| rfc9255xml2.original.xml | rfc9255.xml | |||
|---|---|---|---|---|
| <?xml version="1.0" encoding="utf-8"?> | <?xml version="1.0" encoding="UTF-8"?> | |||
| <!-- <!DOCTYPE rfc SYSTEM "rfc2629.dtd"> --> | <!DOCTYPE rfc [ | |||
| <?rfc comments="yes"?> | <!ENTITY nbsp " "> | |||
| <?rfc compact="yes"?> | <!ENTITY zwsp "​"> | |||
| <?rfc subcompact="no"?> | <!ENTITY nbhy "‑"> | |||
| <?rfc inline="yes"?> | <!ENTITY wj "⁠"> | |||
| <?rfc sortrefs="yes"?> | ]> | |||
| <?rfc symrefs="yes"?> | ||||
| <?rfc toc="yes"?> | ||||
| <?rfc tocdepth="6"?> | ||||
| <?rfc tocindent="yes"?> | ||||
| <?rfc tocompact="yes"?> | ||||
| <rfc category="std" consensus="true" submissionType="IETF" docName="draft-ietf-s | ||||
| idrops-rpki-has-no-identity-07" ipr="trust200902"> | ||||
| <front> | ||||
| <title>The I in RPKI does not stand for Identity</title> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" docName="draft-ietf-sidrops-rpki -has-no-identity-07" number="9255" submissionType="IETF" category="std" consensu s="true" ipr="trust200902" sortRefs="true" symRefs="true" tocInclude="true" tocD epth="6" xml:lang="en" updates="" obsoletes="" version="3"> | |||
| <author fullname="Randy Bush" initials="R." surname="Bush"> | <!-- xml2rfc v2v3 conversion 3.12.2 --> | |||
| <organization>Arrcus & Internet Initiative Japan</organization> | <front> | |||
| <address> | <title>The 'I' in RPKI Does Not Stand for Identity</title> | |||
| <postal> | <seriesInfo name="RFC" value="9255"/> | |||
| <street>5147 Crystal Springs</street> | <author fullname="Randy Bush" initials="R." surname="Bush"> | |||
| <city>Bainbridge Island</city> | <organization abbrev="Arrcus & IIJ Research">Arrcus & Internet Ini | |||
| <region>WA</region> | tiative Japan Research</organization> | |||
| <code>98110</code> | <address> | |||
| <country>US</country> | <postal> | |||
| <street>5147 Crystal Springs</street> | ||||
| <city>Bainbridge Island</city> | ||||
| <region>WA</region> | ||||
| <code>98110</code> | ||||
| <country>United States of America</country> | ||||
| </postal> | </postal> | |||
| <email>randy@psg.com</email> | <email>randy@psg.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author initials="R." surname="Housley" fullname="Russ Housley"> | <author initials="R." surname="Housley" fullname="Russ Housley"> | |||
| <organization abbrev="Vigil Security">Vigil Security, LLC</organization> | <organization abbrev="Vigil Security">Vigil Security, LLC</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <street>516 Dranesville Road</street> | <street>516 Dranesville Road</street> | |||
| <city>Herndon, VA</city> | <city>Herndon</city> | |||
| <region>VA</region> | ||||
| <code>20170</code> | <code>20170</code> | |||
| <country>US</country> | <country>United States of America</country> | |||
| </postal> | </postal> | |||
| <email>housley@vigilsec.com</email> | <email>housley@vigilsec.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date year="2022" month="June" /> | ||||
| <area>ops</area> | ||||
| <workgroup>sidrops</workgroup> | ||||
| <keyword>Public Key Infrastructure</keyword> | ||||
| <keyword>Security</keyword> | ||||
| <keyword>X.509</keyword> | ||||
| <keyword>Certificate</keyword> | ||||
| <date /> | <abstract> | |||
| <t>There is a false notion that Internet Number Resources (INRs) in | ||||
| <abstract> | ||||
| <t>There is a false notion that Internet Number Resources (INRs) in | ||||
| the RPKI can be associated with the real-world identity of the | the RPKI can be associated with the real-world identity of the | |||
| 'holder' of an INR. This document specifies that RPKI does not | 'holder' of an INR. This document specifies that RPKI does not | |||
| associate to the INR holder.</t> | associate to the INR holder.</t> | |||
| </abstract> | ||||
| </abstract> | ||||
| <note title="Requirements Language"> | ||||
| <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL | ||||
| NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", | ||||
| "MAY", and "OPTIONAL" in this document are to be interpreted as | ||||
| described in BCP 14 <xref target="RFC2119"/> <xref | ||||
