The Secretariat has responded to my ticket about the attachment problem noted 
below.

> On Dec 7, 2017, at 5:17 PM, xxxxx via RT <ietf-act...@ietf.org> wrote:
> 
> Hi Sandy,
> 
> It turns out the archive did not have support for the "text/rtf" mimetype. 
> This
> has now been added and the attachment appears in the messages you referenced
> below.


So .rtf attachments, if anyone were so wise as to try one, should now show up 
in the archive.

—Sandy

> On Nov 14, 2017, at 9:07 PM, Sandra Murphy <sa...@tislabs.com> wrote:
> 
> Wellllll.
> 
> The mail archive does not seem to show attachments.  For me. I see do see 
> attachments on other messages.
> 
> It would be nice to know if anyone has seen attachments on my messages in the 
> last few weeks.
> 
> At any rate, for the mail archive, the comments are copied below the 
> signature.
> 
> —Sandy
> 
> 
> Points that might get lost in the long detailed list that follows:
> 
> 1.  RFC4271 (and RFC6286) and RFC8209 use the term “BGP Identifier”.  The 
> main text says RouterID and the Appendix B says “serial number”.  I believe 
> both are talking about what RFC8209 calls the “BGP Identifier”.  Most of the 
> tech sites say router ID or router-id or routerid or RID or some such.  But I 
> think consistency with the referenced text would be good.
> 
> 2.  I was initially confused by the text in various places that talks about 
> the operator adding the AS and RouterID (sic) and sends to the CA.  I thought 
> that meant the operator adds those to the CSR, which would be hard since the 
> CSR is signed.  This occurs a couple of places.  I suggest a sentence early 
> on that says the router certificate includes the AS and router identifier but 
> the CSR does not include such fields, so the operator must include the AS and 
> routerID when it sends the CSR to the CA.
> 
> 3.  “corresponds” - there are several places that say the certificate must be 
> validated to prove that the public key corresponds with the private key.  The 
> main body does not say how that correspondence is validated.  The appendix 
> suggests that the operator could validate the signature on the CSR with the 
> returned router cert in order to validate the key.  (a) When the operator 
> generated the public/private key pair, why not just do a comparison to the 
> generated public key, presuming it was retained?  (b) When the operator 
> passed the CSR generated by the router to the CA, why not validate the public 
> key before sending it to the CA?  The public key in the returned router 
> certificate could subsequently be validated by a comparison, presuming the 
> public key was retained.  (c) When the router is supposed to validate the 
> public key of the router cert it receives, and the operator generated the 
> public/private key pair, it does not have a copy of the CSR to validate the 
> correspondence.  Took me a bit to realize the router could sign just any old 
> bit of bytes and then validate the signature with the received router cert.  
> Right?
> 
> 4.  “corresponds” again - there’s no mention of a router verifying that the 
> router cert it receives has an AS that is configured on the router.  There 
> are lots of other checks and double checks - why not this one?  And if the 
> router has multiple ASs and multiple CSRs have been generated (either by the 
> router or by the operator), then the router uses the received router 
> certificate to associate the AS with the public/private key pair, so it knows 
> which private key to use over which session.  Right?
> 
> 5.  Section 8 on “Advanced Deployment Scenarios” talks about routers that 
> already have pre-installed keys (with mentions of types of crypto that are 
> not known to me, and I did not dig up the refs, so I might be missing 
> something here).  The first paragraph talks about “pre-installed key 
> material”.  I could understand why these pre-installed keys might be useful 
> in authenticating the router directly to the CA.  The “burdens” 1 and 2 also 
> talk abut “key material”.  It did not look to me like the “key material” in 1 
> and 2 are talking about these “pre-installed” keys.  But I admit to being 
> very confused by the way the term is used.
