[Sidrops] RFC 9286 on Manifests for the Resource Public Key Infrastructure (RPKI)

rfc-editor@rfc-editor.org Thu, 30 June 2022 20:19 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12EB8C15C13E; Thu, 30 Jun 2022 13:19:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.657
X-Spam-Level:
X-Spam-Status: No, score=-1.657 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sSWGNQhZ-1pk; Thu, 30 Jun 2022 13:19:18 -0700 (PDT)
Received: from rfcpa.amsl.com (rfc-editor.org [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 704EEC15C13C; Thu, 30 Jun 2022 13:19:18 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 42C58289E0; Thu, 30 Jun 2022 13:19:18 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
From: rfc-editor@rfc-editor.org
Cc: rfc-editor@rfc-editor.org, drafts-update-ref@iana.org, sidrops@ietf.org
Content-type: text/plain; charset="UTF-8"
Message-Id: <20220630201918.42C58289E0@rfcpa.amsl.com>
Date: Thu, 30 Jun 2022 13:19:18 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/ECwOYZItkX3lXsyEeSVJQ2UWxi4>
Subject: [Sidrops] RFC 9286 on Manifests for the Resource Public Key Infrastructure (RPKI)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jun 2022 20:19:22 -0000

A new Request for Comments is now available in online RFC libraries.

        
        RFC 9286

        Title:      Manifests for the Resource Public 
                    Key Infrastructure (RPKI) 
        Author:     R. Austein,
                    G. Huston,
                    S. Kent,
                    M. Lepinski
        Status:     Standards Track
        Stream:     IETF
        Date:       June 2022
        Mailbox:    sra@hactrn.net,
                    gih@apnic.net,
                    kent@alum.mit.edu,
                    mlepinski@ncf.edu
        Pages:      16
        Obsoletes:  RFC 6486

        I-D Tag:    draft-ietf-sidrops-6486bis-11.txt

        URL:        https://www.rfc-editor.org/info/rfc9286

        DOI:        10.17487/RFC9286

This document defines a "manifest" for use in the Resource Public Key
Infrastructure (RPKI). A manifest is a signed object (file) that
contains a listing of all the signed objects (files) in the
repository publication point (directory) associated with an authority
responsible for publishing in the repository. For each certificate,
Certificate Revocation List (CRL), or other type of signed objects
issued by the authority that are published at this repository
publication point, the manifest contains both the name of the file
containing the object and a hash of the file content. Manifests are
intended to enable a relying party (RP) to detect certain forms of
attacks against a repository. Specifically, if an RP checks a
manifest's contents against the signed objects retrieved from a
repository publication point, then the RP can detect replay attacks,
and unauthorized in-flight modification or deletion of signed
objects. This document obsoletes RFC 6486.

This document is a product of the SIDR Operations Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC