Hi SIDR WG,

I just submitted the first version of the algorithm agility document.

I submit it as an individual contribution, but it is my understanding that the 
group has already decided to take this as a working item. I kindly request the 
WG chairs to indicate if there is still a need to request WG adoption or I can 
go ahead and submit it as a WG item.

Going to the content, the document documents what has been presented in 
Maastricht and discussed in the mailing list. There are some sections that 
still need to be completed, particularly on how to sync. the different CAs 
during the transition for both the CAs and the RPs.

I do have two requests for the provisioning protocol draft, that is a 
consequence of the decision to adopt the "lazier faire" mode taken in 
Maastricht:

- As any subordinate CA can start the transition at any given time without 
waiting to its parent CA to be able to issue certificates using the new 
algorithm suite, we need a way in the provisioning protocol for the subordinate 
CA to indicate which signing algorithm the parent CA should use to process a 
particular request. This could be implemented this way:
                - in the "issue" message, add an optional attribute: 
"signing_algorithm=OID"
<request
              class_name="class name"
              req_resource_set_as="as resource set"
              req_resource_set_ipv4="ipv4 resource set"
              req_resource_set_ipv6="ipv6 resource set"
              cert_signing_algorithm="OID">
             [Certificate request]
              </request>
Behavior from issuing CA: if the  cert_signing_algorithm is specified and 
supported, use that OID. If the cert_signing_algorithm not specify, use 
"current" algorithm. If the cert_signing_algorithm not supported, reply with a 
"Request-Not-Performed" message with error code:
        1401 request - request - signing algorithm not supported.

- In order for the transition process to happen without any "off-line" 
communication between CAs on when are they going to be able to handle requests 
using the "new" algorithm sets, it may be a good idea to include in the 
provisioning protocol the possibility to ask the server about its capabilities. 
Another option is just to try to issue a certificate with the new suite and see 
if you receive an error "core 1401".

I look forward for your comments,

Roque



Begin forwarded message:

> From: IETF I-D Submission Tool <[email protected]>
> Date: October 18, 2010 2:31:30 AM GMT+02:00
> To: [email protected]
> Cc: [email protected], [email protected]
> Subject: New Version Notification for 
> draft-rgaglian-sidr-algorithm-agility-00 
> 
> 
> A new version of I-D, draft-rgaglian-sidr-algorithm-agility-00.txt has been 
> successfully submitted by Roque Gagliano and posted to the IETF repository.
> 
> Filename:      draft-rgaglian-sidr-algorithm-agility
> Revision:      00
> Title:                 Algorithm Agility Procedure for RPKI.
> Creation_date:         2010-10-18
> WG ID:                 Independent Submission
> Number_of_pages: 22
> 
> Abstract:
> This document specifies the process that Certificate Authorities
> (CAs) and Relying Parties (RP) participating in the Resource Public
> Key Infrastructure (RPKI) will need to follow to transition to a new
> (and probably cryptographically stronger) algorithm set.  The process
> is expected to be completed in a time scale of months or years.
> Consequently, no emergency transition is specified.
> 
> 
> 
> The IETF Secretariat.
> 
> 

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to