The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure
RFC 7935
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-07-29
|
05 | (System) | Received changes through RFC Editor sync (removed Errata tag (all errata rejected)) |
2019-05-28
|
05 | (System) | Received changes through RFC Editor sync (added Errata tag) |
2016-09-01
|
05 | (System) | Received changes through RFC Editor sync (changed title to 'The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure', changed … Received changes through RFC Editor sync (changed title to 'The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure', changed abstract to 'This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures.', changed standardization level to Proposed Standard, created obsoletes relation between draft-ietf-sidr-rfc6485bis and RFC 6485) |
2016-08-31
|
05 | (System) | RFC published |
2016-08-30
|
05 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2016-07-07
|
05 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2016-07-07
|
05 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2016-06-20
|
05 | (System) | RFC Editor state changed to EDIT |
2016-06-20
|
05 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2016-06-20
|
05 | (System) | Announcement was received by RFC Editor |
2016-06-20
|
05 | (System) | IANA Action state changed to No IC from In Progress |
2016-06-20
|
05 | (System) | IANA Action state changed to In Progress |
2016-06-20
|
05 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2016-06-20
|
05 | Amy Vezza | IESG has approved the document |
2016-06-20
|
05 | Amy Vezza | Closed "Approve" ballot |
2016-06-20
|
05 | Amy Vezza | Ballot approval text was generated |
2016-06-20
|
05 | Amy Vezza | Ballot writeup was changed |
2016-06-16
|
05 | Cindy Morgan | IESG state changed to Approved-announcement to be sent from IESG Evaluation |
2016-06-14
|
05 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2016-06-14
|
05 | Terry Manderson | [Ballot comment] Thank you for amending the text in Section 5 (Additional Requirements) to reflect the work in RFC6916 and removing the explicit contradiction. Setting … [Ballot comment] Thank you for amending the text in Section 5 (Additional Requirements) to reflect the work in RFC6916 and removing the explicit contradiction. Setting my ballot to No Objection. |
2016-06-14
|
05 | Terry Manderson | [Ballot Position Update] Position for Terry Manderson has been changed to No Objection from Discuss |
2016-06-13
|
05 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2016-06-11
|
05 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2016-06-02
|
05 | Alvaro Retana | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2016-06-02
|
05 | Alvaro Retana | Ballot has been issued |
2016-06-02
|
05 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2016-05-26
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2016-05-26
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2016-05-26
|
05 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2016-05-26
|
05 | Sabrina Tanamal | (Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-sidr-rfc6485bis-05.txt, which is currently in Last Call, and has the following comments: We understand that this … (Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-sidr-rfc6485bis-05.txt, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object. If this assessment is not accurate, please respond as soon as possible. Thank you, Sabrina Tanamal IANA Specialist ICANN |
2016-05-19
|
05 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: sandy@tislabs.com, aretana@cisco.com, draft-ietf-sidr-rfc6485bis@ietf.org, sidr-chairs@ietf.org, sidr@ietf.org Reply-To: ietf@ietf.org … The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: sandy@tislabs.com, aretana@cisco.com, draft-ietf-sidr-rfc6485bis@ietf.org, sidr-chairs@ietf.org, sidr@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (The Profile for Algorithms and Key Sizes for use in the Resource Public Key Infrastructure) to Proposed Standard The IESG has received a request from the Secure Inter-Domain Routing WG (sidr) to consider the following document: - 'The Profile for Algorithms and Key Sizes for use in the Resource Public Key Infrastructure' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2016-06-02. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures. Downref: Normative references are made to 3 Informational documents: RFC2986, RFC3447 and RFC6480. RFC2986 and RFC3447 have been previously approved by the community (https://trac.tools.ietf.org/group/iesg/trac/wiki/DownrefRegistry). RFC2986 and RFC6480 were also Downrefs in RFC6485, which this document obsoletes. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/ballot/ No IPR declarations have been submitted directly on this I-D. |
2016-05-19
|
05 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2016-05-19
|
05 | Alvaro Retana | Telechat date has been changed to 2016-06-16 from 2015-11-19 |
2016-05-19
|
05 | Alvaro Retana | Last call was requested |
2016-05-19
|
05 | Alvaro Retana | IESG state changed to Last Call Requested from AD Evaluation |
2016-05-19
|
05 | Alvaro Retana | Last call announcement was changed |
2016-05-19
|
05 | Alvaro Retana | Last call announcement was generated |
2016-05-19
|
05 | Alvaro Retana | IESG state changed to AD Evaluation from Publication Requested |
2016-04-15
|
05 | Sandra Murphy | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? This document requests Standards Track. This document obsoletes RFC6485, also noted as Standards Track. RFC6485 is the specification for cryptographic algorithms and key sizes to be used in the RPKI, which require standardization for global interoperability. Therefore, Standard Track is the appropriate RFC type. This type of RFC is indicated in the header as Intended status. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures. Working Group Summary The need for the new version of RFC6485 was identified in the working group, and there was wide consensus that it was necessary. A late arriving and painstakingly detailed review identified some editorial issues that delayed the swift publication of a non-controversial change. The IESG consideration noted that the discussion of algorithm agility had been overtaken by publication of RFC6916. The working group came to easy consensus on the appropriate text to refer to RFC6916. Document Quality There are at least four widely used implementations of the RPKI which must implement these cryptographic algorithms. All already support the changes this document makes in RFC6485. The RPKI is in production in all five Regional Internet Registries. Richard Hansen is recognized as having performed a very exacting review, as mentioned above. No MIB doctor, Media Type expert or other expert review was necessary or applicable. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? The Document Shepherd is Sandra Murphy. The Responsible Area Director is Alvaro Retana (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd has personally reviewed this document. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The Document Shepherd has no concerns; adequate reviews were performed. This documents corrects a recognized error in an existing RFC, a change that was not addressable in an errata in the judgment of the responsible AD. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No further review of this document is needed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The Document Shepherd has no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Each author has confirmed that they have no knowledge of any IPR related to this document. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures have been filed directly related to this draft. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG consensus of the need for this technical change was strong and without controversy. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No appeals related to this draft have been mentioned. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The ID nits tool on the datatracker reports: Summary: 3 errors (**), 0 flaws (~~), 0 warnings (==), 3 comments (--). The errors are downrefs, normative references to informational RFCs. These references are retained from RFC6485. See the answer to (15) for full details. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No formal review is applicable to this document. (13) Have all references within this document been identified as either normative or informative? Yes, the references are separated into normative and informative sections. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No such normative references exist. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. ** Downref: Normative reference to an Informational RFC: RFC 2986 This RFC is an IETF republication of another organization's document (PKCS #10 from RSA Laboratories) ** Downref: Normative reference to an Informational RFC: RFC 3447 This RFC is an IETF republication of another organization's document (PKCS #1 from RSA Laboratories) ** Downref: Normative reference to an Informational RFC: RFC 6480 This RFC is the architecture document for the RPKI. The normative reference is appropriate. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document obsoletes RFC6485. Section 8 describes the technical changes to RFC6485 and the reasons they are necessary, as well as the editorial changes. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There are no IANA considerations in RFC6485 and the changes to RFC6485 in this document do not require any IANA actions. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No IANA registries are needed for this document. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No sections of this document are written in a formal language. |
2016-04-15
|
05 | Sandra Murphy | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2016-04-15
|
05 | Sandra Murphy | IESG state changed to Publication Requested from AD is watching |
2016-04-15
|
05 | Sandra Murphy | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? This document requests Standards Track. This document obsoletes RFC6485, also noted as Standards Track. RFC6485 is the specification for cryptographic algorithms and key sizes to be used in the RPKI, which require standardization for global interoperability. Therefore, Standard Track is the appropriate RFC type. This type of RFC is indicated in the header as Intended status. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures. Working Group Summary The need for the new version of RFC6485 was identified in the working group, and there was wide consensus that it was necessary. A late arriving and painstakingly detailed review identified some editorial issues that delayed the swift publication of a non-controversial change. The IESG consideration noted that the discussion of algorithm agility had been overtaken by publication of RFC6916. The working group came to easy consensus on the appropriate text to refer to RFC6916. Document Quality There are at least four widely used implementations of the RPKI which must implement these cryptographic algorithms. All already support the changes this document makes in RFC6485. The RPKI is in production in all five Regional Internet Registries. Richard Hansen is recognized as having performed a very exacting review, as mentioned above. No MIB doctor, Media Type expert or other expert review was necessary or applicable. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? The Document Shepherd is Sandra Murphy. The Responsible Area Director is Alvaro Retana (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd has personally reviewed this document. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The Document Shepherd has no concerns; adequate reviews were performed. This documents corrects a recognized error in an existing RFC, a change that was not addressable in an errata in the judgment of the responsible AD. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No further review of this document is needed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The Document Shepherd has no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Each author has confirmed that they have no knowledge of any IPR related to this document. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures have been filed directly related to this draft. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG consensus of the need for this technical change was strong and without controversy. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No appeals related to this draft have been mentioned. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The ID nits tool on the datatracker reports: Summary: 3 errors (**), 0 flaws (~~), 0 warnings (==), 3 comments (--). The errors are downrefs, normative references to informational RFCs. These references are retained from RFC6485. See the answer to (15) for full details. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No formal review is applicable to this document. (13) Have all references within this document been identified as either normative or informative? Yes, the references are separated into normative and informative sections. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No such normative references exist. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. ** Downref: Normative reference to an Informational RFC: RFC 2986 This RFC is an IETF republication of another organization's document (PKCS #10 from RSA Laboratories) ** Downref: Normative reference to an Informational RFC: RFC 3447 This RFC is an IETF republication of another organization's document (PKCS #1 from RSA Laboratories) ** Downref: Normative reference to an Informational RFC: RFC 6480 This RFC is the architecture document for the RPKI. The normative reference is appropriate. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document obsoletes RFC6485. Section 8 describes the technical changes to RFC6485 and the reasons they are necessary, as well as the editorial changes. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There are no IANA considerations in RFC6485 and the changes to RFC6485 in this document do not require any IANA actions. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No IANA registries are needed for this document. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No sections of this document are written in a formal language. |
2016-04-15
|
05 | Sandra Murphy | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2016-03-10
|
05 | Sandra Murphy | wglc started 09 Mar 2016, ending 23 Mar 2016 |
2016-03-10
|
05 | Sandra Murphy | Tag Revised I-D Needed - Issue raised by IESG cleared. |
2016-03-10
|
05 | Sandra Murphy | IETF WG state changed to In WG Last Call from WG Document |
2016-03-08
|
05 | Geoff Huston | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2016-03-08
|
05 | Geoff Huston | New version available: draft-ietf-sidr-rfc6485bis-05.txt |
2016-02-22
|
04 | Jean Mahoney | Closed request for Last Call review by GENART with state 'No Response' |
2015-12-09
|
04 | Alvaro Retana | Tag Revised I-D Needed - Issue raised by IESG set. Tag Revised I-D Needed cleared. |
2015-12-09
|
04 | Alvaro Retana | IETF WG state changed to WG Document from Submitted to IESG for Publication |
2015-12-07
|
04 | Alvaro Retana | Returning this document to the WG to address the comments from the IESG review (Terry's DISCUSS). |
2015-12-07
|
04 | Alvaro Retana | IESG state changed to AD is watching::Revised I-D Needed from IESG Evaluation::Revised I-D Needed |
2015-11-29
|
04 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'No Response' |
2015-11-19
|
04 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2015-11-19
|
04 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2015-11-18
|
04 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2015-11-18
|
04 | Brian Haberman | [Ballot comment] I support Terry's DISCUSS. |
2015-11-18
|
04 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2015-11-17
|
04 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2015-11-17
|
04 | Terry Manderson | [Ballot discuss] I'm not so sure that this will be an easy DISCUSS to work through as I view this in light of future sustainability/deployability … [Ballot discuss] I'm not so sure that this will be an easy DISCUSS to work through as I view this in light of future sustainability/deployability of RPKI and any protocol wedded to it (eg BGPSEC). Section 5 "Additional Requirements" suggests that both CAs and RPs "SHOULD" be capable of supporting a transition and thus able to support multiple RPKI alg. and key profiles. To me this "SHOULD" seems like it invites fragility in any such transition. An immediate example would be the root DNSSEC ksk rollover. An rather large amount of work is underway to ascertain the impact. By leaving the SHOULDs in place is this walking the same path? Let me ask another way. Under what situations is it actually appropriate for a CA or RP to be able to ignore the requirement of being able to support a phased introduction/deprecation of new/different RPKI algorithm and key profiles? And if they ignore such a recommendation does this make the entire RPKI infrastructure a fractured PKI by algorithm? |
2015-11-17
|
04 | Terry Manderson | [Ballot Position Update] New position, Discuss, has been recorded for Terry Manderson |
2015-11-17
|
04 | Kathleen Moriarty | [Ballot comment] The SecDir reviewer picked up on a stray "/>" in section 6, just making a note of that here, but I'm sure the … [Ballot comment] The SecDir reviewer picked up on a stray "/>" in section 6, just making a note of that here, but I'm sure the RFC editor would see it too. https://www.ietf.org/mail-archive/web/secdir/current/msg06151.html |
2015-11-17
|
04 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2015-11-17
|
04 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2015-11-17
|
04 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2015-11-17
|
04 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2015-11-17
|
04 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2015-11-17
|
04 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2015-11-17
|
04 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2015-11-16
|
04 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2015-11-16
|
04 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2015-11-10
|
04 | Alvaro Retana | IESG state changed to IESG Evaluation from Waiting for Writeup |
2015-11-10
|
04 | Alvaro Retana | Ballot approval text was generated |
2015-11-02
|
04 | Alvaro Retana | Ballot has been issued |
2015-11-02
|
04 | Alvaro Retana | [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana |
2015-11-02
|
04 | Alvaro Retana | Created "Approve" ballot |
2015-11-02
|
04 | Alvaro Retana | Ballot writeup was changed |
2015-11-02
|
04 | Alvaro Retana | Ballot approval text was generated |
2015-11-02
|
04 | Alvaro Retana | Changed consensus to Yes from Unknown |
2015-11-02
|
04 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2015-10-29
|
04 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Sean Turner. |
2015-10-22
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2015-10-22
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2015-10-22
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sean Turner |
2015-10-22
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sean Turner |
2015-10-19
|
04 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2015-10-19
|
04 | Amanda Baber | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-sidr-rfc6485bis-04, which is currently in Last Call, and has the following comments: We understand that this … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-sidr-rfc6485bis-04, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object. If this assessment is not accurate, please respond as soon as possible. |
2015-10-19
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Suzanne Woolf |
2015-10-19
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Suzanne Woolf |
2015-10-19
|
04 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2015-10-19
|
04 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: , , sidr-chairs@ietf.org, sidr@ietf.org, aretana@cisco.com, Reply-To: ietf@ietf.org Sender: … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: , , sidr-chairs@ietf.org, sidr@ietf.org, aretana@cisco.com, Reply-To: ietf@ietf.org Sender: Subject: Last Call: (The Profile for Algorithms and Key Sizes for use in the Resource Public Key Infrastructure) to Proposed Standard The IESG has received a request from the Secure Inter-Domain Routing WG (sidr) to consider the following document: - 'The Profile for Algorithms and Key Sizes for use in the Resource Public Key Infrastructure' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2015-11-02. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures. Downref: Normative references are made to 3 Informational documents: RFC2986, RFC3447 and RFC6480. RFC2986 and RFC3447 have been previously approved by the community (https://trac.tools.ietf.org/group/iesg/trac/wiki/DownrefRegistry). RFC2986 and RFC6480 were also Downrefs in RFC6485, which this document obsoletes. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/ballot/ No IPR declarations have been submitted directly on this I-D. |
2015-10-19
|
04 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2015-10-19
|
04 | Alvaro Retana | Placed on agenda for telechat - 2015-11-19 |
2015-10-19
|
04 | Alvaro Retana | Last call was requested |
2015-10-19
|
04 | Alvaro Retana | Ballot approval text was generated |
2015-10-19
|
04 | Alvaro Retana | Ballot writeup was generated |
2015-10-19
|
04 | Alvaro Retana | IESG state changed to Last Call Requested from AD Evaluation |
2015-10-19
|
04 | Alvaro Retana | Last call announcement was changed |
2015-10-19
|
04 | Alvaro Retana | Last call announcement was generated |
2015-10-19
|
04 | Alvaro Retana | Notification list changed to aretana@cisco.com |
2015-10-19
|
04 | Alvaro Retana | IESG state changed to AD Evaluation from Publication Requested |
2015-10-19
|
04 | Alvaro Retana | Last call announcement was generated |
2015-10-16
|
04 | Sandra Murphy | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? This document requests Standards Track. This document obsoletes RFC6485, also noted as Standards Track. RFC6485 is the specification for cryptographic algorithms and key sizes to be used in the RPKI, which require standardization for global interoperability. Therefore, Standard Track is the appropriate RFC type. This type of RFC is indicated in the header as Intended status. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures. Working Group Summary The need for the new version of RFC6485 was identified in the working group, and there was wide consensus that it was necessary. A late arriving and painstakingly detailed review identified some editorial issues that delayed the swift publication of a non-controversial change. Document Quality There are at least four widely used implementations of the RPKI which must implement these cryptographic algorithms. All already support the changes this document makes in RFC6485. The RPKI is in production in all five Regional Internet Registries. Richard Hansen is recognized as having performed a very exacting review, as mentioned above. No MIB doctor, Media Type expert or other expert review was necessary or applicable. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? The Document Shepherd is Sandra Murphy. The Responsible Area Director is Alvaro Retana (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd has personally reviewed this document. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The Document Shepherd has no concerns; adequate reviews were performed. This is a recognized change to an existing RFC, a change that was not addressable in an errata in the judgment of the responsible AD. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No further review of this document is needed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The Document Shepherd has no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Each author has confirmed that they have no knowledge of any IPR related to this document. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures have been filed directly related to this draft. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG consensus of the need for this technical change was strong and without controversy. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No appeals related to this draft have been mentioned. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The ID nits tool on the datatracker reports: Summary: 3 errors (**), 0 flaws (~~), 0 warnings (==), 3 comments (--). The error are downrefs, normative references to informational RFCs. These references are retained from RFC6485. See the answer to (15) for full details. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No formal review is applicable to this document. (13) Have all references within this document been identified as either normative or informative? Yes, the references are separated into normative and informative sections. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No such normative references exist. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. ** Downref: Normative reference to an Informational RFC: RFC 2986 This RFC is an IETF republication of another organization's document (PKCS #10 from RSA Laboratories) ** Downref: Normative reference to an Informational RFC: RFC 3447 This RFC is an IETF republication of another organization's document (PKCS #1 from RSA Laboratories) ** Downref: Normative reference to an Informational RFC: RFC 6480 This RFC is the architecture document for the RPKI. The normative reference is appropriate. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document obsoletes RFC6485. Section 8 describes the technical changes to RFC6485 and the reason they are necessary, as well as the editorial changes. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There are no IANA considerations in RFC6485 and the changes in this document do not require any IANA actions. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No IANA registries are needed for this document. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No sections of this document are written in a formal language. |
2015-10-16
|
04 | Sandra Murphy | Responsible AD changed to Alvaro Retana |
2015-10-16
|
04 | Sandra Murphy | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2015-10-16
|
04 | Sandra Murphy | IESG state changed to Publication Requested |
2015-10-16
|
04 | Sandra Murphy | IESG process started in state Publication Requested |
2015-10-16
|
04 | Sandra Murphy | Intended Status changed to Proposed Standard from None |
2015-10-16
|
04 | Sandra Murphy | Changed document writeup |
2015-10-16
|
04 | Sandra Murphy | The error this draft corrects was identified by Andrew Chi and David Mandleberg, verified by Russ Housley, brought to the wg by Rob Austein in … The error this draft corrects was identified by Andrew Chi and David Mandleberg, verified by Russ Housley, brought to the wg by Rob Austein in 2012 and discussed with Matt Lepinski on list, presented to the wg at IETF89 in Mar 14, judged by the AD as inappropriate for an errata and adopted without controversy by the wg as a quick bis. The wg has been following but with little urgency since all known implementations already use the right OID. The draft has been discussed (enough to discover an unrelated errata), a meticulous and thorough review was performed by Richard Hansen, and multiple rounds of comments were resolved and incorporated. |
2015-10-16
|
04 | Sandra Murphy | IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document |
2015-10-15
|
04 | Geoff Huston | New version available: draft-ietf-sidr-rfc6485bis-04.txt |
2015-10-15
|
03 | Sandra Murphy | Changed document writeup |
2015-10-14
|
03 | (System) | Notify list changed from "Sandra L. Murphy" to (None) |
2015-07-24
|
03 | Geoff Huston | New version available: draft-ietf-sidr-rfc6485bis-03.txt |
2015-05-20
|
02 | Sandra Murphy | Notification list changed to "Sandra L. Murphy" <sandy@tislabs.com> |
2015-05-20
|
02 | Sandra Murphy | Document shepherd changed to Sandra L. Murphy |
2015-05-15
|
02 | Geoff Huston | New version available: draft-ietf-sidr-rfc6485bis-02.txt |
2014-03-27
|
01 | Geoff Huston | New version available: draft-ietf-sidr-rfc6485bis-01.txt |
2014-03-07
|
00 | Geoff Huston | New version available: draft-ietf-sidr-rfc6485bis-00.txt |