I think it might be helpful to explore some aspects of how we envision migrating to a new algorithm suite, without debating all of the details of migration. This way we can determine if there is agreement on general principles re migration before we try to resolve details.

My notion is that the process of migration begins with the publication of a new CP version by the IETF. That process will be very visible and take several months to complete, at a minimum. The new CP would specify the next algorithm suite by reference to an existing RFC that defines the signature algorithm and hash algorithm that comprise the suite. That RFC will have been around for a while, because we would not consider migrating to anything other than a well-established, mature algorithm suite. Thus the suite itself will have been defined in an RFC well in advance.

I think new CP should specify the following milestones:

- CA Ready <next alg suite name>: By this date all (non-leaf) CAs MUST be ready to process a request from a child CA to issue a certificate containing a key for the new signature algorithm. The certificate that is issued would be signed under the current algorithm suite. The reason we need this date is because a certificate request requires the issuing CA to verify proof of possession (PoP) for the new key by the requesting party. Thus by this date all CAs MUS be able to perform the PoP procedure, even if they are not yet ready to issue certificates under the new algorithm suite. (If we decide that a top-down migration approach is desirable, this date might apply to IANA and the RIRs, rather than to all CAs.)

- CA Set <next alg suite name>: By his date all CAs MUST be prepared to issue a certificate signed under the new algorithm suite to a child CA that requests such. At this stage there is no requirement that any CA issue such certificates, but rather that all (not leaf) CAs be prepared to do so upon request.


- CA Go <next alg suite name>: By this date, all (non-leaf) CAs MUST have re-issued all child CA certificates, under the new algorithm suite, as well as CRLs, manifests, and ROAs. The old suite is still in use and thus CAs are maintaining parallel, synchronized sets of signed objects under old and new algorithm suites. (If we adopt dual-signatures for ROAs and manifests, one set of those objects can satisfy this requirement. However, a certificate or CRL has only one signature, so corresponding copies of these objects are still required.)

- RP Ready <next alg suite name>: By this date all RPs MUST be prepared to process certificates issued under the new algorithm suite. Since all CAs are publishing all sighed products under both suites by now, RPs have plenty of material to process to verify that they get the same results under old and new suites. My recommendation would be that if the results from the new suite don't agree with the results from the current suite, stick with the results from the current suite while you try to figure out the problem. (This may require contacting some of the CAs to see why there is a mismatch, but since you can keep using the products under the current alg suite, there should be time to resolve the problems.)


- Twilight <old alg suite name>: At this date a CA MAY cease issuing signed products under the old algorithm suite, at its discretion. (This affects the children of the CA, so there is a need for coordination. But, since this date is after RP Ready, no RPs should require signed products under the old algorithm suite at this stage.)

- EOL <old alg suite name>: At this date NO signed objects under the old algorithm suite are generated or consumed. More formally, every CA and every RP MUST NOT generate certs, CRLs, or other RPKI signed objects under the old alg suite. The transition is now complete.

Note that during the interval when current and new algorithm suites are in use (from CA Set <alg suite name> until Twilight <alg suite name>) a CA MUST be prepared to process key rollover requests for children under both current and new suites. There are a lot of details to be worked out for this.

I have intentionally not suggested any durations for the intervals defined by the ordered list above. Clearly that is one of the topics we need to address, if we agree to a model that adopts a timetable like this. But, first we need to discuss whether these are the right milestones.

Comments and suggestions are solicited.

Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to