BGPsec Algorithms, Key Formats, and Signature Formats
draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-05
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2019-06-14
|
05 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2019-05-30
|
05 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2019-05-21
|
05 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2019-04-25
|
05 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2019-04-25
|
05 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'No Response' |
2019-04-24
|
05 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2019-04-24
|
05 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2019-04-23
|
05 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2019-04-19
|
05 | (System) | IANA Action state changed to In Progress |
2019-04-19
|
05 | (System) | RFC Editor state changed to EDIT |
2019-04-19
|
05 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2019-04-19
|
05 | (System) | Announcement was received by RFC Editor |
2019-04-19
|
05 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2019-04-19
|
05 | Amy Vezza | IESG has approved the document |
2019-04-19
|
05 | Amy Vezza | Closed "Approve" ballot |
2019-04-19
|
05 | Amy Vezza | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2019-04-16
|
05 | Amy Vezza | Ballot approval text was generated |
2019-04-15
|
05 | Alexey Melnikov | [Ballot comment] Thank you for addressing my DISCUSS. |
2019-04-15
|
05 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss |
2019-04-15
|
05 | Adam Roach | [Ballot comment] Thanks for addressing my DISCUSS. |
2019-04-15
|
05 | Adam Roach | [Ballot Position Update] Position for Adam Roach has been changed to No Objection from Discuss |
2019-04-15
|
05 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2019-04-15
|
05 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2019-04-15
|
05 | Oliver Borchert | New version available: draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-05.txt |
2019-04-15
|
05 | (System) | New version approved |
2019-04-15
|
05 | (System) | Request for posting confirmation emailed to previous authors: Sean Turner , Oliver Borchert |
2019-04-15
|
05 | Oliver Borchert | Uploaded new revision |
2019-04-11
|
04 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2019-04-11
|
04 | Alvaro Retana | [Ballot comment] I support Alexey's DISCUSS: this document should be marked as Obsoleting rfc8208. |
2019-04-11
|
04 | Alvaro Retana | [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana |
2019-04-11
|
04 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2019-04-11
|
04 | Martin Vigoureux | [Ballot comment] Hi if this obsoletes 8208 then the iana registry looks fine. If it is an update I see no reason to change the … [Ballot comment] Hi if this obsoletes 8208 then the iana registry looks fine. If it is an update I see no reason to change the reference from 8208 to This Document for the identifiers 8208 had defined. -m |
2019-04-11
|
04 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2019-04-10
|
04 | Adam Roach | [Ballot discuss] Thanks to everyone who worked on this document. This issue should be trivial to fix, but it's still a blocker. §2.1: > … [Ballot discuss] Thanks to everyone who worked on this document. This issue should be trivial to fix, but it's still a blocker. §2.1: > Special-Use algorithm IDs span from 0xFA (250) to 0xFE (254). §7: > In addition IANA is asked to register the following address space for > "Special-Use": > > Algorithm Digest Signature Specification > Suite Algorithm Algorithm Pointer > Identifier > +------------+---------------+--------------+-----------------------+ > | 0xFB-0xFE | Special-Use | Special-Use | This Document | > +------------+---------------+--------------+-----------------------+ The ranges here do not match ([0xFA-0xFE] != [0xFB-0xFE]). Presuming that the text in Section 2.1 is what was intended, this issue impacts all of the tables in section 7. |
2019-04-10
|
04 | Adam Roach | Ballot discuss text updated for Adam Roach |
2019-04-10
|
04 | Adam Roach | [Ballot discuss] Thanks to everyone who worked on this document. This issue should be trivial to fix, but it's still a blocker. §2.1: > … [Ballot discuss] Thanks to everyone who worked on this document. This issue should be trivial to fix, but it's still a blocker. §2.1: > Special-Use algorithm IDs span from 0xFA (250) to 0xFE (254). §7: > In addition IANA is asked to register the following address space for > "Special-Use": > > Algorithm Digest Signature Specification > Suite Algorithm Algorithm Pointer > Identifier > +------------+---------------+--------------+-----------------------+ > | 0xFB-0xFE | Special-Use | Special-Use | This Document | > +------------+---------------+--------------+-----------------------+ The ranges here do not match ([0xFA - 0xFE] != [0xFB-0xFE]). Presuming that the text in Section 2.1 is what was intended, this issue impacts all of the tables in section 7. |
2019-04-10
|
