The Resource Public Key Infrastructure (RPKI) to Router Protocol
draft-ietf-sidr-rpki-rtr-26
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
26 | (System) | post-migration administrative database adjustment to the Yes position for Stewart Bryant |
2012-08-22
|
26 | (System) | post-migration administrative database adjustment to the Yes position for Peter Saint-Andre |
2012-02-27
|
26 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2012-02-27
|
26 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2012-02-24
|
26 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2012-02-24
|
26 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2012-02-17
|
26 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2012-02-08
|
26 | Sam Weiler | Request for Telechat review by SECDIR Completed. Reviewer: Hilarie Orman. |
2012-02-07
|
26 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent. |
2012-02-06
|
26 | (System) | IANA Action state changed to In Progress |
2012-02-06
|
26 | Amy Vezza | IESG state changed to Approved-announcement sent |
2012-02-06
|
26 | Amy Vezza | IESG has approved the document |
2012-02-06
|
26 | Amy Vezza | Closed "Approve" ballot |
2012-02-06
|
26 | Amy Vezza | Approval announcement text regenerated |
2012-02-03
|
26 | Stewart Bryant | Ballot writeup text changed |
2012-02-03
|
26 | Stewart Bryant | Ballot writeup text changed |
2012-02-02
|
26 | (System) | New version available: draft-ietf-sidr-rpki-rtr-26.txt |
2012-02-02
|
26 | Cindy Morgan | Removed from agenda for telechat |
2012-02-02
|
26 | Cindy Morgan | State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation. |
2012-02-02
|
26 | Peter Saint-Andre | [Ballot comment] Thank you for addressing my comments and those from the AppsDir reviewer. The new text about TLS is well formulated, and I'll be … [Ballot comment] Thank you for addressing my comments and those from the AppsDir reviewer. The new text about TLS is well formulated, and I'll be pointing future authors to it as a model for how to use RFC 6125. |
2012-02-02
|
26 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to Yes from Discuss |
2012-02-02
|
26 | David Harrington | [Ballot Position Update] New position, No Objection, has been recorded |
2012-02-02
|
26 | Stewart Bryant | Ballot writeup text changed |
2012-02-02
|
26 | Sean Turner | [Ballot Position Update] New position, Yes, has been recorded |
2012-02-01
|
26 | Jari Arkko | [Ballot comment] This is a well written and much needed document, thank you for writing it. (The only worry that I had was that there … [Ballot comment] This is a well written and much needed document, thank you for writing it. (The only worry that I had was that there was a long list of different security mechanisms, perhaps too many for interoperability.) |
2012-02-01
|
26 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded |
2012-02-01
|
26 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded |
2012-02-01
|
26 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-31
|
26 | Adrian Farrel | [Ballot comment] I am also concerned about the internationalisability of error strings, but otherwise have no objection to the publication of this document. |
2012-01-31
|
26 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-30
|
26 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-30
|
26 | Stewart Bryant | [Ballot comment] I believe that the outstanding IETF LC comment has been addressed. |
2012-01-30
|
26 | Stewart Bryant | [Ballot Position Update] Position for Stewart Bryant has been changed to Yes from Discuss |
2012-01-30
|
26 | Peter Saint-Andre | [Ballot comment] I second Pete's query about ASCII-only error text. The AppsDir review by Lisa Dusseault asks some questions that deserve a response: http://www.ietf.org/mail-archive/web/apps-discuss/current/msg04230.html Section … [Ballot comment] I second Pete's query about ASCII-only error text. The AppsDir review by Lisa Dusseault asks some questions that deserve a response: http://www.ietf.org/mail-archive/web/apps-discuss/current/msg04230.html Section 2 states: Serial Number: A 32-bit monotonically increasing unsigned integer which wraps from 2^32-1 to 0. Do you mean "strictly increasing" instead of "monotonically increasing"? Section 10 states: This section contains a preliminary list of error codes. The authors expect additions to this section during development of the initial implementations. A forward reference to the IANA considerations would be friendly here. IDnits reports: ** Obsolete normative reference: RFC 2385 (Obsoleted by RFC 5925) |
2012-01-30
|
26 | Peter Saint-Andre | [Ballot discuss] There are two interrelated issues I'd like to chat about with respect to TLS transport. Section 7.2 states: If such certificates are … [Ballot discuss] There are two interrelated issues I'd like to chat about with respect to TLS transport. Section 7.2 states: If such certificates are used, the CN field [RFC5280] MUST be used to denote the router's identity. What is meant by "identity" here? Is there a specific identifier that ought to be included in the CN (e.g., IP address or FQDN)? The term "identity" is nearly void for vagueness. Then: "Clients SHOULD verify the cache's certificate". It would be good to specify more clearly what is meant by certificate verification (e.g., using the rules from RFC 2818 or RFC 6125). |
2012-01-30
|
26 | Peter Saint-Andre | [Ballot Position Update] New position, Discuss, has been recorded |
2012-01-30
|
26 | Ron Bonica | [Ballot Position Update] New position, Yes, has been recorded |
2012-01-30
|
26 | Dan Romascanu | [Ballot comment] 1. It would be useful for the readability of the document to have acronyms expanded at the first occurence (starting with RPKI) 2. … [Ballot comment] 1. It would be useful for the readability of the document to have acronyms expanded at the first occurence (starting with RPKI) 2. In Section 5.9: > The diagnostic text is optional, if not present the Length of Error Text field SHOULD be zero. Why is this a SHOULD? 3. Same: > If error text is present, it SHOULD be a string in US-ASCII, for maximum portability; if non-US-ASCII characters are absolutely required, the error text MUST use UTF-8 encoding. Pete already refered to this. RFC 2277 mandates implementing UTF-8, so what is the reason for recommending US-ASCII? |
2012-01-30
|
26 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-29
|
26 | Ralph Droms | [Ballot comment] Minor editorial suggestion - section 5.10 seems out of order and would have been more useful to me if it had appeared before … [Ballot comment] Minor editorial suggestion - section 5.10 seems out of order and would have been more useful to me if it had appeared before the definitions of the PDU fields in section 5. |
2012-01-29
|
26 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-29
|
26 | Stephen Farrell | [Ballot comment] - "Formally" and "simple but reliable" in the abstract and intro seem to be marketing text. - I (still) don't like where it … [Ballot comment] - "Formally" and "simple but reliable" in the abstract and intro seem to be marketing text. - I (still) don't like where it says you SHOULD do ACLs or something. (The text in the document uses "..." rather than "or something" but that's the meaning.) Just delete the elipsis or actually give a non-ACL example of what one might sensibly do. - I agree with the comments about the expansion of MITM but, like everyone else probably, don't care that much. |
2012-01-29
|
26 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-28
|
26 | Pete Resnick | [Ballot comment] In 5.9: If error text is present, it SHOULD be a string in US-ASCII, for maximum portability; if non-US-ASCII characters … [Ballot comment] In 5.9: If error text is present, it SHOULD be a string in US-ASCII, for maximum portability; if non-US-ASCII characters are absolutely required, the error text MUST use UTF-8 encoding. I'm trying to suss out what "maximum portability" means. Is UTF-8 known to screw up some implementations (in which case the SHOULD is justified), or is it just that you're being super-conservative, or worse, that you're afraid some non-English might end up in the error log? :-) Unless there's a real worry for interoperability here, just define the thing as UTF-8 (which means that US-ASCII still looks like US-ASCII) and be done with it. A reference to RFC 3629 might be extra friendly. |
2012-01-28
|
26 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-27
|
25 | (System) | New version available: draft-ietf-sidr-rpki-rtr-25.txt |
2012-01-27
|
26 | Russ Housley | [Ballot Position Update] New position, Yes, has been recorded |
2012-01-23
|
26 | Sam Weiler | Request for Telechat review by SECDIR is assigned to Hilarie Orman |
2012-01-23
|
26 | Sam Weiler | Request for Telechat review by SECDIR is assigned to Hilarie Orman |
2012-01-13
|
26 | Stewart Bryant | [Ballot discuss] This discuss is a placeholder until it is verified that all of the following LC comments have been addressed http://www.ietf.org/mail-archive/web/ietf/current/msg71194.html |
2012-01-13
|
26 | Stewart Bryant | [Ballot Position Update] Position for Stewart Bryant has been changed to Discuss from Yes |
2012-01-13
|
26 | Stewart Bryant | State changed to IESG Evaluation from Waiting for AD Go-Ahead. |
2012-01-13
|
26 | Stewart Bryant | Placed on agenda for telechat - 2012-02-02 |
2012-01-13
|
26 | Stewart Bryant | [Ballot Position Update] New position, Yes, has been recorded for Stewart Bryant |
2012-01-13
|
26 | Stewart Bryant | Ballot has been issued |
2012-01-13
|
26 | Stewart Bryant | Created "Approve" ballot |
2012-01-12
|
24 | (System) | New version available: draft-ietf-sidr-rpki-rtr-24.txt |
2012-01-09
|
23 | (System) | New version available: draft-ietf-sidr-rpki-rtr-23.txt |
2011-12-21
|
26 | Sam Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Hilarie Orman. |
2011-12-19
|
22 | (System) | New version available: draft-ietf-sidr-rpki-rtr-22.txt |
2011-12-17
|
21 | (System) | New version available: draft-ietf-sidr-rpki-rtr-21.txt |
2011-12-13
|
26 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2011-12-09
|
26 | Amanda Baber | IANA has questions about the port registrations requested by draft-ietf-sidr-rpki-rtr-19.txt: QUESTIONS: "RPKI-Rtr" and "RPKI-Rtr TLS" aren't valid service names, per RFC 6335; we … IANA has questions about the port registrations requested by draft-ietf-sidr-rpki-rtr-19.txt: QUESTIONS: "RPKI-Rtr" and "RPKI-Rtr TLS" aren't valid service names, per RFC 6335; we can't use capital letters or spaces. Should we use these in the description field? If not, how should we fill in the description field for the two new port numbers? Should we use "rpki-rtr" and "rpki-rtr-tls" for the service names? ACTION 1: IANA will register the following ports in the 0-1023 range: Port Number: TBD Service Name: rpki-rtr Transport Protocol: TCP Description: RPKI-Rtr (?) Assignee: IESG Contact: IETF Chair Reference: [RFCXXXX] Port Number: TBD Service Name: rpki-rtr-tls Transport Protocol: TCP Description: RPKI-Rtr TLS (?) Assignee: IESG Contact: IETF Chair Reference: [RFCXXXX] ACTION 2: IANA will create the following registry at http://www.iana.org/assignments/rpki Registry Name: rpki-rtr-pdu Registration Procedure: RFC Required (Standards Track or Experimental) Protocol Version PDU Type Description Reference -------- -------- ----------- --------- 0 0 Serial Notify [RFCXXXX] 0 1 Serial Query [RFCXXXX] 0 2 Reset Query [RFCXXXX] 0 3 Cache Response [RFCXXXX] 0 4 IPv4 Prefix [RFCXXXX] 5 Unassigned 0 6 IPv6 Prefix [RFCXXXX] 0 7 End of Data [RFCXXXX] 0 8 Cache Reset [RFCXXXX] 9 Unassigned 0 10 Error Report [RFCXXXX] 11-254 Unassigned 0 255 Reserved [RFCXXXX] ACTION 3: IANA will create the following registry at http://www.iana.org/assignments/rpki Registry Name: rpki-rtr-error Registration Procedure: Expert Review Value Description Reference ----- ------------------------------- --------- 0 Corrupt Data [RFCXXXX] 1 Internal Error [RFCXXXX] 2 No Data Available [RFCXXXX] 3 Invalid Request [RFCXXXX] 4 Unsupported Protocol Version [RFCXXXX] 5 Unsupported PDU Type [RFCXXXX] 6 Withdrawal of Unknown Record [RFCXXXX] 7 Duplicate Announcement Received [RFCXXXX] 8-254 Unassigned 255 Reserved [RFCXXXX] ACTION 4: IANA will register the following SSH Connection Protocol Subsystem Name at http://www.iana.org/assignments/ssh-parameters rpki-rtr [RFCXXXX] |
2011-12-04
|
26 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Hilarie Orman |
2011-12-04
|
26 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Hilarie Orman |
2011-11-30
|
20 | (System) | New version available: draft-ietf-sidr-rpki-rtr-20.txt |
2011-11-29
|
26 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2011-11-29
|
26 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2011-11-29
|
26 | Cindy Morgan | Last call sent |
2011-11-29
|
26 | Cindy Morgan | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (The RPKI/Router Protocol) to Proposed Standard The IESG has received a request from the Secure Inter-Domain Routing WG (sidr) to consider the following document: - 'The RPKI/Router Protocol' as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2011-12-13. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract In order to formally validate the origin ASs of BGP announcements, routers need a simple but reliable mechanism to receive RPKI [I-D.ietf-sidr-arch] prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-sidr-rpki-rtr/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-sidr-rpki-rtr/ No IPR declarations have been submitted directly on this I-D. |
2011-11-29
|
26 | Stewart Bryant | Last Call was requested |
2011-11-29
|
26 | Stewart Bryant | State changed to Last Call Requested from Publication Requested. |
2011-11-29
|
26 | Stewart Bryant | Last Call text changed |
2011-11-29
|
26 | (System) | Ballot writeup text was added |
2011-11-29
|
26 | (System) | Last call text was added |
2011-11-29
|
26 | (System) | Ballot approval text was added |
2011-10-31
|
19 | (System) | New version available: draft-ietf-sidr-rpki-rtr-19.txt |
2011-10-27
|
26 | Amy Vezza | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Shepard: Chris Morrow Has been read: True Is Document Ready: True (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Adequate Review: True Existing Concerns: False (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? Need Further Review: False (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. Specific Concerns: False IPR issues: False (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Consensus Reached: True Solidity: Solid (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) Appeals Threats: False (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? ID-Nits has 2 outstanding issues, Authors to fix in IESG Review (down ref + obsolete ref, non-critcal) (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Split Refs: True (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? Consistent/IANA Section: True (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Format Language Checks: True (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. "In order to formally validate the origin ASs of BGP announcements, routers need a simple but reliable mechanism to receive RPKI [I-D.ietf-sidr-arch] prefix origin data from a trusted cache. This document describes a protocol to deliver validated prefix origin data to routers." Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? WG Summary: Significant discussion on-list about authentication protocols to be used between the 2 parties in play (router/cache), this did wind down to a conclusion though, which is a positive result. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? Quality: Fine |
2011-10-27
|
26 | Amy Vezza | Draft added in state Publication Requested |
2011-10-27
|
26 | Amy Vezza | [Note]: 'Document shepherd is Chris Morrow (morrowc@ops-netman.net).' added |
2011-10-14
|
18 | (System) | New version available: draft-ietf-sidr-rpki-rtr-18.txt |
2011-10-01
|
17 | (System) | New version available: draft-ietf-sidr-rpki-rtr-17.txt |
2011-08-13
|
16 | (System) | New version available: draft-ietf-sidr-rpki-rtr-16.txt |
2011-08-09
|
15 | (System) | New version available: draft-ietf-sidr-rpki-rtr-15.txt |
2011-07-10
|
14 | (System) | New version available: draft-ietf-sidr-rpki-rtr-14.txt |
2011-06-29
|
13 | (System) | New version available: draft-ietf-sidr-rpki-rtr-13.txt |
2011-04-25
|
12 | (System) | New version available: draft-ietf-sidr-rpki-rtr-12.txt |
2011-03-14
|
11 | (System) | New version available: draft-ietf-sidr-rpki-rtr-11.txt |
2011-03-02
|
10 | (System) | New version available: draft-ietf-sidr-rpki-rtr-10.txt |
2011-02-17
|
09 | (System) | New version available: draft-ietf-sidr-rpki-rtr-09.txt |
2011-02-15
|
08 | (System) | New version available: draft-ietf-sidr-rpki-rtr-08.txt |
2011-01-12
|
07 | (System) | New version available: draft-ietf-sidr-rpki-rtr-07.txt |
2011-01-06
|
06 | (System) | New version available: draft-ietf-sidr-rpki-rtr-06.txt |
2010-12-16
|
05 | (System) | New version available: draft-ietf-sidr-rpki-rtr-05.txt |
2010-11-22
|
04 | (System) | New version available: draft-ietf-sidr-rpki-rtr-04.txt |
2010-11-19
|
03 | (System) | New version available: draft-ietf-sidr-rpki-rtr-03.txt |
2010-08-29
|
02 | (System) | New version available: draft-ietf-sidr-rpki-rtr-02.txt |
2010-08-15
|
01 | (System) | New version available: draft-ietf-sidr-rpki-rtr-01.txt |
2010-08-11
|
00 | (System) | New version available: draft-ietf-sidr-rpki-rtr-00.txt |