[Sidrops] Protocol Action: 'RPKI Signed Object for Trust Anchor Key' to Proposed Standard (draft-ietf-sidrops-signed-tal-16.txt)

The IESG <iesg-secretary@ietf.org> Tue, 21 May 2024 17:57 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: sidrops@ietf.org
Delivered-To: sidrops@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D186C180B42; Tue, 21 May 2024 10:57:01 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 12.11.0
Auto-Submitted: auto-generated
Precedence: bulk
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <171631422143.42430.17581144634763136066@ietfa.amsl.com>
Date: Tue, 21 May 2024 10:57:01 -0700
Message-ID-Hash: E4W3MF75EYNHPZNSSQFYC4OIIS5W35GR
X-Message-ID-Hash: E4W3MF75EYNHPZNSSQFYC4OIIS5W35GR
X-MailFrom: iesg-secretary@ietf.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-sidrops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: The IESG <iesg@ietf.org>, draft-ietf-sidrops-signed-tal@ietf.org, housley@vigilsec.com, keyur@arrcus.com, rfc-editor@rfc-editor.org, sidrops-chairs@ietf.org, sidrops@ietf.org, warren@kumari.net
X-Mailman-Version: 3.3.9rc4
Subject: [Sidrops] Protocol Action: 'RPKI Signed Object for Trust Anchor Key' to Proposed Standard (draft-ietf-sidrops-signed-tal-16.txt)
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/PvTr5_Jvjx4xKwWvykX67xknzfI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Owner: <mailto:sidrops-owner@ietf.org>
List-Post: <mailto:sidrops@ietf.org>
List-Subscribe: <mailto:sidrops-join@ietf.org>
List-Unsubscribe: <mailto:sidrops-leave@ietf.org>

The IESG has approved the following document:
- 'RPKI Signed Object for Trust Anchor Key'
  (draft-ietf-sidrops-signed-tal-16.txt) as Proposed Standard

This document is the product of the SIDR Operations Working Group.

The IESG contact persons are Warren Kumari and Mahesh Jethanandani.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-sidrops-signed-tal/




Technical Summary

   A Trust Anchor Locator (TAL) is used by Relying Parties (RPs) in the
   Resource Public Key Infrastructure (RPKI) to locate and validate a
   Trust Anchor (TA) Certification Authority (CA) certificate used in
   RPKI validation.  This document defines an RPKI signed object for a
   Trust Anchor Key (TAK), that can be used by a TA to signal the
   location(s) of the accompanying CA certificate for the current key to
   RPs, as well as the successor key and the location(s) of its CA
   certificate.  This object helps to support planned key rolls without
   impacting RPKI validation.

Working Group Summary

   There is consensus for this document in the SIDRops WG.

Document Quality

   There are multiple implementations of this, documented in Section 13v of the draft.

Personnel

   Russ Housley is DS
   Warren "Ace" Kumari