I went ahead and updated the life span of the certificates in the example.
attached please find the updated version with a certificate validity of 365 days

Oliver


On 1/12/17, 10:08 AM, "sidr on behalf of Borchert, Oliver (Fed)" 
<[email protected] on behalf of [email protected]> wrote:

    Hi Randy,
    
    The intention from my side to have the “200+ years” was based on my private 
dislike to see an example one could actually use in X years where X > now() and 
the certificate would be expired. 
    Said that, this is my personal preference but I get your point. This most 
likely would set a bad example for others that might start issuing certificates 
with “infinite” life spans. 
    
    In this regards what about a Validity of 365 days within the example. This 
seems feasible to me.
    
    Oliver
    
    On 1/12/17, 8:47 AM, "Randy Bush" <[email protected]> wrote:
    
        >         Validity
        >             Not Before: Jan 10 19:55:44 2017 GMT
        >             Not After : Oct 25 19:55:44 2290 GMT
        
        ok, i blew it and gave no guidance in bgpsec-ops.  i guess this doc
        would be as good a place as any.
        
        of course that leaves open what lifetime to recommend.  we're not gonna
        do oscp, but rather withdraw from the rpki.  so to keep from making too
        much bgp noise, let me toss out O(year) to start the discussion.
        
        i am still staring at the bgpsec message
        
        randy
        
    
    _______________________________________________
    sidr mailing list
    [email protected]
    https://www.ietf.org/mailman/listinfo/sidr
    

Topology:

AS(64496)----AS(65536)----AS(65537)

Prefix Announcement: AS(64496), 192.0.2.0/24

For this example the ECDSA algorithm was provided with a static k to 
make the result deterministic. 
The k used for all signature operations was taken from RFC 6979, 
chapter A.2.5 “Signatures With SHA-256, message 'sample'”.

  k = A6E3C57DD01ABE90086538398355DD4C3B17AA873382B0F24D6129493D8AAD60

Keys of AS64496:
================
ski: AB4D910F55CAE71A215EF3CAFE3ACC45B5EEC154

private key:
  x = D8AA4DFBE2478F86E88A7451BF075565709C575AC1C136D081C540254CA440B9

public key: 
  Ux = 7391BABB92A0CB3BE10E59B19EBFFB214E04A91E0CBA1B139A7D38D90F77E55A
  Uy = A05B8E695678E0FA16904B55D9D4F5C0DFC58895EE50BC4F75D205A25BD36FF5

Router Key Certificate example using OpenSSL 1.0.1e-fips 11 Feb 2013
--------------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 3255538383 (0xc20b92cf)
    Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=ROUTER-0000FBF0
        Validity
            Not Before: Jan 12 15:17:12 2017 GMT
            Not After : Jan 12 15:17:12 2018 GMT
        Subject: CN=ROUTER-0000FBF0
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub: 
                    04:73:91:ba:bb:92:a0:cb:3b:e1:0e:59:b1:9e:bf:
                    fb:21:4e:04:a9:1e:0c:ba:1b:13:9a:7d:38:d9:0f:
                    77:e5:5a:a0:5b:8e:69:56:78:e0:fa:16:90:4b:55:
                    d9:d4:f5:c0:df:c5:88:95:ee:50:bc:4f:75:d2:05:
                    a2:5b:d3:6f:f5
                ASN1 OID: prime256v1
        X509v3 extensions:
            X509v3 Key Usage: 
                Digital Signature
            X509v3 Subject Key Identifier: 
                AB:4D:91:0F:55:CA:E7:1A:21:5E:F3:CA:FE:3A:CC:45:B5:EE:C1:54
            X509v3 Extended Key Usage: 
                1.3.6.1.5.5.7.3.30
            sbgp-autonomousSysNum: critical
                Autonomous System Numbers:
                  64496
                Routing Domain Identifiers:
                  inherit

    Signature Algorithm: ecdsa-with-SHA256
         30:44:02:20:6c:94:bb:32:22:3c:c7:ae:e8:e3:fd:d5:75:c2:
         74:27:fa:be:c3:ad:ba:dd:3e:4a:34:a3:c4:b7:89:65:30:64:
         02:20:2d:82:17:f4:11:97:92:df:fc:92:be:be:c6:53:bb:44:
         2d:36:83:d6:0c:95:29:47:80:85:bc:84:32:92:f7:22
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----



