On 04/04/2012 18:21, David Mandelberg wrote:
On Wed, 2012-04-04 at 09:27 +1000, Geoff Huston wrote:
I'm tending to a "reject". Section 4.8.3 does not precisely apply to CRLs, so 
to accept this would then require a further errata notice to amend this errata to narrow 
down the scope of the AIA further.
AKI, not AIA. I just meant that the CRL AKI should have the same format
and meaning as in 4.8.3, i.e. it should use the SHA-1 hash of the
issuer's public key with neither authorityCertIssuer nor
authorityCertSerialNumber fields present. Maybe the errata should be
rejected and resubmitted with text copied and edited from 4.8.3, instead
of referencing 4.8.3?


Given that the text already says:  "The algorithm used in CRLs issued under this 
profile is specified in [RFC6485]." then I'm not not what futerhe specification is 
required here.
What part of RFC6485 says anything about CRL AKIs? The closest I can
find is in Section 2:

          NOTE: The exception to the above hashing algorithm is the use
          of SHA-1 [SHS] when Certification Authorities (CAs) generate
          authority and subject key identifiers [RFC6487].

That maybe could be interpreted as saying that CRL AKIs should use
SHA-1, but it doesn't say that authorityCertIssuer and
authorityCertSerialNumber must be absent. It also doesn't explicitly say
what to take the SHA-1 of when generating a CRL AKI.


As far as I can see the thread died at this point.

I have rejected the errata.

I see two ways forward, either submit a new errata that describes the
correction in a way that has consensus, or roll the change into the
update required to address the issue raised in errata 3168.

- Stewart


_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to