Skip to main content

The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure
draft-ietf-sidr-rfc6485bis-05

Revision differences

Document history

Date Rev. By Action
2016-08-30
05 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2016-07-07
05 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2016-07-07
05 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2016-06-20
05 (System) RFC Editor state changed to EDIT
2016-06-20
05 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2016-06-20
05 (System) Announcement was received by RFC Editor
2016-06-20
05 (System) IANA Action state changed to No IC from In Progress
2016-06-20
05 (System) IANA Action state changed to In Progress
2016-06-20
05 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2016-06-20
05 Amy Vezza IESG has approved the document
2016-06-20
05 Amy Vezza Closed "Approve" ballot
2016-06-20
05 Amy Vezza Ballot approval text was generated
2016-06-20
05 Amy Vezza Ballot writeup was changed
2016-06-16
05 Cindy Morgan IESG state changed to Approved-announcement to be sent from IESG Evaluation
2016-06-14
05 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2016-06-14
05 Terry Manderson
[Ballot comment]
Thank you for amending the text in Section 5 (Additional Requirements) to reflect the work in RFC6916 and removing the explicit contradiction.

Setting …
[Ballot comment]
Thank you for amending the text in Section 5 (Additional Requirements) to reflect the work in RFC6916 and removing the explicit contradiction.

Setting my ballot to No Objection.
2016-06-14
05 Terry Manderson [Ballot Position Update] Position for Terry Manderson has been changed to No Objection from Discuss
2016-06-13
05 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2016-06-11
05 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2016-06-02
05 Alvaro Retana IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2016-06-02
05 Alvaro Retana Ballot has been issued
2016-06-02
05 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2016-05-26
05 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2016-05-26
05 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2016-05-26
05 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2016-05-26
05 Sabrina Tanamal
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-sidr-rfc6485bis-05.txt, which is currently in Last Call, and has the following comments:

We understand that this …
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-sidr-rfc6485bis-05.txt, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
IANA Specialist
ICANN
2016-05-19
05 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: sandy@tislabs.com, aretana@cisco.com, draft-ietf-sidr-rfc6485bis@ietf.org, sidr-chairs@ietf.org, sidr@ietf.org
Reply-To: ietf@ietf.org …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: sandy@tislabs.com, aretana@cisco.com, draft-ietf-sidr-rfc6485bis@ietf.org, sidr-chairs@ietf.org, sidr@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (The Profile for Algorithms and Key Sizes for use in the Resource Public Key Infrastructure) to Proposed Standard


The IESG has received a request from the Secure Inter-Domain Routing WG
(sidr) to consider the following document:
- 'The Profile for Algorithms and Key Sizes for use in the Resource
  Public Key Infrastructure'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-06-02. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document specifies the algorithms, algorithms' parameters,
  asymmetric key formats, asymmetric key size, and signature format for
  the Resource Public Key Infrastructure (RPKI) subscribers that
  generate digital signatures on certificates, Certificate Revocation
  Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and
  certification requests as well as for the relying parties (RPs) that
  verify these digital signatures.

Downref:
Normative references are made to 3 Informational documents: RFC2986, RFC3447 and RFC6480.
RFC2986 and RFC3447 have been previously approved by the community (https://trac.tools.ietf.org/group/iesg/trac/wiki/DownrefRegistry).
RFC2986 and RFC6480 were also Downrefs in RFC6485, which this document obsoletes.



The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/ballot/


No IPR declarations have been submitted directly on this I-D.


2016-05-19
05 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2016-05-19
05 Alvaro Retana Telechat date has been changed to 2016-06-16 from 2015-11-19
2016-05-19
05 Alvaro Retana Last call was requested
2016-05-19
05 Alvaro Retana IESG state changed to Last Call Requested from AD Evaluation
2016-05-19
05 Alvaro Retana Last call announcement was changed
2016-05-19
05 Alvaro Retana Last call announcement was generated
2016-05-19
05 Alvaro Retana IESG state changed to AD Evaluation from Publication Requested
2016-04-15
05 Sandra Murphy
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

This document requests Standards Track.  This document obsoletes
RFC6485, also noted as Standards Track.  RFC6485 is the specification
for cryptographic algorithms and key sizes to be used in the RPKI,
which require standardization for global interoperability.  Therefore,
Standard Track is the appropriate RFC type.  This type of RFC is
indicated in the header as Intended status.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  This document specifies the algorithms, algorithms' parameters,
  asymmetric key formats, asymmetric key size, and signature format for
  the Resource Public Key Infrastructure (RPKI) subscribers that
  generate digital signatures on certificates, Certificate Revocation
  Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and
  certification requests as well as for the relying parties (RPs) that
  verify these digital signatures.


Working Group Summary

  The need for the new version of RFC6485 was identified in the
  working group, and there was wide consensus that it was necessary. A
  late arriving and painstakingly detailed review identified some
  editorial issues that delayed the swift publication of a
  non-controversial change.  The IESG consideration noted that the
  discussion of algorithm agility had been overtaken by publication of
  RFC6916.  The working group came to easy consensus on the
  appropriate text to refer to RFC6916.

Document Quality

  There are at least four widely used implementations of the RPKI
  which must implement these cryptographic algorithms.  All already
  support the changes this document makes in RFC6485.  The RPKI
  is in production in all five Regional Internet Registries.
  Richard Hansen is recognized as having performed a very
  exacting review, as mentioned above.
  No MIB doctor, Media Type expert or other expert review
  was necessary or applicable.

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  The Document Shepherd is Sandra Murphy.
  The Responsible Area Director is Alvaro Retana

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The Document Shepherd has personally reviewed this document.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

The Document Shepherd has no concerns; adequate reviews were
performed.  This documents corrects a recognized error in an existing
RFC, a change that was not addressable in an errata in the judgment of
the responsible AD.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No further review of this document is needed.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

The Document Shepherd has no concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Each author has confirmed that they have no knowledge of any IPR
related to this document.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosures have been filed directly related to this draft.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

The WG consensus of the need for this technical change was strong and
without controversy.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No appeals related to this draft have been mentioned.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

The ID nits tool on the datatracker reports:

    Summary: 3 errors (**), 0 flaws (~~), 0 warnings (==), 3 comments (--).

The errors are downrefs, normative references to informational RFCs.  These
references are retained from RFC6485.  See the answer to (15) for full
details.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No formal review is applicable to this document.

(13) Have all references within this document been identified as
either normative or informative?

Yes, the references are separated into normative and informative sections.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No such normative references exist.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.


  ** Downref: Normative reference to an Informational RFC: RFC 2986

This RFC is an IETF republication of another organization's document
(PKCS #10 from RSA Laboratories)

  ** Downref: Normative reference to an Informational RFC: RFC 3447

This RFC is an IETF republication of another organization's document
(PKCS #1 from RSA Laboratories)

  ** Downref: Normative reference to an Informational RFC: RFC 6480

This RFC is the architecture document for the RPKI.  The normative reference
is appropriate.


(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

This document obsoletes RFC6485.  Section 8 describes the technical changes to
RFC6485 and the reasons they are necessary, as well as the editorial changes.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

There are no IANA considerations in RFC6485 and the changes to RFC6485
in this document do not require any IANA actions.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

No IANA registries are needed for this document.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

No sections of this document are written in a formal language.

2016-04-15
05 Sandra Murphy IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2016-04-15
05 Sandra Murphy IESG state changed to Publication Requested from AD is watching
2016-04-15
05 Sandra Murphy
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

This document requests Standards Track.  This document obsoletes
RFC6485, also noted as Standards Track.  RFC6485 is the specification
for cryptographic algorithms and key sizes to be used in the RPKI,
which require standardization for global interoperability.  Therefore,
Standard Track is the appropriate RFC type.  This type of RFC is
indicated in the header as Intended status.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  This document specifies the algorithms, algorithms' parameters,
  asymmetric key formats, asymmetric key size, and signature format for
  the Resource Public Key Infrastructure (RPKI) subscribers that
  generate digital signatures on certificates, Certificate Revocation
  Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and
  certification requests as well as for the relying parties (RPs) that
  verify these digital signatures.


Working Group Summary

  The need for the new version of RFC6485 was identified in the
  working group, and there was wide consensus that it was necessary. A
  late arriving and painstakingly detailed review identified some
  editorial issues that delayed the swift publication of a
  non-controversial change.  The IESG consideration noted that the
  discussion of algorithm agility had been overtaken by publication of
  RFC6916.  The working group came to easy consensus on the
  appropriate text to refer to RFC6916.

Document Quality

  There are at least four widely used implementations of the RPKI
  which must implement these cryptographic algorithms.  All already
  support the changes this document makes in RFC6485.  The RPKI
  is in production in all five Regional Internet Registries.
  Richard Hansen is recognized as having performed a very
  exacting review, as mentioned above.
  No MIB doctor, Media Type expert or other expert review
  was necessary or applicable.

