Dear RIPE NCC,

On Tue, Feb 16, 2021 at 04:56:31PM +0100, Nathalie Trenaman wrote:
> On Monday, 15 February we encountered an issue with our RPKI software.
> This issue prevented us from publishing RPKI object updates from
> 08:07-18:06 (UTC). 
> 
> During this period, Certificate Authority activation and Route Origin
> Authorization configuration updates were delayed and therefore not
> visible in the RPKI repository.

It appears Certificate Authority revocation was also delayed.

> The updates were published after we restarted the system at 17:45
> (UTC), with full recovery completed by 18:06 (UTC).  Since this
> non-publishing period is shorter than our default RPKI object validity
> period, set to 8 hours, existing objects that are not updated were
> still valid. No data was lost during this period. 

Can the following phrase "default RPKI object validty period, set to 8
hours" please be clarified?

For objects produced in the RIPE-hosted RPKI environment I observe the
following validity periods are commonly used:

Object type        | validity duration after issuance
-------------------+---------------------------------
CRLs               |         24 hours
ROA EE certs       |         18 months
Manifest eContent  |         24 hours
Manifest EE certs  |          7 days
CAs                |         18 months

I'm just guessing, is the '8 hour' period a reference to RIPE-751
section 2.3?

    "A certificate will be published within eight hours of being issued (or 
deleted)."

The RIPE-751 CPS also states in section 4.9.8 ("Maximum latency for
CRLs"): CRLs will be published to the repository system within one hour
of their generation. 

As the outage appears to have exceeded both the 1 hour revocation window
and 8 hour object publication window, RIPE NCC was not compliant with
its own CPS.

The multitude of RPKI service impacting events as a result from
maloperation of the RIPE NCC trust anchor are starting to give me me
cause for concern.

Kind regards,

Job

Reply via email to