Sandy,

...
When this working group was developing the RPKI specifications, the RIRs essentially 
asked us not to specify how the "movement of resources across registries" would 
take place.  I for one accepted this at the time because it looked like an issue between 
RIRs.  This document is calling for a make-before-break certificate issuance capability.  
Maybe there are other motives too.
There are two cases.

One is the transfer case and the need to revise certs upward on the giving side 
and downward on the receiving side.  That's the make-before-break part.
The other is the problem of removing resources from certs - one CA reissues a 
"smaller" cert, and reissuing has to take place down the chain for the 
resources that are retained, in order to keep the encompassing rules valid.  The pain is 
felt in the CA's descendants until other CAs get their re-issuance done.
The second case merits further analysis, I think.

If the INRs being removed are not in use at lower tier CAs, then maybe they are not allocated in certs issued to those CAs, and the process is trivial. If the INRs have been allocated to lower tier CAs, and thus they are represented in the certs of the CAs, then one would not expect to remove the INRs in a top down basis anyway, right? One would expect the lowest tier CA holding the INRs that are to be returned to be the fist to relinquish them. Then this would propagate up the chain, consistent with each CA updating its databases to reflect the new allocation status. RPKI docs consistently state that certs are issued ti reflect the INR databases of the entities acting as CAs. These databases ought not be updated to reflect a return of INRs until that return has taken place. So, it seems that the only artificial timing issue is the lag one has to accept in terms of RPKI repository (and cache) propagation. But, we already know that such lags are intrinsic in the RPKI. Also, what are the requirements, vis-a-vis timing, for completing INR removal? How man tiers of CAs are involved?
RFC 3779 has been implemented.  For example, OpenSSL implements RFC 3779, and 
others make use of this certificate handling software.  We are not talking 
about a little tweak to such a library.  Implementation would require a path 
validation parameter to pass the content of the ROA.
Not sure that's the case.  I think all RPKI recipients now need to do a 
computation of which of a cert's resources are valid, which are not.  The 
*recipients* decide what the certificate says.  This will impact interpretation 
of a ROA but I don't think it requires something that has to get passed around 
with the ROA.
Having looked at our RP software, I believe the revised vaidation approach (based on the current, informal spec) would require that we compute the intersection of parent and child CA certs along each cert path and store the result. This is independent of whether one is later using the path to validate a ROA (with it's embedded EE cert) or a router cert (in BGPSEC). Maybe Russ was alluding to the need to pass that intersection of INR sets to the ROA validation process.

As I understand the situation, the existing specification works, but it imposes 
some restrictions on the order that certificates that must be issued and 
distributed.
There's a order problem in the transfer case and a timing problem in the 
reduction case.
This seems like a good characterization, but I question whether the timing restrictions are really important. Also, in the INR transfer case, I've seen detailed slides at APNIC meetings showing how inter-RIR xfers work today. It is a process with a number of steps, and some, limited parallelism. It's not clear how much additional parallelism one can achieve with the proposed validation procedure, without violating the CP. We have a spec of the details of INR xfer in TAO. We don't yet have an analogous spec for the proposed validation model. Until we do, we can't accurately compare the proposed scenario vs. the
existing one.

Steve

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to