Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties
draft-ietf-sidrops-rp-06
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-09-01
|
06 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2020-08-28
|
06 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2020-05-19
|
06 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2020-04-16
|
06 | Jean Mahoney | Request closed, assignment withdrawn: Wassim Haddad Last Call GENART review |
2020-04-16
|
06 | Jean Mahoney | Closed request for Last Call review by GENART with state 'Overtaken by Events' |
2020-04-15
|
06 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2020-04-15
|
06 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Kathleen Moriarty was marked no-response |
2020-04-13
|
06 | (System) | RFC Editor state changed to EDIT |
2020-04-13
|
06 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2020-04-13
|
06 | (System) | Announcement was received by RFC Editor |
2020-04-13
|
06 | (System) | IANA Action state changed to No IANA Actions |
2020-04-13
|
06 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2020-04-13
|
06 | Amy Vezza | IESG has approved the document |
2020-04-13
|
06 | Amy Vezza | Closed "Approve" ballot |
2020-04-13
|
06 | Amy Vezza | Ballot approval text was generated |
2020-04-09
|
06 | Cindy Morgan | IESG state changed to Approved-announcement to be sent from IESG Evaluation |
2020-04-09
|
06 | Cindy Morgan | Changed consensus to Yes from Unknown |
2020-04-09
|
06 | Alissa Cooper | [Ballot comment] I agree with Alvaro about Section 4.3. |
2020-04-09
|
06 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2020-04-09
|
06 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2020-04-08
|
06 | Benjamin Kaduk | [Ballot comment] Section 2 RP software uses synchronization mechanisms supported by targeted repositories (e.g., [rsync], RRDP [RFC8182]) to download all RPKI … [Ballot comment] Section 2 RP software uses synchronization mechanisms supported by targeted repositories (e.g., [rsync], RRDP [RFC8182]) to download all RPKI changed data objects in the repository system and cache them locally. nit(?): perhaps "changed" requires a bit more explanation. Section 2.1 TAL acquisition and processing are specified in Section 3 of [RFC8630]. I'm not really convinced that the referenced section discusses specifically TAL *acquisition*. Section 2.2 by using the SIA and AIA extensions. Detailed specifications of SIA and AIA extensions in a resource certificate are described in Section 4 of [RFC6487]. (Subsections thereof, though I trust that the reader should be able to figure this out.) Section 3.1 established by Section 4 of [RFC6487]. This means that all extensions mandated by Section 4.8 of [RFC6487] must be present and value of each extension must be within the range specified by this RFC. Moreover, any extension excluded by Section 4.8 of [RFC6487] nit: s/this/that/ ("this RFC" is the thing that draft-ietf-sidrops-rp will become, in this context). Section 7.1 of [RFC6487] gives the procedure that the RP should follow to verify resource certificate and syntax. "verify resource certificate and syntax" seems a little broad; the referenced section seems specific to validating the extension defined in RFC 3779. Section 3.2 Certificate Authorities that want to reduce aspects of operational fragility will migrate to the new OIDs [RFC8360], informing the RP of using an alternative RPKI validation algorithm. An RP is expected to support the amended procedure to handle with accidental over-claim. nit: I suggest s/with accidental over-claim/accidental overclaim/. Section 3.3 Processing of a CRL that is not consistent with a manifest is a matter of local policy, as described in the fourth paragraph of Section 6.6 of [RFC6486]. Is the fifth paragraph relevant, also? Section 4.1 Note that these checks are necessary, but not sufficient. Additional validation checks must be performed based on the specific type of signed object. These additional validations are covered in the following sections, it seems -- should we mention that here? Section 4.2.4 contain an IP Address Delegation extension. The validation procedure used for BGPsec Router Certificates is identical to the validation procedure described in Section 7 of [RFC6487], but using the constraints applied come from specification of Section 7 of [RFC8209]. nit: if it does something differently, it's no longer "identical"; maybe "analogous" or it's following the validation procedure [...] with additional constraints"? That said, Section 7 of RFC 8209 is the IANA considerations, so I'm not sure what the "constraints applied come from" is intended to say. Section 7 The validation steps discussed throughout this document are also pretty important to the security of the system as a whole. Section 10.1 I'm not sure that RFC 5280 actually is normative here. (That might be the first time I've ever said that!) Section 10.2 I think that RFCs 6489, 6916, and 8634 are probably better as normative. |
2020-04-08
|
06 | Benjamin Kaduk | [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk |
2020-04-08
|
06 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2020-04-08
|
