Skip to main content

Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI)
draft-ietf-sidr-cp-17

Revision differences

Document history

Date Rev. By Action
2011-05-04
17 (System) IANA Action state changed to No IC from In Progress
2011-05-04
17 (System) IANA Action state changed to In Progress
2011-05-04
17 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent.
2011-05-04
17 Amy Vezza IESG state changed to Approved-announcement sent
2011-05-04
17 Amy Vezza IESG has approved the document
2011-05-04
17 Amy Vezza Closed "Approve" ballot
2011-05-04
17 Amy Vezza Approval announcement text regenerated
2011-05-04
17 Stewart Bryant Ballot writeup text changed
2011-04-19
17 (System) New version available: draft-ietf-sidr-cp-17.txt
2011-03-17
17 Cindy Morgan Removed from agenda for telechat
2011-03-17
17 Cindy Morgan State changed to Approved-announcement to be sent::Point Raised - writeup needed from Waiting for AD Go-Ahead.
2011-03-17
17 Jari Arkko
[Ballot comment]
Some comments from Ari Keränen:

4.6.7. Notification of certificate issuance by the CA to other entities

  No additional stipulations beyond those of …
[Ballot comment]
Some comments from Ari Keränen:

4.6.7. Notification of certificate issuance by the CA to other entities

  No additional stipulations beyond those of section 4.3.3.

There's no section "4.3.3" in this document; I'd assume you mean "4.4.3" (same problem in sections 4.7.7 and 4.8.7).


13. References

Missing RFC5736 reference (mentioned in Section 1.1.)
2011-03-17
17 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded
2011-03-17
17 Adrian Farrel
[Ballot comment]
I have No Objection to the publication of this document, but there are
a couple of nits I hope the authors will attend …
[Ballot comment]
I have No Objection to the publication of this document, but there are
a couple of nits I hope the authors will attend to before publication.

---

Missing close parenthesis in the document title.

---

In the Introduction...

  Note: This document is based on the template specified in the
  Internet Engineering Task Force (IETF) standards document RFC 3647
  [RFC3647].  In the interest of keeping the document as short as
  reasonable, a number of sections contained in the template are
  omitted from this policy because they did not apply to this PKI.
  However, we have retained the section numbering scheme employed in
  the RFC to facilitate comparison with the outline in Section 6 of
  the RFC. Each of these omitted sections should be read as "No
  stipulation" in CP/CPS parlance.

In the interestes of disambiguity (for example, once this document
has been published as an RFC) could you please
s/the RFC/RFC 3647/
both times it shows.

---

1.5.4. CP approval procedures

  The IESG MUST approve a replacement BCP that either updates or
  obsoletes this BCP, following the procedures of the IETF Standards
  Process as defined in RFC 2026 [RFC2026].

This is a little amusing. But I think you actually mean...


  Any BCP that either updates or obsoletes this BCP, MUST be approved
  by the IESG following the procedures of the IETF Standards Process as
  defined in RFC 2026 [RFC2026].

---

3.1.2. Need for names to be meaningful

  The Subject name in each certificate SHOULD NOT be "meaningful",
  i.e., the name is NOT intended to convey the identity of the Subject
  to relying parties.

While I understnd the desire for stress, I think s/NOT/not/

---

3.1.3. Anonymity or pseudonymity of subscribers

  Although Subject (and Issuer) names need not be meaningful, and may
  appear "random," anonymity is not a function of this PKI, and thus
  no explicit support for this feature is provided.

Unless there is some special meaning of "pseudonimity" in the security
community, I would suggest dropping it from the section title. The
section text does not discuss the use of pseudonyms, and (to me) the
use of a pseudonym is destinct from annonymity.

---

3.1.5

s/Subject names/subject names/ at least twice
2011-03-17
17 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
17 Ralph Droms
[Ballot comment]
A few nits:

Abstract: s/Internet resource/Internet Number Resource/

Introduction: s/Internet number resource/Internet Number Resource/

In section 2.4, should this text use RFC 2119 …
[Ballot comment]
A few nits:

Abstract: s/Internet resource/Internet Number Resource/

Introduction: s/Internet number resource/Internet Number Resource/

In section 2.4, should this text use RFC 2119 terms:

  This data is supposed to be accessible to the public.

Why are sections 5.1.*, 5.2.* listed as sections with no text?
2011-03-16
17 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
17 Peter Saint-Andre [Ballot comment]
Please expand "SIA" on first use and provide a reference if necessary.

