[Sidrops] Re: Ketan Talaulikar's Yes on charter-ietf-sidrops-01-05: (with COMMENT)
Job Snijders <job@bsd.nl> Wed, 07 January 2026 17:03 UTC
Return-Path: <job@instituut.net>
X-Original-To: sidrops@mail2.ietf.org
Delivered-To: sidrops@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 51DF6A41AD6E for <sidrops@mail2.ietf.org>; Wed, 7 Jan 2026 09:03:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.877
X-Spam-Level:
X-Spam-Status: No, score=-1.877 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.017, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=unavailable autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LGiBz5KuzFtk for <sidrops@mail2.ietf.org>; Wed, 7 Jan 2026 09:03:18 -0800 (PST)
Received: from mail-ej1-f42.google.com (mail-ej1-f42.google.com [209.85.218.42]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id E01AEA41AD5F for <sidrops@ietf.org>; Wed, 7 Jan 2026 09:03:18 -0800 (PST)
Received: by mail-ej1-f42.google.com with SMTP id a640c23a62f3a-b8440cb2dbeso182124366b.3 for <sidrops@ietf.org>; Wed, 07 Jan 2026 09:03:18 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1767805392; x=1768410192; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=GgZ7m3BNNb7A/9cqNgx3o9TfvjgR8DmUeoeSNlcT3Cs=; b=a6KKvAxT/E+oVloNqzXK9enqOq1otL/sVopzAHBTsz8Ho0bscXF5d3bGkL9/w2eCCd w6OwBnujHQIplIIp0L+8hfakj7qWbR6jhy7Qru0g3v29i4DlITYmFIJnmRf6W69aa4TI wYOsL4Tvks98Skqsln3kUBuCNcqBY0c69z5bkGMak/cAGRhGdzzJDSbSXEDBuBXsvf0w G/oLkkZ7Ktkn7t4WZfVo4te4AvQZrhoJPWNDVyPy7oBcCWVoMc02Z27Ie2+8bSrbDEmR s4syd6U4AFkhmup7kBMcC0QCuXQXjg4xT84tvucDLE+wUc8EiB1PaH23oPKQuywyx5Cy XW2A==
X-Forwarded-Encrypted: i=1; AJvYcCU4EpZlxCIITofn/iV1QC0IYjuohLt+T46oQYyHfQkocxEV7qMTbg6oRoZ25lWIILNJh3h/qeb9@ietf.org
X-Gm-Message-State: AOJu0YyL7VO2LDJ7u4igtWVjbldDCFrWwbTM9/1SynS/GNRLWEkI93sr fjaJKrfXVCAVt4nRSzycnFsA4RZMgZpTgXwKhKTHBN+I+a1HaoeJ8gYpRDvbJ7mL5twmBmAlbWs JhCXajX0=
X-Gm-Gg: AY/fxX7Fk5A1CQPGli9HYsgYVptHoziJ1GSfKt1Bw7ulRkDPjKwD15ZzFo43ilQ8k98 Dc2sno6TAVNcg6/aJve4rKTHR9zf5QmXLsVeDcVg2u+R9RvMdiZGG16doChSIv2qaZltfxRfqgP U3mtXtkmKvDIJWgHY8ez8cNGh6IiPWsY9zXoyYBebKDFcGTWX/dsO6b2yS1sqmOyqxS39jr6H9Z 4TcMuyDbcFd4t1ukNDKEwEO9A4/xmX3ImQUiB/JBUbUo7I5O5Zv74XdkqL4I1Hp2bwgMP3pLbUd 7nTFz5tWjhrd7Y+EMf3Fs7EJeSwqpmbeALBmtlI06HGkTbDIQJFWq3iPTy9wE+d193tmsnzjmKU RmQcWVGpUj52JHaP16KK1Yv///YHkSRaK7s6S1BjkkwrlGrecprjtDwpLJILDYs31wXYRXWesDH 2oyVuW9oz0Kreyis5Hl17pX/hrwPsMUrhNhUjC5vXsWIhTyNUb/aF5LikH+eWED8/oTSrM0grDI sNqmud6PBwXdn3LoX0CTxajYAP8Ronqghx8XGH49Sb66h5NEfgpjBA9cE4QTYZiXASC33G4
X-Google-Smtp-Source: AGHT+IGEJS0yLXz08YNIl3FryOYXPlWiAaOtKjkpr/WubZvnU/Ew6qsSmDSK/oucGA5W1I0UEBoIHA==
X-Received: by 2002:a17:907:2d88:b0:b76:7e90:713f with SMTP id a640c23a62f3a-b84451692fdmr362472666b.10.1767805392148; Wed, 07 Jan 2026 09:03:12 -0800 (PST)
Received: from feather.sobornost.net ([192.147.168.2]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-b842a2bc6bbsm570073566b.27.2026.01.07.09.03.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 07 Jan 2026 09:03:11 -0800 (PST)