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  The Document Shepherd is Sandra Murphy.
  The Responsible Area Director is Alvaro Retana

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The Document Shepherd has personally reviewed this document.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

The Document Shepherd has no concerns; adequate reviews were
performed.  This documents corrects a recognized error in an existing
RFC, a change that was not addressable in an errata in the judgment of
the responsible AD.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No further review of this document is needed.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

The Document Shepherd has no concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Each author has confirmed that they have no knowledge of any IPR
related to this document.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosures have been filed directly related to this draft.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

The WG consensus of the need for this technical change was strong and
without controversy.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No appeals related to this draft have been mentioned.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

The ID nits tool on the datatracker reports:

    Summary: 3 errors (**), 0 flaws (~~), 0 warnings (==), 3 comments (--).

The errors are downrefs, normative references to informational RFCs.  These
references are retained from RFC6485.  See the answer to (15) for full
details.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No formal review is applicable to this document.

(13) Have all references within this document been identified as
either normative or informative?

Yes, the references are separated into normative and informative sections.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No such normative references exist.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.


  ** Downref: Normative reference to an Informational RFC: RFC 2986

This RFC is an IETF republication of another organization's document
(PKCS #10 from RSA Laboratories)

  ** Downref: Normative reference to an Informational RFC: RFC 3447

This RFC is an IETF republication of another organization's document
(PKCS #1 from RSA Laboratories)

  ** Downref: Normative reference to an Informational RFC: RFC 6480

This RFC is the architecture document for the RPKI.  The normative reference
is appropriate.


(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

This document obsoletes RFC6485.  Section 8 describes the technical changes to
RFC6485 and the reasons they are necessary, as well as the editorial changes.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

There are no IANA considerations in RFC6485 and the changes to RFC6485
in this document do not require any IANA actions.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

No IANA registries are needed for this document.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

No sections of this document are written in a formal language.

2016-04-15
05 Sandra Murphy IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2016-03-10
05 Sandra Murphy wglc started 09 Mar 2016, ending 23 Mar 2016
2016-03-10
05 Sandra Murphy Tag Revised I-D Needed - Issue raised by IESG cleared.
2016-03-10
05 Sandra Murphy IETF WG state changed to In WG Last Call from WG Document
2016-03-08
05 Geoff Huston IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2016-03-08
05 Geoff Huston New version available: draft-ietf-sidr-rfc6485bis-05.txt
2016-02-22
04 Jean Mahoney Closed request for Last Call review by GENART with state 'No Response'
2015-12-09
04 Alvaro Retana Tag Revised I-D Needed - Issue raised by IESG set. Tag Revised I-D Needed cleared.
2015-12-09
04 Alvaro Retana IETF WG state changed to WG Document from Submitted to IESG for Publication
2015-12-07
04 Alvaro Retana Returning this document to the WG to address the comments from the IESG review (Terry's DISCUSS).
2015-12-07
04 Alvaro Retana IESG state changed to AD is watching::Revised I-D Needed from IESG Evaluation::Revised I-D Needed
2015-11-29
04 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'No Response'
2015-11-19
04 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2015-11-19
04 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2015-11-18
04 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2015-11-18
04 Brian Haberman [Ballot comment]
I support Terry's DISCUSS.
2015-11-18
04 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2015-11-17
04 Ben Campbell [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell
2015-11-17
04 Terry Manderson
[Ballot discuss]
I'm not so sure that this will be an easy DISCUSS to work through as I view this in light of future sustainability/deployability …
[Ballot discuss]
I'm not so sure that this will be an easy DISCUSS to work through as I view this in light of future sustainability/deployability of RPKI and any protocol wedded to it (eg BGPSEC).

Section 5 "Additional Requirements" suggests that both CAs and RPs "SHOULD" be capable of supporting a transition and thus able to support multiple RPKI alg. and key profiles. To me this "SHOULD" seems like it invites fragility in any such transition. An immediate example would be the root DNSSEC ksk rollover. An rather large amount of work is underway to ascertain the impact. By leaving the SHOULDs in place is this walking the same path?

