RPKI Certificate Policy Status Update Stephen Kent.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
RPKI Standards Activity Geoff Huston APNIC February 2010.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
2 3 Global Foundation Services Security Global Delivery Sustainability Infrastructure.
Nigel Titley. RIPE 54, 9 May 2007, Tallinn, Estonia. 1 RIPE NCC Certification Task Force Update Presented by Nigel Titley RIPE NCC.
Classic X.509 secured profile version 4.2 Proposed Changes David Groep, Apr 20 th, 2009.
APNIC Member Services George Kuo. MyAPNIC 2 What is MyAPNIC A secure Member services website Internet resources management, for example: –Whois updates.
RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Local TA Management In prior WG meetings I presented a model for local management of trust anchors for the RPKI In response to these presentations, a.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Status Update for Algorithm Transition for the RPKI (draft-ietf-sidr-algorithm-agility) Steve Kent Roque Gagliano Sean Turner.
A PKI for IP Address Space and AS Numbers Stephen Kent.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
Policy Implementation and Experience Report Leslie Nobile.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
RPKI Tutorial Andy Newton Chief Engineer, ARIN. Agenda Resource Public Key Infrastructure(RPKI) Route Origin Authorizations (ROAs) Certificate Authorities.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
ARIN Update RIPE 66 Leslie Nobile Director, Registration Services.
Manifests (and Destiny?) Stephen Kent BBN Technologies.
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Wed 24 Mar 2010SIDR IETF 77 Anaheim, CA1 SIDR Working Group IETF 77 Anaheim, CA Wednesday, Mar 24, 2010.
Draft-ietf-sidr-roa-format draft-ietf-sidr-arch Matt Lepinski BBN Technologies.
Comments on draft-ietf-pkix-rfc3280bis-01.txt IETF PKIX Meeting Paris - August 2005 Denis Pinkas
RPKI Certificate Policy Status Update Stephen Kent.
Advisory Council Shepherds: David Farmer & Chris Grundemann Global Policy for post exhaustion IPv4 allocation mechanisms by the IANA.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
HellasGrid CA self Audit. In general We do operations well Our policy documents need work (mostly to make the text clearer in a few sections) 2.
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
RPKI Certificate Policy Status Update Stephen Kent.
TAG Presentation 18th May 2004 Paul Butler
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
APNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
Digital Certificates and X.509
ROA Content Proposal November 2006 Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Presentation transcript:

RPKI Certificate Policy Status Update Stephen Kent

2 Change Process We provided the MS Word master copy to Andrei Robachevsky (RIPE), who coordinated changes with all the RIRs and returned the change-tracked version to us Changes fall into a few categories l Changed terminology globally (see next slide) l Removed references to routing security l Referred to CPS for more topics l Better alignment with RIR policies l Removed references to trust anchors, LIRs, NRO l Algorithm specifications The the document did not become shorter

3 Changes to Terminology/Definitions allocate and assign distribute IP address(es) and AS number(s) Internet Number Resource(s) (INR) subscriber network subscriber uploading to repositories publishing via repositories certificate holder subscriber Defined INR Defined RPKI signed objects

4 Briefer, More General Text Removed description of RPKI infrastructure Removed references to specific uses of the RPKI, e.g., routing security, resource transfers Changed text about ROAs to be about RPKI signed objects Replaced details of applying for a certificate (4.1.1) with pointer to CPS Replaced some of the details of circumstances for revocation (4.9.1) with pointer to CPS Replaced some of the details for CA/RA termination (5.8) with pointer to CPS

5 Alignment with RIR Ops/Policies Removed mention of RIRs as trust anchors Removed mention of LIRs Deleted the expansion/definition of RIR names Deleted definition of NRO (1.7) Changed CP approval procedures to be made by the organizations administering the CP

6 Other Changes (1/2) 2.4. Access controls on repositories -- "Each CA shall implement access controls to prevent unauthorized persons from adding, modifying or deleting repository entries. A CA shall not intentionally use technical means of limiting read access to its CPS, certificates, CRLs or RPKI signed objects Relying party public key and certificate usage -- reworked section to provide more detail on the responsibilities of the relying party Circumstance for certificate renewal -- clarified that "Prior to the expiration of an existing subscriber's certificate, it is the responsibility of the subscriber to renew the certificate to maintain continuity of certificate usage.

7 Other Changes (2/2) 5.6. Key changeover -- Focused on requirement to acquire new certificate well before scheduled change of the current key pair. Deleted details re: validity period vs contractual period Public key delivery to certificate issuer -- When a public key is transferred to the issuing CA to be certified, it shall be delivered through a mechanism ensuring that the public key has not been altered during transit and that the subscriber possesses the private key corresponding to the transferred public key Key sizes -- rewritten to specify algorithm/hash, need to accommodate transition to a different algorithm/hash, and key sizes.

8 Remaining Issues CP approval procedures -- Should there be mention of where the CP and amendments can be found? Non-verified subscriber information – No non- verified subscriber data is included in certificates issued under this certificate policy. but what about SIA? Who can request revocation -- "The subscriber or issuer may request a revocation. Should there be reference to regional policies and CPS/business agreements (SSA)? CA public key delivery to relying parties -- "The relying parties need to know who the TAs are and how are Key sizes -- Where should algorithm specs reside – certificate profile, CP, or a third document?

9 Questions?