RPKI Validation - Revisited draft-huston-rpki-validation-00.txt Geoff Huston George Michaelson APNIC.

Slides:



Advertisements
Similar presentations
RPKI Standards Activity Geoff Huston APNIC February 2010.
Advertisements

A Profile for Trust Anchor Material for the Resource Certificate PKI Geoff Huston SIDR WG IETF 74.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 70.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
RPKI Certificate Policy Status Update Stephen Kent.
RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
CRL Processing Rules Santosh Chokhani November 2004.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
COEN 350 Public Key Infrastructure. PKI Task: Securely distribute public keys. Certificates. Repository for retrieving certificates. Method for revoking.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
RPKI Validation - Revisited draft-huston-rpki-validation-01.txt Geoff Huston George Michaelson APNIC Slide 1/19.
Public Key Management and X.509 Certificates
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Local TA Management In prior WG meetings I presented a model for local management of trust anchors for the RPKI In response to these presentations, a.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
MPKI Interoperability I-D ChangeLog from -01 to -02 Jan 16, 2004 Masaki SHIMAOKA SECOM Trust.net.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Resource Certification What it means for LIRs Alain P. AINA Special Project Manager.
Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston.
The Resource Public Key Infrastructure Geoff Huston APNIC.
Status Update for Algorithm Transition for the RPKI (draft-ietf-sidr-algorithm-agility) Steve Kent Roque Gagliano Sean Turner.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston Chief Scientist APNIC.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Symmetric Encryption Mom’sSecretApplePieRecipe Mom’sSecretApplePieRecipe The same key is used to encrypt and decrypt the data. DES is one example. Pie.
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Comments on draft-ietf-pkix-scvp-19.txt IETF Meeting Paris - August 2005 Denis Pinkas
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
3280bis David Cooper. Changes Since Draft 02 ● Section 1 (Introduction): Replaced text highlighting changes between RFC 2459 and 3280 with text highlighting.
Manifests (and Destiny?) Stephen Kent BBN Technologies.
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.
Resource Certificate Provisioning Protocol Geoff Huston IETF 70 December 2007.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
November 2006 Geoff Huston APNIC
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography and Network Security
RPKI Trust Anchor Geoff Huston APNIC.
APNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
Digital Certificates and X.509
Progress Report on Resource Certification
October 2006 Geoff Huston APNIC
ROA Content Proposal November 2006 Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Selecting Outcomes/Indicators and Impacts for Extension Programs in the 2007 ROA and 2008 Plan of Work Revisions to the menus for Outcomes and Impacts.
Presentation transcript:

RPKI Validation - Revisited draft-huston-rpki-validation-00.txt Geoff Huston George Michaelson APNIC

RPKI Validation RFC3779 defined validation recursively For a certificate to be “valid”: the certificate must satisfy a number of criteria, Syntax correctness, validity dates, etc and there must exist an ordered sequence of certificates (1..n) where: – Certificate 1 is issued by a trust anchor – Certificate x’s Subject Name value matches Certificate x+1’s Issuer Name value – Certificate ‘n’ is the certificate to be validated – Certificates 1 through n-1 are also “valid” according to this same criteria draft-huston-rpki-validation Slide 2/20

RPKI Validation RFC6487 referenced the validation criteria for the RFC3779 Number Resource extension: draft-huston-rpki-validation Slide 3/20

This is Valid Issuer: A Subject: B Resources: /24, AS64496-AS6500 Issuer: B Subject: C Resources: /25, AS64496-AS6500 Issuer: C Subject: D Resources: /25 Local Trust Anchor Certificate being Tested for validity draft-huston-rpki-validation Slide 4/20

This is not Valid Issuer: A Subject: B Resources: /24, AS64496-AS6500 Issuer: B Subject: C Resources: /25, AS64496-AS6511 Issuer: C Subject: D Resources: /25 Local Trust Anchor Certificate being Tested for validity draft-huston-rpki-validation Slide 5/20

Implications How to maintain validity of certified resources during a process of movement of resources between CA’s (registries) A B C D E /24 draft-huston-rpki-validation Slide 6/20