Let me ask another way. Under what situations is it actually appropriate for a CA or RP to be able to ignore the requirement of being able to support a phased introduction/deprecation of new/different RPKI algorithm and key profiles? And if they ignore such a recommendation does this make the entire RPKI infrastructure a fractured PKI by algorithm?
2015-11-17
04 Terry Manderson [Ballot Position Update] New position, Discuss, has been recorded for Terry Manderson
2015-11-17
04 Kathleen Moriarty
[Ballot comment]
The SecDir reviewer picked up on a stray "/>" in section 6, just making a note of that here, but I'm sure the …
[Ballot comment]
The SecDir reviewer picked up on a stray "/>" in section 6, just making a note of that here, but I'm sure the RFC editor would see it too.
https://www.ietf.org/mail-archive/web/secdir/current/msg06151.html
2015-11-17
04 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2015-11-17
04 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2015-11-17
04 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2015-11-17
04 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2015-11-17
04 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2015-11-17
04 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2015-11-17
04 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2015-11-16
04 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2015-11-16
04 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2015-11-10
04 Alvaro Retana IESG state changed to IESG Evaluation from Waiting for Writeup
2015-11-10
04 Alvaro Retana Ballot approval text was generated
2015-11-02
04 Alvaro Retana Ballot has been issued
2015-11-02
04 Alvaro Retana [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana
2015-11-02
04 Alvaro Retana Created "Approve" ballot
2015-11-02
04 Alvaro Retana Ballot writeup was changed
2015-11-02
04 Alvaro Retana Ballot approval text was generated
2015-11-02
04 Alvaro Retana Changed consensus to Yes from Unknown
2015-11-02
04 (System) IESG state changed to Waiting for Writeup from In Last Call
2015-10-29
04 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Sean Turner.
2015-10-22
04 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2015-10-22
04 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2015-10-22
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Sean Turner
2015-10-22
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Sean Turner
2015-10-19
04 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2015-10-19
04 Amanda Baber
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-sidr-rfc6485bis-04, which is currently in Last Call, and has the following comments:

We understand that this …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-sidr-rfc6485bis-04, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object.

If this assessment is not accurate, please respond as soon as possible.
2015-10-19
04 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Suzanne Woolf
2015-10-19
04 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Suzanne Woolf
2015-10-19
04 Amy Vezza IANA Review state changed to IANA - Review Needed
2015-10-19
04 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC: , , sidr-chairs@ietf.org, sidr@ietf.org, aretana@cisco.com,
Reply-To: ietf@ietf.org
Sender: …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC: , , sidr-chairs@ietf.org, sidr@ietf.org, aretana@cisco.com,
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (The Profile for Algorithms and Key Sizes for use in the Resource Public Key Infrastructure) to Proposed Standard


The IESG has received a request from the Secure Inter-Domain Routing WG
(sidr) to consider the following document:
- 'The Profile for Algorithms and Key Sizes for use in the Resource
  Public Key Infrastructure'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2015-11-02. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document specifies the algorithms, algorithms' parameters,
  asymmetric key formats, asymmetric key size, and signature format for
  the Resource Public Key Infrastructure (RPKI) subscribers that
  generate digital signatures on certificates, Certificate Revocation
  Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and
  certification requests as well as for the relying parties (RPs) that
  verify these digital signatures.


Downref:
Normative references are made to 3 Informational documents: RFC2986, RFC3447 and RFC6480.
RFC2986 and RFC3447 have been previously approved by the community (https://trac.tools.ietf.org/group/iesg/trac/wiki/DownrefRegistry).
RFC2986 and RFC6480 were also Downrefs in RFC6485, which this document obsoletes.


The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-sidr-rfc6485bis/ballot/


No IPR declarations have been submitted directly on this I-D.


2015-10-19
04 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2015-10-19
04 Alvaro Retana Placed on agenda for telechat - 2015-11-19
2015-10-19
04 Alvaro Retana Last call was requested
2015-10-19
04 Alvaro Retana Ballot approval text was generated
2015-10-19
04 Alvaro Retana Ballot writeup was generated
2015-10-19
04 Alvaro Retana IESG state changed to Last Call Requested from AD Evaluation
2015-10-19
04 Alvaro Retana Last call announcement was changed
2015-10-19
04 Alvaro Retana Last call announcement was generated
2015-10-19
04 Alvaro Retana Notification list changed to aretana@cisco.com
2015-10-19
04 Alvaro Retana IESG state changed to AD Evaluation from Publication Requested
2015-10-19
04 Alvaro Retana Last call announcement was generated
2015-10-16
04 Sandra Murphy
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

This document requests Standards Track.  This document obsoletes
RFC6485, also noted as Standards Track.  RFC6485 is the specification
for cryptographic algorithms and key sizes to be used in the RPKI,
which require standardization for global interoperability.  Therefore,
Standard Track is the appropriate RFC type.  This type of RFC is
indicated in the header as Intended status.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  This document specifies the algorithms, algorithms' parameters,
  asymmetric key formats, asymmetric key size, and signature format for
  the Resource Public Key Infrastructure (RPKI) subscribers that
  generate digital signatures on certificates, Certificate Revocation
  Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and
  certification requests as well as for the relying parties (RPs) that
  verify these digital signatures.


