RIPE NCC's Implementation of Resource Public Key Infrastructure (RPKI) Certificate Tree Validation
draft-ietf-sidrops-rpki-tree-validation-03
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2018-12-18
|
03 | (System) | Received changes through RFC Editor sync (created alias RFC 8488, changed title to 'RIPE NCC's Implementation of Resource Public Key Infrastructure (RPKI) Certificate Tree … Received changes through RFC Editor sync (created alias RFC 8488, changed title to 'RIPE NCC's Implementation of Resource Public Key Infrastructure (RPKI) Certificate Tree Validation', changed abstract to 'This document describes an approach to validating the content of the Resource Public Key Infrastructure (RPKI) certificate tree, as it is implemented in the RIPE NCC RPKI Validator. This approach is independent of a particular object retrieval mechanism, which allows it to be used with repositories available over the rsync protocol, the RPKI Repository Delta Protocol (RRDP), and repositories that use a mix of both.', changed pages to 17, changed standardization level to Informational, changed state to RFC, added RFC published event at 2018-12-18, changed IESG state to RFC Published) |
2018-12-18
|
03 | (System) | RFC published |
2018-12-18
|
03 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2018-10-22
|
03 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2018-09-26
|
03 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2018-09-20
|
03 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'No Response' |
2018-09-18
|
03 | (System) | IANA Action state changed to No IANA Actions from In Progress |
2018-09-18
|
03 | (System) | RFC Editor state changed to EDIT |
2018-09-18
|
03 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2018-09-18
|
03 | (System) | Announcement was received by RFC Editor |
2018-09-18
|
03 | (System) | IANA Action state changed to In Progress |
2018-09-18
|
03 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2018-09-18
|
03 | Amy Vezza | IESG has approved the document |
2018-09-18
|
03 | Amy Vezza | Closed "Approve" ballot |
2018-09-18
|
03 | Amy Vezza | Ballot approval text was generated |
2018-09-17
|
03 | Warren Kumari | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2018-09-16
|
03 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2018-09-16
|
03 | Oleg Muravskiy | New version available: draft-ietf-sidrops-rpki-tree-validation-03.txt |
2018-09-16
|
03 | (System) | New version approved |
2018-09-16
|
03 | (System) | Request for posting confirmation emailed to previous authors: Tim Bruijnzeels , Oleg Muravskiy |
2018-09-16
|
03 | Oleg Muravskiy | Uploaded new revision |
2018-08-30
|
02 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation |
2018-08-30
|
02 | Ignas Bagdonas | [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas |
2018-08-30
|
02 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2018-08-30
|
02 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2018-08-29
|
02 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2018-08-29
|
02 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2018-08-28
|
02 | Ben Campbell | [Ballot comment] Thank you for the clear description of the purpose of the document in section 1. |
2018-08-28
|
02 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2018-08-28
|
02 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2018-08-28
|
02 | Benjamin Kaduk | [Ballot comment] This document is Informational, so I will make my comments non-blocking, but I think that the security considerations could be improved. It currently … [Ballot comment] This document is Informational, so I will make my comments non-blocking, but I think that the security considerations could be improved. It currently does a good job talking about cases where the procedure can receive inconsistent inputs (and how it behaves in the face of those inputs), as well as some other considerations, and this is great! I think that the discussion could be more powerful if it also considered how those inconsistent inputs could be produced, in particular which capabilities an attacker could have. There seem to be roughly three classes of actors for active attacks -- an attacker in the network could modify the transferred content (including number of files and directory layout) over unecrypteed rsync or http, an attacker that compromises the webserver's certificate (or obtains a fraudulent one) could do the same over encrypted https, and an attacker that compromises the TA signing key could produce fake-but-"valid" manifests, CRLs, etc.. (Is there more that could be done with a compromised non-TA CA? The potential hazards to this algorithm don't seem to be noticably distinct, though.) Some consumers may be willing to trust in the TA's integrity or even the Web PKI and not worry about those risks. Though there is always risk of accidental error, of course, and the current coverage in this document seems adequate for that risk. Some additional section-by-section comments follow. Section 3.1 The key properties needed of cryptographic hash functions are either "collision resistance" or "second preimage resistance", depending on whether the attacker gets to pick both hash inputs (the first case) or only one of them (the second). Which one is needed here would probably depend on whether the CA/issuer is trusted to not be an attacker or not, but regardless, please use the more detailed terminology. Section 3.2 [...], or use all objects whose AKI extension matches the Subject Key Identifier (SKI) extension (Section 4.2.1 of [RFC5280]) of a CA certificate. "all objects" as discovered within what scope? Section 4.2 Please expand SIA on first usage. In bullet point 1, it might help the uninitiated reader to say something after "and pass it to the object fetcher" to note that "the fetcher will then fetch all objects available from that repository". In bullet point 3, please be more clear about which manifest is "this manifest object" that is used to continue validation processing. 4. Perform manifest entries discovery and validation as described in Section 4.2.2. nit: "manifest entry discovery" (singular "entry") (Note that this implementation uses the operator configuration to decide which algorithm to use for path validation. It applies selected algorithm to all resource certificates, rather than nit: "the selected algorithm" Please expand ROA on first usage. Section 5.1.1, 5.1.2 The syntactic verification performed here is done on what should be considered "untrusted input", which means that the verification code needs to be written in a robust manner. (Given the historical recurrences of, e.g., ASN.1 decoder security vulnerabilities, we probably need to explicitly state this in the security considerations.) Section 9.1 If I understand correctly, RFC 6485 allows for (and predicts the need for) hash agility in the file hash algorithm. In this case, it would probably be appropriate to say something about how "the security of the system as a whole is limited to that of the weakest hash function allowed by consumers, but the hash agility provided for by RFC 6485 allows new (stronger) hashes to be introduced and old hash functions phased out before they are critically broken". Section 9.2 In case of a mismatch described above this implementation will not exclude an object from further validation merely because it's actual nit: "its" (no apostrophe) Section 9.3 nit: Which behavior is allowed-but-not-required -- a CA signing things not listed in the manifest, or an RP ignoring things not listed in the manifest? I suggest "This RP behavior is allowed [...]". Section 9.4 This kind of behavior would be seen as an unacceptable vulnerability in a standards-track protocol, though since this document is only informational it does not block publication. Section 9.5 It might be useful to reference Section 5.1.1 and how we sometimes fetch the entire repository contents, not limited by a manifest listing. |
2018-08-28
|
02 | Benjamin Kaduk | [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk |
2018-08-28
|
02 | Alvaro Retana | [Ballot comment] I am happy that this document exists. Documenting how the RIPE validator works is important and valuable. I think that the content (maybe … [Ballot comment] I am happy that this document exists. Documenting how the RIPE validator works is important and valuable. I think that the content (maybe after getting feedback from the WG) would have been more appropriate as an Independent Submission...or even as simply documentation in the RIPE site. There is one point that bothers me -- as part of the answer to 'why are we publishing this document?' (paraphrasing from the GenArt review), one of the authors mentioned that "the implementation will change (in fact v3 is just (about to be) released), and then the RFC is outdated." [1] There is documentation about the rpki-validator-3 in the github repository [2] already -- I haven't taken the time to examine the differences, but the point about the short term value of this document makes me think about the value of publishing it as an RFC at all. I have also noticed the comments from the WG about the value of this document to implementors, both experienced and new. I am then balloting 'No Objection'. [1] https://mailarchive.ietf.org/arch/msg/ietf/pJzebXqz1mtdGAsFi2V3e-G_SYI [2] https://github.com/RIPE-NCC/rpki-validator-3/wiki |
2018-08-28
|
02 | Alvaro Retana | Ballot comment text updated for Alvaro Retana |
2018-08-27
|
02 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2018-08-27
|
02 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2018-08-24
|
02 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2018-08-20
|
02 | Warren Kumari | IESG state changed to IESG Evaluation from Waiting for Writeup |
2018-08-20
|
02 | Cindy Morgan | Placed on agenda for telechat - 2018-08-30 |
2018-08-20
|
02 | Warren Kumari | Ballot has been issued |
2018-08-20
|
02 | Warren Kumari | [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari |
2018-08-20
|
02 | Warren Kumari | Created "Approve" ballot |
2018-08-20
|
02 | Warren Kumari | Ballot writeup was changed |
