Folks,

We just submitted a revised version of the following I-D:
        Certificate Policy (CP) for the Resource PKI (RPKI)
        draft-ietf-sidr-cp-04.txt

Thanks go to Geoff Huston, Randy Bush, and Tim Christensen for their feedback. The main changes from the 03 version are listed below (not including date changes, typo corrections and various minor wording changes). Note that many of them but NOT all were in the non-IETF version distributed to the rescert mailing list in May. Apologies in advance if I missed any significant changes.

Looking forward to receiving your feedback (and completing this document :-)).
Karen


a. Corrected definition of a "bogus" route to include unauthorized advertisement of an unallocated address (not just one that has been allocated)

b. Changed text throughout the draft to allow the possibility of additional as-yet-unagreed-upon signed objects (as opposed to just ROAs).

c. Changed text throughout the draft from "distributing" PKI data to "publishing PKI data in/into/at the RPKI distributed repository system" (or similar text).

d. Added text throughout the draft to allow the possibility of other routing-related uses of the RPKI data besides route filters.

e. 1.3.1 Certification authorities -- Added IANA and rewrote this in attempt to clarify. It now says:

   The organizations that allocate IP addresses (IANA, RIRs, NIRs,
   LIRs/ISPs) and AS numbers (IANA, RIRs and NIRs) act as CAs in this
PKI.
   Organizations that hold address space and create and sign objects
   such as ROAs and manifests also act as CAs in this PKI. Such
   organizations will include internet number registries, LIRs/ISPs,
   provider-independent subscribers and some dual-homed subscribers.
   For each signed object an organization creates, it will issue a
   corresponding EE certificate that will be used to validate the
   digital signature on the signed object. (Organizations may issue
   other types of EE certificates in the future). See [ARCH] for more
   details.

f. 1.3.5 Other Participants -- Now says:

   Every organization that undertakes a role as a CA in this PKI is
   responsible for populating the RPKI distributed repository system
   with the certificates, CRLs, and other signed objects that it
   issues. The organization can operate its own publication point or
   outsource this function (See sections 2.1 and 2.2.)

g. 1.5.1 Organization administering the document -- Now says:

   This CP is co-administered by IANA and the five Regional Internet
   Registries (RIRs), which act as default trust anchors for the PKI:

   and lists them with their addresses.

h. 1.5.2 Contact person -- Now lists general contact info for IANA and the five RIRs.

i. The registries (IANA and the 5 RIRs) are now listed in alphabetic order wherever they appear.

j. 3.1.1 Types of names -- Addition of IANA whose name will be a "directory distinguished" name. Addition of NIRs to list of organizations whose names "consist of a single CN attribute with a value generated by the issuer."

k. 5.6 Key changeover -- Changed text to indicate that "Ideally, the private key that a CA uses to sign a certificate or CRL should have a validity period that is at least as long as that of any certificate being signed. However, since a certificate issued under this PKI will have a validity period that reflects the contractual relationship between the issuer and subject, this may lead to situations where an issued certificate has a validity period longer than that of the key used to sign the certificate."

l. 5.8 CA or RA termination -- Changed text to indicate that "If an organization acting as a CA in this PKI terminates operation without identifying a replacement, then the effective control of the IP addresses and AS numbers revert back to the issuing organization, and address space and AS number allocations that have been previously validated via that CA are invalidated as of revocation of the CA's certificate."

m. 6.1.4 CA public key delivery to relying parties -- Added IANA to list of entities whose public keys are distributed out of band, i.e., trust anchors. Deleted (RIRs) from the sentence that says "Public key values and associated data for the default trust anchors will be distributed out of band..."

n. 6.3.2 Certificate operational periods and key pair usage periods -- Updated as follows to say:

   IANA holds all IP address and AS number space, i.e., all the
   resources which form the base of the RPKI hierarchy, Because a self-
   signed IANA certificate represents this base, it should have a very
long life time.
   Because RIRs and NIRs receive periodic new allocations, it is
   appropriate for their key pairs and certificates to have lifetimes
   that match the periodicity of these allocations.  However, to
   minimize disruption, the key pairs should be maintained across
certificate changes.
   LIR/ISP and subscriber certificates typically will have validity
   periods commensurate with the duration of service agreements. The
   validity periods will be chosen by the issuing CA and described in
   its CPS.

o. 9. Other Business and Legal Matters - Changed almost all subsections to be "[OMITTED]" because there is no single set of responses that would cover every relevant organization in the RPKI, i.e., each of these organizations will have to specify this information in its CPS or other document.

p. 9.12 Amendments -- Changed as follows -- NOTE that this needs to be changed to match Secton 1.5.1. My apologies, I missed this.

   9.12.1. Procedure for amendment

   The procedure for amendments to this CP is via written notice from
   the Secretary of the NRO.

   9.12.2. Notification mechanism and period

   The NRO will provide one month's notice of a change to this CP.

   9.12.3. Circumstances under which OID must be changed [OMITTED]

   If the Secretary judges that the change(s) will not materially
   reduce the  acceptability of certificates for RPKI purposes, then
   there will be no change to the CP OID.  If the Secretary judges that
   the change(s) will materially change the acceptability of
   certificates for RPKI purposes, then there will be a new CP OID.

q. References -- Added:

   [REPOS] Huston, G., Loomans, R., and Michaelson, G., A Profile for
       Resource Certificate Repository Structure, draft-huston-sidr-
       repos-struct-01.txt, work in progress.
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to