06 | Roman Danyliw | [Ballot comment] ** In the spirit of this being a pathfinding document, provide additional references as follows: -- Section 3.2. Per “An RP is expected … [Ballot comment] ** In the spirit of this being a pathfinding document, provide additional references as follows: -- Section 3.2. Per “An RP is expected to support the amended procedure to handle with accidental over-claim.”, a pointer to these procedures would be helpful. -- Section 3.3. Per “CRLs in the RPKI are tightly constrained; only the AuthorityKeyIndetifier and CRLNumber extensions are allowed …”, a pointer to these extensions would be helpful. -- Section 4.2.4, Per “Additionally, the certificate must contain an AS Identifier Delegation extension …”, a pointer to this extension would be helpful. ** Section 1. Per “Besides, software engineering calls for how to segment the RP system into components with orthogonal functionalities, so that those components could be distributed across the operational timeline of the user”. I didn’t follow the intent of this sentence. What are principles of software engineering calling for? ** Section 3.3. Typo in the extension name. s/AuthorityKeyIndetifier/AuthorityKeyIdentifier/ ** Section 7. Please add text that this document doesn’t introduce any new security considerations but is a resource to implementers. The individual RPKI RFC need to be consulted for specific guidance. ** Editorial Nits -- Section 1. Typo. s/This document will be update …/This document will be updated …/ -- Section 3.1. Typo. s/must be present and value of each extension/must be present and the value of each extension/ |
2020-04-08
|
06 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2020-04-08
|
06 | Éric Vyncke | [Ballot comment] While this document is useful for a RPKI newcomer or implementer, I wonder whether it should become a RFC even if informal... and … [Ballot comment] While this document is useful for a RPKI newcomer or implementer, I wonder whether it should become a RFC even if informal... and the "requirements" in the title is also conflicting IMHO with an informational RFC. I wonder whether the "security considerations" section is really about security considerations linked to this document or to the overall RP system. Regards -éric |
2020-04-08
|
06 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2020-04-08
|
06 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2020-04-08
|
06 | Éric Vyncke | Request closed, assignment withdrawn: Basavaraj Patil Telechat INTDIR review |
2020-04-08
|
06 | Éric Vyncke | Closed request for Telechat review by INTDIR with state 'Withdrawn': Deadline has expired... next time, please decline. |
2020-04-08
|
06 | Robert Wilton | [Ballot comment] Thanks for this - I think that this document is useful. One issue with the IETF standard format is that it can be … [Ballot comment] Thanks for this - I think that this document is useful. One issue with the IETF standard format is that it can be difficult to find which RFCs need to be read to fully solve a particular problem, particularly considering that some of those RFCs may be updated or obsoleted by other RFCs. I agree with Warren's comment that it would make a good living document, if IETF had such things. In terms of reading the document, I noted that it uses quite a lot of acronyms that I was not immediately familiar with and that are not defined in the document. Perhaps the document could be improved by having a short terminology section? The acronyms that didn't appear to be defined include CRL, INR, CA, ROA. 4.2.1. Manifest To determine whether a manifest is valid, the RP is required to perform manifest-specific checks in addition to those specified in [RFC6488]. I found the above paragraph as being unclear, in that I don't know what "those" is referring to, and hence I suggest more clearly identifying “those” checks. Finally, I agree with Alvaro's comment related to section 4.3: This document probably shouldn't be giving recommendations. Perhaps better to just keep this as "However, most RP software ignores such objects.", or combine it with the previous sentence. |
2020-04-08
|
06 | Robert Wilton | [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton |
2020-04-07
|
06 | Alvaro Retana | [Ballot comment] ABSTAIN This document presents a nice summary, but I am ABSTAINing, and not standing in the way of publication, because I don't think … [Ballot comment] ABSTAIN This document presents a nice summary, but I am ABSTAINing, and not standing in the way of publication, because I don't think the contribution has enough archival value and it could cause confusion. While the document tries to provide "a single reference point", it mostly points at other RFCs, which an implementer will have to consult anyway. IOW, this document seems to add to the list. No normative language is used, which is good from the point of view that this document doesn't define a specification, but in some places the text implies a requirement level, which may cause confusion -- again, the reader will have to consult the existing RFCs... The document itself recognizes the need to maintain it up to date: "This document will be update to reflect new or changed requirements as these RFCs are updated, or new RFCs are written." (s/be update/be updated) And the difficulty in doing so is evident in the fact that one of the referenced RFCs is already obsolete, but the text doesn't reflect that. [Even though I'm ABSTAINing, I have a couple of comments.] (1) This paragraph from §4.3 caught my eye... If there are valid objects in a publication point that are not present on a Manifest, [RFC6486] does not mandate specific RP behavior with respect to such objects. However, most RP software ignores such objects and the authors of this document suggest this behavior be adopted uniformly. ...because in it the authors get away from pointing at the existing RFCs to suggest a behavior. That clearly should not be the job of this document. (2) Nits: s/RPKI make use/RPKI makes use s/one of necessary/one of the necessary s/RP is required perform/RP is required to perform s/[RFC8208]and/[RFC8208] and |
2020-04-07
|
06 | Alvaro Retana | Ballot comment text updated for Alvaro Retana |
2020-04-07
|
06 | Alvaro Retana | [Ballot comment] This document presents a nice summary, but I am ABSTAINing, and not standing in the way of publication, because I don't think the … [Ballot comment] This document presents a nice summary, but I am ABSTAINing, and not standing in the way of publication, because I don't think the contribution has enough archival value and it could cause confusion. While the document tries to provide "a single reference point", it mostly points at other RFCs, which an implementer will have to consult anyway. IOW, this document seems to add to the list. No normative language is used, which is good from the point of view that this document doesn't define a specification, but in some places the text implies the requirement level, which may cause confusion -- again, the reader will have to consult the existing RFCs... The document itself recognizes the need to maintain it up to date: "This document will be update to reflect new or changed requirements as these RFCs are updated, or new RFCs are written." (s/be update/be updated) And the difficulty in doing so is evident in the fact that one of the referenced RFCs is already obsolete, but the text doesn't reflect that. ===== [Even though I'm ABSTAINing, I have a couple of comments.] (1) This paragraph from §4.3 caught my eye... If there are valid objects in a publication point that are not present on a Manifest, [RFC6486] does not mandate specific RP behavior with respect to such objects. However, most RP software ignores such objects and the authors of this document suggest this behavior be adopted uniformly. ...because in it the authors get away from pointing at the existing RFCs to suggest a behavior. That clearly should not be the job of this document. (2) Nits: s/RPKI make use/RPKI makes use s/one of necessary/one of the necessary s/RP is required perform/RP is required to perform s/[RFC8208]and/[RFC8208] and |
2020-04-07
|
06 | Alvaro Retana | [Ballot Position Update] New position, Abstain, has been recorded for Alvaro Retana |
2020-04-05
|
06 | Erik Kline | [Ballot comment] {Yes} [nits] S4.2.2 * This is the first time ROA is really used. Consider expanding it here one time, or up in … [Ballot comment] {Yes} [nits] S4.2.2 * This is the first time ROA is really used. Consider expanding it here one time, or up in the introduction where it first appears in the list of RFCs. S4.2.4 * I had some trouble parsing "but using the constraints applied come from ...". S4.3 * s/make decision/make decisions|make a decision/ S4.4 * s/slate/stale/ |
2020-04-05
|
06 | Erik Kline | [Ballot Position Update] New position, Yes, has been recorded for Erik Kline |
2020-03-27
|
06 | Murray Kucherawy | [Ballot Position Update] Position for Murray Kucherawy has been changed to No Objection from No Record |
2020-03-27
|
06 | Murray Kucherawy | [Ballot comment] Section 4.3: “A Manifest can be classified as either valid or invalid, and a valid Manifest is either current and stale.” That should … [Ballot comment] Section 4.3: “A Manifest can be classified as either valid or invalid, and a valid Manifest is either current and stale.” That should be “...or stale”, right? |
2020-03-27
|
06 | Murray Kucherawy | Ballot comment text updated for Murray Kucherawy |
2020-03-26
|
06 | Bernie Volz | Request for Telechat review by INTDIR is assigned to Basavaraj Patil |
2020-03-26
|
06 | Bernie Volz | Request for Telechat review by INTDIR is assigned to Basavaraj Patil |
2020-03-26
|
06 | Éric Vyncke | Requested Telechat review by INTDIR |
2020-03-25
|
06 | Warren Kumari | IESG state changed to IESG Evaluation from Waiting for Writeup |
2020-03-25
|
06 | Amy Vezza | Placed on agenda for telechat - 2020-04-09 |
2020-03-25
|
06 | Warren Kumari | [Ballot comment] Notes for IESG reviewers: The requirements for relying party software is scattered throughout a bunch of different RFCs, and are sometimes buried and … [Ballot comment] Notes for IESG reviewers: The requirements for relying party software is scattered throughout a bunch of different RFCs, and are sometimes buried and easy to overlook within these RFCs - they are generally more descriptive of how the system as a whole should work, not the responsibilities from each component's view. This has already caused a number of issues and inconsistencies between implementations, and so a document like this is needed. Like with other "Hitchhikers Guide to the XXX protocol" documents this would be a prime candidate for an "evolving document" type solution - but in the absence of such a thing, having an RFC is much better than a draft... |
