo corrections and various minor wording 
changes).  Note that many of them but NOT all were in the non-IETF 
version distributed to the rescert mailing list in May.  Apologies in 
advance if I missed any significant changes.

Looking forward to receiving your feedback (and completing this document :-)).
Karen


a. Corrected definition of a "bogus" route to include unauthorized 
advertisement of an unallocated address (not just one that has been 
allocated)

b. Changed text throughout the draft to allow the possibility of 
additional as-yet-unagreed-upon signed objects (as opposed to just 
ROAs).

c. Changed text throughout the draft from "distributing" PKI data to 
"publishing PKI data in/into/at the RPKI distributed repository 
system" (or similar text).

d. Added text throughout the draft to allow the possibility of other 
routing-related uses of the RPKI data besides route filters.

e. 1.3.1 Certification authorities -- Added IANA and rewrote this in 
attempt to clarify. It now says:

    The organizations that allocate IP addresses (IANA, RIRs, NIRs,
    LIRs/ISPs) and AS numbers (IANA, RIRs and NIRs) act as CAs in this
    PKI. 

    Organizations that hold address space and create and sign objects
    such as ROAs and manifests also act as CAs in this PKI. Such
    organizations will include internet number registries, LIRs/ISPs,
    provider-independent subscribers and some dual-homed subscribers.
    For each signed object an organization creates, it will issue a
    corresponding EE certificate that will be used to validate the
    digital signature on the signed object. (Organizations may issue
    other types of EE certificates in the future). See [ARCH] for more
    details.

f. 1.3.5 Other Participants -- Now says:

    Every organization that undertakes a role as a CA in this PKI is
    responsible for populating the RPKI distributed repository system
    with the certificates, CRLs, and other signed objects that it
    issues. The organization can operate its own publication point or
    outsource this function (See sections 2.1 and 2.2.)

g. 1.5.1 Organization administering the document -- Now says:

    This CP is co-administered by IANA and the five Regional Internet
    Registries (RIRs), which act as default trust anchors for the PKI:

    and lists them with their addresses.

h. 1.5.2 Contact person -- Now lists general contact info for IANA 
and the five RIRs.

i. The registries (IANA and the 5 RIRs) are now listed in alphabetic 
order wherever they appear.

j. 3.1.1 Types of names -- Addition of IANA whose name will be a 
"directory distinguished" name.  Addition of NIRs to list of 
organizations whose names "consist of a single CN attribute with a 
value generated by the issuer."

k. 5.6 Key changeover -- Changed text to indicate that "Ideally, the 
private key that a CA uses to sign a certificate or CRL should have a 
validity period that is at least as long as that of any certificate 
being signed.  However, since a certificate issued under this PKI 
will have a validity period that reflects the contractual 
relationship between the issuer and subject, this may lead to 
situations where an issued certificate has a validity period longer 
than that of the key used to sign the certificate."

l. 5.8 CA or RA termination -- Changed text to indicate that "If an 
organization acting as a CA in this PKI terminates operation without 
identifying a replacement, then the effective control of the IP 
addresses and AS numbers revert back to the issuing organization, and 
address space and AS number allocations that have been previously 
validated via that CA are invalidated as of revocation of the CA's 
certificate."

m. 6.1.4 CA public key delivery to relying parties -- Added IANA to 
list of entities whose public keys are distributed out of band, i.e., 
trust anchors. Deleted (RIRs) from the sentence that says "Public key 
values and associated data for the default trust anchors will be 
distributed out of band..."

n. 6.3.2 Certificate operational periods and key pair usage periods 
-- Updated as follows to say:

    IANA holds all IP address and AS number space, i.e., all the
    resources which form the base of the RPKI hierarchy, Because a self-
    signed IANA certificate represents this base, it should have a very
    long life time.  

    Because RIRs and NIRs receive periodic new allocations, it is
    appropriate for their key pairs and certificates to have lifetimes
    that match the periodicity of these allocations.  However, to
    minimize disruption, the key pairs should be maintained across
    certificate changes. 

    LIR/ISP and subscriber certificates typically will have validity
    periods commensurate with the duration of service agreements. The
    validity periods will be chosen by the issuing CA and described in
    its CPS.

o. 9. Other Business and Legal Matters - Changed almost all 
subsections to be "[OMITTED]" because there is no single set of 
responses that would cover every relevant organization in the RPKI, 
i.e., each of these organizations will have to specify this 
information in its CPS or other document.

p. 9.12 Amendments -- Changed as follows -- NOTE that this needs to 
be changed to match Secton 1.5.1.  My apologies, I missed this.

    9.12.1. Procedure for amendment

    The procedure for amendments to this CP is via written notice from
    the Secretary of the NRO.

    9.12.2. Notification mechanism and period

    The NRO will provide one month's notice of a change to this CP.

    9.12.3. Circumstances under which OID must be changed [OMITTED]

    If the Secretary judges that the change(s) will not materially
    reduce the  acceptability of certificates for RPKI purposes, then
    there will be no change to the CP OID.  If the Secretary judges that
    the change(s) will materially change the acceptability of
    certificates for RPKI purposes, then there will be a new CP OID.

q. References -- Added:

    [REPOS] Huston, G., Loomans, R., and Michaelson, G., A Profile for
        Resource Certificate Repository Structure, draft-huston-sidr-
        repos-struct-01.txt, work in progress.
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr