Simplified Local Internet Number Resource Management with the RPKI (SLURM)
RFC 8416
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2022-08-12
|
08 | (System) | Received changes through RFC Editor sync (added Errata tag) |
2018-08-07
|
08 | (System) | Received changes through RFC Editor sync (created alias RFC 8416, changed title to 'Simplified Local Internet Number Resource Management with the RPKI (SLURM)', changed … Received changes through RFC Editor sync (created alias RFC 8416, changed title to 'Simplified Local Internet Number Resource Management with the RPKI (SLURM)', changed abstract to 'The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.', changed standardization level to Proposed Standard, changed state to RFC, added RFC published event at 2018-08-07, changed IESG state to RFC Published) |
2018-08-07
|
08 | (System) | RFC published |
2018-08-07
|
08 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2018-06-22
|
08 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2018-06-19
|
08 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2018-05-14
|
08 | (System) | RFC Editor state changed to EDIT |
2018-05-14
|
08 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2018-05-14
|
08 | (System) | Announcement was received by RFC Editor |
2018-05-14
|
08 | (System) | IANA Action state changed to No IC from In Progress |
2018-05-14
|
08 | (System) | IANA Action state changed to In Progress |
2018-05-14
|
08 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2018-05-14
|
08 | Cindy Morgan | IESG has approved the document |
2018-05-14
|
08 | Cindy Morgan | Closed "Approve" ballot |
2018-05-14
|
08 | Alvaro Retana | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2018-05-14
|
08 | Alvaro Retana | Ballot approval text was generated |
2018-05-09
|
08 | Adam Roach | [Ballot comment] Thanks for addressing my DISCUSS! The new text looks good. |
2018-05-09
|
08 | Adam Roach | [Ballot Position Update] Position for Adam Roach has been changed to No Objection from Discuss |
2018-04-30
|
08 | Warren Kumari | [Ballot comment] Thank you for addressing my concerns / DISCUSS - I'm clearing my position. W ----- I have a few questions and editorial comments: … [Ballot comment] Thank you for addressing my concerns / DISCUSS - I'm clearing my position. W ----- I have a few questions and editorial comments: 1: Section Abstract: ISPs can also be able to use the RPKI to validate the path of a BGP route. I think you meant "ISPs can also use the RPKI..." 2: Section 1. Introduction "However, an "RPKI relying party" (RP) may want to override some of the information expressed via putative Trust Anchor(TA) and the certificates downloaded from the RPKI repository system." I think this should be either "a putative Trust Anchor (TA)" or "putative Trust Anchors (TA)" (single vs plurals). I agree with others that "putative TA" is not a well known term - perhaps you can find a better one? Section 3.4.1. Validated ROA Prefix Filters In the "prefixFilters examples", I think it would be helpful to update the comments to be more explicit about what is being matched (e.g"All VRPs covered by 198.51.100.0/24 and matching AS 64497") --- Original DISCUSS for hysterical raisins --- I don't understand the targeting as it related to domain/host names (and suspect that others will have the same issue). From section 3.3: " If a "slurmTarget" element is present, an RP SHOULD verify that the target is an acceptable value, and reject this SLURM file if the "slurmTarget" element is not acceptable.... Accordingly, the SLURM file source needs to indicate which RP(s) should make use of the file by adding the domain name(s) of the RP(s) to the SLURM file target... Such a target value is a server name expressed in FQDN. "slurmTarget": [ { "hostname": "rpki.example.com", "comment": "This file is intended for RP server rpki.example.com" } ] So, if I want to target multiple RPs (rpki1.example.com, rpki2.example.com) can I do: "slurmTarget": [ { "hostname": "example.com", "comment": "This file is intended for RP server rpki.example.com" } ] ? The "domain names(s)" versus "hostname" vs "server name expressed in FQDN" text is handwavey. I'm assuming that I'd need to do: "slurmTarget": [ { "hostname": "rpki1.example.com", "comment": "This file is intended for RP server rpki1.example.com" }, { "hostname": "rpki2.example.com", "comment": "This file is intended for the RP server, rpki2.example.com" }, ]" Can you please make this clearer, and hopefully add more targets to the examples? This seems like an easy fix / clarification, happy to clear once it is, er, clear. |
2018-04-30
|
08 | Warren Kumari | [Ballot Position Update] Position for Warren Kumari has been changed to No Objection from Discuss |
2018-04-26
|
08 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2018-04-26
|
08 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2018-04-26
|
08 | Di Ma | New version available: draft-ietf-sidr-slurm-08.txt |
2018-04-26
|
08 | (System) | New version approved |
2018-04-26
|
08 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Tim Bruijnzeels , David Mandelberg |
2018-04-26
|
08 | Di Ma | Uploaded new revision |
2018-04-05
|
07 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2018-04-05
|
07 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events' |
2018-04-04
|
07 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2018-04-04
|
07 | Adam Roach | [Ballot discuss] Thanks to everyone who worked on this document. The mechanism seems useful. I'm concerned that the document doesn't describe the file format itself; … [Ballot discuss] Thanks to everyone who worked on this document. The mechanism seems useful. I'm concerned that the document doesn't describe the file format itself; rather, it relies on examples to provide vital, nonsupplemental information such as the names of JSON object members, expected encodings (e.g., strings versus numbers), and distinction between arrays and objects. I'm making this a DISCUSS because I think the ambiguity here -- and, in particular the ambiguity about IP address prefix notation -- will lead to non-interoperable implementations. Using section §3.2 as an example: > A SLURM file consists of: > > o A SLURM Version indication that MUST be 1 > > o A slurmTarget element (Section 3.3) consisting of: > > * Zero or more target elements. In this version of SLURM, there > are two types of values for the target: ASN or Fully Qualified > Domain Name(FQDN). If more than one target line is present, > all targets MUST be acceptable to the RP. > > o Validation Output Filters (Section 3.4), consisting of: > > * An array of zero or more Prefix Filters, described in > Section 3.4.1 > > * An array of zero or more BGPsec Filters, described in > Section 3.4.2 > > o Locally Added Assertions (Section 3.5), consisting of: > > * An array of zero or more Prefix Assertions, described in > Section 3.5.1 > > * An array of zero or more BGPsec Assertions, described in > Section 3.5.2 > As this is the normative description of the structure, I would have expected an indication that the file contains a JSON object (rather than, say, a JSON array), an indication that the version is to be encoded as a number (rather than a string), and clarification of what value members are expected to contain. For example, the following JSON object is in compliance with the preceding normative description (and, as far as I can tell, all other normative text in the document): ["1", ["65536", "rpki.example.com"], [ ["192.0.2.0/255.255.255.0", "All VRPs encompassed by prefix"], ["64496", "All VPRs maching ASN"], ["198.51.100.0/255.255.255.0", "64497", "All VRPs encompassed by prefix, matching ASN"] ], [ ["64496", "All keys for ASN"], ["Zm9v", "Key matching Router SKI"], ["64497", "YmFy", "Key for ASN 64497 matching Router SKI"], ], [ ["64496", "198.51.100.0/255.255.255.0", "My other important route"], ["64496", "2001:DB8::/FFFF:FFFF::", "48", "My other important de-aggregated routes"], ], [ ["64496", "My known key for my important ASN", "", ""] ] ] Fixing this should be pretty easy; the document simply needs text added that describes the JSON structure explicitly, with clear indications of how values are to be encoded. For example, the preceding text I quote becomes: A SLURM file consists of a single JSON object containing the following members: o A "slurmVersion" member that MUST be set to 1, encoded as a number o A "slurmTarget" member (Section 3.3) If more than one target line is present, all targets MUST be acceptable to the RP. The "slurmTarget" member is encoded as an array of zero or more objects. Each object in the array contains exactly one member. In this version of SLURM, the member may be named either: * "asn", in which case it contains an ASN, or * "hostname", in which case it contains a Fully Qualified Domain Name (FQDN). o A "validationOutputFilters" member (Section 3.4), whose value is an object. The object MUST contain exactly two members: * A "prefixFilters" member, whose value is described in Section 3.4.1 * A "bgpsecFilters" member, whose value is described in Section 3.4.2 o A "locallyAddedAssertions" member (Section 3.5), whose value is an object. The object MUST contain exactly two members: * A "prefixAssertions" member, whose value is described in Section 3.5.1 * A "bgpsecAssertions" member, whose value is described in Section 3.5.2 Gotchas to watch out for include: - If you're using the word "element" to describe something in a JSON object, you probably need to find a more specific word. This document, for example, uses "element" instead of "member" in most places. - Everywhere you use the word "structure," replace it with either "array" or "object," as appropriate. - When values can be encoded as either a number or a string (e.g., as with "slurmVersion" above, or with AS numbers), indicate which encoding is expected. - For IP prefixes, be clear about acceptable syntax. For example: is the RFC 950 syntax ("192.0.2.0/255.255.255.0") acceptable? My suggestion is to cite RFC 4632 §3.1 for prefix-length notation (both for IPv4 and IPv6), and RFC 5952 for the syntax of IPv6 addresses. |
2018-04-04
|
07 | Adam Roach | [Ballot comment] The remaining comments are in document order. --------------------------------------------------------------------------- Title: It seems odd to use the stylized capitalization (e.g., "nUmber") without following it by … [Ballot comment] The remaining comments are in document order. --------------------------------------------------------------------------- Title: It seems odd to use the stylized capitalization (e.g., "nUmber") without following it by the "SLURM" acronym. Consider adding "(SLURM)" to the title. --------------------------------------------------------------------------- §3.1: > This document describes responses in the JSON [RFC8259] format. I don't think this means to say "responses," does it? It appears to be describing a JSON document rather than a request/response protocol. --------------------------------------------------------------------------- §3.3: > A SLURM file MUST specify a "slurmTarget" element that identifies the > environment in which the SLURM file is intended to be used. The > "slurmTarget" element MAY have an empty array as its value, which > means "applies to all". The meaning of the "slurmTarget" element, if > present, is determined by the user. If a "slurmTarget" element is > present, an RP SHOULD verify that the target is an acceptable value, > and reject this SLURM file if the "slurmTarget" element is not > acceptable. Each "slurmTarget" element contains merely one "asn" or > one "hostname". An explanatory "comment" MAY be included in each > "slurmTarget" element so that it can be shown to users of the RP > software. When reworking this paragraph in particular, please be careful to distinguish between the "slurmTarget" member and the elements in the array that constitutes its value. The preceding text calls both of these things '"slurmTarget" element,' which is very confusing. |
2018-04-04
|
07 | Adam Roach | [Ballot Position Update] New position, Discuss, has been recorded for Adam Roach |
2018-04-04
|
07 | Alissa Cooper | [Ballot comment] Please cite BCP 14 rather than RFC 2119, assuming you intend for normative keywords to have their normative meaning in uppercase only. |
2018-04-04
|
07 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2018-04-04
|
07 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2018-04-03
|
07 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2018-04-03
|
07 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2018-04-03
|
07 | Ben Campbell | [Ballot comment] Major Comments: §6: I also agree with Benjamin's sadness about the security considerations. The section really should at least discuss the potential consequences … [Ballot comment] Major Comments: §6: I also agree with Benjamin's sadness about the security considerations. The section really should at least discuss the potential consequences of an adversary inserting a false slurm file, modifying one on the fly, or eavesdropping on one. Minor Comments: §1.1: The document contains at least a few lower case instances of "must". Please consider using the boilerplate from RFC 8174. §3.3, 1st paragraph: "RP SHOULD verify that the target is an acceptable value" What is the criteria for acceptability? §8.2, " [RFC4648]": The document requires Base64 encoding. Doesn't that make this a normative reference? Editorial Comments and Nits: [significant] Abstract (and throughout the document): I don't find the term "local view of the RPKI" to be descriptive. IIUC, we are talking about overriding assertions that come from the RPKI based on local (or possibly 3rd party) knowledge. This seems to me to be a different thing than providing a "local view of the RPKI", and I certainly would not have gotten a sense of that difference from the Abstract alone, and possibly not the introduction. §1, last paragraph: Please expand or define rpki-rtr on first mention. §3.4.1: Please expand SKI on first mention. (You do so in the second mention :-) ) |
2018-04-03
|
07 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2018-04-03
|
07 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2018-04-02
|
07 | Eric Rescorla | [Ballot comment] path of a BGP route. However, ISPs may want to establish a local view of the RPKI to control its own … [Ballot comment] path of a BGP route. However, ISPs may want to establish a local view of the RPKI to control its own network while making use of RPKI data. The mechanisms described in this document provide a simple way Nit: their network the information expressed via putative Trust Anchor(TA) and the certificates downloaded from the RPKI repository system. For instances, [RFC6491] recommends the creation of ROAs that would I don't really understand this sentence. Why "putatve" operators are hereby called Simplified Local internet nUmber Resource Management with the RPKI (SLURM). It would help here to say that this includes filtering. In general, the primary output of an RP is the data it sends to routers over the rpki-rtr protocol. The rpki-rtr protocol enables routers to query an RP for all assertions it knows about (Reset citation for rpki-rtr plese. members that are not defined here MUST NOT be used in SLURM Files. An RP MUST consider any deviations from the specification an error. Future additions to the specifications in this document MUST use an Nit: errors. acceptable. Each "slurmTarget" element contains merely one "asn" or one "hostname". An explanatory "comment" MAY be included in each "slurmTarget" element so that it can be shown to users of the RP Is this exclusive or? Emergency Response Team Coordination, the SLURM file source may generate a SLURM file that is to be applied to only one specific RP. This file can take advantage of the "target" element to restrict the I am having trouble reading this sentence. Can you please rephrase. [RFC6487]. This is the value of the ASN.1 OCTET STRING without the ASN.1 tag or length fields. IMPORTANT: There is an opportunity for ambiguity here in case the SPKI was not DER-encoded. I assume you mean this must be taken directly from the cert? The following JSON structure represents an array of "prefixAssertions" with an element for each use case listed above: I guess that the semantics here are obvious, but perhaps you could state them explicitly, given that this is actually not exactly the same as an ROA. 3.5.2. BGPsec Assertions IMPORTANT: It seems even less obvious what the semantics are here for injecting BGPSec assertions. How do you reconstruct the BGPSec data. contained by any prefix in any or in file Z. OK, so you are going to error out even if there are assertions which are identical? |
2018-04-02
|
07 | Eric Rescorla | [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla |
2018-04-02
|
07 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2018-04-02
|
07 | Alexey Melnikov | [Ballot comment] I agree with Warren's DISCUSS. I also share Benjamin's sadness about the Security Considerations section. Additionally, one little, but important thing that I … [Ballot comment] I agree with Warren's DISCUSS. I also share Benjamin's sadness about the Security Considerations section. Additionally, one little, but important thing that I would like you to fix: In Section 3.4.2 and 3.5.2, when referencing Base64 [RFC4648], you need to specify which version you are using. I think you want to use the version in Section 4 (and not Section 5) of this document. It would also be useful to specify whether trailing "=" need to be present in base64 values. |
2018-04-02
|
07 | Alexey Melnikov | Ballot comment text updated for Alexey Melnikov |
2018-04-02
|
07 | Alexey Melnikov | [Ballot comment] I agree with Warren's DISCUSS. Additionally, one little, but important thing that I would like you to fix: In Section 3.4.2 and 3.5.2, … [Ballot comment] I agree with Warren's DISCUSS. Additionally, one little, but important thing that I would like you to fix: In Section 3.4.2 and 3.5.2, when referencing Base64 [RFC4648], you need to specify which version you are using. I think you want to use the version in Section 4 (and not Section 5) of this document. It would also be useful to specify whether trailing "=" need to be present in base64 values. |
2018-04-02
|
07 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2018-04-01
|
07 | Warren Kumari | [Ballot discuss] I don't understand the targeting as it related to domain/host names (and suspect that others will have the same issue). From section 3.3: … [Ballot discuss] I don't understand the targeting as it related to domain/host names (and suspect that others will have the same issue). From section 3.3: " If a "slurmTarget" element is present, an RP SHOULD verify that the target is an acceptable value, and reject this SLURM file if the "slurmTarget" element is not acceptable.... Accordingly, the SLURM file source needs to indicate which RP(s) should make use of the file by adding the domain name(s) of the RP(s) to the SLURM file target... Such a target value is a server name expressed in FQDN. "slurmTarget": [ { "hostname": "rpki.example.com", "comment": "This file is intended for RP server rpki.example.com" } ] So, if I want to target multiple RPs (rpki1.example.com, rpki2.example.com) can I do: "slurmTarget": [ { "hostname": "example.com", "comment": "This file is intended for RP server rpki.example.com" } ] ? The "domain names(s)" versus "hostname" vs "server name expressed in FQDN" text is handwavey. I'm assuming that I'd need to do: "slurmTarget": [ { "hostname": "rpki1.example.com", "comment": "This file is intended for RP server rpki1.example.com" }, { "hostname": "rpki2.example.com", "comment": "This file is intended for the RP server, rpki2.example.com" }, ]" Can you please make this clearer, and hopefully add more targets to the examples? This seems like an easy fix / clarification, happy to clear once it is, er, clear. |
2018-04-01
|
07 | Warren Kumari | [Ballot comment] I have a few questions and editorial comments: 1: Section Abstract: ISPs can also be able to use the RPKI to validate the … [Ballot comment] I have a few questions and editorial comments: 1: Section Abstract: ISPs can also be able to use the RPKI to validate the path of a BGP route. I think you meant "ISPs can also use the RPKI..." 2: Section 1. Introduction "However, an "RPKI relying party" (RP) may want to override some of the information expressed via putative Trust Anchor(TA) and the certificates downloaded from the RPKI repository system." I think this should be either "a putative Trust Anchor (TA)" or "putative Trust Anchors (TA)" (single vs plurals). I agree with others that "putative TA" is not a well known term - perhaps you can find a better one? Section 3.4.1. Validated ROA Prefix Filters In the "prefixFilters examples", I think it would be helpful to update the comments to be more explicit about what is being matched (e.g"All VRPs covered by 198.51.100.0/24 and matching AS 64497") |
2018-04-01
|
07 | Warren Kumari | [Ballot Position Update] New position, Discuss, has been recorded for Warren Kumari |
2018-03-30
|
07 | Benjamin Kaduk | [Ballot comment] The directorate reviews have some good comments, especially about expanding acronyms/defining terms. I think Section 3.3 would benefit from greater clarity about individual … [Ballot comment] The directorate reviews have some good comments, especially about expanding acronyms/defining terms. I think Section 3.3 would benefit from greater clarity about individual components of the JSON array that is the value of the "slurmTarget" element, versus that element itself. (Also, slurmTarget appears to be mandatory, so talking about cases where it is present seems strange, and presumably a nonempty value being present is the desired criterion.) I'm also not entirely sure I understand the intended semantics -- when first introduced in Section 3.2, we say that "all targets MUST be acceptable to the RP". (Presumably that includes both ASN and FQDN entries.) Does this mean that if the same SLURM file is provided to multiple RPs, those RPs both need to be "responsible for" all the ASNs and FQDNS contained therein? Would this present a limit on the ability to reuse SLURM files for multiple recipients within a single administrative domain (that may span multiple ASNs and FQDNs)? Some editorial suggestions follow. Abstract: OLD: [...] ISPs can also be able to use the RPKI to validate the path of a BGP route. NEW: [...] ISPs can also use the RPKI to validate the path of a BGP route. Section 3.2 OLD: o A SLURM Version indication that MUST be 1 NEW: o A SLURM Version indication. This document specifies version 1. Also, in * Zero or more target elements. In this version of SLURM, there are two types of values for the target: ASN or Fully Qualified Domain Name(FQDN). If more than one target line is present, all targets MUST be acceptable to the RP. What's the difference between a target element and a target line? Section 3.5 (both subsections): "is locally configured with" does not mention SLURM at all as being involved in that configuration; perhaps it should. Section 4.2 [...] To do so, the RP MUST check the entries of SLURM file with regard to overlaps of the INR assertions and report errors to the sources that created these SLURM files in question. The "report errors to the sources" part seems ineligible for MUST-level requirement. Also, in case of conflict, does the "MUST NOT use them" apply to all SLURM files, only the ones with directly conflicting inputs, or only enough files to remove the conflict? Section 6 I'm always a little sad to see security-relevant functionality (such as the transport with authenticity and integrity protection of SLRUM files over the network) left as out of scope with no examples of reasonable usage given. I also wonder if we would benefit from a little discussion of the potential routing issues that could arise from using a "broken" (or deliberately adversarial) SLURM file, though I expect that the target audience is probably pretty familiar with these already. |
2018-03-30
|
07 | Benjamin Kaduk | [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk |
2018-03-29
|
07 | Mirja Kühlewind | [Ballot comment] The shepherd write-up says "Internet Standard" but I assume "Proposed Standard" as indicated in the datatracker is correct...? |
2018-03-29
|
07 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2018-03-27
|
07 | Ignas Bagdonas | [Ballot comment] A few comments: 1. Document uses all capital form of AND for filters containing both prefixes and ASNs, and filters containing ASNs and … [Ballot comment] A few comments: 1. Document uses all capital form of AND for filters containing both prefixes and ASNs, and filters containing ASNs and SKIs. That is not part of RFC2119 language. 2. s/Route Origination Authorization/Route Origin Authorization 3. If a local assertion is added without a matching filter, does it take priority over existing assertion? 4. The term 'putative TA' has been flagged a couple of times in various reviews as being not known. It does not appear to be formally defined, RFC7730 seems to be the closest source - while it is not formally defined there either. |