Date: Wed, 07 Jan 2026 17:03:09 +0000
From: Job Snijders <job@bsd.nl>
To: Ketan Talaulikar <ketant.ietf@gmail.com>
Message-ID: <aV6RzTGjbdwOJblN@feather.sobornost.net>
References: <176780475592.3840977.5390849792306664270@dt-datatracker-5656579b89-p6k4r>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <176780475592.3840977.5390849792306664270@dt-datatracker-5656579b89-p6k4r>
X-Clacks-Overhead: GNU Erik Bais
Message-ID-Hash: 6SC6BHQC6TADIDYGD3XVFCIKMEHZ2XLN
X-Message-ID-Hash: 6SC6BHQC6TADIDYGD3XVFCIKMEHZ2XLN
X-MailFrom: job@instituut.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-sidrops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: The IESG <iesg@ietf.org>, sidrops-chairs@ietf.org, sidrops@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Sidrops] Re: Ketan Talaulikar's Yes on charter-ietf-sidrops-01-05: (with COMMENT)
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/4KvIOaMl-7HwQMvNNCmU9MzsY94>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Owner: <mailto:sidrops-owner@ietf.org>
List-Post: <mailto:sidrops@ietf.org>
List-Subscribe: <mailto:sidrops-join@ietf.org>
List-Unsubscribe: <mailto:sidrops-leave@ietf.org>
On Wed, Jan 07, 2026 at 08:52:35AM -0800, Ketan Talaulikar via Datatracker wrote: > ---------------------------------------------------------------------- > COMMENT: > ---------------------------------------------------------------------- > > Is RPKI cache to Router protocol is covered under "RPKI Technology > Stack"? Is there a definition of the components of this stack in some > RFC? My understand is that RPKI is an infrastructure and includes > those various components but not sure we can call it a stack. > > I would be more comfortable if the word "stack" were to be replaced > with the components of the RPKI instead (including the RPKI-RTR). In my mind the RPKI-To-Router is a distinct component that should be called out separately. Of note is that the RTR protocol itself does not involve CMS, X.509, or ASN.1. OTOH, very recent examples of "Maintenance of the RPKI technology stack" are the clarifications on how to handle CRL Numbers (RFC 9829), or for example the updates to Manifest Number handling in RFC-To-Be draft-ietf-sidrops-manifest-numbers. Less recent examples are the RFCs in which Manifests & ROAs were revised (RFC 9286 & RFC 9582). The RPKI is a technology layered on top of other technologies: it makes use of a restrictive X.509/CRL profile, a number of RPKI-specific ASN.1 profiles have been defined, it uses transport that wasn't invented here (Rsync) and also transport that the old SIDR group specified (RRDP), and so on. I offer these comments as an attempt to clarify some of the thinking that went into the charter from my side, and I recognize the challenges in trying to capture a complex technology like the RPKI in a succinct manner. Kind regards, Job
- [Sidrops] Ketan Talaulikar's Yes on charter-ietf-… Ketan Talaulikar via Datatracker
- [Sidrops] Re: Ketan Talaulikar's Yes on charter-i… Job Snijders