> 
> 6.  Section 5.2.1 is titled ”Using PKCS#8 to Transfer Public Key”.  The text 
> talks about using PKCS #8 in RFC5958, which allows for including both the 
> public and private key.  But the text of that section is talking about using 
> PKCS #8 to transmit the private key to the router.  I presume the title 
> should be Using PKCS#8 to Transfer Private Key
> 
> 7.  There is an early assumption that all the communication between the 
> operator and the router is over a protected channel.  Section 5.2.1 suggests 
> using a CMS SignedData to transmit the PKCS#8.  RFC5958 suggests several 
> different “CMS protecting content types” for the PKCS#8 - EncryptedData, 
> EnvelopedData, etc.  I presume that the encrypted versions are not used here 
> because the protected channel ensures confidentiality.  So (a) Appendix A 
> talks about the key strength to be used for the different crypto algorithms 
> (encryption, key exchange, …).  That’s a big hint that the channel should 
> provide the related security protections.  I think it would be good to 
> explicitly state the protections the protected channel must provide: “The 
> protected channel must provide confidentiality, authentication, integrity and 
> replay protection”.  (b) if the protected channel provides authentication and 
> integrity, why is the protection of the CMS SignedData needed?  One possible 
> reason follows -> (c) The AS EE certificate has an AS extension, not an IP 
> extension, I presume.  So the AS EE certificate would be a second way for the 
> router to associate a private key with an AS and an appropriate BGP session 
> (see my comment 3c above).  But this applies only when the operator generated 
> the public/private key pair.
> 
> 8.  PKCS#7 needs a reference.  I looked at RFC2315.  RFC2315 defines several 
> types of content, e.g., signed-data, enveloped-data, 
> signed-and-enveloped-data, etc.  Is there any reason to specify which type?  
> Is it operator choice?
> 
> 9.  The term “operator” is used to talk about carbon-based units (who are 
> forgetful), ISP organizations (who peer with other operators), ASs (who have 
> an AS EE certificates) and management system stations (that receive CSRs from 
> the router).  It was a bit unsettling, but after multiple reads through I’m 
> getting used to it.  I’m not sure I could suggest a term that would fit all 
> those uses.  Perhaps network operators (the ones with DNA) identify 
> personally with all those uses and think of their person in all cases.  “I am 
> the AS”, “I am the peering entity”, “I am the management of the network”, etc.
> 
> 10.  I do not understand the last two paragraphs of section 7 at the bottom 
> of page 6.  It sounds to me like they are out of place, like they belong 
> elsewhere in the text.
> 
> 11.  There are some occurrences of “must” and only a few of “MUST” - the 
> draft is standards track, so how much of the described behaviors are 
> mandatory?
> 
> 12. Some consistency nits - PKCS sometimes followed by a space, sometimes 
> not.  protected channel, secure channel, communications channel, protected 
> session, SSH session, . . .  
> 
> ========================================
> 
> OK, so on to the detailed comments, sequentially through the document
> 
> p3, section 1:
> 
>   two methods to provision new and existing routers.  The methods
>   described involve the operator configuring the two end points and
>   acting as the intermediary.
> 
> What are the two endpoints?  The router and the management station?  The 
> router and the CA?  I can imagine the operator configuring the management 
> station, but not the CA.  I can imagine the operator acting as the 
> intermediary between the router and the CA, but not between the router and 
> the management station.
> 
> p3, section 1: (nit)
> 
>                                                   [RFC8208]
>   specifies the algorithms used to generate the signature.
> 
> If I read correctly, “the” signature in this text would be the signature on 
> the PKCS#10.  
> 
> suggest:
> 
>                                                  [RFC8208]
>   specifies the algorithms used to generate the PKCS#10 signature.
> 
> 
> p4, section 2
> 
>                           See Appendix A for security considerations
>   for this channel.
> 
> I think it is important to say what security protection are required for this 
> protected channel.
> Appendix A talks about the strength of the key used in the various crypto 
> algorithms.  I think a
> sentence something like the following would be useful here or in Appendix A.
> 
> “The protected channel must provide confidentiality, authentication, 
> integrity” and replay protection.”
> 
> p4, section 4 (nit)
> 
>   appropriate RPKI Trust Anchor' Certificate (TA Cert) in the router.
> 
> suggest:
> 
>   appropriate RPKI Trust Anchor Certificate (TA Cert) in the router.
> or
>   appropriate RPKI Trust Anchor’s Certificate (TA Cert) in the router.
> 
> p4, section 4
> 
>   The operator also configures the Autonomous System (AS) number to be
>   used in the generated router certificate.  This may be the sole AS
>   configured on the router, or an operator choice if the router is
>   configured with multiple ASs.
> 
> There’s a hint here that the operator configures the router to generate just 
> one router certificate.
> RFC8209 allows the router certificate to have one or more ASs, but recommends 
> that there be multiple router certificates with one AS each.  Does this 
> paragraph intend to limit a router to one router certificate or just to limit 
> the router to one AS per router certificate?  I have questions later about 
> what happens if the router wants a router certificate for each of multiple 
> ASs.
> 
> Perhaps “A router with multiple ASs can be configured with multiple router 
> certificates”, maybe also “by following the process of this document for 
> reach desired certificate”.
> 
>   The operator configures or extracts from the router the BGP RouterID
> 
> RFC4271 and RFC8209 say “BGP Identifier”.  OSPF uses RouterID, and lots of 
> C/J commands use RouterID, or router-id, or router id, or RID, or . . .  But 
> consistency with the referenced specs would a good thing.
> 
> p4, section 5
> 
> I think it would be great to add a sentence here explaining that the PKCS#10 
> (CSR) format does not include the AS and RouterID (sic).  Therefore, the 
> operator must transmit the AS and RouterID (sic) as well when it sends the 
> CSR to the CA.  
> 
> That sentence applies to both the router generated keys and the operator 
> generated keys, so maybe it could go here.
> 
> The PKCS#10 format does not include the AS and RouterID for the router 
> certificate.  Therefore, the operator must include the AS it has chosen for 
> the router and the RouterID when it sends the CSR to the RPKI CA.
> 
> That should be a MUST, shouldn’t it?
> 
> p5, section 5.1
> 
>   The operator adds the chosen AS number and the RouterID to send to
>   the RPKI CA for the CA to certify.
> 
> My first reading was that the text meant the AS and RouterID were added to 
> the CSR.  First, that’s not possible because of the signature, unless there’s 
> some key sharing going on.  Second, that’s not possible because the CSR 
> format does not include the AS and RouterID.  Hence my comment above.
> 
> suggest:
> 
>   The operator includes the chosen AS number and the RouterID when it sends 
> the CSR to
> 
> p4, section 5.1 (nit)
> 
>   NOTE: If a router was to communicate directly with a CA to have the
> 
> suggest:
> 
>   NOTE: If a router were to communicate directly with a CA to have the
> 
> p5, section 5.2
> 
>   and adds the chosen AS number and RouterID to be sent to the RPKI CA
>   for the CA to certify.
> 
> suggest:
> 
>   and includes the chosen AS number and the RouterID when it sends the CSR to 
> the RPKI CA
>   for the CA to certify.
> 
> p5, section 5.2.1
> 
> section title “Using PKCS#8 to Transfer Public Key”
> 
> PKCS#8 in RFC5958 can transfer public keys.  But the following text is 
> talking about transferring the private key to the router.  
> 
> I think this title should be “Using PKCS#8 to Transfer Private Key”
> 
> 
>   A private key encapsulated in a PKCS #8 [RFC5958] should be further
>   encapsulated in Cryptographic Message Syntax (CMS) SignedData
>   [RFC5652] and signed with the AS's End Entity (EE) private key.
> 
> Would “A private key encapsulated in a PKCS #8” be followed by "OTOH, a 
> private key that is not encapsulated in a PKCS#8”?  :-)
> 
> Suggest:
> 
>   A private key can be encapsulated in a PKCS #8 [RFC5958] and should be 
> further
>    (or “is” encapsulated or “should be” encapsulated) 
> 
> Section 3 suggests various ways to “exchange PKI-related information with 
> routers”.  Is this PKCS#8 just one more way, or is it the recommended way?  
> The intro to section 5 suggests that copy and paste could also be used, but 
> doesn’t say if that would be copy and paste of the PKCS#8.  If Section 5 is 
> also talking about straight copy and paste of the hex or the PEM block, then 
> that’s another alternative.
> 
> RFC5958 discusses several “CMS protecting content types” to protect the 
> AsymmetricKeyPackage.  I presume that the encryption/enveloping content types 
> are not needed because confidentiality is being provided by the protected 
> channel.  But then why use the CMS SignedData - would not the protected 
> channel provide the authentication and integrity needed?  (But see potential 
> reason below)
> 
> 
>   [RFC5652] and signed with the AS's End Entity (EE) private key.
> 
> Does it matter which AS’s EE cert the operator uses to sign the PKCS#8?  I 
> presume that the AS must match an AS with which the router is configured.  
> Should the router check that?  Does a router that is configured with multiple 
> ASs use this communication to tie the private key to the appropriate AS & 
> BGPsec session?  
> 
> If the answer is yes to both questions, should those actions be mentioned 
> here?
> 
> (I admit to being a bit dizzy here, but maybe the mapping of private key to 
> AS happens in the receipt of the router certificate.)  
> 
>   include in the SignedData the RPKI CA certificate and relevant AS's
>   EE certificate(s).  
> 
> Maybe this is the reason for using the SignedData - to be able to include the 
> AS’s EE cert and give the router the means to tie the private key to the 
> right AS.
> 
>   The router SHOULD verify the signature of the encapsulated PKCS#8 to
>   ensure the returned private key did in fact come from the operator,
> 
> Then shouldn’t it be signed with the operator’s personal cert?  :-)  
> 
>   include in the SignedData the RPKI CA certificate and relevant AS's
>   EE certificate(s).
> 
> Elsewhere (sections 6 & 7) it mentions including the entire cert chain.  
> Should that be mentioned here as well?
> 
> p5, section 6 (nit)
> 
>   The operator uses RPKI management tools to communicate with the
>   global RPKI system to have the appropriate CA validate the PKCS#10
>   request, sign the key in the PKCS#10 (i.e., certify it) and generated
>   PKCS#7 response, as well as publishing the certificate in the Global
>   RPKI.
> 
> for symmetry, suggest:
> 
>   The operator uses RPKI management tools to communicate with the
>   global RPKI system to have the appropriate CA validate the PKCS#10
>   request, sign the key in the PKCS#10 (i.e., certify it) and generate a
>   PKCS#7 response, as well as publish the certificate in the Global
>   RPKI.
> 
> p5, section 6 
> 
>          External network connectivity may be needed if the certificate
>   is to be published in the Global RPKI.
> 
> The previous sentence and the following paragraph do not hint that there is 
> any “if” about the publication of the certificate.  Is there a case where the 
> certificate is NOT “to be published in the Global RPKI”?
> 
> p6, section 6 (nit)
> 
>   2.  Returns the certificate to the operator's management station,
>       packaged in a PKCS#7
> 
> Needs a reference.  RFC2315?
> 
>   In the operator-generated method, the operator SHOULD extract the
>   certificate from the PKCS#7, and verify that the private key it holds
>   corresponds to the returned public key.
> 
> “it” means the operator, right?
> 
> You get to Appendix B before the verification of the correspondence is 
> explained.  I think it should be explained here.
> 
> The Appendix B says the operator should verify the signature on the PKCS#10 
> CSR to verify the correspondence.  But the operator generated the key - can’t 
> the correspondence be verified by checking the certificate’s public key 
> against the operator generated public key (presuming the key was retained)?  
> That seems too easy - I fear I am missing some important part here.
> 
> p6, section 7
> 
>   The router SHOULD extract the certificate from the PKCS#7 and verify
>   that the public key corresponds to the stored private key. 
> 
> I think more needs to be said about how the correspondence would be verified. 
> 
> Appendix B says the operator should verify the signature on the PKCS#10 with 
> the certificate to verify the correspondence to the private key.  That would 
> work for the router as well if the router generated the PKCS#10, but not if 
> the operator generated the key pair and the PKCS#10.  But the router could 
> sign any random bunch of bits and verify the signature with the certificate 
> to verify the correspondence.  Should those things be said?
> 
> Also, in the router-driven method, the router can verify the correspondence 
> simply by matching the certificate’s public key with one of the router’s 
> stored public keys.  (Right?  What am I missing here?)
> 
> Should the router also verify that the AS mentioned in the returned router 
> certificate is an AS with which it is configured?
> 
> For a router that is configured with multiple ASs, is this where the router 
> ties the private key to the AS & BGPsec session with which the private key 
> should be used?
> 
> The last two paragraphs of section 7 confuse me.
> 
>   Even if the operator cannot extract the private key from the router,
>   this signature still provides a linkage between a private key and a
>   router.  That is the operator can verify the proof of possession
>   (POP), as required by [RFC6484].
> 
> What is “this signature”?  And there’s been no mention in this section of 
> extracting the private key from the router.
> 
> This sounds to me like it belongs in section 5.1, maybe after: 
>                                                               “to sign
>   the PKCS#10 with the private key.  Once generated, the PKCS#10 is
>   returned to the operator over the protected channel.
> 
> And then:
> 
>   NOTE: The signature on the PKCS#8 and Certificate need not be made by
>   the same entity.  Signing the PKCS#8, permits more advanced
>   configurations where the entity that generates the keys is not the
>   direct CA.
> 
> Maybe this belongs in section 5.2.1 where it is talking about the PKCS#8?
> 
> Even so, I’m not sure what Certificate this text references.  The AS EE cert?
> 
> Both the router-driven method and the operator-driven method are not the 
> direct CA.  Nowhere in this draft does it mention the CA generating the keys. 
>  So the entire draft is one of these “advanced configurations”.  What am I 
> missing here?
> 
> p7, section 8 (nit)
> 
>   Transport" [RFC7030] or the original CMC transport protocol's
> 
> Is the possessive really needed here?  I didn’t peruse the RFC5273 
> thoroughly, but I can see that it defines a number of transport methods, so 
> maybe there is a “CMC transport protocol’s X” missing here.
> 
> p7, section 8
> 
> 
> This section uses “key material” several places.  But I’m not certain each 
> use is talking about the same key material.
> 
>                When the operator first establishes a secure
>   communication channel between the management system and the router,
>   this pre-installed key material is used to authenticate the router.
> 
> So the router gets keys as part of the manufacturing, where the 
> “pre-installed key material” can be used in communication with the operator.
> 
> I can see that this might make it easier for the router to communicate 
> directly with the CA and authenticate itself using these keys.  But section 
> 5.1 notes that the CA has no way to authenticate the router.  I don’t know 
> that the pre-installed key material could provide that way to authenticate 
> the router, without the participation of the operator at some point.
> 
>   The operator burden shifts here to include:
> 
> I’m not sure how to read this.  Maybe “The operator burdens that shift here 
> can/will include”.
> 
> I’m also not sure if both 1 and 2 are presumed to be shifted/lifted, or if it 
> is either.
> 
> 
>   1.  Securely communicating the router's authentication material to
>       the CA prior to operator initiating the router's CSR.  CAs use
>       authentication material to determine whether the router is
>       eligible to receive a certificate. Authentication material at a
>       minimum includes the router's AS number and RouterID as well as
>       the router's key material, but can also include additional
>       information. Authentication material can be communicated to the
>       CA (i.e., CSRs signed by this key material are issued
>       certificates with this AS and RouterID) or to the router (i.e.,
>       the operator uses the vendor-supplied management interface to
>       include the AS number and routerID in the router-generated CSR).
> 
> Who is doing the communicating in “securely communicating to the CA” and “can 
> be communicated to the CA”?  In the following paragraph, the text says “the 
> router is communicating directly with the CA” - is the communication in this 
> part 1 text going from the router to the CA?
> 
> What is the “router’s key material”?  I could read it both ways:
> 
> The paragraph above says that the pre-installed key material is used to 
> authenticate the router, so maybe the “router’s key material” is the 
> pre-installed key material.  The text says that the CA “uses” the 
> authentication material, which includes the router’s key material, to 
> determine whether to issue the certificate.  I don’t know how the 
> pre-installed key material could assure the CA that the router could be 
> issued a cert, without some coordination with the operator about that 
> particular key material.
> 
> Then the text says “CSRs signed by this key material” which implies that the 
> “router’s key material” is the public/private key pair.
> 
> So I’m not certain what is going on here, or how the pre-installed key 
> material is helping.
> 
> 
>   Once configured, the operator can begin the process of enrolling the
>   router.  
> 
> What does “once configured” mean?  configuring the router-operator protected 
> channel?  Doing the communication of authentication material in 1 and 2 
> above?  Configuring the router with AS and RouterID?
> 
>            Because the router is communicating directly with the CA,
>   there is no need for the operator to retrieve the PKCS#10 from the
>   router or return the PKCS#7 to the router as in Section 6.    Note that
>   the checks performed by the router,
> 
> Section 5 says the router returns the PKCS#10 to the operator.
> Section 7 says the operator sends the PKCS#7 to the router and the router 
> performs checks.
> 
> suggest:
> 
>            Because the router is communicating directly with the CA,
>   there is no need for the operator to retrieve the PKCS#10 from the
>   router as in Section 5 or return the PKCS#7 to the router as in Section 7.  
> Note that
>   the checks performed by the router in Section 7,
> 
>   When a router is so configured the communication with the CA SHOULD
>   be automatically re-established
> 
> what does “so configured” mean here?  configured with pre-installed key 
> material?  configured by the operator with AS and RouterID?
> 
> p8, section 9.1 (nit)
> 
> just for symmetry:
> 
>   4.  Use some other kind of automated process to search for and track
> 
> suggest:
> 
>   4.  The operator uses some other kind of automated process to search for 
> and track
> 
> p8, section 9.1
> 
>   Regardless of the technique used to track router certificate expiry
>   times, it is advisable to notify additional operators in the same
>   organization
> 
> “notify additional operators” — In addition to what? or after what?
> 
> I think you mean “multiple” operators, or I misunderstand.
> 
> p9, section 9.3  (nits)
> 
>   certificate to the router), and distributing the status takes time
> 
> Not sure what you mean by “status” that needs to be distributed.  Are you 
> talking about distributing the revocation “status” in the CRL?
> 
>   Keeping the router operational and BGPsec-speaking is the ideal goal,
>   but if operational practices do not allow this then reconfiguring the
>   router to disabling BGPsec is likely preferred to bringing the router
>   offline.
> 
> suggest:
> 
>  router to disable BGPsec is likely preferred to bringing the router
> 
> p10, section 9.4
> 
>   To allow operators to quickly replace routers without requiring
>   update and distribution of the corresponding public keys in the RPKI,
>   routers SHOULD allow the private BGPsec key to inserted via a
>   protected session, e.g., SSH, NetConf (see [RFC6470]), SNMP.  This
>   lets the operator escrow the old private key via the mechanism used
>   for operator-generated keys, see Section 5.2, such that it can be re-
>   inserted into a replacement router.
