Wellllll.

The mail archive does not seem to show attachments.  For me. I see do see 
attachments on other messages.

It would be nice to know if anyone has seen attachments on my messages in the 
last few weeks.

At any rate, for the mail archive, the comments are copied below the signature.

—Sandy


Points that might get lost in the long detailed list that follows:

1.  RFC4271 (and RFC6286) and RFC8209 use the term “BGP Identifier”.  The main 
text says RouterID and the Appendix B says “serial number”.  I believe both are 
talking about what RFC8209 calls the “BGP Identifier”.  Most of the tech sites 
say router ID or router-id or routerid or RID or some such.  But I think 
consistency with the referenced text would be good.

2.  I was initially confused by the text in various places that talks about the 
operator adding the AS and RouterID (sic) and sends to the CA.  I thought that 
meant the operator adds those to the CSR, which would be hard since the CSR is 
signed.  This occurs a couple of places.  I suggest a sentence early on that 
says the router certificate includes the AS and router identifier but the CSR 
does not include such fields, so the operator must include the AS and routerID 
when it sends the CSR to the CA.

3.  “corresponds” - there are several places that say the certificate must be 
validated to prove that the public key corresponds with the private key.  The 
main body does not say how that correspondence is validated.  The appendix 
suggests that the operator could validate the signature on the CSR with the 
returned router cert in order to validate the key.  (a) When the operator 
generated the public/private key pair, why not just do a comparison to the 
generated public key, presuming it was retained?  (b) When the operator passed 
the CSR generated by the router to the CA, why not validate the public key 
before sending it to the CA?  The public key in the returned router certificate 
could subsequently be validated by a comparison, presuming the public key was 
retained.  (c) When the router is supposed to validate the public key of the 
router cert it receives, and the operator generated the public/private key 
pair, it does not have a copy of the CSR to validate the correspondence.  Took 
me a bit to realize the router could sign just any old bit of bytes and then 
validate the signature with the received router cert.  Right?

4.  “corresponds” again - there’s no mention of a router verifying that the 
router cert it receives has an AS that is configured on the router.  There are 
lots of other checks and double checks - why not this one?  And if the router 
has multiple ASs and multiple CSRs have been generated (either by the router or 
by the operator), then the router uses the received router certificate to 
associate the AS with the public/private key pair, so it knows which private 
key to use over which session.  Right?

5.  Section 8 on “Advanced Deployment Scenarios” talks about routers that 
already have pre-installed keys (with mentions of types of crypto that are not 
known to me, and I did not dig up the refs, so I might be missing something 
here).  The first paragraph talks about “pre-installed key material”.  I could 
understand why these pre-installed keys might be useful in authenticating the 
router directly to the CA.  The “burdens” 1 and 2 also talk abut “key 
material”.  It did not look to me like the “key material” in 1 and 2 are 
talking about these “pre-installed” keys.  But I admit to being very confused 
by the way the term is used.

6.  Section 5.2.1 is titled ”Using PKCS#8 to Transfer Public Key”.  The text 
talks about using PKCS #8 in RFC5958, which allows for including both the 
public and private key.  But the text of that section is talking about using 
PKCS #8 to transmit the private key to the router.  I presume the title should 
be Using PKCS#8 to Transfer Private Key

7.  There is an early assumption that all the communication between the 
operator and the router is over a protected channel.  Section 5.2.1 suggests 
using a CMS SignedData to transmit the PKCS#8.  RFC5958 suggests several 
different “CMS protecting content types” for the PKCS#8 - EncryptedData, 
EnvelopedData, etc.  I presume that the encrypted versions are not used here 
because the protected channel ensures confidentiality.  So (a) Appendix A talks 
about the key strength to be used for the different crypto algorithms 
(encryption, key exchange, …).  That’s a big hint that the channel should 
provide the related security protections.  I think it would be good to 
explicitly state the protections the protected channel must provide: “The 
protected channel must provide confidentiality, authentication, integrity and 
replay protection”.  (b) if the protected channel provides authentication and 
integrity, why is the protection of the CMS SignedData needed?  One possible 
reason follows -> (c) The AS EE certificate has an AS extension, not an IP 
extension, I presume.  So the AS EE certificate would be a second way for the 
router to associate a private key with an AS and an appropriate BGP session 
(see my comment 3c above).  But this applies only when the operator generated 
the public/private key pair.

8.  PKCS#7 needs a reference.  I looked at RFC2315.  RFC2315 defines several 
types of content, e.g., signed-data, enveloped-data, signed-and-enveloped-data, 
etc.  Is there any reason to specify which type?  Is it operator choice?

9.  The term “operator” is used to talk about carbon-based units (who are 
forgetful), ISP organizations (who peer with other operators), ASs (who have an 
AS EE certificates) and management system stations (that receive CSRs from the 
router).  It was a bit unsettling, but after multiple reads through I’m getting 
used to it.  I’m not sure I could suggest a term that would fit all those uses. 
 Perhaps network operators (the ones with DNA) identify personally with all 
those uses and think of their person in all cases.  “I am the AS”, “I am the 
peering entity”, “I am the management of the network”, etc.

10.  I do not understand the last two paragraphs of section 7 at the bottom of 
page 6.  It sounds to me like they are out of place, like they belong elsewhere 
in the text.

11.  There are some occurrences of “must” and only a few of “MUST” - the draft 
is standards track, so how much of the described behaviors are mandatory?

12. Some consistency nits - PKCS sometimes followed by a space, sometimes not.  
protected channel, secure channel, communications channel, protected session, 
SSH session, . . .  

========================================

OK, so on to the detailed comments, sequentially through the document

p3, section 1:

   two methods to provision new and existing routers.  The methods
   described involve the operator configuring the two end points and
   acting as the intermediary.

What are the two endpoints?  The router and the management station?  The router 
and the CA?  I can imagine the operator configuring the management station, but 
not the CA.  I can imagine the operator acting as the intermediary between the 
router and the CA, but not between the router and the management station.

p3, section 1: (nit)

                                                   [RFC8208]
   specifies the algorithms used to generate the signature.

If I read correctly, “the” signature in this text would be the signature on the 
PKCS#10.  

suggest:

                                                  [RFC8208]
   specifies the algorithms used to generate the PKCS#10 signature.


p4, section 2

                           See Appendix A for security considerations
   for this channel.

I think it is important to say what security protection are required for this 
protected channel.
Appendix A talks about the strength of the key used in the various crypto 
algorithms.  I think a
sentence something like the following would be useful here or in Appendix A.

“The protected channel must provide confidentiality, authentication, integrity” 
and replay protection.”

p4, section 4 (nit)

   appropriate RPKI Trust Anchor' Certificate (TA Cert) in the router.

suggest:

   appropriate RPKI Trust Anchor Certificate (TA Cert) in the router.
or
   appropriate RPKI Trust Anchor’s Certificate (TA Cert) in the router.

p4, section 4

   The operator also configures the Autonomous System (AS) number to be
   used in the generated router certificate.  This may be the sole AS
   configured on the router, or an operator choice if the router is
   configured with multiple ASs.

There’s a hint here that the operator configures the router to generate just 
one router certificate.
RFC8209 allows the router certificate to have one or more ASs, but recommends 
that there be multiple router certificates with one AS each.  Does this 
paragraph intend to limit a router to one router certificate or just to limit 
the router to one AS per router certificate?  I have questions later about what 
happens if the router wants a router certificate for each of multiple ASs.

Perhaps “A router with multiple ASs can be configured with multiple router 
certificates”, maybe also “by following the process of this document for reach 
desired certificate”.

   The operator configures or extracts from the router the BGP RouterID

RFC4271 and RFC8209 say “BGP Identifier”.  OSPF uses RouterID, and lots of C/J 
commands use RouterID, or router-id, or router id, or RID, or . . .  But 
consistency with the referenced specs would a good thing.

p4, section 5

I think it would be great to add a sentence here explaining that the PKCS#10 
(CSR) format does not include the AS and RouterID (sic).  Therefore, the 
operator must transmit the AS and RouterID (sic) as well when it sends the CSR 
to the CA.  

That sentence applies to both the router generated keys and the operator 
generated keys, so maybe it could go here.

The PKCS#10 format does not include the AS and RouterID for the router 
certificate.  Therefore, the operator must include the AS it has chosen for the 
router and the RouterID when it sends the CSR to the RPKI CA.

That should be a MUST, shouldn’t it?

p5, section 5.1

   The operator adds the chosen AS number and the RouterID to send to
   the RPKI CA for the CA to certify.

My first reading was that the text meant the AS and RouterID were added to the 
CSR.  First, that’s not possible because of the signature, unless there’s some 
key sharing going on.  Second, that’s not possible because the CSR format does 
not include the AS and RouterID.  Hence my comment above.

suggest:

   The operator includes the chosen AS number and the RouterID when it sends 
the CSR to

p4, section 5.1 (nit)

   NOTE: If a router was to communicate directly with a CA to have the

suggest:

   NOTE: If a router were to communicate directly with a CA to have the

p5, section 5.2

   and adds the chosen AS number and RouterID to be sent to the RPKI CA
   for the CA to certify.

suggest:

   and includes the chosen AS number and the RouterID when it sends the CSR to 
the RPKI CA
   for the CA to certify.

p5, section 5.2.1

section title “Using PKCS#8 to Transfer Public Key”

PKCS#8 in RFC5958 can transfer public keys.  But the following text is talking 
about transferring the private key to the router.  

I think this title should be “Using PKCS#8 to Transfer Private Key”


   A private key encapsulated in a PKCS #8 [RFC5958] should be further
   encapsulated in Cryptographic Message Syntax (CMS) SignedData
   [RFC5652] and signed with the AS's End Entity (EE) private key.

Would “A private key encapsulated in a PKCS #8” be followed by "OTOH, a private 
key that is not encapsulated in a PKCS#8”?  :-)

Suggest:

   A private key can be encapsulated in a PKCS #8 [RFC5958] and should be 
further
    (or “is” encapsulated or “should be” encapsulated) 

Section 3 suggests various ways to “exchange PKI-related information with 
routers”.  Is this PKCS#8 just one more way, or is it the recommended way?  The 
intro to section 5 suggests that copy and paste could also be used, but doesn’t 
say if that would be copy and paste of the PKCS#8.  If Section 5 is also 
talking about straight copy and paste of the hex or the PEM block, then that’s 
another alternative.

RFC5958 discusses several “CMS protecting content types” to protect the 
AsymmetricKeyPackage.  I presume that the encryption/enveloping content types 
are not needed because confidentiality is being provided by the protected 
channel.  But then why use the CMS SignedData - would not the protected channel 
provide the authentication and integrity needed?  (But see potential reason 
below)


   [RFC5652] and signed with the AS's End Entity (EE) private key.

Does it matter which AS’s EE cert the operator uses to sign the PKCS#8?  I 
presume that the AS must match an AS with which the router is configured.  
Should the router check that?  Does a router that is configured with multiple 
ASs use this communication to tie the private key to the appropriate AS & 
BGPsec session?  

If the answer is yes to both questions, should those actions be mentioned here?

 (I admit to being a bit dizzy here, but maybe the mapping of private key to AS 
happens in the receipt of the router certificate.)  

   include in the SignedData the RPKI CA certificate and relevant AS's
   EE certificate(s).  

Maybe this is the reason for using the SignedData - to be able to include the 
AS’s EE cert and give the router the means to tie the private key to the right 
AS.

