Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
RPKI Standards Activity Geoff Huston APNIC February 2010.
A Profile for Trust Anchor Material for the Resource Certificate PKI Geoff Huston SIDR WG IETF 74.
The Role of a Registry Certificate Authority Some Steps towards Improving the Resiliency of the Internet Routing System: The Role of a Registry Certificate.
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
Introduction to ARIN and the Internet Registry System.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
RPKI Certificate Policy Status Update Stephen Kent.
1 Overview of policy proposals Policy SIG Wednesday 26 August 2009 Beijing, China.
RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.
Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
Introduction to ARIN and the Internet Registry System.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
RPKI Validation - Revisited draft-huston-rpki-validation-01.txt Geoff Huston George Michaelson APNIC Slide 1/19.
RPKI Validation - Revisited draft-huston-rpki-validation-00.txt Geoff Huston George Michaelson APNIC.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Local TA Management In prior WG meetings I presented a model for local management of trust anchors for the RPKI In response to these presentations, a.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007.
Summary Report on Resource Certification February 2007 Geoff Huston Chief Scientist APNIC.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
Progress Report on resource certification February 2007 Geoff Huston Chief Scientist APNIC.
Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston.
The Resource Public Key Infrastructure Geoff Huston APNIC.
Global policy proposal for the allocation of IPv4 blocks to Regional Internet Registries prop-069-v002.
Status Update for Algorithm Transition for the RPKI (draft-ietf-sidr-algorithm-agility) Steve Kent Roque Gagliano Sean Turner.
A PKI for IP Address Space and AS Numbers Stephen Kent.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston Chief Scientist APNIC.
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
Using Resource Certificates Progress Report on the Trial of Resource Certification November 2006 Geoff Huston APNIC.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
1 Madison, Wisconsin 9 September14. 2 Security Overlays on Core Internet Protocols – DNSSEC and RPKI Mark Kosters ARIN Engineering.
Jimmy C. Tseng Assistant Professor of Electronic Commerce
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Manifests (and Destiny?) Stephen Kent BBN Technologies.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Overview of draft-ietf-sidr-roa-00.txt Steve Kent BBN Technologies.
RPKI Certificate Policy Status Update Stephen Kent.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
RPKI Certificate Policy Status Update Stephen Kent.
November 2006 Geoff Huston APNIC
RPKI Trust Anchor Geoff Huston APNIC.
APNIC Trial of Certification of IP Addresses and ASes
Introduction to ARIN and the Internet Registry System
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
Progress Report on Resource Certification
October 2006 Geoff Huston APNIC
ROA Content Proposal November 2006 Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
IPv6 distribution and policy update
Internet Number Resource Status Report Regional Internet Registries
Presentation transcript:

Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies

Basis of Changes We received feedback from –Geoff Huston –Randy Bush –Tim Christensen I also added text re IANA’s role as a trust anchor and co-administrator of the CP We know of a couple of additional required changes, and will issue a new version very soon I hope we can then proceed to WGLC

Reminder: What is the RPKI CP? There is exactly one CP for the whole RPKI All CA’s operating in the RPKI MUST include the OID for the CP in every (RPKI) certificate they issue Thus, all prospective RPKI CA’s (IANA, RIRs, NIRs, LIRs/ISPs) REALLY OUGHT to pay attention to this document, and provide feedback!

Global Changes Corrected definition of a "bogus" route to include unauthorized advertisement of an unallocated address (not just one that has been allocated) Changed text to allow the possibility of additional assigned objects (not just ROAs) Changed text from "distributing" PKI data to ”publishing PKI data in the RPKI distributed repository system” Added text to allow for other routing-related uses of the RPKI data (not just route filters)

Specific Changes (1/4) (Certification Authorities): Added IANA and rewrote this in attempt to clarify (Other Participants): Notes that every CA is responsible for populating the RPKI distributed repository system with its data, but that this function can be outsourced 1.5.1/2 (CP administration & contact info): says that the CP is co-administered by IANA and the RIRs (which act as default trust anchors for the RPKI) and provides contact info for each

Specific Changes (2/4) (Types of names): Added IANA to the list of CA’s whose name will be a directory distinguished name, and added NIRs to list of organizations whose names "consist of a single CN attribute with a value generated by the issuer.” 5.6 (Key changeover): Text now notes that a (CA) certificate issued to an ISP/LIR by an RIR/NIR might have a lifetime longer than the RIR/NIR’s (CA) certificate. This is because the ISP/LIR certificate typically will have a validity period that reflects the contractual relationship between the issuer and subject. 5.8 (CA or RA termination): Text now says that if an organization acting as a CA in the RPKI terminates operation without identifying a replacement, then the effective control of the IP addresses and AS numbers revert back to the issuing organization(s), and the terminated CA’s certificate will be revoked.

Specific Changes (3/4) (CA public key delivery to relying parties) -- Added IANA to list of entities whose public keys are distributed out of band (Certificate operational periods and key pair usage periods): Updated text to motivate two-tier TA structure for the RPKI However, one sentence needs to be changed, based on RIR feedback: “IANA holds all IP address and AS number space, i.e., all the resources which form the base of the RPKI hierarchy, Because a self-signed IANA certificate represents this base, it should have a very long life time.”

Two-tied Model Diagram Registry TA Certificate Registry TA CRL RPKI TA Certificate CMS Signed Object Registry EE Certificate Other CMS fields

RIR & IANA TA Pairs ARIN TA ARIN RPKI TA RIPE TA RIPE RPKI TA APNIC TA APNIC RPKI TA LACNIC TA LACNIC RPKI TA AfriNIC TA AfriNIC RPKI TA IANA TA IANA RPKI TA

Specific Changes (4/4) 9. (Other Business and Legal Matters): Almost all subsections are now "[OMITTED]" because there is no single set of responses that would cover every relevant organization in the RPKI, i.e., each organization will to specify this information in its CPS 9.12 (Amendments): still needs to be updated to reflect text in 1.5.1, i.e., listing RIRs and IANA as the co-administrators of the CP

Questions?