Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-01.txt

Tim Bruijnzeels <tim@nlnetlabs.nl> Wed, 13 June 2018 08:52 UTC

Return-Path: <tim@nlnetlabs.nl>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB47C130EB2 for <sidrops@ietfa.amsl.com>; Wed, 13 Jun 2018 01:52:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.001
X-Spam-Level:
X-Spam-Status: No, score=-7.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nlnetlabs.nl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OMsRDlvBi-R6 for <sidrops@ietfa.amsl.com>; Wed, 13 Jun 2018 01:51:57 -0700 (PDT)
Received: from dicht.nlnetlabs.nl (dicht.nlnetlabs.nl [185.49.140.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 67E36130E05 for <sidrops@ietf.org>; Wed, 13 Jun 2018 01:51:57 -0700 (PDT)
Received: from [IPv6:2001:67c:2e8:110:bcfd:17a3:ae54:36f9] (unknown [IPv6:2001:67c:2e8:110:bcfd:17a3:ae54:36f9]) by dicht.nlnetlabs.nl (Postfix) with ESMTPSA id E297184CB; Wed, 13 Jun 2018 10:51:55 +0200 (CEST)
Authentication-Results: dicht.nlnetlabs.nl; dmarc=none header.from=nlnetlabs.nl
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nlnetlabs.nl; s=default; t=1528879915; bh=he1pdWnm0izYlvrTdRvFLidZ7vs9EJlR4IRB2dqk314=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=Xo8wxhj0F547vsfK32/n5lc27ZoSStd7AiihLluiYAEVcdbP/NbleSIKCjx11S9x/ oFR//XCX4EPAbgK/Dnw0TWrd2JCIsCI+UHYuSyUNBzq4cus6sSY/5K6nxNeRna/Pot U9XFePq8JEkLrRsh83Njj3vTQQuY8Dx+K+p3Gb00=
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.4 \(3445.8.2\))
From: Tim Bruijnzeels <tim@nlnetlabs.nl>
In-Reply-To: <92C4B82E-FD84-4278-B423-4F0D12D533F5@rpstir.net>
Date: Wed, 13 Jun 2018 10:51:51 +0200
Cc: SIDR Operations WG <sidrops@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <EBE81C40-F7D5-4E5F-A68A-613A651B527C@nlnetlabs.nl>
References: <152846464123.15396.14579027912013078144@ietfa.amsl.com> <0EF21785-2C8B-4148-90DB-13C528FAFB40@ripe.net> <92C4B82E-FD84-4278-B423-4F0D12D533F5@rpstir.net>
To: Di Ma <madi@rpstir.net>
X-Mailer: Apple Mail (2.3445.8.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/W25-uxjYoP587SnMZFWH76I6LJw>
Subject: Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-01.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jun 2018 08:52:06 -0000

Hi Di,

I prefer to have “activationTime” either be mandatory, in which case it’s fairly trivial to set it to ‘now’ or ‘2 minutes ago’ even when one publishes, or not have it all and say that ‘activation’ is implicit because the Signed TAL is published.

This really depends on whether there is a good case for future dating.

Personally I don’t see this use case from the RP side. I would rather that I can just find whatever the TA thinks is the current TAL variables to use and switch to it immediately if they are different from mine.

From the TA side I think that if a TA does its testing and set up as described in section 6, before publishing the Signed TAL, then there is also no need for future dating.

The other issue I have with future dating is that I believe it makes things easy to reason about if there MAY be one, but only one, Signed TAL that describes the current TAL variables (URIs and Subject Public Key Info) to use. Having a future dated object, but no current, is confusing. Having two is more work and a bit confusing.

But if someone else does see a good case for future dating I would be happy to learn it.

Tim


> On 10 Jun 2018, at 09:52, Di Ma <madi@rpstir.net> wrote:
> 
> Tim,
> 
> I think you might as well leave ‘activationTime’ as OPTIONAL element since it is sorta an operational strategy in this document intended to be a BCP. If so, the first MUST in the following text should be change to MAY.
> 
> The Signed TAL MUST have an "activationTime" that reflects when	
> 	      Relying Parties MUST use use this new TAL in place of any	
> 	      previously known TAL for this Trust Anchor.
> 
> Besides, it is lovely to see ‘deployment considerations’  included in this version and I am in favor of what is stated in it.
> 
> Di
> 
> P.S.
> 
> I found a nit in Section 6.1 that The sentence ‘The Trust Anchors MUST a new key pair and generate a new TA Certificate. ‘ just missed a verb ‘generate’.
> 
>> 在 2018年6月8日,21:37,Tim Bruijnzeels <tim@ripe.net> 写道:
>> 
>> Dear WG,
>> 
>> This a new version of the “Signed TAL” document that I presented on at IETF101.
>> 
>> The main changes in this version are:
>> - Now supporting planned rolls only!
>> - MAJOR change here:
>> — No staging time!
>> — BUT: Added steps for the TA to be sure that things work BEFORE publishing the new Signed TAL (I think this is better).
>> - Included deployment considerations - essentially: once RPs support, roll often!
>> - Do changes in URIs as planned rolls.. - included consideration section on this
>> - No unplanned rolls, they are too complex and introduce a new key that can be compromised (now you have two problems) - included consideration section on this
>> - Changed the structure of the object to have a version (definitely needed) and use ASN.1 structure rather than plain text or XML - inline with other RPKI Signed Objects
>> - I included a “activationTime” element in the object to allow for future planned rolls, but I am not convinced that it’s really needed given the proposed procedure to set up the new key and test it first, and only then publish the Signed TAL - But, I don’t object strongly either.
>> 
>> As I said in London. I don’t think that we are close to the final word on this.. so I really would like to invite all of you to give this a good read and speak your mind.
>> 
>> I do want to keep the ball rolling. I think the experience with 5011 has shown that this should be addressed before there are too many implementations. So, I see urgency to address this.
>> 
>> Kind regards,
>> 
>> Tim
>> 
>> 
>> 
>>> On 8 Jun 2018, at 15:30, internet-drafts@ietf.org wrote:
>>> 
>>> 
>>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>> This draft is a work item of the SIDR Operations WG of the IETF.
>>> 
>>>      Title           : RPKI signed object for TAL
>>>      Authors         : Tim Bruijnzeels
>>>                        Carlos Martinez
>>> 	Filename        : draft-ietf-sidrops-signed-tal-01.txt
>>> 	Pages           : 12
>>> 	Date            : 2018-06-08
>>> 
>>> Abstract:
>>> Trust Anchor Locators (TALs) [I-D.ietf-sidrops-https-tal] are used by
>>> Relying Parties in the RPKI to locate and validate Trust Anchor
>>> certificates used in RPKI validation.  This document defines an RPKI
>>> signed object [RFC6488] for a Trust Anchor Locator (TAL) that can be
>>> used by Trust Anchors to perform a planned migration to a new key,
>>> allowing Relying Parties to discover the new key up to one year after
>>> the migration occurred.
>>> 
>>> 
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-sidrops-signed-tal/
>>> 
>>> There are also htmlized versions available at:
>>> https://tools.ietf.org/html/draft-ietf-sidrops-signed-tal-01
>>> https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-signed-tal-01
>>> 
>>> A diff from the previous version is available at:
>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-sidrops-signed-tal-01
>>> 
>>> 
>>> Please note that it may take a couple of minutes from the time of submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>> 
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>> 
>>> _______________________________________________
>>> Sidrops mailing list
>>> Sidrops@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sidrops
>>> 
>> 
>> _______________________________________________
>> Sidrops mailing list
>> Sidrops@ietf.org
>> https://www.ietf.org/mailman/listinfo/sidrops
> 
> _______________________________________________
> Sidrops mailing list
> Sidrops@ietf.org
> https://www.ietf.org/mailman/listinfo/sidrops