[Sidrops] Protocol Action: 'RPKI Signed Object for Trust Anchor Key' to Proposed Standard (draft-ietf-sidrops-signed-tal-16.txt)
The IESG <iesg-secretary@ietf.org> Tue, 21 May 2024 17:57 UTC
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: sidrops@ietf.org
Delivered-To: sidrops@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D186C180B42; Tue, 21 May 2024 10:57:01 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 12.11.0
Auto-Submitted: auto-generated
Precedence: bulk
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <171631422143.42430.17581144634763136066@ietfa.amsl.com>
Date: Tue, 21 May 2024 10:57:01 -0700
Message-ID-Hash: E4W3MF75EYNHPZNSSQFYC4OIIS5W35GR
X-Message-ID-Hash: E4W3MF75EYNHPZNSSQFYC4OIIS5W35GR
X-MailFrom: iesg-secretary@ietf.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-sidrops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: The IESG <iesg@ietf.org>, draft-ietf-sidrops-signed-tal@ietf.org, housley@vigilsec.com, keyur@arrcus.com, rfc-editor@rfc-editor.org, sidrops-chairs@ietf.org, sidrops@ietf.org, warren@kumari.net
X-Mailman-Version: 3.3.9rc4
Subject: [Sidrops] Protocol Action: 'RPKI Signed Object for Trust Anchor Key' to Proposed Standard (draft-ietf-sidrops-signed-tal-16.txt)
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/PvTr5_Jvjx4xKwWvykX67xknzfI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Owner: <mailto:sidrops-owner@ietf.org>
List-Post: <mailto:sidrops@ietf.org>
List-Subscribe: <mailto:sidrops-join@ietf.org>
List-Unsubscribe: <mailto:sidrops-leave@ietf.org>
The IESG has approved the following document: - 'RPKI Signed Object for Trust Anchor Key' (draft-ietf-sidrops-signed-tal-16.txt) as Proposed Standard This document is the product of the SIDR Operations Working Group. The IESG contact persons are Warren Kumari and Mahesh Jethanandani. A URL of this Internet-Draft is: https://datatracker.ietf.org/doc/draft-ietf-sidrops-signed-tal/ Technical Summary A Trust Anchor Locator (TAL) is used by Relying Parties (RPs) in the Resource Public Key Infrastructure (RPKI) to locate and validate a Trust Anchor (TA) Certification Authority (CA) certificate used in RPKI validation. This document defines an RPKI signed object for a Trust Anchor Key (TAK), that can be used by a TA to signal the location(s) of the accompanying CA certificate for the current key to RPs, as well as the successor key and the location(s) of its CA certificate. This object helps to support planned key rolls without impacting RPKI validation. Working Group Summary There is consensus for this document in the SIDRops WG. Document Quality There are multiple implementations of this, documented in Section 13v of the draft. Personnel Russ Housley is DS Warren "Ace" Kumari