04 | Adam Roach | [Ballot comment] I agree with Alexey's discuss. --------------------------------------------------------------------------- §7: > To be modified to: > > Algorithm Digest Signature … [Ballot comment] I agree with Alexey's discuss. --------------------------------------------------------------------------- §7: > To be modified to: > > Algorithm Digest Signature Specification > Suite Algorithm Algorithm Pointer > Identifier > +------------+---------------+--------------+-----------------------+ > | 0x2-0xFA | Unassigned | Unassigned | | > +------------+---------------+--------------+-----------------------+ Nit: The prose has been updated to use "0x02" rather than "0x2". It would be nice if the IANA section matched this update. |
2019-04-10
|
04 | Adam Roach | [Ballot Position Update] New position, Discuss, has been recorded for Adam Roach |
2019-04-10
|
04 | Suresh Krishnan | [Ballot comment] Thanks for providing a BGPsec IPv6 example. I think it would be better if the next hop address comes out of the documentation … [Ballot comment] Thanks for providing a BGPsec IPv6 example. I think it would be better if the next hop address comes out of the documentation range instead of the benchmarking range. |
2019-04-10
|
04 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2019-04-10
|
04 | Alexey Melnikov | [Ballot discuss] This is a fine document and sorry for nit-picking, but why is this document "Updates: 8208" instead of "Obsolete: 8208"? |
2019-04-10
|
04 | Alexey Melnikov | [Ballot Position Update] New position, Discuss, has been recorded for Alexey Melnikov |
2019-04-09
|
04 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2019-04-09
|
04 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2019-04-08
|
04 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2019-04-08
|
04 | Benjamin Kaduk | [Ballot comment] Section 2.2.1 Hash algorithms are not identified by themselves in certificates or BGPsec UPDATE messages. They are represented by an OID … [Ballot comment] Section 2.2.1 Hash algorithms are not identified by themselves in certificates or BGPsec UPDATE messages. They are represented by an OID that combines the hash algorithm with the digital signature algorithm as follows: o The ecdsa-with-SHA256 OID [RFC5480] MUST appear in the Public-Key Cryptography Standards #10 (PKCS #10) signatureAlgorithm field [RFC2986] or in the Certificate Request Message Format (CRMF) POPOSigningKey algorithm field [RFC4211]; where the OID is placed depends on the certificate request format generated. The first paragraph talks of "certificates" but this last sentence talks about "certificate request"s. Are we trying to talk about both? Section 7 The IANA considerations are perhaps not as accurate as they could be. For example, we could say that the BGPsec Algorithm Suite Registry was originally created by RFC 8208 and has been updated to refer to this document, and similarly for the P256-SHA256 codepoint. (Just moving the references over would seem to be even more appropriate if this document were fully Obsoleting 8208.) Appendix A Do we want to note that the certificates are expired but the examples are still useful within that constraint? (They were valid at the time RFC 8208 was published but it seems imprudent to try to assume that the examples would always be valid, when writing a document such as this.) |
2019-04-08
|
04 | Benjamin Kaduk | [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk |
2019-04-04
|
04 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2019-04-03
|
04 | Roman Danyliw | [Ballot comment] Thank you for this easy to read update to RFC8208. Below are a few editorial comments: (1) Section 1. Editorial nit. s/BGPsec … [Ballot comment] Thank you for this easy to read update to RFC8208. Below are a few editorial comments: (1) Section 1. Editorial nit. s/BGPsec uses a different algorithm [RFC6090] [DSS] as compared to the rest of the RPKI by using a different algorithm that provides similar security with smaller keys making the certificates smaller;/ BGPsec uses a different algorithm [RFC6090] [DSS] as compared to the rest of the RPKI that provides similar security with smaller keys making the certificates smaller;/ (2) Section 2. Editorial nit. s/This section addresses BGPsec algorithms; for example, these algorithms are used by BGPsec routers to sign and verify BGPsec UPDATE messages./ This section addresses the algorithms used by BGPSec [RFC6090] [DSS]. For examples, these algorithms are used by BGPSec routers to sign and verify BGPsec UPDATE messages./ (3) Section 2. The sentence “To identify which algorithm is used, the BGPsec UPDATE message contains the corresponding algorithm ID in each Signature_Block of the BGPsec UPDATE message” seems redundant given that the first sentence of Section 2.1 says something very similar. (4) Section 2.1. Editorial nit. Make the use of constants here consistent with the description of “special-use Algo ID”. s/0x00 and 0xFF/0x00 (0) and 0xFF (255)/ |
2019-04-03
|
04 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2019-03-26
|
04 | Carlos Pignataro | Request for Telechat review by RTGDIR Completed: Has Issues. Reviewer: Carlos Pignataro. Sent review to list. |
2019-03-21
|
04 | Amy Vezza | Placed on agenda for telechat - 2019-04-11 |
2019-03-21
|
04 | Warren Kumari | IESG state changed to IESG Evaluation from Waiting for Writeup |
2019-03-21
|
04 | Warren Kumari | Ballot has been issued |
2019-03-21
|
04 | Warren Kumari | [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari |
2019-03-21
|
04 | Warren Kumari | Created "Approve" ballot |
2019-03-21
|
04 | Warren Kumari | Ballot writeup was changed |
2019-03-18
|
04 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2019-03-18
|
04 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-04. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-04. If any part of this review is inaccurate, please let us know. The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document. The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete. The BGPsec Algorithm Suite Registry on the Resource Public Key Infrastructure (RPKI) registry page located at: https://www.iana.org/assignments/rpki/ is to be modified. Currently, the unassigned range in the registry is from 0x2-0xEF. This is to be changed to 0x2-0xFA. A single assignment is to be made as follows: Algorithm Suite Identifier: 0xFB-0xFE Digest Algorithm: Special-use Signature Algorithm: Special-use Reference: [ RFC-to-be ] The value 0xFF remains reserved and the reference is changed to [ RFC-to-be ]. [ RFC-to-be ] is to be added to the references for the only registration in the registry: 0x01 SHA-256. IANA Question --> Are there any other places where the reference [RFC8208] should be changed/amended to [ RFC-to-be ]? The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2019-03-18
|
04 | Mehmet Ersue | Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Mehmet Ersue. Sent review to list. |
2019-03-18
|
04 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2019-03-13
|
04 | Francesca Palombini | Request for Last Call review by GENART Completed: Ready. Reviewer: Francesca Palombini. Sent review to list. |
2019-03-11
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Mehmet Ersue |
2019-03-11
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Mehmet Ersue |
2019-03-10
|
04 | Min Ye | Request for Telechat review by RTGDIR is assigned to Carlos Pignataro |
2019-03-10
|
04 | Min Ye | Request for Telechat review by RTGDIR is assigned to Carlos Pignataro |
2019-03-07
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francesca Palombini |
2019-03-07
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francesca Palombini |
2019-03-07
|
04 | Alvaro Retana | Requested Telechat review by RTGDIR |
2019-03-07
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker |
2019-03-07
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker |
2019-03-04
|
04 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2019-03-04
|
04 | Amy Vezza | The following Last Call announcement was sent out (ends 2019-03-18): From: The IESG To: IETF-Announce CC: morrowc@ops-netman.net, draft-ietf-sidrops-bgpsec-algs-rfc8208-bis@ietf.org, sidrops@ietf.org, sidrops-chairs@ietf.org, Chris … The following Last Call announcement was sent out (ends 2019-03-18): From: The IESG To: IETF-Announce CC: morrowc@ops-netman.net, draft-ietf-sidrops-bgpsec-algs-rfc8208-bis@ietf.org, sidrops@ietf.org, sidrops-chairs@ietf.org, Chris Morrow , warren@kumari.net Reply-To: ietf@ietf.org Sender: Subject: Last Call: (BGPsec Algorithms, Key Formats, and Signature Formats) to Proposed Standard The IESG has received a request from the SIDR Operations WG (sidrops) to consider the following document: - 'BGPsec Algorithms, Key Formats, and Signature Formats' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2019-03-18. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 8208 ("BGPsec Algorithms, Key Formats, and Signature Formats") by adding Special-Use Algorithm IDs and correcting the range of unassigned algorithms IDs to fill the complete range. This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sidrops-bgpsec-algs-rfc8208-bis/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-sidrops-bgpsec-algs-rfc8208-bis/ballot/ No IPR declarations have been submitted directly on this I-D. |
2019-03-04
|
04 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2019-03-04
|
04 | Warren Kumari | Last call was requested |
2019-03-04
|
04 | Warren Kumari | Last call announcement was generated |
2019-03-04
|
04 | Warren Kumari | Ballot approval text was generated |
2019-03-04
|
04 | Warren Kumari | Ballot writeup was generated |
2019-03-04
|
04 | Warren Kumari | IESG state changed to Last Call Requested from Publication Requested |
2019-02-27
|
04 | Chris Morrow | quot; attribute MUST be used to identify the registrant or contact object if and only if the given authInfo … quot; attribute MUST be used to identify the registrant or contact object if and only if the given authInfo is associated with a registrant or contact object, and not the domain object itself. If this element is not provided or if the authorization information is invalid, server policy determines if the command is rejected or if response information will be returned to the client. Hollenbeck Standards Track [Page 11] RFC 4931 EPP Domain Name Mapping May 2007 Example <info> command without authorization information: C:<?xml version="1.0" encoding="UTF-8" standalone="no"?> C:<epp xmlns="urn:ietf:params:xml:ns:epp-1.0"> C: <command> C: <info> C: <domain:info C: xmlns:domain="urn:ietf:params:xml:ns:domain-1.0"> C: <domain:name hosts="all">example.com</domain:name> C: </domain:info> C: </info> C: <clTRID>ABC-12345</clTRID> C: </command> C:</epp> Example <info> command with authorization information: C:<?xml version="1.0" encoding="UTF-8" standalone="no"?> C:<epp xmlns="urn:ietf:params:xml:ns:epp-1.0"> C: <command> C: <info> C: <domain:info C: xmlns:domain="urn:ietf:params:xml:ns:domain-1.0"> C: <domain:name hosts="all">example.com</domain:name> C: <domain:authInfo> C: <domain:pw>2fooBAR</domain:pw> C: </domain:authInfo> C: </domain:info> C: </info> C: <clTRID>ABC-12345</clTRID> C: </command> C:</epp> When an <info> command has been processed successfully, the EPP <resData> element MUST contain a child <domain:infData> element that identifies the domain namespace. Elements that are not OPTIONAL MUST be returned; OPTIONAL elements are returned based on client authorization and server policy. The <domain:infData> element contains the following child elements: - A <domain:name> element that contains the fully qualified name of the domain object. - A <domain:roid> element that contains the Repository Object IDentifier assigned to the domain object when the object was created. Hollenbeck Standards Track [Page 12] RFC 4931 EPP Domain Name Mapping May 2007 - Zero or more OPTIONAL <domain:status> elements that contain the current status descriptors associated with the domain. - If supported by the server, one OPTIONAL <domain:registrant> element and one or more OPTIONAL <domain:contact> elements that contain identifiers for the human or organizational social information objects associated with the domain object. - An OPTIONAL <domain:ns> element that contains the fully qualified names of the delegated host objects or host attributes (name servers) associated with the domain object. See Section 1.1 for a description of the elements used to specify host objects or host attributes. - Zero or more OPTIONAL <domain:host> elements that contain the fully qualified names of the subordinate host objects that exist under this superordinate domain object. - A <domain:clID> element that contains the identifier of the sponsoring client. - An OPTIONAL <domain:crID> element that contains the identifier of the client that created the domain object. - An OPTIONAL <domain:crDate> element that contains the date and time of domain object creation. - An OPTIONAL <domain:exDate> element that contains the date and time identifying the end of the domain object's registration period. - An OPTIONAL <domain:upID> element that contains the identifier of the client that last updated the domain object. This element MUST NOT be present if the domain has never been modified. - An OPTIONAL <domain:upDate> element that contains the date and time of the most recent domain object modification. This element MUST NOT be present if the domain object has never been modified. - An OPTIONAL &As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? PROPOSED Standard (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 8208 ("BGPsec Algorithms, Key Formats, and Signature Formats") by adding Special-Use Algorithm IDs and correcting the range of unassigned algorithms IDs to fill the complete range. This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There was nothing in the WG review which was notable. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This is an update to the existing document, there was nothing super special here. It's the specification of algorithms and parameters to those algorithms to be used in the BGPSec protocol. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Chris Morrow (morrowc@ops-netman.net) Responsible AD: Warren Kumari (warren@kumari.net) (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has read the original document, and this BIS document during it's lifetime. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? no concerns (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes, confirmation received. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. none required. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? as solid as sidr/sidrops ever is, yes. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no threats. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. There are no significant nits in the document. There are 2 downrefs which will be dealt with in auth48 timelines. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. not necessary (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? I don't believe so. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. yes: ** Downref: Normative reference to an Informational RFC: RFC 2986 ** Downref: Normative reference to an Informational RFC: RFC 6090 And these: -- Possible downref: Non-RFC (?) normative reference: ref. 'DSS' -- Possible downref: Non-RFC (?) normative reference: ref. 'SHS' (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. It will make rfc8208 deprecated in favor of the -bis which this document is, I believe. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There is an IANA considerations document with content, I believe there are requests to IANA for updates to the registry: "BGPsec Algorithm Suite Registry" to create a special-use block inside the registry, this is detailed in the document and appears clear, to the shepherd. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. no automated reviews required. |
2019-02-27
|
04 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? PRPOSED Standard (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 8208 ("BGPsec Algorithms, Key Formats, and Signature Formats") by adding Special-Use Algorithm IDs and correcting the range of unassigned algorithms IDs to fill the complete range. This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There was nothing in the WG review which was notable. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This is an update to the existing document, there was nothing super special here. It's the specification of algorithms and parameters to those algorithms to be used in the BGPSec protocol. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Chris Morrow (morrowc@ops-netman.net) Responsible AD: Warren Kumari (warren@kumari.net) (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has read the original document, and this BIS document during it's lifetime. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? no concerns (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes, confirmation received. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. none required. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? as solid as sidr/sidrops ever is, yes. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no threats. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. There are no significant nits in the document. There are 2 downrefs which will be dealt with in auth48 timelines. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. not necessary (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? I don't believe so. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. yes: ** Downref: Normative reference to an Informational RFC: RFC 2986 ** Downref: Normative reference to an Informational RFC: RFC 6090 And these: -- Possible downref: Non-RFC (?) normative reference: ref. 'DSS' -- Possible downref: Non-RFC (?) normative reference: ref. 'SHS' (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. It will make rfc8208 deprecated in favor of the -bis which this document is, I believe. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There is an IANA considerations document with content, I believe there are requests to IANA for updates to the registry: "BGPsec Algorithm Suite Registry" to create a special-use block inside the registry, this is detailed in the document and appears clear, to the shepherd. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. no automated reviews required. |
2019-02-27
|
04 | Chris Morrow | HAHA FOOLED ME TWO TIMES!! :) |
2019-02-27
|
04 | Chris Morrow | Intended Status changed to Proposed Standard from Internet Standard |
2019-02-25
|
04 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Internet Standard (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 8208 ("BGPsec Algorithms, Key Formats, and Signature Formats") by adding Special-Use Algorithm IDs and correcting the range of unassigned algorithms IDs to fill the complete range. This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There was nothing in the WG review which was notable. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This is an update to the existing document, there was nothing super special here. It's the specification of algorithms and parameters to those algorithms to be used in the BGPSec protocol. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Chris Morrow (morrowc@ops-netman.net) Responsible AD: Warren Kumari (warren@kumari.net) (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has read the original document, and this BIS document during it's lifetime. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? no concerns (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes, confirmation received. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. none required. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? as solid as sidr/sidrops ever is, yes. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no threats. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. There are no significant nits in the document. There are 2 downrefs which will be dealt with in auth48 timelines. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. not necessary (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? I don't believe so. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. yes: ** Downref: Normative reference to an Informational RFC: RFC 2986 ** Downref: Normative reference to an Informational RFC: RFC 6090 And these: -- Possible downref: Non-RFC (?) normative reference: ref. 'DSS' -- Possible downref: Non-RFC (?) normative reference: ref. 'SHS' (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. It will make rfc8208 deprecated in favor of the -bis which this document is, I believe. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There is an IANA considerations document with content, I believe there are requests to IANA for updates to the registry: "BGPsec Algorithm Suite Registry" to create a special-use block inside the registry, this is detailed in the document and appears clear, to the shepherd. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. no automated reviews required. |
