On Wed, Sep 18, 2013 at 3:16 PM, Murphy, Sandra <sandra.mur...@parsons.com> wrote: > Looks like this is the final word. > > Consensus of the wglc is that the document is good to go, with revisions. > > Draft authors, could you please submit a new version with the wording > suggested below? >
draft-authors: "Y U NO SEND DRAFT UPDATE?" :) > As an update to RFC6487, this document broadens the class of certificates > that conform to the RPKI profile by explicitly including within the profile > those certificates that contain a policy qualifier as described here. A > relying party that performs a strict validation based on RFC6487 and fails to > support the updates described in this document, would incorrectly invalidate > RPKI objects that implement the changes in Section 2. > > Note this includes one nit change of "implements" to "implement". > > Please also consider the nits mentioned in the message: > http://www.ietf.org/mail-archive/web/sidr/current/msg06124.html > > --Sandy, speaking as wg co-chair > > > ________________________________________ > From: Roque Gagliano (rogaglia) [rogag...@cisco.com] > Sent: Monday, August 26, 2013 4:18 AM > To: Geoff Huston; Murphy, Sandra > Cc: Andy Newton; sidr@ietf.org list > Subject: Re: [sidr] wglc draft-ietf-sidr-policy-qualifiers-00 > > Hi Geoff/Sandy, > > Agree that we can void the mention on the current status of the known RP. As > the due-diligence was done, I am fine. > > I think your proposed text from Geoff goes well with the intention of the > original text (at least with the first sentence).It is just a matter of how > explicit we want to be in the consequences of not implementing the changes on > this document for RP parties. We and go with only his sentence or adding the > two sentences: > > "As an update to RFC6487, this document broadens the class of certificates > that conform to the RPKI profile by explicitly including within the profile > those certificates that contain a policy qualifier as described here. A > relying party that performs a strict validation based on RFC6487 and fails to > support the updates described in this document, would incorrectly invalidate > RPKI objects that implements the changes in Section 2." > > Roque > > > > On Aug 24, 2013, at 12:03 AM, Geoff Huston <g...@apnic.net> wrote: > >> Wouldn't it be better to note that: As an update to RFC6487, this document >> broadens the class of certificates that conform to the RPKI profile by >> explicitly including within the profile those certificates that contain a >> policy qualifier as described here. >> >> Geoff >> >> >> >> On 24/08/2013, at 4:09 AM, "Murphy, Sandra" <sandra.mur...@parsons.com> >> wrote: >> >>> Speaking as working group chair: >>> >>> I can't be certain that this indicates a promise to modify the draft or >>> not. Roque, Andy, could you comment? >>> >>> If so, a new version is needed and I'll say so on the list. >>> If not, I'll have to ask for resolution on list. >>> >>> Speaking as regular ol' member (and a bit as wg chair, as I'm not clear >>> about the intent of the new text): >>> >>> I don't think this text hurts anything, but I am puzzled about the intent. >>> If "all known" implementations comply, why mention the problem? OTOH, it >>> might serve to forestall AD/IESG questions. >>> >>> So I agree with Andy's observation, though I'd say a heading "Backward >>> Compatibility Considerations" rather than "Interoperability Considerations" >>> suits the situation better. >>> >>> (Apologies - searching for the thread, I found these comments stuck in my >>> draft folder from 17 July.) >>> >>> --Sandy >>> >>> P.S. >>> >>> "strick"->"strict" >>> "RPKI signed objects" -> "RPKI objects" <because you mean CA certs as well >>> and signed objects might be taken to mean only ROAs and ghostbusters and >>> manifests etc> >>> "implements"->"include" or "contain" or... >>> "RP"-> relying party (or you'll have to define the acronym somewhere) >>> Not sure what ""as in IDR" means. >>> >>> ________________________________________ >>> From: Andy Newton [a...@arin.net] >>> Sent: Tuesday, July 16, 2013 9:49 AM >>> To: Roque Gagliano (rogaglia) >>> Cc: Murphy, Sandra; sidr@ietf.org >>> Subject: Re: [sidr] wglc draft-ietf-sidr-policy-qualifiers-00 >>> >>> This sounds fine to me, though it is really an interoperability >>> considerations section thingy. The IETF does those now, right? :) >>> >>> -andy >>> >>> On 7/16/13 4:55 AM, "Roque Gagliano (rogaglia)" <rogag...@cisco.com> wrote: >>> >>>> Thanks Andy. >>>> >>>> Do you think we need to add something in the security section about the >>>> transition? >>>> >>>> Something like: >>>> >>>> "A RP that performs a strick validation based on RFC6487 and fails to >>>> support the updates described in this document, would incorrectly >>>> invalidate RPKI signed objects that implements the changes in Section 2. >>>> At the time of this writing, all known RP software suites (you can >>>> mention them as in IDR) were tested and supported the updates on this >>>> document" >>>> >>>> Roque >>>> >>>> On Jul 15, 2013, at 7:07 PM, Andy Newton <a...@arin.net> wrote: >>>> >>>>> On 7/15/13 10:22 AM, "Roque Gagliano (rogaglia)" <rogag...@cisco.com> >>>>> wrote: >>>>> >>>>>> Before sending my support to advance to the IESG, I wanted to ask the >>>>>> author if they have tested the effects of this change on existing RP >>>>>> tools. Do they really set the certificate as invalid? >>>>> >>>>> Yes, we have tested against the three RP suites. One did not require a >>>>> change while the other two required simple one line changes. Current >>>>> releases of all three now accommodate it. >>>>> >>>>> -andy >>>>> >>>> >>>> >>> >>> >>> _______________________________________________ >>> sidr mailing list >>> sidr@ietf.org >>> https://www.ietf.org/mailman/listinfo/sidr >> > > _______________________________________________ > sidr mailing list > sidr@ietf.org > https://www.ietf.org/mailman/listinfo/sidr _______________________________________________ sidr mailing list sidr@ietf.org https://www.ietf.org/mailman/listinfo/sidr