[Sidrops] draft-ietf-sidrops-signed-tal-10.txt

Russ Housley <housley@vigilsec.com> Tue, 12 July 2022 19:42 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96134C157B4D for <sidrops@ietfa.amsl.com>; Tue, 12 Jul 2022 12:42:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0GTz57QHVDsA for <sidrops@ietfa.amsl.com>; Tue, 12 Jul 2022 12:42:40 -0700 (PDT)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AFBFEC188715 for <sidrops@ietf.org>; Tue, 12 Jul 2022 12:42:33 -0700 (PDT)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id ED11812F71F for <sidrops@ietf.org>; Tue, 12 Jul 2022 15:42:32 -0400 (EDT)
Received: from [10.0.1.2] (pfs.iad.rg.net [198.180.150.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id E3F9012E85D for <sidrops@ietf.org>; Tue, 12 Jul 2022 15:42:32 -0400 (EDT)
From: Russ Housley <housley@vigilsec.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.21\))
Date: Tue, 12 Jul 2022 15:42:32 -0400
References: <165757888277.5020.13307456649922069639@ietfa.amsl.com>
To: SIDR Operations WG <sidrops@ietf.org>
In-Reply-To: <165757888277.5020.13307456649922069639@ietfa.amsl.com>
Message-Id: <AC19C378-0FFD-490B-B8F7-5E518A3B42DB@vigilsec.com>
X-Mailer: Apple Mail (2.3445.104.21)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/ezSUkkzf7bX2iMj4PiRjN7dv918>
Subject: [Sidrops] draft-ietf-sidrops-signed-tal-10.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jul 2022 19:42:44 -0000

Thanks for fixing the ASN.1 module.  It compiles properly.

Russ


> On Jul 11, 2022, at 6:34 PM, internet-drafts@ietf.org wrote:
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the SIDR Operations WG of the IETF.
> 
>        Title           : RPKI Signed Object for Trust Anchor Key
>        Authors         : Carlos Martinez
>                          George G. Michaelson
>                          Tom Harrison
>                          Tim Bruijnzeels
>                          Rob Austein
>  Filename        : draft-ietf-sidrops-signed-tal-10.txt
>  Pages           : 19
>  Date            : 2022-07-11
> 
> Abstract:
>   A Trust Anchor Locator (TAL) is used by Relying Parties (RPs) in the
>   Resource Public Key Infrastructure (RPKI) to locate and validate a
>   Trust Anchor (TA) Certification Authority (CA) certificate used in
>   RPKI validation.  This document defines an RPKI signed object for a
>   Trust Anchor Key (TAK), that can be used by a TA to signal the
>   location(s) of the accompanying CA certificate for the current key to
>   RPs, as well as the successor key and the location(s) of its CA
>   certificate.  This object helps to support planned key rolls without
>   impacting RPKI validation.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sidrops-signed-tal/
> 
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-sidrops-signed-tal-10.html
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sidrops-signed-tal-10
> 
> 
> Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts