[Sidrops] draft-ietf-sidrops-signed-tal-10.txt

Russ Housley <housley@vigilsec.com> Tue, 12 July 2022 20:41 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F73EC14F721; Tue, 12 Jul 2022 13:41:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id waN34BsG97Pn; Tue, 12 Jul 2022 13:41:40 -0700 (PDT)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3FC0AC14CF0D; Tue, 12 Jul 2022 13:41:39 -0700 (PDT)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id 86CBD159D80; Tue, 12 Jul 2022 16:41:38 -0400 (EDT)
Received: from [10.0.1.2] (pfs.iad.rg.net [198.180.150.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id 79D4F1599FF; Tue, 12 Jul 2022 16:41:38 -0400 (EDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.21\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <165757888277.5020.13307456649922069639@ietfa.amsl.com>
Date: Tue, 12 Jul 2022 16:41:38 -0400
Cc: SIDR Operations WG <sidrops@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <252FDA4D-12C2-4B46-848D-AECDC6233DF4@vigilsec.com>
References: <165757888277.5020.13307456649922069639@ietfa.amsl.com>
To: SIDROps Chairs <sidrops-chairs@ietf.org>
X-Mailer: Apple Mail (2.3445.104.21)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/xdkz4wfejmYa2HZVrNp1czUn9zI>
Subject: [Sidrops] draft-ietf-sidrops-signed-tal-10.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jul 2022 20:41:41 -0000

Dear SIDRops Chairs:

I recall a request for early allocation of OIDs for this document.  Did that happen?

Russ


> On Jul 11, 2022, at 6:34 PM, internet-drafts@ietf.org wrote:
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the SIDR Operations WG of the IETF.
> 
>       Title           : RPKI Signed Object for Trust Anchor Key
>       Authors         : Carlos Martinez
>                         George G. Michaelson
>                         Tom Harrison
>                         Tim Bruijnzeels
>                         Rob Austein
> Filename        : draft-ietf-sidrops-signed-tal-10.txt
> Pages           : 19
> Date            : 2022-07-11
> 
> Abstract:
>  A Trust Anchor Locator (TAL) is used by Relying Parties (RPs) in the
>  Resource Public Key Infrastructure (RPKI) to locate and validate a
>  Trust Anchor (TA) Certification Authority (CA) certificate used in
>  RPKI validation.  This document defines an RPKI signed object for a
>  Trust Anchor Key (TAK), that can be used by a TA to signal the
>  location(s) of the accompanying CA certificate for the current key to
>  RPs, as well as the successor key and the location(s) of its CA
>  certificate.  This object helps to support planned key rolls without
>  impacting RPKI validation.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sidrops-signed-tal/
> 
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-sidrops-signed-tal-10.html
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sidrops-signed-tal-10
> 
> 
> Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts