Roque,

The algorithms used to issue and validate BGPSEC certificates are the same as those for RPKI res-certs. This bit is in Section 2:

  Further, the algorithms used to generate RPKI CA certificates
  that issue the BGPSEC Router Certificates and the CRLs necessary
  to check the validity of the BGPSEC Router Certificates remain
  unchanged (i.e., they are as specified in [ID.sidr-rpki-algs]).

What that means is that a BGPSEC certs could be validated by a RP compliant with res-cert (modulo the things noted in Sec 3.3). Now if that same RP wants to do BGPSEC it's got to support the bgpsec-prtocol, bgpsec-pki-profile, and bgpsec-pki-algs drafts too. The other way to think about this is that if a BGPSEC RP is going to validate a BGPSEC signature - it's going to need to validate the BGPSEC protocol signature with the public key in the BGPSEC router's certificate using the algs in bgpsec-pki-algs, then the RP is going to need to validate the signature on the BGPSEC router's certificate with the public key and algs in rpki-certs and rpki-algs, and then repeat until it gets to a TA. I also made sure to put in the bgpsec-algs document that the algs used to sign the BGPSEC certs are found in rpki-algs.

I could see changing the following in Section 3.1:

OLD:

  A BGPSEC Router Certificate is a valid X.509 public key certificate,
  consistent with the PKIX profile [RFC5280] and [ID.sidr-res-cert-
  profile], containing the fields listed in this section.  Only the
  differences between this profile and the profile in [ID.sidr-res-
  cert-profile] are listed.

NEW:

  A BGPSEC Router Certificate is a valid X.509 public key certificate,
  consistent with the PKIX profile [RFC5280], containing the fields
  listed in this section.  This profile is based on [ID.sidr-
  res-cert-profile] and only the differences between this profile and
  the profile in [ID.sidr-res-cert-profile] are listed.

Section 3.1.2 points to the bgpsec-algs draft only for the key/alg in
the EE certificate. The signature alg is still as specified in draft-ietf-sidr-rpki-algs-05 because the bgpsec-algs draft is only listing the differences.

Section 3.2 also points to the bgpsec-algs draft because the BGPSEC router is going to request the certificate using the algorithms specified in that draft.

But, I could see adding something like the following to Sec 3.3:

  NOTE: The cryptographic algorithms used by BGPSEC routers are
  found in [ID.sidr-bgpsec-algs].  Currently, the algorithms
  specified in [ID.sidr-bgpsec-algs] and [ID.sidr-rpki-algs] are
  different.  BGPSEC RPs will need to support algorithms that are
  needed to validate BGPSEC signatures as well as the algorithms
  that are needed to validate signatures on BGPSEC certificates,
  RPKI CA certificates, and RPKI CRLs.

I rambled a bit so let me know if this makes sense.

spt

On 8/9/11 11:59 AM, Roque Gagliano wrote:
Sean,

In Section 3.3 of 
http://datatracker.ietf.org/doc/draft-turner-sidr-bgpsec-pki-profiles/, you are 
missing to mention that one of the difference from 
draft-ietf-sidr-res-cert-profile is that your document refers a different 
algorithm suite document. Consequently, a BGPSEC certificate will not validate 
draft-ietf-res-cert-profile, as long as the two algorithm suites are different, 
correct? If that is the case, I believe you should clarify it and probably 
remove the references that the new profile is consistent with 
draft-ietf-sidr-res-cert-profile certificates.

Roque



On Aug 5, 2011, at 10:19 PM, Sean Turner wrote:

On 8/5/11 2:11 PM, Sandra Murphy wrote:


On Thu, 4 Aug 2011, Sean Turner wrote:

On 8/3/11 8:43 PM, Randy Bush wrote:
The intention was to focus on the use case for the proposed changes
(BGPSEC certs).

what is a "BGPSEC cert?"

What Mark and I are currently proposing in
draft-turner-sidr-bgpsec-pki-profiles is that a BGPSEC certificate is a

<snip>


PS Technically, the EKU is defined in
draft-turner-bpgsec-pki-profiles. It's

<snip>

If the WG decides to adopt this approach, then we'll go through the
appropriate procedures to request an OID and include it in the draft.

Sean, would you like to request wg adoption for these two drafts?

Yes I would like the wg to consider adoption of:

http://datatracker.ietf.org/doc/draft-turner-sidr-bgpsec-pki-profiles/
http://datatracker.ietf.org/doc/draft-turner-sidr-bgpsec-algs/

as the starting point for certificates and algorithms for BGPSEC.

spt
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to