   The router SHOULD verify the signature of the encapsulated PKCS#8 to
   ensure the returned private key did in fact come from the operator,

Then shouldn’t it be signed with the operator’s personal cert?  :-)  

   include in the SignedData the RPKI CA certificate and relevant AS's
   EE certificate(s).

Elsewhere (sections 6 & 7) it mentions including the entire cert chain.  Should 
that be mentioned here as well?

p5, section 6 (nit)

   The operator uses RPKI management tools to communicate with the
   global RPKI system to have the appropriate CA validate the PKCS#10
   request, sign the key in the PKCS#10 (i.e., certify it) and generated
   PKCS#7 response, as well as publishing the certificate in the Global
   RPKI.

for symmetry, suggest:

   The operator uses RPKI management tools to communicate with the
   global RPKI system to have the appropriate CA validate the PKCS#10
   request, sign the key in the PKCS#10 (i.e., certify it) and generate a
   PKCS#7 response, as well as publish the certificate in the Global
   RPKI.

p5, section 6 

          External network connectivity may be needed if the certificate
   is to be published in the Global RPKI.

The previous sentence and the following paragraph do not hint that there is any 
“if” about the publication of the certificate.  Is there a case where the 
certificate is NOT “to be published in the Global RPKI”?

p6, section 6 (nit)

   2.  Returns the certificate to the operator's management station,
       packaged in a PKCS#7

Needs a reference.  RFC2315?

   In the operator-generated method, the operator SHOULD extract the
   certificate from the PKCS#7, and verify that the private key it holds
   corresponds to the returned public key.

“it” means the operator, right?

You get to Appendix B before the verification of the correspondence is 
explained.  I think it should be explained here.

The Appendix B says the operator should verify the signature on the PKCS#10 CSR 
to verify the correspondence.  But the operator generated the key - can’t the 
correspondence be verified by checking the certificate’s public key against the 
operator generated public key (presuming the key was retained)?  That seems too 
easy - I fear I am missing some important part here.

p6, section 7

   The router SHOULD extract the certificate from the PKCS#7 and verify
   that the public key corresponds to the stored private key. 

I think more needs to be said about how the correspondence would be verified. 

Appendix B says the operator should verify the signature on the PKCS#10 with 
the certificate to verify the correspondence to the private key.  That would 
work for the router as well if the router generated the PKCS#10, but not if the 
operator generated the key pair and the PKCS#10.  But the router could sign any 
random bunch of bits and verify the signature with the certificate to verify 
the correspondence.  Should those things be said?

Also, in the router-driven method, the router can verify the correspondence 
simply by matching the certificate’s public key with one of the router’s stored 
public keys.  (Right?  What am I missing here?)

Should the router also verify that the AS mentioned in the returned router 
certificate is an AS with which it is configured?

For a router that is configured with multiple ASs, is this where the router 
ties the private key to the AS & BGPsec session with which the private key 
should be used?

The last two paragraphs of section 7 confuse me.

   Even if the operator cannot extract the private key from the router,
   this signature still provides a linkage between a private key and a
   router.  That is the operator can verify the proof of possession
   (POP), as required by [RFC6484].

What is “this signature”?  And there’s been no mention in this section of 
extracting the private key from the router.

This sounds to me like it belongs in section 5.1, maybe after: 
                                                               “to sign
   the PKCS#10 with the private key.  Once generated, the PKCS#10 is
   returned to the operator over the protected channel.

And then:

   NOTE: The signature on the PKCS#8 and Certificate need not be made by
   the same entity.  Signing the PKCS#8, permits more advanced
   configurations where the entity that generates the keys is not the
   direct CA.

Maybe this belongs in section 5.2.1 where it is talking about the PKCS#8?

Even so, I’m not sure what Certificate this text references.  The AS EE cert?

Both the router-driven method and the operator-driven method are not the direct 
CA.  Nowhere in this draft does it mention the CA generating the keys.  So the 
entire draft is one of these “advanced configurations”.  What am I missing here?

p7, section 8 (nit)

   Transport" [RFC7030] or the original CMC transport protocol's

Is the possessive really needed here?  I didn’t peruse the RFC5273 thoroughly, 
but I can see that it defines a number of transport methods, so maybe there is 
a “CMC transport protocol’s X” missing here.

p7, section 8


This section uses “key material” several places.  But I’m not certain each use 
is talking about the same key material.

                When the operator first establishes a secure
   communication channel between the management system and the router,
   this pre-installed key material is used to authenticate the router.

So the router gets keys as part of the manufacturing, where the “pre-installed 
key material” can be used in communication with the operator.

I can see that this might make it easier for the router to communicate directly 
with the CA and authenticate itself using these keys.  But section 5.1 notes 
that the CA has no way to authenticate the router.  I don’t know that the 
pre-installed key material could provide that way to authenticate the router, 
without the participation of the operator at some point.

   The operator burden shifts here to include:

I’m not sure how to read this.  Maybe “The operator burdens that shift here 
can/will include”.

I’m also not sure if both 1 and 2 are presumed to be shifted/lifted, or if it 
is either.


   1.  Securely communicating the router's authentication material to
       the CA prior to operator initiating the router's CSR.  CAs use
       authentication material to determine whether the router is
       eligible to receive a certificate. Authentication material at a
       minimum includes the router's AS number and RouterID as well as
       the router's key material, but can also include additional
       information. Authentication material can be communicated to the
       CA (i.e., CSRs signed by this key material are issued
       certificates with this AS and RouterID) or to the router (i.e.,
       the operator uses the vendor-supplied management interface to
       include the AS number and routerID in the router-generated CSR).

Who is doing the communicating in “securely communicating to the CA” and “can 
be communicated to the CA”?  In the following paragraph, the text says “the 
router is communicating directly with the CA” - is the communication in this 
part 1 text going from the router to the CA?

What is the “router’s key material”?  I could read it both ways:

The paragraph above says that the pre-installed key material is used to 
authenticate the router, so maybe the “router’s key material” is the 
pre-installed key material.  The text says that the CA “uses” the 
authentication material, which includes the router’s key material, to determine 
whether to issue the certificate.  I don’t know how the pre-installed key 
material could assure the CA that the router could be issued a cert, without 
some coordination with the operator about that particular key material.

Then the text says “CSRs signed by this key material” which implies that the 
“router’s key material” is the public/private key pair.

So I’m not certain what is going on here, or how the pre-installed key material 
is helping.


   Once configured, the operator can begin the process of enrolling the
   router.  

What does “once configured” mean?  configuring the router-operator protected 
channel?  Doing the communication of authentication material in 1 and 2 above?  
Configuring the router with AS and RouterID?

            Because the router is communicating directly with the CA,
   there is no need for the operator to retrieve the PKCS#10 from the
   router or return the PKCS#7 to the router as in Section 6.    Note that
   the checks performed by the router,

Section 5 says the router returns the PKCS#10 to the operator.
Section 7 says the operator sends the PKCS#7 to the router and the router 
performs checks.

suggest:

            Because the router is communicating directly with the CA,
   there is no need for the operator to retrieve the PKCS#10 from the
   router as in Section 5 or return the PKCS#7 to the router as in Section 7.  
Note that
   the checks performed by the router in Section 7,

   When a router is so configured the communication with the CA SHOULD
   be automatically re-established

what does “so configured” mean here?  configured with pre-installed key 
material?  configured by the operator with AS and RouterID?

p8, section 9.1 (nit)

just for symmetry:

   4.  Use some other kind of automated process to search for and track

suggest:

   4.  The operator uses some other kind of automated process to search for and 
track

p8, section 9.1

   Regardless of the technique used to track router certificate expiry
   times, it is advisable to notify additional operators in the same
   organization

“notify additional operators” — In addition to what? or after what?

I think you mean “multiple” operators, or I misunderstand.

p9, section 9.3  (nits)

   certificate to the router), and distributing the status takes time

Not sure what you mean by “status” that needs to be distributed.  Are you 
talking about distributing the revocation “status” in the CRL?

   Keeping the router operational and BGPsec-speaking is the ideal goal,
   but if operational practices do not allow this then reconfiguring the
   router to disabling BGPsec is likely preferred to bringing the router
   offline.

suggest:

  router to disable BGPsec is likely preferred to bringing the router

p10, section 9.4

   To allow operators to quickly replace routers without requiring
   update and distribution of the corresponding public keys in the RPKI,
   routers SHOULD allow the private BGPsec key to inserted via a
   protected session, e.g., SSH, NetConf (see [RFC6470]), SNMP.  This
   lets the operator escrow the old private key via the mechanism used
   for operator-generated keys, see Section 5.2, such that it can be re-
   inserted into a replacement router.

The topic here is routers that won’t allow off-loading of their keys.  

“routers SHOULD allow the private BGPsec key to inserted”

is the router that is doing the allowing the old, soon to be replaced routers, 
or the newly installed routers?

“to <be> inserted” - where? - in the newly installed router or in the 
management station?

“This lets the operator escrow the old private key” - sounds like the old 
router is allowing the private key to be “inserted in” (exported to?) the 
management station.  Right?

Is there a suggestion of how to get the routers to allow export of the key, 
which is currently not allowed?

I don’t see that section 5.2 says anything about a mechanism for escrowing 
keys.  It talks about installing a private key into a router over the protected 
channel.  If the citation to 5.2 is about the “such that it can be re-inserted” 
part of the sentence, then I get it.  But the citation should move  to the end 
of the sentence.

p10, section 10 (nit)

                                                         After
   familiarizing one's self with the capabilities of the router,
   operators are encouraged

suggest:

                                                         After
   familiarizing themselves with the capabilities of the router,
   operators are encouraged


or

                                                         After
   familiarizing one's self with the capabilities of the router,
   an operator is encouraged

p11, section 10 (nit)

                           employees that no longer need access to
   routers SHOULD be removed the router 

suggest

                           employees that no longer need access to
   a router SHOULD be removed from the router 

or

                          employees that no longer need access to
   a router SHOULD be removed from the router access [list]

p11, section 10 (nit)

                                                                The
   operator MUST ensure that installed CA certificate is valid.

suggest:

                                                                The
   operator MUST ensure that the installed CA certificate is valid.

p14, section Appendix A

   x509v3-ecdsa-sha2-nistp256 [RFC6187] could be used for
   authentication.

is that an example, or a recommendation?

p15, section Appendix B (nit)

   that will generate the key pair for the algorithms noted in the main
   body of this document;

the algorithms are not noted in the main body, but the end of section 1 does 
cite RFC8208.  

   the private key just generated to sign the certification request with
   the algorithms specified in the main body of this document;

the algorithms are not specified in the main body, but the end of section 1 
does cite RFC8208.

p16, Appendix B

Uses of “serial number”:

   the subject name and serial number for the router.  The CA needs this
and
   CSR you sent; the certificate will include the subject name, serial
   number, public key, and other fields
and
   Create CSR and sign CSR with private key, and; o Step 3: Send CSR
   file with the subject name and serial number to CA.

The first of these seem to mean the BGP Identifier aka RouterID.  As said 
before, RFC4271 and RFC8209 use the term BGP Identifier.

The second and third use of “serial number” probably also mean BGP Identifier 
aka RouterID (not the issued cert’s serial number).
 
p17, section Appendix B (typo nit)

   way through GPsec-enabling the router.

suggest:

   way through BGPsec-enabling the router.

p17, section Appendix B

                      To avoid having routers with expired certificates
   follow the recommendations in the Certification Policy (CP) [RFC6484]

you could also mention section 9.1.





> On Nov 14, 2017, at 10:36 AM, Sandra Murphy <sa...@tislabs.com> wrote:
> 
> 
> 
> Sorry, the reply did not pick up the original attachment.
> 
> Attached here.
> 
> Let me know if there are problems reading the comments.
> 
> —Sandy
> 
> <draft-ietf-sidr-rtr-keying-14.mycomments.rtf>
> 
>> On Nov 14, 2017, at 10:33 AM, Sandra Murphy <sa...@tislabs.com> wrote:
>> 
>> Speaking as wg co-chair
>> 
>> Please, wg, do take a look at the comments attached.  This draft was 
>> requested by the operators and is important.
>> 
>> Some of the comments are about substance.  Those at the very least must be 
>> considered by the wg.
>> 
>> Please take advantage of focused attention and close proximity at the IETF 
>> meeting to discuss.  
>> 
>> I unfortunately can not be there to button hole people and shove printouts 
>> into their hands.
>> 
>> —Sandy, speaking as wg co-chair
>> 
>>> On Nov 5, 2017, at 9:25 PM, Sandra Murphy <sa...@tislabs.com> wrote:
>>> 
>>> I’m attaching some comments and questions I found in the -14 version.
>>> 
>>> —Sandy
>>> 
>>> <draft-ietf-sidr-rtr-keying-14.mycomments.rtf>
>>> 
>>>> On Oct 20, 2017, at 1:04 PM, Sean Turner <s...@sn3rd.com> wrote:
>>>> 
>>>> Chris,
>>>> 
>>>> This version includes changes to address Oliver’s and Sriram’s comments.
>>>> 
>>>> spt
>>>> 
>>>>> On Oct 20, 2017, at 13:02, internet-dra...@ietf.org wrote:
>>>>> 
>>>>> 
>>>>> A New Internet-Draft is available from the on-line Internet-Drafts 
>>>>> directories.
>>>>> This draft is a work item of the Secure Inter-Domain Routing WG of the 
>>>>> IETF.
>>>>> 
>>>>>    Title           : Router Keying for BGPsec
>>>>>    Authors         : Randy Bush
>>>>>                      Sean Turner
>>>>>                      Keyur Patel
>>>>>   Filename        : draft-ietf-sidr-rtr-keying-14.txt
>>>>>   Pages           : 17
>>>>>   Date            : 2017-10-20
>>>>> 
>>>>> Abstract:
>>>>> BGPsec-speaking routers are provisioned with private keys in order to
>>>>> sign BGPsec announcements.  The corresponding public keys are
>>>>> published in the global Resource Public Key Infrastructure, enabling
>>>>> verification of BGPsec messages.  This document describes two methods
>>>>> of generating the public-private key-pairs: router-driven and
>>>>> operator-driven.
>>>>> 
>>>>> 
>>>>> 
>>>>> The IETF datatracker status page for this draft is:
>>>>> https://datatracker.ietf.org/doc/draft-ietf-sidr-rtr-keying/
>>>>> 
>>>>> There are also htmlized versions available at:
>>>>> https://tools.ietf.org/html/draft-ietf-sidr-rtr-keying-14
>>>>> https://datatracker.ietf.org/doc/html/draft-ietf-sidr-rtr-keying-14
>>>>> 
>>>>> A diff from the previous version is available at:
>>>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-sidr-rtr-keying-14
>>>>> 
>>>>> 
>>>>> Please note that it may take a couple of minutes from the time of 
>>>>> submission
>>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>>> 
>>>>> Internet-Drafts are also available by anonymous FTP at:
>>>>> ftp://ftp.ietf.org/internet-drafts/
>>>>> 
>>>>> _______________________________________________
>>>>> I-D-Announce mailing list
>>>>> i-d-annou...@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/i-d-announce
>>>>> Internet-Draft directories: http://www.ietf.org/shadow.html
>>>>> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>>>> 
>>>> _______________________________________________
>>>> sidr mailing list
>>>> sidr@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sidr
>>> 
> 

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to