Implications How to maintain validity of certified resources during a process of movement of resources between CA’s (registries) A B C D E /24 1. Add /24 to a reissued certificate draft-huston-rpki-validation Slide 7/20

Implications How to maintain validity of certified resources during a process of movement of resources between CA’s (registries) A B C D E /24 1. Add /24 to a reissued certificate 2. Add /24 to a reissued certificate /24 draft-huston-rpki-validation Slide 8/20

Implications How to maintain validity of certified resources during a process of movement of resources between CA’s (registries) A B C D E 1. Add /24 to a reissued certificate 2. Add /24 to a reissued certificate 3. remove /24 from a reissued certificate /24 draft-huston-rpki-validation Slide 9/20

Implications How to maintain validity of certified resources during a process of movement of resources between CA’s (registries) A B C D E 1. Add /24 to a reissued certificate 2. Add /24 to a reissued certificate /24 4. remove /24 from a reissued certificate 3. remove /24 from a reissued certificate /24 draft-huston-rpki-validation Slide 10/20

Implications How to maintain validity of certified resources during a process of movement of resources between CA’s (registries) A B C D E 1. Add /24 to a reissued certificate 2. Add /24 to a reissued certificate 3. remove /24 from a reissued certificate /24 5. revoke the previously issued certificate 4. remove /24 from a reissued certificate draft-huston-rpki-validation Slide 11/20

Implications How to maintain validity of certified resources during a process of movement of resources between CA’s (registries) A B C D E 1. Add /24 to a reissued certificate 2. Add /24 to a reissued certificate 3. remove /24 from a reissued certificate /24 5. revoke the previously issued certificate 4. remove /24 from a reissued certificate 6. revoke the previously issued certificate draft-huston-rpki-validation Slide 12/20

Operational Synchronisation The “receiving side” uses a top down sequence of certificate re-issuance The “sending side” uses a bottom up sequence of certificate reissuance in order to avoid the side effect of unintended invalidity – But this requires careful synchronisation of issuance actions between CA’s draft-huston-rpki-validation Slide 13/20

An Alternative Validity Test Replace “Is this certificate valid?” with “Is this certificate valid for these resources?” i.e. add a specific set of resources to the validity question 6. The resources specified in the validity test are "encompassed" by the resource extension data contained in all certificates that form the validation path. draft-huston-rpki-validation Slide 14/20

This is Valid for /25 Issuer: A Subject: B Resources: /24, AS64496-AS6500 Issuer: B Subject: C Resources: /25, AS64496-AS6511 Issuer: C Subject: D Resources: /25 Local Trust Anchor Certificate being Tested for validity with the resource /25 draft-huston-rpki-validation Slide 15/20

What about Resource Movement? No synchronisation of CA actions is necessary – Each CA can re-issue augmented or reduced subordinate certificates without needing to synchronise their actions with other Cas draft-huston-rpki-validation Slide 16/20

What else changes? Not much! – A ROA is valid if the certificate used to sign the ROA is valid against the resources listed in the ROA – Similar refinements can be used in other cases of RPKI certificate use draft-huston-rpki-validation Slide 17/20

What about local cache operation? If you need to specify a resource to undertake a validity test for a certificate then what about local cache operation? How can you pre- determine “valid” certificates in the local cache? draft-huston-rpki-validation Slide 18/20

A revised Local Cache Management Approach Perform top-down local cache construction Add a data object to the local cache of each certificate – This object holds the intersection of the resources listed in the associated certificate and the resources in the data object associated with the “parent” certificate Use the resources in the associated data object instead of the resources listed in the certificate in all cases where “resources certified by this certificate” are used draft-huston-rpki-validation Slide 19/20

Where is this draft going? It may be useful Or it may not As of right now,its just an idea But we are interested to see if there are any flaws in our logic here. Have we missed something critical in contemplating this refinement to the RPKI validity process? This subtly different RPKI validation process could make the operational issues of CA coordination a lot easier, and thereby reduce some of the fragility in the operation of the RPKI and its potential application in secure routing. draft-huston-rpki-validation Slide 20/20