Re: [Sidrops] feedback on draft-michaelson-rpki-rta

"Korsback, Fredrik" <> Mon, 11 January 2021 13:39 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 786943A0BFC for <>; Mon, 11 Jan 2021 05:39:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -9.869
X-Spam-Status: No, score=-9.869 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 0jWlQyV6U_Sz for <>; Mon, 11 Jan 2021 05:39:43 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 957573A0B58 for <>; Mon, 11 Jan 2021 05:39:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;;; q=dns/txt; s=amazon201209; t=1610372384; x=1641908384; h=from:to:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version:subject; bh=8gpEllEcFO9W+CTyZWNuIL4aKkQetGAJjQKPJ2Goyvw=; b=Z2RmYPEMInDYK+tCMm+PiPyL65QkZp7DtqZKMwhcQ6TiKMrPsP9khOBC mEu61YBuCKlDhIz2Gf6JAIZ+aQp6mbRVXxkHEFr6JCghTMI3rm0jP72uH ek2FKc+Odo3jfd9B3vCed2l7i3QeUghJJOc47hjl5eecIwSvmFJiqW7/7 s=;
X-IronPort-AV: E=Sophos;i="5.79,338,1602547200"; d="scan'208";a="111242931"
Thread-Topic: [Sidrops] feedback on draft-michaelson-rpki-rta
Received: from (HELO ([]) by with ESMTP; 11 Jan 2021 13:39:36 +0000
Received: from ( []) by (Postfix) with ESMTPS id 3A1E8A1E56; Mon, 11 Jan 2021 13:39:34 +0000 (UTC)
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 11 Jan 2021 13:39:34 +0000
Received: from ([]) by ([]) with mapi id 15.00.1497.010; Mon, 11 Jan 2021 13:39:34 +0000
From: "Korsback, Fredrik" <>
To: Tim Bruijnzeels <>, SIDR Operations WG <>
Thread-Index: AQHW26+zCu0LU4poFE22Cf0wLyGGd6oN31UAgAAgawCAAA18gIAAJpqAgAALToCAAX8wAIASiaCAgABP04A=
Date: Mon, 11 Jan 2021 13:39:33 +0000
Message-ID: <>
References: <X+d3+e5Rj/> <> <> <> <> <> <20201230144836.ytg4u2gobkv4uzqn@benm-laptop> <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-GB
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: []
Content-Type: text/plain; charset="utf-8"
Content-ID: <>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <>
Subject: Re: [Sidrops] feedback on draft-michaelson-rpki-rta
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 11 Jan 2021 13:39:46 -0000


So one thing I'm failing to see is the motivation why we step away from the fairly simple "stay within a single TA-cone" model we have in "regular" RPKI. Even if implementing a Multi-signatory support seems simple enough for your implementations, we do not know the full extent of which software is out in the wild that may or may not need full refactors to handle this. 

You bring up "However, with multi-signing relying parties can be sure they have seen the complete set of resources, and expected signatures based on a single file. There is no guessing for the RP as to whether they have seen everything relevant." Wouldn’t this also go the opposite way as well? If a TA goes down and/or is not included in your set of TAs, the multi-signed object goes out? Increasing the blast-radius. With Multiple single-signing this blast radius should lessen. 

Our usecase is fairly obvious on what we would like to use RTA for ( since we already have a poor-mans-version of it implemented and used today. Getting simple RTA objects would make our BYOIP-process a lot simpler, make it go faster and reduce the amount of humans involved. I can't see any outcome where multi-signing makes sense over multiple single-signing and keeping recent outages, slow software-updates, and the fairly slow adoption of RPKI in mind it seems that "keep it simple" is going to help with these things. At least more than what this multi-signing paradigm can give us. 

Happy to hear more comments or some tribal knowledge I just don’t understand in this design choice though. 

Fredrik Korsbäck

On 2021-01-11, 10:54, "Sidrops on behalf of Tim Bruijnzeels" < on behalf of> wrote:

    Dear all,

    Apologies for top-posting, but I wanted to send a readable response highlighting the motivations for the RTA draft and the implementation experience so-far by the co-authors of this draft.

