Hi Rob,

On 04/01/17 20:04, Rob Austein wrote:
> [Not the author, but...]
> 

No matter - a good answer is a good answer:-)

> At Wed, 04 Jan 2017 05:51:20 -0800, Stephen Farrell wrote:
> ...
>> I have a few probably quick things I'd like to discuss for
>> this one:
>>
>> (1) 3.1.1: Why MUST a CA ensure that the CA name and
>> Subject name combination is unique? I don't see what'd
>> break in BGPsec if that rule is omitted, but maybe I'm
>> missing something. 
>>
>> (2) 3.1.1: Similarly, I'm not clear why only common name
>> and serial number are allowed in Subject.  Why is that
>> needed for interop? (I can see that you want to say that
>> code MUST support those but not why you want to prevent
>> other things.)
> 
> This draft is a profile of RFC 6487, which is itself a profile of RFC
> 5280.  All of the above is pretty much verbatim from RFC 6487.

Hmm. I wonder if that's the best plan, especially if there's
no interop justification for some of it. I note that 6487
says "In the RPKI, the subject name is determined by the
issuer, not proposed by the subject" but that seems a bit
weird for routers, where I would guess there'll be more
diversity in terms of key/CSR generation code. (Correct me
if I'm wrong but I'm not sure if it's possible to conform
to these requirements with e.g. openssl, or is it?)

> 
>> (3) Where's certificate status checking covered? What's
>> expected for BGPsec router certs? If BGPsec speakers are
>> intended to inherit the CRL checking from 6487 then being
>> explicit about that would probably be worthwhile.
> 
> Yes, I think this too is inherited from RFC 6487.
> 
>> And I'd wonder if router cert revocation will be more common than
>> for other resource certs, in which case an OCSP-like system could be
>> needed - did the WG consider that?
> 
> Not as such.  Fair question, but the architecture kind of assumes that
> the RPKI RP process is separable from the BGPSEC implementation per
> se, BGPSEC just consumes the output of that process.

I'd wonder if that means some revocation request protocol will be
needed later. But it's fine to not try define that now.

More to the point is whether or not the WG have thought about the
revocation support in the RPKI and whether or not that seems also
ok for BGPsec. (I'm unsure myself, but mostly due to the number of
moving parts in the RPKI.)

> Most likely implementation technique does all the RPKI stuff per se on
> a separate box and just stuffs the resulting raw keys into the router
> using the rpki-rtr protocol, so the router itself probably would not
> have the information needed to play OCSP even if it wanted to do so,
> which it probably doesn't.  

So if that's a widely shared view of WG participants then it'd be
good to see it described somewhere to help implementers. (It may
be in the -overview document which I've yet to read.)

> Requiring the routers to speak OCSP seems
> like a potentially dangerous layering violation.

Not sure about a layering violation but I can see it'd likely be
problematic;-)

Cheers,
S.



Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to