2018-08-10
|
02 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2018-08-09
|
02 | Jürgen Schönwälder | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Jürgen Schönwälder. Sent review to list. |
2018-08-03
|
02 | Linda Dunbar | Request for Last Call review by GENART Completed: Ready. Reviewer: Linda Dunbar. Sent review to list. |
2018-08-02
|
02 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2018-08-02
|
02 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-sidrops-rpki-tree-validation-02, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-sidrops-rpki-tree-validation-02, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2018-08-02
|
02 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sandra Murphy |
2018-08-02
|
02 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sandra Murphy |
2018-07-31
|
02 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jürgen Schönwälder |
2018-07-31
|
02 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jürgen Schönwälder |
2018-07-30
|
02 | Jean Mahoney | Request for Last Call review by GENART is assigned to Linda Dunbar |
2018-07-30
|
02 | Jean Mahoney | Request for Last Call review by GENART is assigned to Linda Dunbar |
2018-07-27
|
02 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2018-07-27
|
02 | Amy Vezza | The following Last Call announcement was sent out (ends 2018-08-10): From: The IESG To: IETF-Announce CC: morrowc@ops-netman.net, sidrops@ietf.org, sidrops-chairs@ietf.org, Chris Morrow , … The following Last Call announcement was sent out (ends 2018-08-10): From: The IESG To: IETF-Announce CC: morrowc@ops-netman.net, sidrops@ietf.org, sidrops-chairs@ietf.org, Chris Morrow , warren@kumari.net, draft-ietf-sidrops-rpki-tree-validation@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (RPKI Certificate Tree Validation by the RIPE NCC RPKI Validator) to Informational RFC The IESG has received a request from the SIDR Operations WG (sidrops) to consider the following document: - 'RPKI Certificate Tree Validation by the RIPE NCC RPKI Validator' as Informational RFC An "Informational" specification is published for the general information of the Internet community, and does not represent an Internet community consensus or recommendation. The Informational designation is intended to provide for the timely publication of a very broad range of responsible informational documents from many sources, subject only to editorial considerations and to verification that there has been adequate coordination with the standards process (see section 4.2.3). The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2018-08-10. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes the approach to validate the content of the RPKI certificate tree, as it is implemented in the RIPE NCC RPKI Validator. This approach is independent of a particular object retrieval mechanism. This allows it to be used with repositories available over the rsync protocol, the RPKI Repository Delta Protocol, and repositories that use a mix of both. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sidrops-rpki-tree-validation/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-sidrops-rpki-tree-validation/ballot/ No IPR declarations have been submitted directly on this I-D. |
2018-07-27
|
02 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2018-07-27
|
02 | Warren Kumari | Last call was requested |
2018-07-27
|
02 | Warren Kumari | Ballot approval text was generated |
2018-07-27
|
02 | Warren Kumari | Ballot writeup was generated |
2018-07-27
|
02 | Warren Kumari | IESG state changed to Last Call Requested from AD Evaluation |
2018-07-27
|
02 | Warren Kumari | Last call announcement was changed |
2018-07-27
|
02 | Warren Kumari | Changed consensus to Yes from Unknown |
2018-07-27
|
02 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Informational (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document describes the approach to validate the content of the RPKI certificate tree, as it is implemented in the RIPE NCC RPKI Validator. This approach is independent of a particular object retrieval mechanism. This allows it to be used with repositories available over the rsync protocol, the RPKI Repository Delta Protocol, and repositories that use a mix of both. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? no particularly difficult notes from the WG, this document describes the operations of a particular piece of infrastructure, it's not changing live things. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? this document describes a running system... it's clear and concise. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Shepherd: morrowc@ops-netman.net AD: Warren Kumari - warren@kumari.net (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Shepherd has read this document, comments on the document and fixes which came from the comments, the document seems to be in good shape at this point. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? no concerns (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. not required. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concerns (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. yes, no ipr concerns (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. no (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? solid enough for sidr/sidrops. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. there are 3 references which will be updated before publication (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. no review required. (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? no (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. none. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. nope (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). review/reading made, no issues. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. none |
2018-07-21
|
02 | Warren Kumari | IESG state changed to AD Evaluation from Publication Requested |
2018-07-17
|
02 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Informational (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document describes the approach to validate the content of the RPKI certificate tree, as it is implemented in the RIPE NCC RPKI Validator. This approach is independent of a particular object retrieval mechanism. This allows it to be used with repositories available over the rsync protocol, the RPKI Repository Delta Protocol, and repositories that use a mix of both. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? no particularly difficult notes from the WG, this document describes the operations of a particular piece of infrastructure, it's not changing live things. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? this document describes a running system... it's clear and concise. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Shepherd: morrowc@ops-netman.net AD: Warren Kumari - warren@kumari.net (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Shepherd has read this document, comments on the document and fixes which came from the comments, (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? no concerns (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. not required. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concerns (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. yes, no ipr concerns (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. no (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? solid enough for sidr/sidrops. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. there are 3 references which will be updated before publication (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. no review required. (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? no (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. none. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. nope (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). review/reading made, no issues. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. none |
2018-07-17
|
02 | Chris Morrow | Responsible AD changed to Warren Kumari |
2018-07-17
|
02 | Chris Morrow | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2018-07-17
|
02 | Chris Morrow | IESG state changed to Publication Requested |
2018-07-17
|
02 | Chris Morrow | IESG process started in state Publication Requested |
2018-07-17
|
02 | Chris Morrow | Changed document writeup |
2018-07-17
|
02 | Chris Morrow | Notification list changed to Chris Morrow <morrowc@ops-netman.net> |
2018-07-17
|
02 | Chris Morrow | Document shepherd changed to Chris Morrow |
2018-07-17
|
02 | Chris Morrow | Intended Status changed to Informational from None |
2018-06-29
|
02 | Oleg Muravskiy | New version available: draft-ietf-sidrops-rpki-tree-validation-02.txt |
2018-06-29
|
02 | (System) | New version approved |
2018-06-29
|
02 | (System) | Request for posting confirmation emailed to previous authors: sidrops-chairs@ietf.org, Tim Bruijnzeels , Oleg Muravskiy |
2018-06-29
|
02 | Oleg Muravskiy | Uploaded new revision |
2018-04-19
|
01 | (System) | Document has expired |
2017-11-14
|
01 | Chris Morrow | Added to session: IETF-100: sidrops Wed-1330 |
2017-07-20
|
01 | Oleg Muravskiy | New version available: draft-ietf-sidrops-rpki-tree-validation-01.txt |
2017-07-20
|
01 | (System) | New version approved |
2017-07-20
|
01 | (System) | Request for posting confirmation emailed to previous authors: Tim Bruijnzeels , Oleg Muravskiy |
2017-07-20
|
01 | Oleg Muravskiy | Uploaded new revision |
2017-07-18
|
00 | (System) | Document has expired |
2017-01-14
|
00 | Keyur Patel | This document now replaces draft-ietf-sidr-rpki-tree-validation instead of None |
2017-01-14
|
00 | Oleg Muravskiy | New version available: draft-ietf-sidrops-rpki-tree-validation-00.txt |
2017-01-14
|
00 | (System) | WG -00 approved |
2017-01-14
|
00 | Oleg Muravskiy | Set submitter to "Oleg Muravskiy ", replaces to draft-ietf-sidr-rpki-tree-validation and sent approval email to group chairs: sidrops-chairs@ietf.org |
2017-01-14
|
00 | Oleg Muravskiy | Uploaded new revision |