2018-03-27
|
07 | Ignas Bagdonas | Ballot comment text updated for Ignas Bagdonas |
2018-03-27
|
07 | Ignas Bagdonas | [Ballot comment] A few comments: 1. Document uses all capital form of AND for filters containing both prefixes and ASNs, and filters containing ASNs and … [Ballot comment] A few comments: 1. Document uses all capital form of AND for filters containing both prefixes and ASNs, and filters containing ASNs and SKIs. That is not part of RFC2119 language. 2. s/Route Origination Authorization/Route Origin Authorization 3. If a local assertion is added without a matching filter, does it take priority over existing assertion? 4. A term 'putative TA' has been flagged a couple of times in various reviews as being not known. It does not appear to be formally defined, RFC7730 seems to be the closest source - while it is not formally defined there either. |
2018-03-27
|
07 | Ignas Bagdonas | Ballot comment text updated for Ignas Bagdonas |
2018-03-27
|
07 | Ignas Bagdonas | [Ballot comment] A few comments: 1. Document uses all capital form of AND for filters containing both prefixes and ASNs, and filters containing ASNs and … [Ballot comment] A few comments: 1. Document uses all capital form of AND for filters containing both prefixes and ASNs, and filters containing ASNs and SKIs. That is not part of RFC2119 language. 2. s/Route Origination Authorization/Route Origin Authorization 3. If a local assertion is added without a matching filter, does it take priority over existing assertion? 4. A term 'putative TA' has been flagged a couple of times in various reviews as being not known. It does not appear to be formally defined, RFC7730 seems to be the closest source - while it is not formally defined there either. |
2018-03-27
|
07 | Ignas Bagdonas | [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas |
2018-03-23
|
07 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2018-03-23
|
07 | Di Ma | New version available: draft-ietf-sidr-slurm-07.txt |
2018-03-23
|
07 | (System) | New version approved |
2018-03-23
|
07 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Tim Bruijnzeels , David Mandelberg |
2018-03-23
|
07 | Di Ma | Uploaded new revision |
2018-02-27
|
06 | Min Ye | Request for Telechat review by RTGDIR Completed: Has Nits. Reviewer: IJsbrand Wijnands. |
2018-02-26
|
06 | Francis Dupont | Request for Last Call review by GENART Completed: Ready. Reviewer: Francis Dupont. |
2018-02-21
|
06 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events' |
2018-02-21
|
06 | Alvaro Retana | IESG state changed to IESG Evaluation from Waiting for Writeup |
2018-02-21
|
06 | Alvaro Retana | Ballot has been issued |
2018-02-21
|
06 | Alvaro Retana | [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana |
2018-02-21
|
06 | Alvaro Retana | Created "Approve" ballot |
2018-02-21
|
06 | Alvaro Retana | Ballot writeup was changed |
2018-02-21
|
06 | Alvaro Retana | Telechat date has been changed to 2018-04-05 from 2018-03-08 |
2018-02-21
|
06 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2018-02-20
|
06 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2018-02-20
|
06 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has reviewed draft-ietf-sidr-slurm-06, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has reviewed draft-ietf-sidr-slurm-06, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2018-02-20
|
06 | Daniel Migault | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Daniel Migault. Sent review to list. |
2018-02-19
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to (None) |
2018-02-16
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Shwetha Bhandari |
2018-02-15
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Shwetha Bhandari |
2018-02-15
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Shwetha Bhandari |
2018-02-08
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Daniel Migault |
2018-02-08
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Daniel Migault |
2018-02-08
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francis Dupont |
2018-02-08
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francis Dupont |
2018-02-07
|
06 | Min Ye | Request for Telechat review by RTGDIR is assigned to IJsbrand Wijnands |
2018-02-07
|
06 | Min Ye | Request for Telechat review by RTGDIR is assigned to IJsbrand Wijnands |
2018-02-07
|
06 | Min Ye | Request for Telechat review by RTGDIR is assigned to Russ White |
2018-02-07
|
06 | Min Ye | Request for Telechat review by RTGDIR is assigned to Russ White |
2018-02-07
|
06 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2018-02-07
|
06 | Cindy Morgan | The following Last Call announcement was sent out (ends 2018-02-21): From: The IESG To: IETF-Announce CC: draft-ietf-sidr-slurm@ietf.org, aretana.ietf@gmail.com, morrowc@ops-netman.net, Chris Morrow , … The following Last Call announcement was sent out (ends 2018-02-21): From: The IESG To: IETF-Announce CC: draft-ietf-sidr-slurm@ietf.org, aretana.ietf@gmail.com, morrowc@ops-netman.net, Chris Morrow , sidr-chairs@ietf.org, sidr@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Simplified Local internet nUmber Resource Management with the RPKI) to Proposed Standard The IESG has received a request from the Secure Inter-Domain Routing WG (sidr) to consider the following document: - 'Simplified Local internet nUmber Resource Management with the RPKI' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2018-02-21. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origination assertions. In the future, ISPs also will be able to use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of the RPKI to control its own network while making use of RPKI data. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sidr-slurm/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-sidr-slurm/ballot/ No IPR declarations have been submitted directly on this I-D. |
2018-02-07
|
06 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2018-02-07
|
06 | Alvaro Retana | Requested Telechat review by RTGDIR |
2018-02-07
|
06 | Alvaro Retana | Placed on agenda for telechat - 2018-03-08 |
2018-02-07
|
06 | Alvaro Retana | Last call was requested |
2018-02-07
|
06 | Alvaro Retana | Ballot approval text was generated |
2018-02-07
|
06 | Alvaro Retana | Ballot writeup was generated |
2018-02-07
|
06 | Alvaro Retana | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2018-02-07
|
06 | Alvaro Retana | Last call announcement was generated |
2018-02-06
|
06 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2018-02-06
|
06 | Di Ma | New version available: draft-ietf-sidr-slurm-06.txt |
2018-02-06
|
06 | (System) | New version approved |
2018-02-06
|
06 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Tim Bruijnzeels , David Mandelberg |
2018-02-06
|
06 | Di Ma | Uploaded new revision |
2018-02-06
|
05 | Alvaro Retana | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup |
2018-02-05
|
05 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2018-02-05
|
05 | Di Ma | New version available: draft-ietf-sidr-slurm-05.txt |
2018-02-05
|
05 | (System) | New version approved |
2018-02-05
|
05 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Tim Bruijnzeels , David Mandelberg |
2018-02-05
|
05 | Di Ma | Uploaded new revision |
2018-01-29
|
04 | Alvaro Retana | === AD Review of draft-ietf-sidr-slurm-04 === https://mailarchive.ietf.org/arch/msg/sidr/K7y1URe1tkh78vjHhZHAIJJ6L4M/?qid=36ea3c3d3fe32249b4cb2494651338ab Dear authors: I just finished reading this document. I have some comments (below) that should be easy to … === AD Review of draft-ietf-sidr-slurm-04 === https://mailarchive.ietf.org/arch/msg/sidr/K7y1URe1tkh78vjHhZHAIJJ6L4M/?qid=36ea3c3d3fe32249b4cb2494651338ab Dear authors: I just finished reading this document. I have some comments (below) that should be easy to address — please take a look. I need you to address the References before I start the IETF Last Call because of the DownRef to rfc6483. Thanks! Alvaro. Major: M1. Section 3.1: I'm not sure what the Normative result is form this piece of text: "JSON members that are not defined here MUST not be used in SLURM Files, however Relying Parties SHOULD ignore such unrecognized JSON members at the top level, while any deviations from the specification at lower levels MUST be considered an error." (s/MUST not/MUST NOT) If the not defined members MUST NOT be used, when would the RPs not ignore (or even better, treat as errors) them? IOW, why use SHOULD instead of MUST? M2. Section 4.2: "Before an RP configures SLURM files from different source it MUST make sure there is no internal conflict among the INR assertions in these SLURM files. To do so, the RP SHOULD check the entries of SLURM file..." I think there's a Normative mismatch: "MUST make sure...no...conflict" vs "SHOULD check the entries"; the SHOULD leaves the door open to not always checking -- are there cases when the entries wouldn't be checked *and* the MUST can still be guaranteed? It seems to me like both keywords should be MUST. M3. Section 6: "...but if the RP updates its SLURM file over the network, it MUST verify the authenticity and integrity of the updated SLURM file." Please indicate that the mechanism to update files, and the authentication/integrity verification are outside the scope of this document. M4. References: M4.1. s/I-D.ietf-sidr-bgpsec-overview/rfc8205 ...and should be Normative. M4.2. I believe the following references should also be Normative: ietf-sidr-rpki-rtr-rfc6810-bis/rfc8210, rfc6483, rfc6810, rfc6811 and rfc7159. M4.3. [minor] Please update the references according to the Nits [1]. [1] https://tools.ietf.org/idnits?url=https://tools.ietf.org/id/draft-ietf-sidr-slurm-04.txt Minor: P1. "Relying party software MAY modify other forms of output in comparable ways, but that is outside the scope of this document." If it's out of scope, then there shouldn't be any Normative language. s/MAY/may P2. "Locally Added Assertions" are sometimes called "Locally Adding Assertions". Nits: N1. s/control make use of RPKI data/control use of RPKI data |
2018-01-29
|
04 | Alvaro Retana | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2018-01-26
|
04 | Alvaro Retana | IESG state changed to AD Evaluation from Publication Requested |
2018-01-26
|
04 | Alvaro Retana | Notification list changed to "Chris Morrow" <morrowc@ops-netman.net>, aretana.ietf@gmail.com from Chris Morrow <morrowc@ops-netman.net> |
2017-09-06
|
04 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Internet Standard (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origination assertions. In the future, ISPs also will be able to use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of the RPKI to control its own network while making use of RPKI data. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? The working group discussion was a bit long for this draft, and eventually concluded successfully. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? there is no protocol here, just a method of implementing a local Trust anchor for rpki/bgpsec/sidr operations. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Shepherd: chris morrow (morrowc@ops-netman.net) ResponsibleAD: Alvaro Retana (aretana@cisco.com) (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has read the document a few times during it's lifecycle, it seems in good shape and seems to fulfill a real need in the space. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? nope. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. they do not. if a JSON person wants to review section: 3 that would be fine, too, though :) (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concernts (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. no disclosures (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? as with all SIDR documents, consensus was reached...after a time :) (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no threats of appeal/etc. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. There's one 2119 language issue which the authors are addressing and the normal 'this id is actually a later version now' stuff that auth48 catches with get. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. no formal review required, but the json folk could review if they are feeling peppy. :) (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? no, though waiting on algs/profiles (two bgpsec docs) would be nice. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. no (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. no (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). no considerations to consider! win! (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. The json examples seem ok to e and to a validator, but as before if somene in json land is feeling frisky please feel free to review :) |
2017-09-06
|
04 | Chris Morrow | Responsible AD changed to Alvaro Retana |
2017-09-06
|
04 | Chris Morrow | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2017-09-06
|
04 | Chris Morrow | IESG state changed to Publication Requested |
2017-09-06
|
04 | Chris Morrow | IESG process started in state Publication Requested |
2017-09-06
|
04 | Chris Morrow | Changed document writeup |
2017-09-06
|
04 | Chris Morrow | Changed consensus to Yes from Unknown |
2017-09-06
|
04 | Chris Morrow | Intended Status changed to Proposed Standard from None |
2017-09-06
|
04 | Chris Morrow | Notification list changed to Chris Morrow <morrowc@ops-netman.net> |
2017-09-06
|
04 | Chris Morrow | Document shepherd changed to Chris Morrow |
2017-03-13
|
04 | Tim Bruijnzeels | New version available: draft-ietf-sidr-slurm-04.txt |
2017-03-13
|
04 | (System) | New version approved |
2017-03-13
|
04 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Tim Bruijnzeels , David Mandelberg |
2017-03-13
|
04 | Tim Bruijnzeels | Uploaded new revision |
2017-02-11
|
03 | Di Ma | New version available: draft-ietf-sidr-slurm-03.txt |
2017-02-11
|
03 | (System) | New version approved |
2017-02-11
|
03 | (System) | Request for posting confirmation emailed to previous authors: sidr-chairs@ietf.org, "Di Ma" , "David Mandelberg" |
2017-02-11
|
03 | Di Ma | Uploaded new revision |
2016-08-15
|
02 | Di Ma | New version available: draft-ietf-sidr-slurm-02.txt |
2016-04-13
|
01 | David Mandelberg | New version available: draft-ietf-sidr-slurm-01.txt |
2015-10-16
|
00 | Sandra Murphy | Adopted by sidr as a working group work item |
2015-10-16
|
00 | Sandra Murphy | This document now replaces draft-dseomn-sidr-slurm instead of None |
2015-10-07
|
00 | David Mandelberg | New version available: draft-ietf-sidr-slurm-00.txt |