2019-02-25
|
04 | Chris Morrow | Responsible AD changed to Warren Kumari |
2019-02-25
|
04 | Chris Morrow | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2019-02-25
|
04 | Chris Morrow | IESG state changed to Publication Requested from I-D Exists |
2019-02-25
|
04 | Chris Morrow | IESG process started in state Publication Requested |
2019-02-25
|
04 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Internet Standard (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 8208 ("BGPsec Algorithms, Key Formats, and Signature Formats") by adding Special-Use Algorithm IDs and correcting the range of unassigned algorithms IDs to fill the complete range. This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There was nothing in the WG review which was notable. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This is an update to the existing document, there was nothing super special here. It's the specification of algorithms and parameters to those algorithms to be used in the BGPSec protocol. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Chris Morrow (morrowc@ops-netman.net) Responsible AD: Warren Kumari (warren@kumari.net) (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has read the original document, and this BIS document during it's lifetime. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? no concerns (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes, confirmation received. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. none required. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? as solid as sidr/sidrops ever is, yes. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no threats. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. There are no significant nits in the document. There are 2 downrefs which will be dealt with in auth48 timelines. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. not necessary (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? I don't believe so. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. yes: ** Downref: Normative reference to an Informational RFC: RFC 2986 ** Downref: Normative reference to an Informational RFC: RFC 6090 And these: -- Possible downref: Non-RFC (?) normative reference: ref. 'DSS' -- Possible downref: Non-RFC (?) normative reference: ref. 'SHS' (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. It will make rfc8208 deprecated in favor of the -bis which this document is, I believe. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There is an IANA considerations document with content, I believe there are requests to IANA for updates to the registry: "BGPsec Algorithm Suite Registry" to create a special-use block inside the registry, this is detailed in the document and appears clear, to the shepherd. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. no automated reviews required. |
2019-02-25
|
04 | Chris Morrow | Notification list changed to Chris Morrow <morrowc@ops-netman.net> |
2019-02-25
|
04 | Chris Morrow | Document shepherd changed to Chris Morrow |
2019-02-25
|
04 | Chris Morrow | Changed consensus to Yes from Unknown |
2019-02-25
|
04 | Chris Morrow | Document says: "Standards Track" |
2019-02-25
|
04 | Chris Morrow | Intended Status changed to Internet Standard from None |
2018-12-03
|
04 | Oliver Borchert | New version available: draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-04.txt |
2018-12-03
|
04 | (System) | New version approved |
2018-12-03
|
04 | (System) | Request for posting confirmation emailed to previous authors: Sean Turner , Oliver Borchert |
2018-12-03
|
04 | Oliver Borchert | Uploaded new revision |
2018-09-20
|
03 | Oliver Borchert | New version available: draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-03.txt |
2018-09-20
|
03 | (System) | New version approved |
2018-09-20
|
03 | (System) | Request for posting confirmation emailed to previous authors: Sean Turner , Oliver Borchert |
2018-09-20
|
03 | Oliver Borchert | Uploaded new revision |
2018-09-05
|
02 | Oliver Borchert | New version available: draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-02.txt |
2018-09-05
|
02 | (System) | New version approved |
2018-09-05
|
02 | (System) | Request for posting confirmation emailed to previous authors: Sean Turner , Oliver Borchert |
2018-09-05
|
02 | Oliver Borchert | Uploaded new revision |
2018-03-05
|
01 | Oliver Borchert | New version available: draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-01.txt |
2018-03-05
|
01 | (System) | New version approved |
2018-03-05
|
01 | (System) | Request for posting confirmation emailed to previous authors: Sean Turner , Oliver Borchert |
2018-03-05
|
01 | Oliver Borchert | Uploaded new revision |
2018-03-05
|
00 | Cindy Morgan | This document now replaces draft-borchert-sidrops-bgpsec-algs-rfc8208-bis instead of None |
2018-03-01
|
00 | Oliver Borchert | New version available: draft-ietf-sidrops-bgpsec-algs-rfc8208-bis-00.txt |
2018-03-01
|
00 | (System) | WG -00 approved |
2018-03-01
|
00 | Oliver Borchert | Set submitter to "Oliver Borchert ", replaces to (none) and sent approval email to group chairs: sidrops-chairs@ietf.org |
2018-03-01
|
00 | Oliver Borchert | Uploaded new revision |