Skip to main content

Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI)
draft-ietf-sidr-origin-ops-23

Revision differences

Document history

Date Rev. By Action
2014-01-09
23 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2014-01-06
23 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-12-23
23 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2013-11-27
23 (System) IANA Action state changed to No IC from In Progress
2013-11-27
23 (System) IANA Action state changed to In Progress
2013-11-26
23 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2013-11-26
23 (System) RFC Editor state changed to EDIT
2013-11-26
23 (System) Announcement was received by RFC Editor
2013-11-26
23 Cindy Morgan State changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed
2013-11-26
23 Cindy Morgan IESG has approved the document
2013-11-26
23 Cindy Morgan Closed "Approve" ballot
2013-11-26
23 Cindy Morgan Ballot approval text was generated
2013-11-26
23 Cindy Morgan Ballot writeup was changed
2013-11-25
23 Robert Sparks Request for Telechat review by GENART Completed: Ready. Reviewer: Robert Sparks.
2013-11-21
23 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Tom Yu.
2013-11-21
23 Cindy Morgan State changed to Approved-announcement to be sent::Point Raised - writeup needed from Waiting for Writeup
2013-11-21
23 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2013-11-21
23 Spencer Dawkins [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins
2013-11-21
23 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2013-11-20
23 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2013-11-20
23 Ted Lemon [Ballot Position Update] New position, Yes, has been recorded for Ted Lemon
2013-11-20
23 Gunter Van de Velde Request for Telechat review by OPSDIR Completed. Reviewer: Al Morton.
2013-11-20
23 Sean Turner [Ballot Position Update] New position, Yes, has been recorded for Sean Turner
2013-11-20
23 Randy Bush IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2013-11-20
23 Randy Bush New version available: draft-ietf-sidr-origin-ops-23.txt
2013-11-20
22 Benoît Claise
[Ballot comment]
I second Al Morton's OPS-DIR feedback:
  The effort to prepare this BCP should be greatly appreciated in
  the OPS community. Thanks …
[Ballot comment]
I second Al Morton's OPS-DIR feedback:
  The effort to prepare this BCP should be greatly appreciated in
  the OPS community. Thanks Randy.



Editorial:
For example, a router should bootstrap from a chache which is
s/chache/cache
2013-11-20
22 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2013-11-19
22 Richard Barnes
[Ballot comment]
Section 3:
The document uses the phrase "validated cache" (and "valid cache") without defining what the word "validated" means in this context.  If …
[Ballot comment]
Section 3:
The document uses the phrase "validated cache" (and "valid cache") without defining what the word "validated" means in this context.  If I understand correctly, the following text after "... rcynic [rcynic]." would be helpful to explain:
"""
A validated cache contains all RPKI objects that the RP has verified to be valid according to the rules for validation RPKI certificates and signed objects [RFC6487][RFC6488].  Entities that trust the cache can use these RPKI objects without further validation.
"""

Section 3:
"... an operator MAY choose to synchronize quite frequently."
In these comments on cache synchronization, it may be helpful to note that while synchronization with public caches is expensive (requiring validation), synchronization with a trusted validated cache is much cheaper.

Section 3:
"a router SHOULD peer with more than one cache"
Just to be clear, you're talking about peering over the RPKI-RTR protocol, not rsync, right?

Section 3:
"all sub-allocations from that block which are announced by other ASs, e.g. customers, have correct ROAs in the RPKI"
Note that the holder of the super-block can fix this problem, e.g., by issuing the necessary ROAs or issuing de-aggregated ROAs instead of a single one for the super-block.  Do you mean to have the holder of the super-block be gated on customers?  Or do you want to suggest one of these fixes?
2013-11-19
22 Richard Barnes [Ballot Position Update] New position, Yes, has been recorded for Richard Barnes
2013-11-19
22 Stephen Farrell
[Ballot comment]

- Nice bcp, thanks. I like that you flag that it'll
evolve in the abstract.

- section 5, 5th last para: Does "the …
[Ballot comment]

- Nice bcp, thanks. I like that you flag that it'll
evolve in the abstract.

- section 5, 5th last para: Does "the latter" here mean
"NotFound or Invalid" or just "Invalid"?  If it just
means invalid, is there a danger this might cause
someone to not acceopt NotFound announcements too soon?
2013-11-19
22 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2013-11-18
22 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2013-11-18
22 Brian Haberman
[Ballot comment]
Absolutely support the publication of this document.  Just a few quick points...

1. Would the 2nd paragraph of the Introduction be strengthened with …
[Ballot comment]
Absolutely support the publication of this document.  Just a few quick points...

1. Would the 2nd paragraph of the Introduction be strengthened with a reference to the IAB statement on the RPKI (http://www.iab.org/documents/correspondence-reports-documents/docs2010/iab-statement-on-the-rpki/)?

