Speaking as wg chair, I aggree with Geoff's understanding of the current
wg document strategy.
I can see drawbacks to the suggested process.
The sidr-rpki-algs draft was instituted so that changes in algorithm would
not require changes in the base specs, as an ease to implementers of the
base spec and an ease to process.
If we combine the discussion of the transition/migration procedure with
the discussion of required algorithms, we complicate the process both now
(we have to wait until both issues achieve consensus to progress either
work) and also when either the algorithm requirements or the transition
procedure changes.
I believe there is reason to keep the discussion of algorithms
requirements separate from discussion of transition/migration procedures.
--Sandy, speaking as wg chair
On Thu, 1 Jul 2010, Geoff Huston wrote:
I disagree Roque. My understanding was that all the references to algorithms
used in the RPKI were collected into a single document that itself could be
updated without requiring updates to all the other documents - That central
reference point is the rpki-algs document. A second document was proposed that
described how to migrate the RPKI from one algorithm suite to another. The
latter document does not obsolete the former.
An update to the alg document would presumably say something along the lines of "The standard
algorithm used in the RPKI is <X>, and use of RSASSA-PKCS1-v1_5 is deprecated. The process of
migration to use of algorithm <X> is described in RFC Z." This algorithm document could be
further updated to refer to other algorithms and still reference the same migration process
description.
Geoff
On 30/06/2010, at 11:49 PM, Roque Gagliano wrote:
Hi Steve,
Just one comment of procedure. We have now the document
draft-ietf-sidr-rpki-algs, so I guess your procedure should be in a document
that obsoletes that document in the future. There is no real reference to
algorithms in the CP now.
Roque.
On Jun 23, 2010, at 6:11 PM, Stephen Kent wrote:
I think it might be helpful to explore some aspects of how we envision
migrating to a new algorithm suite, without debating all of the details of
migration. This way we can determine if there is agreement on general
principles re migration before we try to resolve details.
My notion is that the process of migration begins with the publication of a new
CP version by the IETF. That process will be very visible and take several
months to complete, at a minimum. The new CP would specify the next algorithm
suite by reference to an existing RFC that defines the signature algorithm and
hash algorithm that comprise the suite. That RFC will have been around for a
while, because we would not consider migrating to anything other than a
well-established, mature algorithm suite. Thus the suite itself will have been
defined in an RFC well in advance.
I think new CP should specify the following milestones:
- CA Ready <next alg suite name>: By this date all (non-leaf) CAs MUST be
ready to process a request from a child CA to issue a certificate containing a key
for the new signature algorithm. The certificate that is issued would be signed
under the current algorithm suite. The reason we need this date is because a
certificate request requires the issuing CA to verify proof of possession (PoP) for
the new key by the requesting party. Thus by this date all CAs MUS be able to
perform the PoP procedure, even if they are not yet ready to issue certificates under
the new algorithm suite. (If we decide that a top-down migration approach is
desirable, this date might apply to IANA and the RIRs, rather than to all CAs.)
- CA Set <next alg suite name>: By his date all CAs MUST be prepared to
issue a certificate signed under the new algorithm suite to a child CA that requests
such. At this stage there is no requirement that any CA issue such certificates, but
rather that all (not leaf) CAs be prepared to do so upon request.
- CA Go <next alg suite name>: By this date, all (non-leaf) CAs MUST have
re-issued all child CA certificates, under the new algorithm suite, as well as CRLs,
manifests, and ROAs. The old suite is still in use and thus CAs are maintaining
parallel, synchronized sets of signed objects under old and new algorithm suites. (If
we adopt dual-signatures for ROAs and manifests, one set of those objects can satisfy
this requirement. However, a certificate or CRL has only one signature, so
corresponding copies of these objects are still required.)
- RP Ready <next alg suite name>: By this date all RPs MUST be prepared
to process certificates issued under the new algorithm suite. Since all CAs are
publishing all sighed products under both suites by now, RPs have plenty of material
to process to verify that they get the same results under old and new suites. My
recommendation would be that if the results from the new suite don't agree with the
results from the current suite, stick with the results from the current suite while
you try to figure out the problem. (This may require contacting some of the CAs to
see why there is a mismatch, but since you can keep using the products under the
current alg suite, there should be time to resolve the problems.)
- Twilight <old alg suite name>: At this date a CA MAY cease issuing
signed products under the old algorithm suite, at its discretion. (This affects the
children of the CA, so there is a need for coordination. But, since this date is
after RP Ready, no RPs should require signed products under the old algorithm suite
at this stage.)
- EOL <old alg suite name>: At this date NO signed objects under the old
algorithm suite are generated or consumed. More formally, every CA and every RP MUST
NOT generate certs, CRLs, or other RPKI signed objects under the old alg suite. The
transition is now complete.
Note that during the interval when current and new algorithm suites are in use (from CA Set
<alg suite name> until Twilight <alg suite name>) a CA MUST be prepared to
process key rollover requests for children under both current and new suites. There are a
lot of details to be worked out for this.
I have intentionally not suggested any durations for the intervals defined by
the ordered list above. Clearly that is one of the topics we need to address,
if we agree to a model that adopts a timetable like this. But, first we need to
discuss whether these are the right milestones.
Comments and suggestions are solicited.
Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr