Just fyi... Steve was out of the country last week and this. He should be back next week...

On 11/25/15 8:11 PM, Geoff Huston wrote:
Hi,

I’m working through this example and I can’t help but observe that its
"ill-defined and, the most likely interpretation doesn't seem to work”
to borrow your words….

Consider a cert path from a trust anchor TA, to CA1 to CA2 to an EE cert for a 
ROA.

TA->CA 1->CA 2->ROA


Assume the TA cert contains address space T, U, V, W, X, Y and Z.

Assume the CA 1 cert contains address space T, U, V, and W.

Assume the CA 2 cert contains address space V and W.

Let's say that the ROA EE cert issued by CA 2 contains address space V.

CA 2 is about to receive address space Z from some other ISP, so it has asked
CA 1 to issue a new CA cert to it, in anticipation of the transfer. CA 1 agrees,
and issues a new cert to CA 2 and that cert contains address space V and Z.
CA1 has already issued a cert with subject “CA2” and resources (V,W) - lets 
call this cert No 1

Do you mean:

a) CA 1 issues a cert  with subject “CA2” and resources (V,Z) - lets call this 
cert No 2

OR the combination of actions:

b)    CA 1 issues a SECOND cert  with subject “CA2” and resources (V,Z)  - lets 
call this Cert No 2
    AND
       CA1 revokes the cert with subject “CA2” and resources (V,W) (which we 
call Cert No 1)


Now, under the assumption about what "specific resource set" means, when
an RP tries to validate CA 2's ROA,
Now I’m confused - originally the ROA was signed by an EE cert issued by CA 2’s 
Cert No 1

so when you refer to CA 2’s ROA do you mean the ROA that was signed by an EE 
cert issued by CA 2’s Cert No 1,
or do you mean a new ROA signed by an EE issued by CA 2’s Cert No 2?


the "specific resource set" will be V, and
so it will be valid, because V is in all of the certs from the TA through CA 1
to CA 2. Even though CA 2's cert contains Z, which is not contained
in CA 1's cert, this will not be considered in the validation of the ROA EE 
cert.
This is the desired outcome, because CA 2 has begun the process of getting its
new address space (Z), but that process has not broken its CA cert. I assume 
this
is an example of the reduced fragility that is so appealing.

So I _think_ you are assuming that there is a new ROA, signed by an EE cert 
issued by
the CA that has a CA cert issued by CA 1 with resources (V,Z), and evidently 
you are referring
to this new ROA and its new EE cert.


If CA 2 issued a ROA for Z, then validation of that ROA would fail, because
the CA 1  cert does not contain Z. That's good, because the second ROA exmaple
ought not be valid, since the transfer has not yet completed.

So far, so good. But, let's look at the implications of this revised validation
procedure in greater depth.

What if CA 1, acting on the request from CA 2 asked the TA to add Z to CA 2's 
cert,
Huh?????

The TA has issued a cert for subject “CA 1” - Since when did Ca2 have a 
relationship
with the TA?

in anticipation of the transfer? Then we have a problem, because Z is under the
tree from this TA and if it agreed to add Z to CA 1's cert, then a ROA for Z,
issued by CA 2, would be valid, even though the transfer had not yet been 
effected.
I’m having trouble following this - I think you have a typo of otherwise 
confused
the example at this point.

I’ll stop here because I can’t see the point of the ensuring text without some 
additional
clarity and precision of the example scenario that does not invent arbitrary 
relationships
between CAs.

regards,

    Geoff

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to