[sidr] Document Action: 'Validation of Route Origination using the Resource Certificate PKI and ROAs' to Informational RFC (draft-ietf-sidr-roa-validation-10.txt)

The IESG <iesg-secretary@ietf.org> Mon, 02 May 2011 17:29 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32C4EE06FE; Mon, 2 May 2011 10:29:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.576
X-Spam-Level:
X-Spam-Status: No, score=-102.576 tagged_above=-999 required=5 tests=[AWL=0.023, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZU9dcyeNDnu3; Mon, 2 May 2011 10:29:44 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 609A6E0720; Mon, 2 May 2011 10:29:44 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 3.52
Message-ID: <20110502172944.28569.8532.idtracker@ietfa.amsl.com>
Date: Mon, 02 May 2011 10:29:44 -0700
Cc: sidr mailing list <sidr@ietf.org>, sidr chair <sidr-chairs@tools.ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [sidr] Document Action: 'Validation of Route Origination using the Resource Certificate PKI and ROAs' to Informational RFC (draft-ietf-sidr-roa-validation-10.txt)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 May 2011 17:29:45 -0000

The IESG has approved the following document:
- 'Validation of Route Origination using the Resource Certificate PKI and
   ROAs'
  (draft-ietf-sidr-roa-validation-10.txt) as an Informational RFC

This document is the product of the Secure Inter-Domain Routing Working
Group.

The IESG contact persons are Adrian Farrel and Stewart Bryant.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-sidr-roa-validation/




Technical Summary

  This document defines the semantics of a Route Origin Authorization 
  (ROA) in terms of an application of the Resource Public Key 
  Infrastructure (RPKI) to the validation of the origination of routes
  advertised in the Border Gateway Protocol.

Working Group Summary

  The initial versions of this document presented a validation algorithm
  that was considerably more complex than the final verison.  It was 
  modified and simplified over many versions and discussions.  The 
  present document is an outcome of energetic discussions involving a 
  broad cross-section of the working group.  The authors advocated the 
  original approach vigorously, but eventually accepted the group
  consensus.

   IP has been filed at http://datatracker.ietf.org/ipr/1204/  The 
   working group discussed this in Nov 2009. The WG decided
   that it prefered non-IPR'd technologies, but did not reject this
   work and continued with it.

Document Quality

  This document is clear and submitted as Informational without anything
  to be implemented. A related document describes an implementation
  in the BGP decision process.  The related document is itself being
  implemented by at least one router vendor.

Personnel

   Sandy Murphy (sandy@sparta.com) is the Document Shepherd.
   Adrian Farrel (adrian/farrel@hauwei,com) is the responsible AD.

RFC Editor Note

Section 4 final sentence
s/MAY/may/   

---

Section 5

OLD
   A ROA validation "expires" at
   the Validity To field of the signing EE certificate, or at such a
   time when there is no certification path that can validate the ROA.
   A ROA issuer may elect to prematurely invalidate a ROA by revoking
   the EE certificate that was used to sign the ROA.
NEW
   A ROA validation "expires" at
   the notAfter field of the signing EE certificate, or at such a
   time when there is no certification path that can validate the ROA.
   A ROA issuer may elect to prematurely invalidate a ROA by revoking
   the EE certificate that was used to sign the ROA.
END