Keys of AS(65636):
==================
ski: 47F23BF1AB2F8A9D26864EBBD8DF2711C74406EC

private key:
  x = 6CB2E931B112F24554BCDCAAFD9553A9519A9AF33C023B60846A21FC95583172

public key: 
  Ux = 28FC5FE9AFCF5F4CAB3F5F85CB212FC1E9D0E0DBEAEE425BD2F0D3175AA0E989
  Uy = EA9B603E38F35FB329DF495641F2BA040F1C3AC6138307F257CBA6B8B588F41F

Router Key Certificate example using OpenSSL 1.0.1e-fips 11 Feb 2013
--------------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 3437468142 (0xcce399ee)
    Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=ROUTER-00010000
        Validity
            Not Before: Jan 12 15:17:34 2017 GMT
            Not After : Jan 12 15:17:34 2018 GMT
        Subject: CN=ROUTER-00010000
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub: 
                    04:28:fc:5f:e9:af:cf:5f:4c:ab:3f:5f:85:cb:21:
                    2f:c1:e9:d0:e0:db:ea:ee:42:5b:d2:f0:d3:17:5a:
                    a0:e9:89:ea:9b:60:3e:38:f3:5f:b3:29:df:49:56:
                    41:f2:ba:04:0f:1c:3a:c6:13:83:07:f2:57:cb:a6:
                    b8:b5:88:f4:1f
                ASN1 OID: prime256v1
        X509v3 extensions:
            X509v3 Key Usage: 
                Digital Signature
            X509v3 Subject Key Identifier: 
                47:F2:3B:F1:AB:2F:8A:9D:26:86:4E:BB:D8:DF:27:11:C7:44:06:EC
            X509v3 Extended Key Usage: 
                1.3.6.1.5.5.7.3.30
            sbgp-autonomousSysNum: critical
                Autonomous System Numbers:
                  65536
                Routing Domain Identifiers:
                  inherit

    Signature Algorithm: ecdsa-with-SHA256
         30:46:02:21:00:b5:8a:e6:ba:26:22:50:05:25:6e:73:83:fa:
         f0:85:29:62:33:cf:9b:a2:c0:77:e3:87:e8:65:b2:9f:ba:2e:
         2e:02:21:00:e9:43:fc:2d:9b:bb:66:f3:01:4d:d3:43:28:a8:
         ea:0f:21:92:5b:de:c6:db:b6:70:44:f9:b9:a4:48:92:f8:08
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----


BGPSec Update from AS(65536) to AS(65537):
===========================================
Binary Form of BGPSec Update (TCP-DUMP):
FF FF FF FF FF FF FF FF  FF FF FF FF FF FF FF FF
01 00 02 00 00 00 E9 40  01 01 02 80 04 04 00 00
00 00 80 0E 0D 00 01 01  04 C6 33 64 64 00 18 C0
00 02 90 1E 00 CA 00 0E  01 00 00 01 00 00 01 00
00 00 FB F0 00 BC 01 47  F2 3B F1 AB 2F 8A 9D 26
86 4E BB D8 DF 27 11 C7  44 06 EC 00 46 30 44 02
20 72 14 BC 96 47 16 0B  BD 39 FF 2F 80 53 3F 5D
C6 DD D7 0D DF 86 BB 81  56 61 E8 05 D5 D4 E6 F2
7C 02 20 2D DC 00 3C 64  BE 7B 29 C9 EB DB C8 A4
97 ED 66 28 5E E9 22 76  83 E6 C1 78 CE 8D E6 D3
59 5F 41 AB 4D 91 0F 55  CA E7 1A 21 5E F3 CA FE
3A CC 45 B5 EE C1 54 00  47 30 45 02 20 72 14 BC
96 47 16 0B BD 39 FF 2F  80 53 3F 5D C6 DD D7 0D
DF 86 BB 81 56 61 E8 05  D5 D4 E6 F2 7C 02 21 00
C6 17 19 34 07 43 06 3B  8A 5C CD 54 16 39 0B 31
21 1D 3C 52 48 07 95 87  D0 13 13 7B 41 CD 23 E2