| target="RFC8174"/> when, and only when, they appear in all capitals, | ||||
| as shown here.</t> | ||||
| </note> | ||||
| </front> | </front> | |||
| <middle> | ||||
| <middle> | <section anchor="intro"> | |||
| <name>Introduction</name> | ||||
| <section anchor="intro" title="Introduction"> | <t>The Resource Public Key Infrastructure (RPKI), see <xref target="RFC648 | |||
| 0"/>, "represents the allocation hierarchy of IP | ||||
| <t>The Resource Public Key Infrastructure (RPKI), see <xref | ||||
| target="RFC6480"/>, "Represents the allocation hierarchy of IP | ||||
| address space and Autonomous System (AS) numbers," which are | address space and Autonomous System (AS) numbers," which are | |||
| collectively known as Internet Number Resources (INRs). Since | collectively known as Internet Number Resources (INRs). Since | |||
| initial deployment, the RPKI has grown to include other similar | initial deployment, the RPKI has grown to include other similar | |||
| resource and routing data, e.g. Router Keying for BGPsec, <xref | resource and routing data, e.g., Router Keying for BGPsec <xref target="RFC8 | |||
| target="RFC8635"/>.</t> | 635"/>.</t> | |||
| <t>In security terms, the phrase "Public Key" implies there is also | ||||
| <t>In security terms, the phrase "Public Key" implies there is also | ||||
| a corresponding private key <xref target="RFC5280"/>. The RPKI | a corresponding private key <xref target="RFC5280"/>. The RPKI | |||
| provides strong authority to the current holder of INRs; however, | provides strong authority to the current holder of INRs; however, | |||
| some people a have a desire to use RPKI private keys to sign | some people have a desire to use RPKI private keys to sign | |||
| arbitrary documents as the INR 'holder' of those resources with the | arbitrary documents as the INR 'holder' of those resources with the | |||
| inappropriate expectation that the signature will be considered an | inappropriate expectation that the signature will be considered an | |||
| attestation to the authenticity of the document content. But in | attestation to the authenticity of the document content. But, in | |||
| reality, the RPKI certificate is only an authorization to speak for | reality, the RPKI certificate is only an authorization to speak for | |||
| the explicitly identified INRs; it is explicitly not intended for | the explicitly identified INRs; it is explicitly not intended for | |||
| authentication of the 'holders' of the INRs. This situation is | authentication of the 'holders' of the INRs. This situation is | |||
| emphasized in Section 2.1 of <xref target="RFC6480"/>.</t> | emphasized in <xref target="RFC6480" section="2.1" sectionFormat="of"/>.</t> | |||
| <t>It has been suggested that one could authenticate real-world | ||||
| <t>It has been suggested that one could authenticate real-world | business transactions with the signatures of INR holders. For example, | |||
| business transactions with the signatures of INR holders. E.g. | ||||
| Bill's Bait and Sushi (BB&S) could use the private key attesting | Bill's Bait and Sushi (BB&S) could use the private key attesting | |||
| to that they are the holder of their AS in the RPKI to sign a Letter | to that they are the holder of their AS in the RPKI to sign a Letter | |||
| of Authorization (LOA) for some other party to rack and stack | of Authorization (LOA) for some other party to rack and stack | |||
| hardware owned by BB&S. Unfortunately, while this may be | hardware owned by BB&S. Unfortunately, while this may be | |||
| technically possible, it is neither appropriate nor meaningful.</t> | technically possible, it is neither appropriate nor meaningful.</t> | |||
| <t>The 'I' in RPKI actually stands for "Infrastructure," as in | ||||
| <t>The I in RPKI actually stands for "Infrastructure," as in | ||||
| Resource Public Key Infrastructure, not for "Identity". In fact, | Resource Public Key Infrastructure, not for "Identity". In fact, | |||
| the RPKI does not provide any association between INRs and the real | the RPKI does not provide any association between INRs and the real-world ho | |||
| world holder(s) of those INRs. The RPKI provides authorization to | lder(s) of those INRs. The RPKI provides authorization to | |||
| make assertions only regarding Internet Number Resources, such as IP | make assertions only regarding Internet Number Resources, such as IP | |||
| prefixes or AS numbers, and data such as ASPA <xref | prefixes or AS numbers, and data such as <xref target="I-D.ietf-sidrops-aspa | |||
| target="I-D.ietf-sidrops-aspa-profile"/>records.</t> | -profile">Autonomous System Provider Authorization (ASPA) records</xref>.</t> | |||
| <t>In short, avoid the desire to use RPKI certificates for any | ||||
| <t>In short, avoid the desire to use RPKI certificates for any | ||||
| purpose other than the verification of authorizations associated | purpose other than the verification of authorizations associated | |||
| with the delegation of INRs or attestations related to INRs. | with the delegation of INRs or attestations related to INRs. | |||
| Instead, recognize that these authorizations and attestations take | Instead, recognize that these authorizations and attestations take | |||
| place irrespective of the identity of a RPKI private key holder.</t> | place irrespective of the identity of an RPKI private key holder.</t> | |||
| <section> | ||||
| <name>Requirements Language</name> | ||||
| <t> | ||||
| The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", | ||||
| "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14> | ||||
| ", | ||||
| "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", | ||||
| "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | ||||
| "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | ||||
| be | ||||
| interpreted as described in BCP 14 <xref target="RFC2119"/> <xref | ||||
| target="RFC8174"/> when, and only when, they appear in all capitals, as | ||||
| shown here. | ||||
| </t> | ||||
| </section> | </section> | |||
| </section> | ||||
| <section anchor="bottom" title="The RPKI is for Authorization"> | <section anchor="bottom"> | |||
| <name>The RPKI is for Authorization</name> | ||||
| <t>The RPKI was designed and specified to sign certificates for use | <t>The RPKI was designed and specified to sign certificates for use | |||
| within the RPKI itself and to generate Route Origin Authorizations | within the RPKI itself and to generate Route Origin Authorizations | |||
| (ROAs), <xref target="RFC6480"/>, for use in routing. Its design | (ROAs) <xref target="RFC6480"/> for use in routing. Its design | |||
| intentionally precluded use for attesting to real-world identity as, | intentionally precluded use for attesting to real-world identity as, | |||
| among other issues, it would expose the Certification Authority (CA) | among other issues, it would expose the Certification Authority (CA) | |||
| to liability.</t> | to liability.</t> | |||
| <t>That the RPKI does not authenticate real-world identity is by | ||||
| <t>That the RPKI does not authenticate real-world identity is by | ||||
| design. If it tried to do so, aside from the liability, it would | design. If it tried to do so, aside from the liability, it would | |||
| end in a world of complexity with no proof of termination.</t> | end in a world of complexity with no proof of termination.</t> | |||
| <t>Registries such as the Regional Internet Registries (RIRs) | ||||
| <t>Registries such as the Regional Internet Registries (RIRs) | provide INR to real-world identity mapping through WHOIS <xref target="RFC39 | |||
| provide INR to real-world identity mapping through WHOIS, <xref | 12"/> and similar services. They claim to be | |||
| target="RFC3912"/>, and similar services. They claim to be | authoritative, at least for the INRs that they allocate.</t> | |||
| authoritative, at least for the INRs which they allocate.</t> | <t>That is, RPKI-based credentials of INRs <bcp14>MUST NOT</bcp14> be used | |||
| to | ||||
| <t>That is, RPKI-based credentials of INRs MUST NOT be used to | ||||
| authenticate real-world documents or transactions. That might be | authenticate real-world documents or transactions. That might be | |||