    - Use-cases

    Please bear in mind that this document is specifically intended as a generic profile, without constraining use cases. This is why it includes the following flexibility:
     - multiple signatures
     - publish in the RPKI, or not
     - option to include the full validation path CAs and CRLS in the CMS
       (think TLS, where validation does not require the assembly of a local cache of signed objects)

    The use case is intentionally _not_ limited to secure routing and publishing in the RPKI may not be necessary in envisaged cases.

    - Publishing in the RPKI

    If the RTA is to be published in the RPKI then indeed the filename extension for the detached signature '.rta' as suggest by Job makes sense. However, in many cases there will be no need to publish these RTA files in the global RPKI. The RTA is in essence a detached signature, and as such they are meaningless if an RP does not know which file they were supposed to sign. The file (or object) which has been signed with a detached signature has no role in a CA’s publication point of signed objects and SHOULD NOT (MUST NOT?) be published in a CA’s publication point.

    - Need for multiple signatures

    One case here is that an organisation which operates under multiple parents, e.g. two RIRs or an RIR and an NIR, will receive resources on different CA certificates. Similarly organisations under a single RIR may receive multiple certificates if they hold resources transferred from another region, or if they hold so-called legacy resources where another RIR is the majority holder in the IANA registry. Yet, these organisations may wish to make statements about a set of resources that crosses these boundaries.

    There can also be cases where different organisations want to make a joint statement about shared resources. We do not know what case that might be, but as said above - in this phase the profile allows for arbitrary use cases.

    - Multi-signing vs multiple single-signing

    It is true that requiring single signing for RTAs simplifies the specification. And for some use cases where multiple signatures would be required - multiple single signed RTAs would do fine.

    However, with multi-signing relying parties can be sure they have seen the complete set of resources, and expected signatures based on a single file. There is no guessing for the RP as to whether they have seen everything relevant.

    Question is of course whether this justifies the additional complexity.

    - Multi-sign: Complexity for CA

    Having implemented this in Krill I believe that the complexity is not that bad. Essentially this boils down to letting CAs generate keypairs for the EE certificates and agree on a set of resources. Note that the SET of SKIs of these EE certificates and the agreed resource set are part of the signed content. Then one CA can be the first to add their EE certificate containing its resources and sign with the associated private key, and then the next CA (which may be another CA cert held by the same organisation) can add their signature.

    For use cases where only a single signature is needed the CA can of course just sign things without the need to synchronise with other parties.

    - Multi-sign: Complexity for RPs

    (note, I will use an informal description here)

    For single signed the RP needs to verify that all resources on the RTA are contained by the EE certificate, which is validly signed all the way back up to a known TA. The RTA MAY include CAs and CRLs needed for this verification. If they are, and if the CRLs are not stale, they will be used for validation. If they are not present, stale or invalid, then the RP can look at the public RPKI and find CA certificates and CRLs there.

    For multi signed the process is not changed much. But rather than doing this once, the RP will need to do this N times *and* it will need to verify that the union of resources in the EE certificates used for signing include the described resources.

    If N == 1 then this does not increase the complexity. If N > 1 then there may be some fragility, because any of the paths can fail, but it is reasonable to state that if multiple signatures are required then it is a requirement that the RTA MUST be considered invalid if the validation of any signature or EE certificate fails.


    > On 30 Dec 2020, at 15:48, Ben Maddison <> wrote:
    > On 12/29, Job Snijders wrote:
    >> On Tue, Dec 29, 2020 at 04:16:39PM +0100, Claudio Jeker wrote:
    >>> Up until now all objects only had a single EE cert and a single SID and
    >>> all the linking done with the SKI was a 1-to-1 mapping resulting in a
    >>> simple tree structure with the trust anchor as root.
    >>> This draft allows for multiple EE certs and so multiple paths up to the
    >>> trust anchors. This makes handling RTA a lot more complex than any other
    >>> object under RPKI. It also results in a lot more failure conditions since
    >>> there are more EE certs involved in the validation process.
    >> <snip/>
    >> It is possible the RTA authors forsee use cases where the 'multiple
    >> signatures' offers irreplaceable value, I'm not sure.
    > FWIW, all the use cases that I have in mind for RTA need only a single
    > signer.
    > I have been trying to think of some creative uses that can't be solved
    > by separate objects, and I can't think of any.
    > Thus, if this change can speed up implementation then I'm all for it.
    > Cheers,
    > Ben
    > _______________________________________________
    > Sidrops mailing list

    Sidrops mailing list