2. The use of 10.0.666.0/24 is classic.  I hope it remains.

3. In section 6, I think the discussion of loosely consistent data could be enhanced.  It may be worthwhile to mention that never-before-seen prefixes and ASes appearing in the routing system is not a common event.  The growth rate of those two variables seem to indicate that the loose synchronization of RPKI caches should not be a problem.
2013-11-18
22 Brian Haberman [Ballot Position Update] New position, Yes, has been recorded for Brian Haberman
2013-11-17
22 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2013-11-17
22 Joel Jaeggli [Ballot Position Update] New position, Yes, has been recorded for Joel Jaeggli
2013-11-17
22 Barry Leiba [Ballot comment]
This was a nice read; thanks for a clear, concise document.
2013-11-17
22 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2013-11-15
22 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Al Morton
2013-11-15
22 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Al Morton
2013-11-14
22 Jean Mahoney Request for Telechat review by GENART is assigned to Robert Sparks
2013-11-14
22 Jean Mahoney Request for Telechat review by GENART is assigned to Robert Sparks
2013-11-13
22 Adrian Farrel
[Ballot comment]
I support the publication of this document.

The rest of this Comment is pointless nits:

---

Please expand CRL on first use.

--- …
[Ballot comment]
I support the publication of this document.

The rest of this Comment is pointless nits:

---

Please expand CRL on first use.

---

s/an hierarchic/a hierarchic/

(although qualifies for :-)

---

Section 3

"seriously affects the performance" is ambiguous. Of course...

s/affects/improves/

---

Page 4

  For redundancy, a router SHOULD peer with more than one cache at the
  same time.  Peering with two or more, at least one local and others
  remote, is recommended.

Upper case RECOMMENDED?

---

Page 6

  An environment where private address space is announced in eBGP the
  operator MAY have private RPKI objects which cover these private
  spaces.  This will require a trust anchor created and owned by that
  environment, see [I-D.ietf-sidr-ltamgmt].

In an environment.... ?
2013-11-13
22 Adrian Farrel [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel
2013-10-30
22 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2013-10-29
22 Stewart Bryant Placed on agenda for telechat - 2013-11-21
2013-10-29
22 Stewart Bryant Ballot has been issued
2013-10-29
22 Stewart Bryant [Ballot Position Update] New position, Yes, has been recorded for Stewart Bryant
2013-10-29
22 Stewart Bryant Created "Approve" ballot
2013-10-29
22 Stewart Bryant Ballot writeup was changed
2013-10-07
22 Randy Bush IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2013-10-07
22 Randy Bush New version available: draft-ietf-sidr-origin-ops-22.txt
2013-10-01
21 (System) State changed to Waiting for Writeup from In Last Call (ends 2013-10-01)
2013-09-30
21 Robert Sparks Request for Last Call review by GENART Completed: Ready. Reviewer: Robert Sparks.
2013-09-24
21 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2013-09-24
21 Amanda Baber
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-sidr-origin-ops-21, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-sidr-origin-ops-21, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions. IANA requests that the IANA Considerations section of the document remain in place upon publication.

If this assessment is not accurate, please respond as soon as possible.
2013-09-19
21 Jean Mahoney Request for Last Call review by GENART is assigned to Robert Sparks
2013-09-19
21 Jean Mahoney Request for Last Call review by GENART is assigned to Robert Sparks
2013-09-19
21 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tom Yu
2013-09-19
21 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tom Yu
2013-09-17
21 Amy Vezza IANA Review state changed to IANA - Review Needed
2013-09-17
21 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (RPKI-Based Origin Validation Operation) to …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (RPKI-Based Origin Validation Operation) to Best Current Practice


The IESG has received a request from the Secure Inter-Domain Routing WG
(sidr) to consider the following document:
- 'RPKI-Based Origin Validation Operation'
  as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2013-10-01. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  Deployment of RPKI-based BGP origin validation has many operational
  considerations.  This document attempts to collect and present those
  which are most critical.  It is expected to evolve as RPKI-based
  origin validation continues to be deployed and the dynamics are
  better understood.





The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-sidr-origin-ops/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-sidr-origin-ops/ballot/


No IPR declarations have been submitted directly on this I-D.


2013-09-17
21 Amy Vezza State changed to In Last Call from Last Call Requested
2013-09-17
21 Amy Vezza Last call announcement was generated
2013-09-17
21 Stewart Bryant Last call was requested
2013-09-17
21 Stewart Bryant State changed to Last Call Requested from AD Evaluation::AD Followup
2013-09-17
21 Stewart Bryant Ballot writeup was generated
2013-09-16
21 Stewart Bryant Last call announcement was generated
2013-09-16
21 Stewart Bryant Changed document writeup
2013-09-10
21 Stewart Bryant Ballot approval text was generated
2013-09-05
21 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-09-05
21 Randy Bush New version available: draft-ietf-sidr-origin-ops-21.txt
2013-09-04
20 Stewart Bryant Lots of Nits that need fixing
2013-09-04
20 Stewart Bryant State changed to AD Evaluation::Revised I-D Needed from Publication Requested
2013-08-20
20 Cindy Morgan
1. Summary

Who is the document shepherd?


Who is the responsible Area Director?
Stewart Bryant
Adrian Farrel

Explanation of Document purpose:
"Deployment of RPKI-based BGP …
1. Summary

Who is the document shepherd?


Who is the responsible Area Director?
Stewart Bryant
Adrian Farrel

Explanation of Document purpose:
"Deployment of RPKI-based BGP origin validation has many operational
considerations. This document attempts to collect and present those
which are most critical. It is expected to evolve as RPKI-based
origin validation continues to be deployed and the dynamics are
better understood."

Why BCP?
The WG asked for document to be published as a BCP because it describes
the aspirational 'best common practice' intended to be used for managing
RPKI type data as an origin-as operator.

2. Review and Consensus

The document went through 20 revisions, substantial review on and off
the WG mailing list, and considerable banter at live meetings (both
official 3x/yr f2f meetings and interim f2f ones). It seemed from the
discussion that a large portion of the WG was interested in this
document moving forward and in being written in the first place,
describing expected operational practices with a new system required for
safe(r) operations of a critical part of the Internet (the routing
system) seems to have tickled the fancy of many a WG member.

the only notable parts of discussion where the number of detailed
reviews and commentaries made by members throughout the +2yr process of
writing and publishing this document.

3. Intellectual Property

All authors have confirmed there are no outstanding IPR claims for this
document.

4. Other Points

There is one downref document reference to:
draft-ietf-sidr-ltamgmt

I believe this will be fixed before publication as well. Additionally,
there are some id-nits issues which will be cleaned up prior to
publication (in like auth48 or so).

-chris
(co-chair sidr-wg)
2013-08-20
20 Cindy Morgan Intended Status changed to Best Current Practice
2013-08-20
20 Cindy Morgan IESG process started in state Publication Requested
2013-08-20
20 (System) Earlier history may be found in the Comment Log for /doc/draft-ymbk-rpki-origin-ops/
2013-08-20
20 Cindy Morgan Changed document writeup
2013-08-20
20 Cindy Morgan Document shepherd changed to Chris Morrow
2013-08-20
20 Chris Morrow sent publication-request to iesg-secretary@
2013-08-20
20 Chris Morrow IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2013-08-14
20 Sandra Murphy IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2013-08-14
20 Sandra Murphy Annotation tag Revised I-D Needed - Issue raised by WGLC cleared.
2013-03-11
20 Sandra Murphy IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2013-02-20
20 Randy Bush New version available: draft-ietf-sidr-origin-ops-20.txt
2012-10-12
19 Sandra Murphy Annotation tag Revised I-D Needed - Issue raised by WGLC set.
2012-08-17
19 Sandra Murphy IETF state changed to In WG Last Call from WG Document
2012-08-17
19 Sandra Murphy Annotation tag Other - see Comment Log cleared.
2012-08-17
19 Sandra Murphy Annotation tag Other - see Comment Log set.
2012-08-16
19 Sandra Murphy comments received during wg last call
2012-08-16
19 Sandra Murphy wglc issued 17 Aug 2012 http://www.ietf.org/mail-archive/web/sidr/current/msg04987.html
2012-08-16
19 Sandra Murphy ping to wg 28 Mar 2012 http://www.ietf.org/mail-archive/web/sidr/current/msg04312.html
2012-08-16
19 Sandra Murphy wglc issued 14 Oct 2011 http://www.ietf.org/mail-archive/web/sidr/current/msg03400.html
2012-08-16
19 Randy Bush New version available: draft-ietf-sidr-origin-ops-19.txt
2012-07-31
18 Randy Bush New version available: draft-ietf-sidr-origin-ops-18.txt
2012-06-29
17 Randy Bush New version available: draft-ietf-sidr-origin-ops-17.txt
2012-05-23
16 Randy Bush New version available: draft-ietf-sidr-origin-ops-16.txt
2012-03-09
15 Randy Bush New version available: draft-ietf-sidr-origin-ops-15.txt
2012-03-07
14 Randy Bush New version available: draft-ietf-sidr-origin-ops-14.txt
2011-11-13
13 (System) New version available: draft-ietf-sidr-origin-ops-13.txt
2011-10-31
12 (System) New version available: draft-ietf-sidr-origin-ops-12.txt
2011-10-09
11 (System) New version available: draft-ietf-sidr-origin-ops-11.txt
2011-07-10
10 (System) New version available: draft-ietf-sidr-origin-ops-10.txt
2011-05-23
09 (System) New version available: draft-ietf-sidr-origin-ops-09.txt
2011-05-10
08 (System) New version available: draft-ietf-sidr-origin-ops-08.txt
2011-05-03
07 (System) New version available: draft-ietf-sidr-origin-ops-07.txt
2011-03-10
06 (System) New version available: draft-ietf-sidr-origin-ops-06.txt
2011-02-01
05 (System) New version available: draft-ietf-sidr-origin-ops-05.txt
2011-01-29
04 (System) New version available: draft-ietf-sidr-origin-ops-04.txt
2011-01-20
03 (System) New version available: draft-ietf-sidr-origin-ops-03.txt
2011-01-19
02 (System) New version available: draft-ietf-sidr-origin-ops-02.txt
2011-01-09
01 (System) New version available: draft-ietf-sidr-origin-ops-01.txt
2011-01-02
00 (System) New version available: draft-ietf-sidr-origin-ops-00.txt