> 
> The topic here is routers that won’t allow off-loading of their keys.  
> 
> “routers SHOULD allow the private BGPsec key to inserted”
> 
> is the router that is doing the allowing the old, soon to be replaced 
> routers, or the newly installed routers?
> 
> “to <be> inserted” - where? - in the newly installed router or in the 
> management station?
> 
> “This lets the operator escrow the old private key” - sounds like the old 
> router is allowing the private key to be “inserted in” (exported to?) the 
> management station.  Right?
> 
> Is there a suggestion of how to get the routers to allow export of the key, 
> which is currently not allowed?
> 
> I don’t see that section 5.2 says anything about a mechanism for escrowing 
> keys.  It talks about installing a private key into a router over the 
> protected channel.  If the citation to 5.2 is about the “such that it can be 
> re-inserted” part of the sentence, then I get it.  But the citation should 
> move  to the end of the sentence.
> 
> p10, section 10 (nit)
> 
>                                                         After
>   familiarizing one's self with the capabilities of the router,
>   operators are encouraged
> 
> suggest:
> 
>                                                         After
>   familiarizing themselves with the capabilities of the router,
>   operators are encouraged
> 
> 
> or
> 
>                                                         After
>   familiarizing one's self with the capabilities of the router,
>   an operator is encouraged
> 
> p11, section 10 (nit)
> 
>                           employees that no longer need access to
>   routers SHOULD be removed the router 
> 
> suggest
> 
>                           employees that no longer need access to
>   a router SHOULD be removed from the router 
> 
> or
> 
>                          employees that no longer need access to
>   a router SHOULD be removed from the router access [list]
> 
> p11, section 10 (nit)
> 
>                                                                The
>   operator MUST ensure that installed CA certificate is valid.
> 
> suggest:
> 
>                                                                The
>   operator MUST ensure that the installed CA certificate is valid.
> 
> p14, section Appendix A
> 
>   x509v3-ecdsa-sha2-nistp256 [RFC6187] could be used for
>   authentication.
> 
> is that an example, or a recommendation?
> 
> p15, section Appendix B (nit)
> 
>   that will generate the key pair for the algorithms noted in the main
>   body of this document;
> 
> the algorithms are not noted in the main body, but the end of section 1 does 
> cite RFC8208.  
> 
>   the private key just generated to sign the certification request with
>   the algorithms specified in the main body of this document;
> 
> the algorithms are not specified in the main body, but the end of section 1 
> does cite RFC8208.
> 
> p16, Appendix B
> 
> Uses of “serial number”:
> 
>   the subject name and serial number for the router.  The CA needs this
> and
>   CSR you sent; the certificate will include the subject name, serial
>   number, public key, and other fields
> and
>   Create CSR and sign CSR with private key, and; o Step 3: Send CSR
>   file with the subject name and serial number to CA.
> 
> The first of these seem to mean the BGP Identifier aka RouterID.  As said 
> before, RFC4271 and RFC8209 use the term BGP Identifier.
> 
> The second and third use of “serial number” probably also mean BGP Identifier 
> aka RouterID (not the issued cert’s serial number).
> 
> p17, section Appendix B (typo nit)
> 
>   way through GPsec-enabling the router.
> 
> suggest:
> 
>   way through BGPsec-enabling the router.
> 
> p17, section Appendix B
> 
>                      To avoid having routers with expired certificates
>   follow the recommendations in the Certification Policy (CP) [RFC6484]
> 
> you could also mention section 9.1.
> 
> 
> 
> 
> 
>> On Nov 14, 2017, at 10:36 AM, Sandra Murphy <sa...@tislabs.com> wrote:
>> 
>> 
>> 
>> Sorry, the reply did not pick up the original attachment.
>> 
>> Attached here.
>> 
>> Let me know if there are problems reading the comments.
