Skip to main content

Manifests for the Resource Public Key Infrastructure (RPKI)
draft-ietf-sidr-rpki-manifests-16

Revision differences

Document history

Date Rev. By Action
2012-08-22
16 (System) post-migration administrative database adjustment to the No Objection position for Pete Resnick
2012-08-22
16 (System) post-migration administrative database adjustment to the No Objection position for Stephen Farrell
2011-07-27
16 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2011-07-27
16 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2011-07-07
16 (System) New version available: draft-ietf-sidr-rpki-manifests-16.txt
2011-07-06
15 (System) New version available: draft-ietf-sidr-rpki-manifests-15.txt
2011-06-21
16 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-06-20
16 (System) IANA Action state changed to In Progress from Waiting on Authors
2011-06-20
16 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-06-20
16 (System) IANA Action state changed to In Progress
2011-06-17
16 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent.
2011-06-17
16 Amy Vezza IESG state changed to Approved-announcement sent
2011-06-17
16 Amy Vezza IESG has approved the document
2011-06-17
16 Amy Vezza Closed "Approve" ballot
2011-06-17
16 Amy Vezza Approval announcement text regenerated
2011-06-17
16 Amy Vezza State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup.
2011-06-07
14 (System) New version available: draft-ietf-sidr-rpki-manifests-14.txt
2011-06-07
13 (System) New version available: draft-ietf-sidr-rpki-manifests-13.txt
2011-05-31
12 (System) New version available: draft-ietf-sidr-rpki-manifests-12.txt
2011-05-16
16 Amanda Baber The IANA Considerations section needs to be updated to note that this document is the reference for "Manifest" in the registry being created by draft-ietf-sidr-signed-object.
2011-05-16
16 Stewart Bryant Ballot writeup text changed
2011-05-11
16 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2011-05-07
16 Stephen Farrell
[Ballot discuss]
At this point, I think that these reviews have been adequately handled, and that
only two  changes are needed in response to the …
[Ballot discuss]
At this point, I think that these reviews have been adequately handled, and that
only two  changes are needed in response to the secdir review as listed below.
Those could be handled in a new revision or an RFC editor note.

The secdir review responses requiring some action seem to me to be:

>> 5.2.  Considerations for Manifest Generation
>> >>
>> >>  A new manifest MUST be issued on or before the nextUpdate time.
> >
> > Well, a new manifest must be published on or before the nextUpdate time.
> > Since RPs clocks will have some skew, new manifests should really be
> > published some time ahead of the nextUpdate time.  A few seconds or
> > minutes will do.  See comments on section 6.2.

RESPONSE:

We'll change this to “issued and published.”

>>  then the RP can conclude that no attack against the repository system
>> >>  has compromised the given signed object, and the signed object MUST
>> >>  be treated as valid.
> >
> > No scope for local policy exemptions to the above MUST?
RESPONSE:

Not at this level of validity checking. The signed objects are subjected
to additional checks that are object-specific (encompassed by the text
you elided that includes the constraint "the signed object is valid").
The manifest check adds the additional constraint that "and the issuer
of the signed object has a current intention that this is publically
accessible via its publication". To remove ambiguity here we'll add
"valid (relative to manifest checking)." to that sentence.

[Original discuss text is below]

The secdir and apps reviews raise a few issues that are worth checking/addressing.
I'd expect these should be addressed fairly quickly via a few email exchanges.

The secdir review is at [1], the apps review is at [2].

[1] http://www.ietf.org/mail-archive/web/secdir/current/msg02651.html
[2] http://www.ietf.org/mail-archive/web/apps-discuss/current/msg02510.html
2011-05-07
16 Stephen Farrell
[Ballot discuss]
At this point, I think that these reviews have been adequately handled, and that
only two  changes are needed in response to the …
[Ballot discuss]
At this point, I think that these reviews have been adequately handled, and that
only two  changes are needed in response to the secdir review as listed below.
Those could be handled in a new revision or an RFC editor note.

The secdir review responses requiring some action seem to me to be:

>> 5.2.  Considerations for Manifest Generation
>> >>
>> >>  A new manifest MUST be issued on or before the nextUpdate time.
> >
> > Well, a new manifest must be published on or before the nextUpdate time.
> > Since RPs clocks will have some skew, new manifests should really be
> > published some time ahead of the nextUpdate time.  A few seconds or
> > minutes will do.  See comments on section 6.2.

RESPONSE:

We'll change this to “issued and published.”

>>  then the RP can conclude that no attack against the repository system
>> >>  has compromised the given signed object, and the signed object MUST
>> >>  be treated as valid.
> >
> > No scope for local policy exemptions to the above MUST?
RESPONSE:

Not at this level of validity checking. The signed objects are subjected
to additional checks that are object-specific (encompassed by the text
you elided that includes the constraint "the signed object is valid").
The manifest check adds the additional constraint that "and the issuer
of the signed object has a current intention that this is publically
accessible via its publication". To remove ambiguity here we'll add
"valid (relative to manifest checking)." to that sentence.






The secdir and apps reviews raise a few issues that are worth checking/addressing.
I'd expect these should be addressed fairly quickly via a few email exchanges.

The secdir review is at [1], the apps review is at [2].

[1] http://www.ietf.org/mail-archive/web/secdir/current/msg02651.html
[2] http://www.ietf.org/mail-archive/web/apps-discuss/current/msg02510.html
2011-05-05
11 (System) New version available: draft-ietf-sidr-rpki-manifests-11.txt
2011-04-30
16 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Nicolas Williams.
2011-04-28
16 Cindy Morgan Removed from agenda for telechat
2011-04-28
16 Cindy Morgan State changed to IESG Evaluation::AD Followup from IESG Evaluation.
2011-04-28
16 Sean Turner [Ballot Position Update] New position, Yes, has been recorded
2011-04-28
16 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded
2011-04-28
16 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded
2011-04-27
16 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded
2011-04-27
16 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded
2011-04-26
16 Pete Resnick [Ballot discuss]
[Cleared given Stephen's Discuss]
2011-04-26
16 Pete Resnick [Ballot Position Update] Position for Pete Resnick has been changed to No Objection from Discuss
2011-04-26
16 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded
2011-04-26
16 Stephen Farrell
[Ballot discuss]
The secdir and apps reviews raise a few issues that are worth checking/addressing.
I'd expect these should be addressed fairly quickly via a …
[Ballot discuss]
The secdir and apps reviews raise a few issues that are worth checking/addressing.
I'd expect these should be addressed fairly quickly via a few email exchanges.

The secdir review is at [1], the apps review is at [2].

[1] http://www.ietf.org/mail-archive/web/secdir/current/msg02651.html
[2] http://www.ietf.org/mail-archive/web/apps-discuss/current/msg02510.html
2011-04-26
16 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to Discuss from No Objection
2011-04-25
16 Pete Resnick [Ballot discuss]
Waiting to hear back from the authors/WG regarding Ted Hardie's 21-April Apps Area review. Once I do, I will move to No Objection.
2011-04-25
16 Pete Resnick [Ballot Position Update] New position, Discuss, has been recorded
2011-04-24
16 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded
2011-04-23
16 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded
2011-04-21
16 Russ Housley [Ballot comment]
Please consider the editorial comments in the Gen-ART Review by
  Francis Dupont on 23-Mar-2011.
2011-04-21
16 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-04-20
16 Wesley Eddy
[Ballot comment]
A couple of typos:
- period missing at end of first sentence in section 3
- at end of section 5.2 "CAs" should …
[Ballot comment]
A couple of typos:
- period missing at end of first sentence in section 3
- at end of section 5.2 "CAs" should be "CA"
2011-04-20
16 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded
2011-04-15
16 Stewart Bryant Placed on agenda for telechat - 2011-04-28 by Stewart Bryant
2011-04-15
16 Stewart Bryant [Note]: 'Sandra Murphy (sandra.murphy@sparta.com) is the document shepherd.' added by Stewart Bryant
2011-04-15
16 Stewart Bryant State changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup.
2011-04-15
16 Stewart Bryant [Ballot Position Update] New position, Yes, has been recorded for Stewart Bryant
2011-04-15
16 Stewart Bryant Ballot has been issued
2011-04-15
16 Stewart Bryant Created "Approve" ballot
2011-04-13
16 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-04-13
10 (System) New version available: draft-ietf-sidr-rpki-manifests-10.txt
2011-04-11
16 Stewart Bryant State changed to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead.
2011-03-24
16 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-03-21
16 Amanda Baber We understand that this document does not require any IANA actions.
2011-03-11
16 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2011-03-11
16 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2011-03-10
16 Cindy Morgan Last call sent
2011-03-10
16 Cindy Morgan
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Manifests for the Resource Public Key Infrastructure) to Proposed Standard


The IESG has received a request from the Secure Inter-Domain Routing WG
(sidr) to consider the following document:
- 'Manifests for the Resource Public Key Infrastructure'
  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-03-24. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-sidr-rpki-manifests/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-sidr-rpki-manifests/


Abstract

  This document defines a "manifest" for use in the Resource Public Key
  Infrastructure (RPKI).  A manifest is a signed object (file) that
  contains a listing of all the signed objects (files) in the
  repository publication point (directory) associated with an authority
  responsible for publishing in the repository.  For each certificate,
  Certificate Revocation List (CRL), or other type of signed objects
  issued by the authority, that are published at this repository
  publication point, the manifest contains both the name of the file
  containing the object, and a hash of the file content.  Manifests are
  intended to enable a relying party (RP) to detect certain forms of
  attacks against a repository.  Specifically, if an RP checks a
  manifest's contents against the signed objects retrieved from a
  repository publication point, then the RP can detect "stale" (valid)
  data and deletion of signed objects.
2011-03-10
16 Stewart Bryant Ballot writeup text changed
2011-03-10
16 Stewart Bryant Last Call was requested
2011-03-10
16 (System) Ballot writeup text was added
2011-03-10
16 (System) Last call text was added
2011-03-10
16 (System) Ballot approval text was added
2011-03-10
16 Stewart Bryant State changed to Last Call Requested from Publication Requested.
2011-03-10
16 Stewart Bryant Last Call text changed
2011-02-18
16 Cindy Morgan
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
  …
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

The document shepherd is Sandra Murphy, sidr co-chair.  The document
shepherd has personally reviewed the document.  No issues were
discovered that would prevent advancement.  This document is ready
for forwarding to the IESG.

  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed?
        have been performed?

The document has had adequate review.  It was presented at working
group meetings at the IETF70, IETF72, IETF76, IETF77, and IETF79
meetings and went through last call in Nov 2010 in the working group.
Comments received uniformly positive with one nit noted not worth
holding up the document.  There was adequate support from the working
group to indicate broad interest.

  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

No, the document shepherd has no concerns about this document.

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

The document shepherd has no concerns with advancing this document. No
IPR claims have been filed against this document.

  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

The working group has participated in presentations of this document.
The last call response indicated broad interest.  The certificate
profile document mandates that each certificate contain a reference
to the manifest object this document specifies.  Multiple
implementations of the RPKI exist, so multiple implementations of
this object exist.

  (1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

No appeals have been issued or threatened for this document.

  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See the Internet-Drafts Checklist
        and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

The tools site idnits tool reports:
      Summary: 0 errors (**), 6 warnings (==), 2 comments (--).

The warnings have to do with outdated draft versions in the reference
list and with the pre-5378 status.

  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].


Yes, the document has split its references into normative and informative
sections.  This document relies normatively on several other
working group documents that are advancing at the same time or
have been through last call and are awaiting a final version addressing
minor comments.  This document is intended for Standards status and there
are no downward references.

  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

The IANA Considerations section exists, is consistent with the document,
and does not create a new registry or entries in an existing registry.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

This document uses ASN.1 in describing portions of the signed object.
The Appendix A is an ASN.1 module and it parses correctly. The syntax
was checked using asn1Parser from the libtasn1-tools package (v2.7.1).


  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:
      Technical Summary
        Relevant content can frequently be found in the abstract
        and/or introduction of the document. If not, this may be
        an indication that there are deficiencies in the abstract
        or introduction.
      Working Group Summary
        Was there anything in WG process that is worth noting? For
        example, was there controversy about particular points or
        were there decisions where the consensus was particularly
        rough?
      Document Quality
        Are there existing implementations of the protocol? Have a
        significant number of vendors indicated their plan to
        implement the specification? Are there any reviewers that
        merit special mention as having done a thorough review,
        e.g., one that resulted in important changes or a
        conclusion that the document had no substantive issues? If
        there was a MIB Doctor, Media Type or other expert review,
        what was its course (briefly)? In the case of a Media Type
        review, on what date was the request posted?


Technical Summary

This document defines a "manifest" for use in the Resource Public Key
Infrastructure (RPKI).  A manifest is a signed object (file) that
contains a listing of all the signed objects (files) in the
repository publication point (directory) associated with an authority
responsible for publishing in the repository.  For each certificate,
Certificate Revocation List (CRL), or other type of signed object
issued by the authority that are published at this repository
publication point, the manifest contains both the name of the file
containing the object and a hash of the file content.  Manifests are
intended to enable a relying party (RP) to detect certain forms of
attacks against a repository.  Specifically, if an RP checks a
manifest's contents against the signed objects retrieved from a
repository publication point, then the RP can detect "stale" (valid)
data and deletion of signed objects.

Working Group Summary

This document specifies an object that is needed to protect against
some attacks (deletion, replay, etc.) on repositories in the
distributed RPKI.  The need for this object was recognized by RPKI
implementors and conveyed to the working group.  The working group
supported making this a mandatory part of the repository system.

Document Quality

The document is well written and clear. Implementations of the RPKI
exist, which must include this mandatory object, indicating a detailed
coding level review. Implemenation experience has been reflected in
changes to this document.

There is no MIB and there is no Media Type.
2011-02-18
16 Cindy Morgan Draft added in state Publication Requested
2011-02-18
16 Cindy Morgan [Note]: 'Sandra Murphy (sandra.murphy@sparta.com) is the document shepherd.' added
2010-11-08
09 (System) New version available: draft-ietf-sidr-rpki-manifests-09.txt
2010-10-15
08 (System) New version available: draft-ietf-sidr-rpki-manifests-08.txt
2010-05-12
07 (System) New version available: draft-ietf-sidr-rpki-manifests-07.txt
2009-12-07
06 (System) New version available: draft-ietf-sidr-rpki-manifests-06.txt
2009-08-05
05 (System) New version available: draft-ietf-sidr-rpki-manifests-05.txt
2009-04-27
16 (System) Document has expired
2008-10-24
04 (System) New version available: draft-ietf-sidr-rpki-manifests-04.txt
2008-09-24
03 (System) New version available: draft-ietf-sidr-rpki-manifests-03.txt
2008-08-06
02 (System) New version available: draft-ietf-sidr-rpki-manifests-02.txt
2008-07-17
01 (System) New version available: draft-ietf-sidr-rpki-manifests-01.txt
2008-01-02
00 (System) New version available: draft-ietf-sidr-rpki-manifests-00.txt