thanks Henk for your notes!

   Geoff

Secure Inter-Domain Routing WG (sidr)
IETF 67, San Diego
WEDNESDAY, November 8, 2006
0900-1130 Morning Session I
====================================================
CHAIR(s): Geoff Huston <gih at apnic.net>
          Sandra Murphy <sandy at tislabs.com>

AGENDA:

 1) Administrivia                                             5 minutes

   - Mailing list: http://www.ietf.org/mail-archive/web/sidr/index.html
   - Scribe: Henk Uijterwal
   - Blue Sheets
   - Agenda Bashing

 2) WG Status Report                                        10 minutes

    Chairs

 3) Certificate Discussion (Geoff Huston)                   30 minutes

    A Profile for X.509 PKIX Resource Certificates
    draft-ietf-sidr-res-certs-02.txt
    Available at:
    http://www.ietf.org/internet-drafts/draft-ietf-sidr-res-certs-02.txt

      This will discuss the latest version of the resource certificate
      draft and report on the status of a trial implementation of resource
      certificates.

 4) Certificate Policy and Certificate Practice Statement (Steve Kent)
                                                            30 minutes
    Template for an Internet Registry's Certification Practice Statement
    (CPS) for the Internet IP Address and AS Number (PKI)
    draft-ietf-sidr-cps-irs-00.txt
    Available at:
    http://www.ietf.org/internet-drafts/draft-ietf-sidr-cps-irs-00.txt

    Certificate Policy (CP) for the Internet IP Address and AS Number (PKI)
    draft-ietf-sidr-cp-00.txt
    Available at:
    http://www.ietf.org/internet-drafts/draft-ietf-sidr-cp-00.txt

      This will discuss both a certificate policy for a PKI used for
      resource certificates and a template for a Certification Practice
      Statement (CPS) for an Internet Registry.

 5) Route Origination Attestation (Sandy Murphy)            30 minutes

    Discussion of route origination attestation issues.


SUMMARY:

  The WG agenda items covered the progress with the charter milestones, the
  resource certificate profile and the initial considerations regarding
  routing origination attestations.

  The efforts on an architecture for inter-domain routing security are
  falling behind. A group of authors volunteered to work on this in the
  coming months, so that there is now some confidence that while this
  milestone is going to be late, a path of progress has been identified.
  Work on secure origination is also now visible.

  We had a report from Russ White, the RSPEC WG co-chair that the IDR
  requirements documents was close to completion and that they are unable
  to resolve the issues relating to distinct approaches with respect to
  path validation. We will await the RPSEC outcomes to understand the
  situation a little better.

NOTES:

2. WG Status Report

  Sandy Murphy (Co-Chair) reviewed the WG milestones and note that the WG
  was slipping behind on the document on a secure inter-domain routing
  architecture.

  ACTION:
     Sure Hares and Steve Kent volunteer to work on this draft

The certificate profile specification is largely completed, and the ROA activity is starting up.

The upcoming deadlines to complete this work in the period March - June 2007 remain possible.


3. Certificate Discussion


a. Resource Certificate Profile

The draft to which this item is speaking to is from APNIC together with an inter-RIR design team.

  A resource certificate is based on specific choices made from the PKIX
  profile (RFC3780 (not the draft 3280bis)), and RFC3779 Resource
  Extensions. The general constraints are that the RFC3779 extensions are
  critical and MUST be present. In terms of specific profile, the AIA is
  cast as a persistent URL, and EE certs are used as one-off signing
  certificates where the private key is destroyed after a single signing.

  Questions / Comments:

  Russ White: When should people turn the CA bit off? The draft should
      offer some guidance.

  Steve Kent: The scope of the CRL is all certificates issued by this
      issuer when using this key. Under key rollover the CRLDP will also
      follow the new key, so that the CRL is not constant across key
      rollover.


  Steve Kent: We should analyze the impact of this choice of one-off EE
      certificates. It is an elegant solution for some things, but there
      might be more. The example cited was the routing table, in the case
      where an ISP with a /x prefix allocates sub blocks to customers,
      where those customers become multi homed in the routing system. How
      many EE certs are involved in this case? Based on use-once principle,
      it appears that many more EE certs are needed to support sub
      allocations.

  Geoff Huston: Does not envisaging this happening to a large extent
      (assuming in the response that EE certs are not 1:1 matched with
      routing objects in terms of constraints on advertisement of more
      specific prefixes)

  Brian Wise: Is the one-off use nature of an EE cert mandatory or a
      suggested requirement?

  Geoff: This is a suggested requirement.


b. Resource Certificate Trial progress report.

  (This report was noted as being an informational item.)

  Questions / Comments:

  Steve Kent: With respect to your illustration of the use of signing a
      database object with a signature that was supported by a Resource
      Certificate then the semantics of the signing need to be carefully
      defined. The signer is a resource holder, and the result of the
      signing relates to the resources in the database object.

  Steve Kent: Is worried about the opportunity to retrofit data in into
      existing data structures. Registries can have a diverse range of
      data, while Resource Certificates only attest to resource holdings.
      We don't want to create situation where seeing a signature implies
      trust in all the fields in the object. This unrelated information has
      to be checked.

  George Michaelson: Yes, a Relying Party has to validate this information,
      and existence of signature is not of itself enough for all the fields
      in the registry object.