Signature From AS(64496) to AS(65536):
---------------------------------------
Digest:    21 33 E5 CA A0 26 BE 07   3D 9C 1B 4E FE B9 B9 77 
           9F 20 F8 F5 DE 29 FA 98   40 00 9F 60 
Signature: 30 45 02 20 72 14 BC 96   47 16 0B BD 39 FF 2F 80 
           53 3F 5D C6 DD D7 0D DF   86 BB 81 56 61 E8 05 D5 
           D4 E6 F2 7C 02 21 00 C6   17 19 34 07 43 06 3B 8A 
           5C CD 54 16 39 0B 31 21   1D 3C 52 48 07 95 87 D0 
           13 13 7B 41 CD 23 E2 

Signature From AS(65536) to AS(65537):
--------------------------------------
Digest:    46 4B 57 CE B1 2D 18 B0   FD 1A 1A 35 94 17 3A 4A 
           09 88 E5 F4 ED ED 2F 3D   83 08 5A A8 
Signature: 30 44 02 20 72 14 BC 96   47 16 0B BD 39 FF 2F 80 
           53 3F 5D C6 DD D7 0D DF   86 BB 81 56 61 E8 05 D5 
           D4 E6 F2 7C 02 20 2D DC   00 3C 64 BE 7B 29 C9 EB 
           DB C8 A4 97 ED 66 28 5E   E9 22 76 83 E6 C1 78 CE 
           8D E6 D3 59 5F 41 


The human readable output is produced using bgpsec-io, a bgpsec 
traffic generator that uses a wireshark like printout.

Send Update Message
+--marker: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
+--length: 256
+--type:   2 (UPDATE)
+--withdrawn_routes_length: 0
+--total_path_attr_length: 233
   +--ORIGIN: INCOMPLETE (4 bytes)
   |  +--Flags: 0x40 (Well-Known, Transitive, Complete)
   |  +--Type Code: ORIGIN (1)
   |  +--Length: 1 byte
   |  +--Origin: INCOMPLETE (1)
   +--MULTI_EXIT_DISC (7 bytes)
   |  +--Flags: 0x80 (Optional, Complete)
   |  +--Type Code: MULTI_EXIT_DISC (4)
   |  +--Length: 4 bytes
   |  +--data: 00 00 00 00 
   +--MP_REACH_NLRI (16 bytes)
   |  +--Flags: 0x80 (Optional, Complete)
   |  +--Type Code: MP_REACH_NLRI (14)
   |  +--Length: 13 bytes
   |  +--data: 00 01 01 04 C6 33 64 64   00 18 C0 00 02 
   +--BGPSEC Path Attribute (206 bytes)
      +--Flags: 0x90 (Optional, Complete, Extended Length)
      +--Type Code: BGPSEC Path Attribute (30)
      +--Length: 202 bytes
      +--Secure Path (14 bytes)
      |  +--Length: 14 bytes
      |  +--Secure Path Segment: (6 bytes)
      |  |  +--pCount: 1
      |  |  +--Flags: 0
      |  |  +--AS number: 65536 (1.0)
      |  +--Secure Path Segment: (6 bytes)
      |     +--pCount: 1
      |     +--Flags: 0
      |     +--AS number: 64496 (0.64496)
      +--Signature Block (188 bytes)
         +--Length: 188 bytes
         +--Algo ID: 1
         +--Signature Segment: (92 bytes)
         |  +--SKI: 47F23BF1AB2F8A9D26864EBBD8DF2711C74406EC
         |  +--Length: 70 bytes
         |  +--Signature: 30 44 02 20 72 14 BC 96  47 16 0B BD 39 FF 2F 80 
         |                53 3F 5D C6 DD D7 0D DF  86 BB 81 56 61 E8 05 D5 
         |                D4 E6 F2 7C 02 20 2D DC  00 3C 64 BE 7B 29 C9 EB 
         |                DB C8 A4 97 ED 66 28 5E  E9 22 76 83 E6 C1 78 CE 
         |                8D E6 D3 59 5F 41 
         +--Signature Segment: (93 bytes)
            +--SKI: AB4D910F55CAE71A215EF3CAFE3ACC45B5EEC154
            +--Length: 71 bytes
            +--Signature: 30 45 02 20 72 14 BC 96  47 16 0B BD 39 FF 2F 80 
                          53 3F 5D C6 DD D7 0D DF  86 BB 81 56 61 E8 05 D5 
                          D4 E6 F2 7C 02 21 00 C6  17 19 34 07 43 06 3B 8A 
                          5C CD 54 16 39 0B 31 21  1D 3C 52 48 07 95 87 D0 
                          13 13 7B 41 CD 23 E2 
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to