2020-03-25
|
06 | Warren Kumari | Ballot comment text updated for Warren Kumari |
2020-03-25
|
06 | Warren Kumari | Ballot has been issued |
2020-03-25
|
06 | Warren Kumari | [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari |
2020-03-25
|
06 | Warren Kumari | Created "Approve" ballot |
2020-03-25
|
06 | Warren Kumari | Ballot writeup was changed |
2020-03-23
|
06 | Niclas Comstedt | Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Niclas Comstedt. Sent review to list. |
2020-03-20
|
06 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2020-03-20
|
06 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-sidrops-rp-06, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-sidrops-rp-06, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2020-03-20
|
06 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2020-03-13
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2020-03-13
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2020-03-12
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Kathleen Moriarty |
2020-03-12
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Kathleen Moriarty |
2020-03-11
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Niclas Comstedt |
2020-03-11
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Niclas Comstedt |
2020-03-06
|
06 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2020-03-06
|
06 | Cindy Morgan | The following Last Call announcement was sent out (ends 2020-03-20): From: The IESG To: IETF-Announce CC: sidrops-chairs@ietf.org, nathalie@ripe.net, warren@kumari.net, sidrops@ietf.org, Nathalie … The following Last Call announcement was sent out (ends 2020-03-20): From: The IESG To: IETF-Announce CC: sidrops-chairs@ietf.org, nathalie@ripe.net, warren@kumari.net, sidrops@ietf.org, Nathalie Trenaman , draft-ietf-sidrops-rp@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties) to Informational RFC The IESG has received a request from the SIDR Operations WG (sidrops) to consider the following document: - 'Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2020-03-20. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document provides a single reference point for requirements for Relying Party (RP) software for use in the Resource Public Key Infrastructure (RPKI) in the context of securing Internet routing. It cites requirements that appear in several RPKI RFCs, making it easier for implementers to become aware of these requirements that are segmented with orthogonal functionalities. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sidrops-rp/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-sidrops-rp/ballot/ No IPR declarations have been submitted directly on this I-D. |
2020-03-06
|
06 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2020-03-06
|
06 | Warren Kumari | Last call was requested |
2020-03-06
|
06 | Warren Kumari | Last call announcement was generated |
2020-03-06
|
06 | Warren Kumari | Ballot approval text was generated |
2020-03-06
|
06 | Warren Kumari | Ballot writeup was generated |
2020-03-06
|
06 | Warren Kumari | IESG state changed to Last Call Requested from Publication Requested |
2020-02-27
|
06 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Informational. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document provides a single reference point for requirements for Relying Party (RP) software for use in the Resource Public Key Infrastructure (RPKI) in the context of securing Internet routing. It cites requirements that appear in several RPKI RFCs, making it easier for implementers to become aware of these requirements that are segmented with orthogonal functionalities. Working Group Summary: The document went through several revisions and review at WGLC to include comments/suggestions/changes. The conversation in the WG mail-list and meetings was productive and the chairs believe this document is ready to progress. Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Since the first version of the document, there has been support for this draft. The two points worth noting are the concern of the WG to keep the document current and the removal of normative language because of the type of draft (Informational). This has been addressed. Document Quality: The document is clear and concise. There are no nits nor is the document controversial. Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? Not applicable to this document. Personnel: Nathalie Trenaman (nathalie@ripe.net) is Document Shepherd Warren Kumari (warren@kumari.net) is Area Director (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and reviewed comments. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Not needed. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Consensus was solid. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No threats. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. I did not find any ID nits. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. Not required. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. Not expected. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). Reviewed, and no actions needed. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. Not needed. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? Not applicable. |