Working Group Summary

  The need for the new version of RFC6485 was identified in the
  working group, and there was wide consensus that it was necessary. A
  late arriving and painstakingly detailed review identified some
  editorial issues that delayed the swift publication of a
  non-controversial change.

Document Quality

  There are at least four widely used implementations of the RPKI
  which must implement these cryptographic algorithms.  All already
  support the changes this document makes in RFC6485.  The RPKI
  is in production in all five Regional Internet Registries.
  Richard Hansen is recognized as having performed a very
  exacting review, as mentioned above.
  No MIB doctor, Media Type expert or other expert review
  was necessary or applicable.

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  The Document Shepherd is Sandra Murphy.
  The Responsible Area Director is Alvaro Retana

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The Document Shepherd has personally reviewed this document.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

The Document Shepherd has no concerns; adequate reviews were
performed.  This is a recognized change to an existing RFC, a change
that was not addressable in an errata in the judgment of the
responsible AD.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No further review of this document is needed.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

The Document Shepherd has no concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Each author has confirmed that they have no knowledge of any IPR
related to this document.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosures have been filed directly related to this draft.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

The WG consensus of the need for this technical change was strong and
without controversy.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No appeals related to this draft have been mentioned.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

The ID nits tool on the datatracker reports:

    Summary: 3 errors (**), 0 flaws (~~), 0 warnings (==), 3 comments (--).


The error are downrefs, normative references to informational RFCs.  These
references are retained from RFC6485.  See the answer to (15) for full
details.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No formal review is applicable to this document.

(13) Have all references within this document been identified as
either normative or informative?

Yes, the references are separated into normative and informative sections.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No such normative references exist.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.


  ** Downref: Normative reference to an Informational RFC: RFC 2986

This RFC is an IETF republication of another organization's document
(PKCS #10 from RSA Laboratories)

  ** Downref: Normative reference to an Informational RFC: RFC 3447

This RFC is an IETF republication of another organization's document
(PKCS #1 from RSA Laboratories)

  ** Downref: Normative reference to an Informational RFC: RFC 6480

This RFC is the architecture document for the RPKI.  The normative reference
is appropriate.


(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

This document obsoletes RFC6485.  Section 8 describes the technical changes to
RFC6485 and the reason they are necessary, as well as the editorial changes.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

There are no IANA considerations in RFC6485 and the changes in this
document do not require any IANA actions.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

No IANA registries are needed for this document.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

No sections of this document are written in a formal language.

2015-10-16
04 Sandra Murphy Responsible AD changed to Alvaro Retana
2015-10-16
04 Sandra Murphy IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2015-10-16
04 Sandra Murphy IESG state changed to Publication Requested
2015-10-16
04 Sandra Murphy IESG process started in state Publication Requested
2015-10-16
04 Sandra Murphy Intended Status changed to Proposed Standard from None
2015-10-16
04 Sandra Murphy Changed document writeup
2015-10-16
04 Sandra Murphy
The error this draft corrects was identified by Andrew Chi and David Mandleberg, verified by Russ Housley, brought to the wg by Rob Austein in …
The error this draft corrects was identified by Andrew Chi and David Mandleberg, verified by Russ Housley, brought to the wg by Rob Austein in 2012 and discussed with Matt Lepinski on list, presented to the wg at IETF89 in Mar 14, judged by the AD as inappropriate for an errata and adopted without controversy by the wg as a quick bis.  The wg has been following but with little urgency since all known implementations already use the right OID.  The draft has been discussed (enough to discover an unrelated errata), a meticulous and thorough review was performed by Richard Hansen, and multiple rounds of comments were resolved and incorporated.
2015-10-16
04 Sandra Murphy IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2015-10-15
04 Geoff Huston New version available: draft-ietf-sidr-rfc6485bis-04.txt
2015-10-15
03 Sandra Murphy Changed document writeup
2015-10-14
03 (System) Notify list changed from "Sandra L. Murphy"  to (None)
2015-07-24
03 Geoff Huston New version available: draft-ietf-sidr-rfc6485bis-03.txt
2015-05-20
02 Sandra Murphy Notification list changed to "Sandra L. Murphy" <sandy@tislabs.com>
2015-05-20
02 Sandra Murphy Document shepherd changed to Sandra L. Murphy
2015-05-15
02 Geoff Huston New version available: draft-ietf-sidr-rfc6485bis-02.txt
2014-03-27
01 Geoff Huston New version available: draft-ietf-sidr-rfc6485bis-01.txt
2014-03-07
00 Geoff Huston New version available: draft-ietf-sidr-rfc6485bis-00.txt