Document: draft-ietf-opsawg-prefix-lengths
Title: Publishing End-Site Prefix Lengths
Reviewer: Valery Smyslov
Review result: Has Issues

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
Document editors and WG chairs should treat these comments just like any other
last call comments.

The document describes a way to augment the Routing Policy Specification
Language with information about the length of the prefixes.

Issues.

1. Section 6. The following text is confusing:

   The Certification Authority (CA) SHOULD sign only one prefixlen file
   with each generated private key and SHOULD generate a new key pair
   for each new version of a particular prefixlen file.  The CA MUST
   generate a new End Entity (EE) certificate for each signing of a
   particular prefixlen file.  An associated EE certificate used in this
   fashion is termed a "one-time-use" EE certificate (see Section 3 of
   [RFC6487]).

First, in my understanding of how PKI works, CAs never signs anything rather
than other certificates and CRLs, In particulat, CAs never sign application
data. So I failed to understand what is the first sentence about. Am I missing
something?

Then, it is not clear to me how these SHOULD and MUST are aligned with each
other and how the first SHOULD is aligned with "one-time-use" of EE
certificate. For me this looks inconsistent. Am I missing something?

2. Section 6, list item 3.

       The certification path
       MUST be valid according to the validation algorithm in [RFC5280]
       and the additional checks specified in [RFC3779] associated with
       the IP Address Delegation certificate extension and the
       Autonomous System Identifier Delegation certificate extension.

A few paras above there is a requirement:

   The signing certificate MUST NOT include the Autonomous System
   Identifier Delegation certificate extension [RFC3779].

If the Autonomous System Identifier Delegation extension cannot
be present in the certificate, then I wonder how to perform additional checks
specified in RFC 3779 for this extension.

3. Section 7. "If the prefixlen file is signed, and the signer's certificate
changes, the signature in the prefixlen
   file MUST be updated."

How a certificate can be changed? Perhaps the situation when the certificate
becomes invalid (expired or revoked) is meant? But how to update the signature
in this case? The CA must first issue a new certificate and only after that
this "MUST" can be accomplished. So, I think this sentence should be expanded
to clarify what is meant and what is the needed sequence of actions in this
situation.

Nits:
1. From reading Section 6 it was not immediately clear for me what is meant by
"address range"
   in the context of signing certificate (e.g., in the sentence "The address
   range of the signing certificate MUST cover all prefixes in the signed
   prefixlen file.". As I realized later, this address range is specified in
   the IP Address Delegation Extension defined in RFC 3779, but this is not
   explicitly mentioned in the draft. It would be helpful if this is said
   explicitly referencing RFC 3779 close to the beginning of Section 6.

2. Section 6. In the same sentence "The address range of the signing
certificate MUST cover all prefixes
   in the signed prefixlen file." I wonder why a single address range is
   mentioned. From my reading of RFC 3779 the IP Address Delegation Extension
   can specify multiple ranges, not a single one (SEQUENCE OF IPAddressOrRange).

3. Section 6. I'd rather move para starting with "An address range A "covers"
address range B..." closer
   to the requirement "The address range of the signing certificate MUST cover
   all prefixes in the signed prefixlen file." for readability.

4. Section 6. I think that the following requirement "All of the above steps
MUST be successful to consider the prefixlen
   file signature as valid." is not needed - the draft already have RFC 2119
   language for each step of the validation algorithm.

5. Section 7. "The prefixlen files MUST be published via and fetched using
HTTPS [RFC9110]." While I think this is
   a good requirement, I wonder why other secure protocols are prohibited? Or
   say out-of-band delivery?

6. Section 7. "To dedicate a signing private key for signing a prefixlen file,
an RPKI
   Certification Authority (CA) may issue a subordinate certificate
   exclusively for the purpose shown in Appendix A.". I believe "as" is missing
   here, but even in this case I'd rather make this sentence more clear by
   clarifying the purpose. I also wonder whether "may" should be "MAY" here.

7. Section 8 uses acronim CGNAT. Perhaps CGN is meant?



_______________________________________________
OPSAWG mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to