In section 4.2.1, I suggest changing "SHOULD never" to "SHOULD NOT".
2011-03-16
17 Peter Saint-Andre [Ballot comment]
In section 4.2.1, I suggest changing "SHOULD never" to "SHOULD NOT".
2011-03-16
17 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
17 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
17 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded
2011-03-15
17 Russ Housley [Ballot comment]
Please consider the minor issues raised in the Gen-ART Review by
  Francis Dupont on 24-Feb-2011.
2011-03-15
17 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-03-15
17 Robert Sparks [Ballot Position Update] New position, Yes, has been recorded
2011-03-14
17 Tim Polk [Ballot Position Update] New position, Yes, has been recorded
2011-03-12
17 Alexey Melnikov
[Ballot comment]
4.10. Certificate status services

  This PKI does not make provision for use of OCSP or SCVP, because it

Informative references are needed …
[Ballot comment]
4.10. Certificate status services

  This PKI does not make provision for use of OCSP or SCVP, because it

Informative references are needed here.

  is anticipated that the primary RPs (ISPs) will acquire and validate
  certificates for all participating resource holders.
2011-03-12
17 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded
2011-03-09
17 Sean Turner [Ballot Position Update] New position, Yes, has been recorded
2011-03-09
17 Stewart Bryant Placed on agenda for telechat - 2011-03-17 by Stewart Bryant
2011-03-09
17 Stewart Bryant [Note]: 'Sandra Murphy (Sandra.Murphy@cobham.com ) is the document shepherd.' added by Stewart Bryant
2011-03-09
17 Stewart Bryant [Ballot Position Update] New position, Yes, has been recorded for Stewart Bryant
2011-03-09
17 Stewart Bryant Ballot has been issued
2011-03-09
17 Stewart Bryant Created "Approve" ballot
2011-03-09
17 Stewart Bryant Ballot writeup text changed
2011-03-07
17 Stewart Bryant Ballot writeup text changed
2011-02-22
17 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Paul Hoffman.
2011-02-21
17 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-02-18
17 Amanda Baber We understand that this document does not require any IANA actions.
2011-02-16
17 Samuel Weiler Request for Last Call review by SECDIR is assigned to Paul Hoffman
2011-02-16
17 Samuel Weiler Request for Last Call review by SECDIR is assigned to Paul Hoffman
2011-02-07
17 Amy Vezza Last call sent
2011-02-07
17 Amy Vezza
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Certificate Policy (CP) for the Resource PKI (RPKI) to BCP


The IESG has received a request from the Secure Inter-Domain Routing WG
(sidr) to consider the following document:
- 'Certificate Policy (CP) for the Resource PKI (RPKI'
  as a BCP

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-02-21. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-sidr-cp/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-sidr-cp/

2011-02-07
17 Stewart Bryant Ballot writeup text changed
2011-02-07
17 Stewart Bryant Last Call was requested
2011-02-07
17 Stewart Bryant State changed to Last Call Requested from Publication Requested.
2011-02-07
17 Stewart Bryant Last Call text changed
2011-02-07
17 (System) Ballot writeup text was added
2011-02-07
17 (System) Last call text was added
2011-02-07
17 (System) Ballot approval text was added
2011-02-04
17 Cindy Morgan
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
  …
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

The document shepherd is Sandra Murphy, sidr co-chair.  The document
shepherd has personally reviewed the document.  No issues were
discovered that would prevent advancement.  This document is ready
for forwarding to the IESG.

  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed? 

The document has received adequate review from both key WG members and
key non-WG members.  The document was presented to the working group
at the IETF71, IETF73, IETF74, IETF75, IETF76, IETF77, IETF78 and IETF79
meetings.  Additionally, RIRs have reviewed this document.  There
are no concerns regarding the depth or breath of the reviews that
have been performed.

  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

No.

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

There are no specific concerns to highlight to the AD or IESG. 
No IPR disclosures have been filed related to this document.

  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it? 

The document underwent two WGLCs: one in late 2009 and another that
began in August, 2010. These WGLCs elicited comments from key WG
members, and several others with PKI experience. Changes were made to
address the issues raised by these comments. Because this a 40-page
document (despite effort to minimize its length), and because much of it
is procedural in nature, it is probably fair to assume that not all WG
members have elected to review the document.

  (1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

No.

  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See the Internet-Drafts
Checklist
        and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

Yes.  The tools site reports:

    Summary: 0 errors (**), 2 warnings (==), 6 comments (--).

The warnings have to do with the copyright year and a missing reference.

The comments have to do with possible downrefs, as many of the
references are not yet RFCs.  This document is intended as a BCP.

There are no formal reviews required for this document.

  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

References have been split into normative and informative sections.

This document relies normatively on several other working group
documents that are either advancing at the same time or have been
through last call and are awaiting final versions addressing
minor comments in order to advance.

This document is intended to be BCP.  Several of the normative
references are Standards track, one is to be Informational.  The
question is whether that constitutes a downward reference.  The
idnits tool warns of the potential downref.

This question is under discussion with the routing ADs.

There's reason not to delay publishing this draft, even so.  By X.509
standards, there's a field in each certificate that points to the policy
that governs it.  In the RPKI case, that field MUST point to the
policy in this draft and no other.  (The RPKI is very different from
other PKIs in that respect.)  So this draft should be published for
RIRs and other CAs to have a reference for the policy they include
in their certificates.

  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

The IANA Considerations section exists.  There are no IANA
considerations for this document.  No registries are defined or amended.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

This document uses ASN.1 in mentioning the object identifier for the
CP.  The syntax was checked using asn1Parser from the
libtasn1-tools package (v2.7.1) and passed.

  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:

    Technical Summary
        Relevant content can frequently be found in the abstract
        and/or introduction of the document. If not, this may be
        an indication that there are deficiencies in the abstract
        or introduction.

    Working Group Summary
        Was there anything in WG process that is worth noting? For
        example, was there controversy about particular points or
        were there decisions where the consensus was particularly
        rough?

    Document Quality
        Are there existing implementations of the protocol? Have a
        significant number of vendors indicated their plan to
        implement the specification? Are there any reviewers that
        merit special mention as having done a thorough review,
        e.g., one that resulted in important changes or a
        conclusion that the document had no substantive issues? If
        there was a MIB Doctor, Media Type or other expert review,
        what was its course (briefly)? In the case of a Media Type
        review, on what date was the request posted?

Technical Summary

The document is a Certificate Policy (CP) for the Resource PKI. It
follows the format established for document of this type, in RFC 3647.
It is customary for a large scale PKI to publish an associated CP.
In the case of the RPKI, this CP describes essential, common aspects
of CA operation, both as guidance to CAs and for the benefit of all
relying parties (RPs). The CP defers many details of Certification
Authority (CA) procedures to the Certification Practice Statement
(CPS) that will be published by most CAs that operate in the RPKI
context. (Not all CAs need to publish a CPS; a CA that issues
certificates only to entities within the same administrative realm
as the CA need not generate or publish a CPS.)

Working Group Summary

An early review was provided by the NRO (the RIRs), and, as a result,
the document was reduced in length. A PKI expert (formerly with
VeriSign Japan, now with IANA) provided extensive comments, as did
Sean Turner, the cognizant security AD.

Document Quality

The document is well written and clear. It does not describe a
protocol, so there are no "implementations" per se. However, at least
four RIRs have developed CPS's that are based on the CP. There is no
MIB, and no Media Types are involved. However, as noted above more than
one PKI expert has reviewed the document.
2011-02-04
17 Cindy Morgan Draft added in state Publication Requested
2011-02-04
17 Cindy Morgan [Note]: 'Sandra Murphy (Sandra.Murphy@cobham.com ) is the document shepherd.' added
2010-12-04
16 (System) New version available: draft-ietf-sidr-cp-16.txt
2010-10-20
15 (System) New version available: draft-ietf-sidr-cp-15.txt
2010-10-15
14 (System) New version available: draft-ietf-sidr-cp-14.txt
2010-09-30
13 (System) New version available: draft-ietf-sidr-cp-13.txt
2010-09-29
12 (System) New version available: draft-ietf-sidr-cp-12.txt
2010-09-17
11 (System) New version available: draft-ietf-sidr-cp-11.txt
2010-08-19
10 (System) New version available: draft-ietf-sidr-cp-10.txt
2010-07-02
09 (System) New version available: draft-ietf-sidr-cp-09.txt
2010-01-07
08 (System) New version available: draft-ietf-sidr-cp-08.txt
2009-10-21
07 (System) New version available: draft-ietf-sidr-cp-07.txt
2009-07-13
06 (System) New version available: draft-ietf-sidr-cp-06.txt
2009-03-07
05 (System) New version available: draft-ietf-sidr-cp-05.txt
2008-11-03
04 (System) New version available: draft-ietf-sidr-cp-04.txt
2008-02-26
03 (System) New version available: draft-ietf-sidr-cp-03.txt
2007-07-10
02 (System) New version available: draft-ietf-sidr-cp-02.txt
2007-02-27
01 (System) New version available: draft-ietf-sidr-cp-01.txt
2006-10-18
00 (System) New version available: draft-ietf-sidr-cp-00.txt