2020-02-27
|
06 | Chris Morrow | Responsible AD changed to Warren Kumari |
2020-02-27
|
06 | Chris Morrow | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2020-02-27
|
06 | Chris Morrow | IESG state changed to Publication Requested from I-D Exists |
2020-02-27
|
06 | Chris Morrow | IESG process started in state Publication Requested |
2020-02-05
|
06 | Nathalie Trenaman | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Informational. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document provides a single reference point for requirements for Relying Party (RP) software for use in the Resource Public Key Infrastructure (RPKI) in the context of securing Internet routing. It cites requirements that appear in several RPKI RFCs, making it easier for implementers to become aware of these requirements that are segmented with orthogonal functionalities. Working Group Summary: The document went through several revisions and review at WGLC to include comments/suggestions/changes. The conversation in the WG mail-list and meetings was productive and the chairs believe this document is ready to progress. Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Since the first version of the document, there has been support for this draft. The two points worth noting are the concern of the WG to keep the document current and the removal of normative language because of the type of draft (Informational). This has been addressed. Document Quality: The document is clear and concise. There are no nits nor is the document controversial. Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? Not applicable to this document. Personnel: Nathalie Trenaman (nathalie@ripe.net) is Document Shepherd Warren Kumari (warren@kumari.net) is Area Director (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and reviewed comments. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Not needed. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Consensus was solid. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No threats. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. I did not find any ID nits. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. Not required. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. Not expected. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). Reviewed, and no actions needed. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. Not needed. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? Not applicable. |
2020-01-30
|
06 | Nathalie Trenaman | Notification list changed to Nathalie Trenaman <nathalie@ripe.net> |
2020-01-30
|
06 | Nathalie Trenaman | Document shepherd changed to Nathalie Trenaman |
2020-01-30
|
06 | Nathalie Trenaman | IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document |
2020-01-30
|
06 | Nathalie Trenaman | Intended Status changed to Informational from None |
2019-10-07
|
06 | Di Ma | New version available: draft-ietf-sidrops-rp-06.txt |
2019-10-07
|
06 | (System) | New version approved |
2019-10-07
|
06 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Stephen Kent |
2019-10-07
|
06 | Di Ma | Uploaded new revision |
2019-04-17
|
05 | Di Ma | New version available: draft-ietf-sidrops-rp-05.txt |
2019-04-17
|
05 | (System) | New version approved |
2019-04-17
|
05 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Stephen Kent |
2019-04-17
|
05 | Di Ma | Uploaded new revision |
2019-04-17
|
04 | Di Ma | New version available: draft-ietf-sidrops-rp-04.txt |
2019-04-17
|
04 | (System) | New version approved |
2019-04-17
|
04 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Stephen Kent |
2019-04-17
|
04 | Di Ma | Uploaded new revision |
2019-01-28
|
03 | Di Ma | New version available: draft-ietf-sidrops-rp-03.txt |
2019-01-28
|
03 | (System) | New version approved |
2019-01-28
|
03 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Stephen Kent |
2019-01-28
|
03 | Di Ma | Uploaded new revision |
2018-08-20
|
02 | Di Ma | New version available: draft-ietf-sidrops-rp-02.txt |
2018-08-20
|
02 | (System) | New version approved |
2018-08-20
|
02 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Stephen Kent |
2018-08-20
|
02 | Di Ma | Uploaded new revision |
2018-02-22
|
01 | Di Ma | New version available: draft-ietf-sidrops-rp-01.txt |
2018-02-22
|
01 | (System) | New version approved |
2018-02-22
|
01 | (System) | Request for posting confirmation emailed to previous authors: Di Ma , Stephen Kent |
2018-02-22
|
01 | Di Ma | Uploaded new revision |
2017-11-14
|
00 | Chris Morrow | Added to session: IETF-100: sidrops Wed-1330 |
2017-11-12
|
00 | Chris Morrow | This document now replaces draft-madi-sidrops-rp instead of None |
2017-11-12
|
00 | Di Ma | New version available: draft-ietf-sidrops-rp-00.txt |
2017-11-12
|
00 | (System) | WG -00 approved |
2017-11-12
|
00 | Di Ma | Set submitter to "Di Ma ", replaces to draft-madi-sidrops-rp and sent approval email to group chairs: sidrops-chairs@ietf.org |
2017-11-12
|
00 | Di Ma | Uploaded new revision |