+ All Categories
Home > Documents > A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI...

A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI...

Date post: 16-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
10
A Profile for Trust Anchor Material for the Resource Cer6ficate PKI Geoff Huston SIDR WG IETF 74
Transcript
Page 1: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

AProfileforTrustAnchorMaterialfortheResourceCer6ficatePKI

GeoffHustonSIDRWG

IETF74

Page 2: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

Background

•  ThishasbeenthetopicofWGdiscussion– whoshouldbeputa6veTAfortheRPKI– howshouldTAmaterialbepublished

•  Focusthediscussionbycrea6ngadocumenttoaddressTrustAnchorsfortheRPKI– Removedsec6on6.3fromResCertprofiledraP– CreatedanewdraPwiththismaterial– draP‐ieR‐sidr‐ta‐00.txt

Page 3: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

Who?

•  DraPissilentonprescribingrolesforbodies: “This document does not nominate any organizations as default trust anchors for the RPKI.”

•  Reasonsforthisposi6on:–  ThistaskfallsoutsideofIETFWGdirec6onrela6ngtoconven6onalprotocolparameterregistryfunc6ons

–  Thestandardtechnologyspecifica6onshouldencompassuseinabroadspectrumofcontextsincludingvariousformsofprivateuseaswellaspublic

•  However,thedocumentdoesobservethat: “for most RPs, the IANA is in a unique role as the default TA for representing public address space and public AS numbers.”

Page 4: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

How?

•  NochangefrompreviousTAspecifica6onindraP‐ieR‐sidr‐res‐certs–  (asidefromsometerminologyclarifica6ons)

•  Two‐TierModelofTrustAnchor– Allowsforvaria6oninresourcesheldatthe“root”whilekeepingthetrustanchormaterialconstant

– Canbeusedinavarietyofcontexts,bothpublicandprivate

– AlignswiththeTAworkinPKIXWG(draP‐ieR‐pkix‐ta‐format‐01)

Page 5: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

Signed:ETA

1.ExternalTrustAnchorCer6ficate‐ETA

Page 6: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

Signed:ETA

Signed:ETA

2.Cer6ficateRevoca6onListforETA

Page 7: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

Signed:ETA

Signed:ETA

Signed:ETA

3.ETAEECer6ficate(forCMSObjectVerifica6on)

Page 8: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

Signed:ETA

Signed:ETA

Signed:ETA

Signed:RPKITA

4.RPKITACer6ficate

Page 9: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

CMSPayload

CMSHeader

Signed:ETA

Signed:ETA

Signed:ETA

Signed:RPKITA

Signed:ETAEE

5.CMSpackagingoftheRPKITACer6ficate

Page 10: A Profile for Trust Anchor Material for the Resource ...– who should be putave TA for the RPKI – how should TA material be published • Focus the discussion by creang a document

CMSPayload

CMSHeader

Signed:ETA

Signed:ETA

Signed:ETA

Signed:RPKITA

Signed:ETAEE


Recommended