  Sandy Murphy: How does AS65000 know the person really is ISPx, entitled
      to advertise this prefix? Shouldn't this advertising party want email
      signed by the prefix holder's private key? In your example the
      resource holder has just destroyed it?

  Steve Kent: What Sandy is asking, is, if I send email to my ISP, how do
      they know that the info I provide, claim to be a particular
      subscriber of the ISP, is correct, so they bind the (valid) ROA info
      to the subscriber.

  Geoff Huston: The Resource Certificate has limited use. This does not
      cover secure communication and identity attestation. For such
      purposes the parties may want to use some other trusted communication
      framework. Use an identity certificate if identity is the issue in
      this form of communication.

  Steve Kent: The ISP can decide.

  Geoff Huston: These Resource Certificates provide tools for validation in
      the context of use of resources, and are to be used only for this
      role. They should not be used for unrelated purposes.

  Sandy Murphy: We need guidelines for good usage of these certificates.

4. Certificate Policy and Certificate Practice Statement

  The goal here are informational RFCs. The draft CP and CPS documents need
  review and comments from the Working Group.

  Questions / Comments:

  Paul Wilson, Is it possible that CPS will conflict as a result of local
      differences?

  Steve Kent: The CPS is per issuer, so there cannot be a conflict here.
      The template does not instruct an Issuer what it must do.

  Brian Weiss: This is necessary work, and an informational RFC is a good
      outcome here. How is a PKI-wide CP enforced?

  Steve Kent: Is averse to the term "enforce".  However, issuers will
      declare that they use the CP and hopefully do it according to the CP.

  Russ Housley, This can be summarized as a CP for resources. CAs that
      chose to issue certs will reference this CP by the OID in the issued
      certificates. Issuers will also write a CPS to state how they meet
      the requirements in CP.

  Taijii: CP and CPS are helpful are not only helpful afterwards (to see
      what happened), also useful to build trust infrastructure and
      planning.

  Sandy Murphy: The key pair generation. Is this requestor generated and
      issuer signs, or issuer generated and signed. Is there a recommended
      method?

  Steve Kent: Its requestor generated and issuer-signed. This does not
      preclude the requestor using an agent, and the issuer undertaking
      that agent role.

5. Route Origination attestation


a. ROA Content

  Questions / Comments:

  Steve Kent: Is there benefit in having more than one AS in a ROA?. It
      could be useful for ISPs running a collection of AS.

  Geoff Huston: more than one would be viable, as long as it is one ISP.
      The multiple-AS ROA fate shares in terms of validity across all the
      listed AS's.

  Steve Kent: When talking about a ROA, the associated resource certificate
      for the prefix should be validating the ROA for exact prefix or any
      more specific. From a safety standpoint, should we want an exact
      match, and explicitly disallow more specifics to be validated from a
      covering prefix in a ROA? If both the listed aggregate and more
      specifics can match then is this risky? If you require an exact match
      without more specifics then isn't this less risky in terms of
      validating unintended leakage of more specifics?

  Simon Leinen: This sounds convincing to me.

  Ruediger Volk: In the world of existing allocated prefixes Steve's
      example may break things. Ruediger always asks for precise prefixes.

  Geoff Huston: Noted that more than half the routing table are more
      specifics that share a common origin. Making the ROA precise would
      cause the number of ROAs and the number of EE certs to increase
      proportionately. The issue of whether a ROA allows more specifics or
      not requires some further consideration.

  William Liebzon: In some cases you want constraints, but perhaps we
      should consult with operational folks as to what they want.

  Ruediger Volk: Where do operators communicate routes? Would prefer
      specific routes for specific address blocks.  If this is not
      expressed in the ROA, where then? If we don't do it here, we are
      deferring to another level.

  Geoff Huston: What do you want from a ROA?  Do you want to put routing
      policy in the ROA? This was not intended as a route policy vehicle as
      far as I was aware.

  Larry Blunk:  Allowing more specifics seems to allow lying in path, given
      correct origin AS.

  William Liebzon: Prefers not to have policy in ROAS. Suggests that this
      be referred to the WG list.

  Ruediger Volk: Resource Certs are for address space, while the ROA is to
      switch over from there to the routing system. Description doesn't
      imply policy here - it allows you to define more precisely what you
      are authorizing.

  Geoff Huston: will take this to the list.  This is a draft being written,
      so we can do anything at this early stage!

  Steve Kent: Trust anchors are chosen by relying party.

  Geoff Huston: A ROA doesn't come with trust anchor sets.


b. ROA format and content proposal

   Similar work, started from a different point of view.

   No Questions / Comments

c. Issues

  Questions / Comments:

  Ruediger Volk: Within RPSL, don't touch. For new system: just the address
      holder is right. Path checking is the thing, and a ROA can't do this.

  Geoff Huston: It would be better not to overload ROAs with path
     validation.  We're waiting for RPSEC to give us requirements for
     paths.

  Sandy Murphy: The problem is in ROA, not in path.

  Steve Kent: Mixed feelings, if ROA is a right to originate, then it does
     not need a second signature from the originating AS. It wouldn't solve
     all path attacks in any case.

  Russ White (RPSEC co-chair): The RPSEC IDR current requirements doc is
     most likely what we'll end up with, and as there have been no comments
     recently this like the candidate document for a WG last call. This
     document is not specific on the level of validation required for path
     validity. The document is expected to be in last call before March 2007.





_______________________________________________
Sidr mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/sidr

Reply via email to