Local TA Management In prior WG meetings I presented a model for local management of trust anchors for the RPKI In response to these presentations, a.

Slides:



Advertisements
Similar presentations
LACNIC Policy Update Roque Gagliano LACNIC. Current Policies Proposals - LACNIC As a result of the Open Policy Forum at LACNIC XI four policy proposals.
Advertisements

A Profile for Trust Anchor Material for the Resource Certificate PKI Geoff Huston SIDR WG IETF 74.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 70.
Proposal-062: Use of Final /8 Jonny Martin, Philip Smith & Randy Bush Policy APNIC 26 28th August 2008 Christchurch, New Zealand.
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
Group-to-RP Mapping Algorithm PIM Working Group Bharat Joshi Infosys Technologies Ltd. draft-joshi-pim-group-rp-mapping-00.txt.
RPKI Certificate Policy Status Update Stephen Kent.
Optimistic Methods for Concurrency Control By : H.T. Kung & John T. Robinson Presenters: Munawer Saeed.
IPv4 Addresses. Internet Protocol: Which version? There are currently two versions of the Internet Protocol in use for the Internet IPv4 (IP Version 4)
1 Overview of policy proposals Policy SIG Wednesday 26 August 2009 Beijing, China.
RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
RPKI Validation - Revisited draft-huston-rpki-validation-01.txt Geoff Huston George Michaelson APNIC Slide 1/19.
RPKI Validation - Revisited draft-huston-rpki-validation-00.txt Geoff Huston George Michaelson APNIC.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
This material in not in your text (except as exercises) Sequence Comparisons –Problems in molecular biology involve finding the minimum number of edit.
Chapter 12 Trees. Copyright © 2005 Pearson Addison-Wesley. All rights reserved Chapter Objectives Define trees as data structures Define the terms.
The Resource Public Key Infrastructure Geoff Huston APNIC.
Status Update for Algorithm Transition for the RPKI (draft-ietf-sidr-algorithm-agility) Steve Kent Roque Gagliano Sean Turner.
Applicability Statement v1.1 Feedback: DirectTrust May 5, 2015.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
A Brief Taxonomy of Firewalls
IPv4 Addresses. Internet Protocol: Which version? There are currently two versions of the Internet Protocol in use for the Internet IPv4 (IP Version 4)
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Copyright © 2007 Japan Network Information Center Global Policy for the Allocation of the remaining IPv4 Address Space  Japan Network Information Center.
Array (continue).
31-04: Respond Offline to Planning Schedules Supply Chain Platform Training Presentation Updated April 2011.
1 SeGW Certificate profile (Revised) 3GPP2 TSG-S WG4 /TSG-X WG5 (PDS) S X xx Source: QUALCOMM Incorporated Contact(s): Anand.
6bone address registry proposal Bob Fink ESnet 17 July 2002 Yokohama.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
Using Resource Certificates Progress Report on the Trial of Resource Certification November 2006 Geoff Huston APNIC.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
SIP working group IETF#70 Essential corrections Keith Drage.
Computer Science Projects Internal Assessment. Mastery Item Claimed Justification Where Listed Random Access File – Searching Lines P. 53 Random.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Manifests (and Destiny?) Stephen Kent BBN Technologies.
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
APNIC 32 AMM Policy SIG Report Andy Linton Thursday 1 September 2011.
1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
LDAP for PKI Problems Cannot search for particular certificates or CRLs Cannot retrieve particular certificates or CRLs.
Advisory Council Shepherds: David Farmer & Chris Grundemann Global Policy for post exhaustion IPv4 allocation mechanisms by the IANA.
60 Draft Policy ARIN NRPM 4 (IPv4) Policy Cleanup.
Discovery of CRL Signer Certificate Stefan Santesson Microsoft.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
RPKI Certificate Policy Status Update Stephen Kent.
November 2006 Geoff Huston APNIC
Administrator Training
RPKI Trust Anchor Geoff Huston APNIC.
© 2002, Cisco Systems, Inc. All rights reserved.
APNIC Trial of Certification of IP Addresses and ASes
Dynamic Routing Protocols part2
IPv4 Addresses.
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
Progress Report on Resource Certification
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
News from APNIC ARIN XXII 16 October 2008.
BPSec: AD Review Comments and Responses
Presentation transcript:

Local TA Management In prior WG meetings I presented a model for local management of trust anchors for the RPKI In response to these presentations, a request was made to create a document that explains in detail how to implement this approach to local TA management This presentation describes the document that is being prepared We are soliciting feedback on the document, and seeking to make this a WG item 2

The Model: The RP is the TA! The model we propose calls for each RP to recognize exactly one TA, itself! The RP imports putative TAs (typically in the form of self-signed certificates) and re-homes them under itself The RP can thus override the RPKI nominal hierarchy, as represented in the repository system (paralleling the allocation hierarchy) 3

Making this Work in the RPKI We will need to be able to create new certificates, often with modified RFC 3779 extensions To make this work The self-signed RP certificate must contain RFC 3779 extensions encompassing all addresses and all ASNs The RP re-issues certificates with new 3779 extensions to override the RPKI tree Delete overlapping 3779 data as needed Re-homing targeted certificates under the RP TA Re-homing ancestors of re-parented certificates under the RP TA The RP can also override certain fields of the re-issued certificate using a “constraints file” 4

An RPKI TA Example 5 APNIC IANA Reserved addresses LACNIC Unallocated addresses ARINAFRINICRIPE

RPKI with Local Control 6 APNIC Reserved addresses LACNIC Unallocated addresses ARINAFRINICRIPEIANA (RP wants to make use of 10/8 for local routing)

A More Detailed Example 7 ARIN FOO BAR P-ARIN P-BAR As offered by ARINAs managed by an RP P-FOO (RP trusts its own knowledge of BAR’s address allocation and does not want any action by ARIN or FOO to override that knowledge)

Elements of the Solution Constraints file Resource re-writing algorithm Target processing Ancestor processing Tree processing TA re-homing Path discovery Revocation Expiration 8

Constraints File The RP creates a constraints file specifying IP address and AS# resources for target certificates Certificates are specified by SKI The constraints file also allows the RP to control rewriting certain fields in the re-issued certificates Validity dates CRLDP AIA Policy Qualifier OID

Resource Rewriting Algorithm There are four stages to the algorithm Target processing Certificates that match a given SKI have their resources rewritten to those specified in the constraints file Ancestor processing Ancestors of targets are processed to insure RFC3779 rule compliance Tree processing The entire tree of certificates is searched, and certificates with resources that conflict with any target resources are modified to remove the conflict TA re-homing All TAs in the original hierarchy are re-issued under the RP’s sole TA

Processing Order Dependencies? What happens if a certificate is processed by more than one stage of the algorithm? Can the resulting “para-certificate” be dependant on the order of the entries in the constraints file? An iterative sorting algorithm is applied to the constraint file entries to remove such dependencies There is an upper bound on the iteration count to ensure that the algorithm converges So long as the maximum path length is less than or equal to this upper bound, no order dependency can occur

Implications This algorithm creates two parallel hierarchies: the original certificate hierarchy and the para-certificate hierarchy There are implications for path discovery, since a certificate can now have an original parent and a para-parent There are implications for revocation There are also implications for expiration, since the constraints file allows rewriting the validity interval of para-certificates

Path Discovery Path discovery prefers the para-certificate hierarchy If a certificate has a para-parent, that para-parent will be used to form the certificate path If the certificate has only an original parent, but that parent was a target specified in the constraints file, or an ancestor of such a target, then path discovery fails This can occur if the RP has revoked the para-certificate, the original certificate is still present, and the Local TA tool has not yet been run to regenerate the para-certificate If the certificate has only an original parent, and the parent is not a target, or the ancestor of a target, path discovery can proceed up the original chain

Revocation The original hierarchy and the para-hierarchy are disjoint; revocation of a certificate in one does not affect the other Para-certificates are all issued by the RP, so only the RP can revoke them Original certificates can still be revoked by their issuers Because of the modified path discovery rule, revocation of any para-certificate will cause path discovery to fail until the para-certificate has been replaced or regenerated

Expiration The constraints file allows the RP to specify notBefore and notAfter for all para-certificates This is a global rewrite rule, not a per-certificate rewrite rule As a result, expiration of the original certificate does not necessarily imply that the corresponding para- certificate expires at the same time Expiration of a para-certificate affects path discovery in the same way as revocation of a para-certificate If an original certificate was encompassed by the constraint file rules, and the para-certificate is not present, the original certificate cannot be used to form a path

Questions? 16