Ana Kukec escribió:
marcelo bagnulo braun wrote:


The incompliances between the RPKI and SEND are related to the X.509 extensions profile and their validation. Regarding the acception of the RPKI certificate profile into SeND, there are two problematic extensions, the EKU extension (as we already discussed)

right, but my question is what happens when a current send node receives a cert with the EKU? does it fails, or does it just skipe the option takes the cert as valid?

The draft says that the EKU extension is a critical extension, i.e. if the receiving node does not recognize the extension, it must reject the certificate.

not really

the draft says:

  The extended key usage extension MAY, at the option of the
  certificate issuer, be either critical or non-critical.

So, if we do it as the draft says, it would be compatible with current implementations, right?


So, this seems to psoe two problems:
- first, that a current send node will not accept as valid a cert without the subjectAltname, right? While this is not optimal, we may be able to live with that - second, how does a send node uses the subjectAltName? i mean does the send node needs this information to validate the anchor point? If so, how do we deal with this?


The TA option either helps the receivers to decide which advertisements are useful for them or denotes the TAs that the client is willing to accept (in the solicitation message). If the TA is represented as a FQDN, the FQDN must be equal to the subjectAltName in the TA's certificate.

On the other hand, we can survive with using just the Subject name field and the DER Encoded X.501 Name Trust Anchor option..

but wouldn't that be a different use of the semantics of the subject name?

So, afaiu from this, the currnet implementations would not accept certs wihtout the TA and they would fial inthis case We may be able to tweak it in way that we can make this work, by upating the send nodes the other options is to see how posible is for RPKI cert profile to accept TA, is this correct?




Regarding the validation routines, the rfc3779 extension validation routine conflicts with the one described in the send spec. But together with the RPKI certificate profile we can accept the rfc3779 extension validation routine.

not sure waht do you mean here... can we still use the send validation routing? Or we need to change the send nodes to do the new validation routine?


The RPKI uses the validation described in rfc3779 (section 2.3). The validation described in the send spec is compliant with that one, but more detailed. So, we can just point out that despite using the RPKI profile, nodes have to take into account the send validation as well.


great


Contrary to the X.509 extensions and the validation routines, the revocation is not a conflicting thing, it is just that the SeND lacks the text describing how to incorporate the RPKI revocation into SeND. With carefully chosen validity intervals for the RPKI certificates on the lower tiers, i.e. at the SEND level, the CRL is not expected to grow to large sizes, and it can fit well into the SEND messages.
right, but do we need to specify the revocation routines as well?


The RPKI uses the PKI revocation routines with pure CRLs, and if we accept the RPKI profile, IMO we should use and process the CRLs in SeND. Thus, yes, IMO we should specify messages for the CRL transportation and the processing routines for the receivers.

but if we don't do it, it would imply that we have current send support, right?

I mean, if we do it, it is an enhacement but we can not do it
I guess it is up to the wg to decide what to do


I would like to understnad if we need to update rfc3971 to support this, i understnad we do. I am not sure i fully understnad what are the updates that are needed to rfc3971... could you elaborate on this?

Afaiu, we should update the part about the revocation, and decide what exactly to do with the subjectAltName extension, and update that part as well.

ok, someone else has an opinion on ths?


regards, marcelo

Ana

_______________________________________________
CGA-EXT mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cga-ext

Reply via email to