>> 
>> —Sandy
>> 
>> <draft-ietf-sidr-rtr-keying-14.mycomments.rtf>
>> 
>>> On Nov 14, 2017, at 10:33 AM, Sandra Murphy <sa...@tislabs.com> wrote:
>>> 
>>> Speaking as wg co-chair
>>> 
>>> Please, wg, do take a look at the comments attached.  This draft was 
>>> requested by the operators and is important.
>>> 
>>> Some of the comments are about substance.  Those at the very least must be 
>>> considered by the wg.
>>> 
>>> Please take advantage of focused attention and close proximity at the IETF 
>>> meeting to discuss.  
>>> 
>>> I unfortunately can not be there to button hole people and shove printouts 
>>> into their hands.
>>> 
>>> —Sandy, speaking as wg co-chair
>>> 
>>>> On Nov 5, 2017, at 9:25 PM, Sandra Murphy <sa...@tislabs.com> wrote:
>>>> 
>>>> I’m attaching some comments and questions I found in the -14 version.
>>>> 
>>>> —Sandy
>>>> 
>>>> <draft-ietf-sidr-rtr-keying-14.mycomments.rtf>
>>>> 
>>>>> On Oct 20, 2017, at 1:04 PM, Sean Turner <s...@sn3rd.com> wrote:
>>>>> 
>>>>> Chris,
>>>>> 
>>>>> This version includes changes to address Oliver’s and Sriram’s comments.
>>>>> 
>>>>> spt
>>>>> 
>>>>>> On Oct 20, 2017, at 13:02, internet-dra...@ietf.org wrote:
>>>>>> 
>>>>>> 
>>>>>> A New Internet-Draft is available from the on-line Internet-Drafts 
>>>>>> directories.
>>>>>> This draft is a work item of the Secure Inter-Domain Routing WG of the 
>>>>>> IETF.
>>>>>> 
>>>>>>   Title           : Router Keying for BGPsec
>>>>>>   Authors         : Randy Bush
>>>>>>                     Sean Turner
>>>>>>                     Keyur Patel
>>>>>>  Filename        : draft-ietf-sidr-rtr-keying-14.txt
>>>>>>  Pages           : 17
>>>>>>  Date            : 2017-10-20
>>>>>> 
>>>>>> Abstract:
>>>>>> BGPsec-speaking routers are provisioned with private keys in order to
>>>>>> sign BGPsec announcements.  The corresponding public keys are
>>>>>> published in the global Resource Public Key Infrastructure, enabling
>>>>>> verification of BGPsec messages.  This document describes two methods
>>>>>> of generating the public-private key-pairs: router-driven and
>>>>>> operator-driven.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> The IETF datatracker status page for this draft is:
>>>>>> https://datatracker.ietf.org/doc/draft-ietf-sidr-rtr-keying/
>>>>>> 
>>>>>> There are also htmlized versions available at:
>>>>>> https://tools.ietf.org/html/draft-ietf-sidr-rtr-keying-14
>>>>>> https://datatracker.ietf.org/doc/html/draft-ietf-sidr-rtr-keying-14
>>>>>> 
>>>>>> A diff from the previous version is available at:
>>>>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-sidr-rtr-keying-14
>>>>>> 
>>>>>> 
>>>>>> Please note that it may take a couple of minutes from the time of 
>>>>>> submission
>>>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>>>> 
>>>>>> Internet-Drafts are also available by anonymous FTP at:
>>>>>> ftp://ftp.ietf.org/internet-drafts/
>>>>>> 
>>>>>> _______________________________________________
>>>>>> I-D-Announce mailing list
>>>>>> i-d-annou...@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/i-d-announce
>>>>>> Internet-Draft directories: http://www.ietf.org/shadow.html
>>>>>> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>>>>> 
>>>>> _______________________________________________
>>>>> sidr mailing list
>>>>> sidr@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/sidr
>>>> 
>> 

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to