| done with some formal external authentication of authority allowing | done with some formal external authentication of authority allowing | |||
| an otherwise anonymous INR holder to authenticate the particular | an otherwise anonymous INR holder to authenticate the particular | |||
| document or transaction. Given such external, i.e. non-RPKI, | document or transaction. Given such external, i.e. non-RPKI, | |||
| verification of authority, the use of RPKI-based credentials adds no | verification of authority, the use of RPKI-based credentials adds no | |||
| authenticity.</t> | authenticity.</t> | |||
| </section> | </section> | |||
| <section anchor="discuss"> | ||||
| <section anchor="discuss" title="Discussion"> | <name>Discussion</name> | |||
| <t><xref target="RFC6480" section="2.1" sectionFormat="of">the RPKI base d | ||||
| <t>The RPKI base document, <xref target="RFC6480"/>, Section 2.1 | ocument</xref> says explicitly "An important property of this PKI is that | |||
| says explicitly "An important property of this PKI is that | ||||
| certificates do not attest to the identity of the subject."</t> | certificates do not attest to the identity of the subject."</t> | |||
| <t><xref target="RFC7382" section="3.1" sectionFormat="of">"Template for a | ||||
| <t>The Template for a Certification Practice Statement (CPS) for the | Certification Practice Statement (CPS) for the Resource PKI (RPKI)"</xref> stat | |||
| Resource PKI (RPKI) <xref target="RFC7382"/> Section 3.1, Naming, | es that | |||
| makes very clear that "The Subject name in each certificate SHOULD | the Subject name in each certificate SHOULD NOT be meaningful | |||
| NOT be meaningful;" and goes on to do so at some length.</t> | and goes on to explain this at some length.</t> | |||
| <t>Normally, the INR holder does not hold the private key attesting | ||||
| <t>Normally, the INR holder does not hold the private key attesting | to their resources; the CA does. The INR | |||
| to their resources; the Certification Authority (CA) does. The INR | ||||
| holder has a real-world business relationship with the CA for which | holder has a real-world business relationship with the CA for which | |||
| they have likely signed real-world documents.</t> | they have likely signed real-world documents.</t> | |||
| <t>As the INR holder does not have the keying material, they rely on | ||||
| <t>As the INR holder does not have the keying material, they rely on | ||||
| the CA, to which they presumably present credentials, to manipulate | the CA, to which they presumably present credentials, to manipulate | |||
| their INRs. These credentials may be userid/password (with two | their INRs. These credentials may be user ID and password (with two-factor | |||
| factor authentication one hopes), a hardware token, client browser | authentication one hopes), a hardware token, client browser | |||
| certificates, etc.</t> | certificates, etc.</t> | |||
| <t>Hence schemes such as Resource Tagged Attestations <xref target="I-D.ie | ||||
| <t>Hence schemes such as <xref target="I-D.ietf-sidrops-rpki-rta"/> | tf-sidrops-rpki-rta"/> | |||
| and <xref target="I-D.ietf-sidrops-rpki-rsc"/> must go to great | and Signed Checklists <xref target="I-D.ietf-sidrops-rpki-rsc"/> must go to | |||
| great | ||||
| lengths to extract the supposedly relevant keys from the CA.</t> | lengths to extract the supposedly relevant keys from the CA.</t> | |||
| <t>For some particular INR, say, Bill's Bait and Sushi's Autonomous | ||||
| <t>For some particular INR, say Bill's Bait and Sushi's Autonomous | ||||
| System (AS) number, someone out on the net probably has the | System (AS) number, someone out on the net probably has the | |||
| credentials to the CA account in which BB&S's INRs are | credentials to the CA account in which BB&S's INRs are | |||
| registered. That could be the owner of BB&S, Roberto's Taco | registered. That could be the owner of BB&S, Randy's Taco | |||
| Stand, an IT vendor, or the Government of Elbonia. One simply can | Stand, an IT vendor, or the Government of Elbonia. One simply can | |||
| not know.</t> | not know.</t> | |||
| <t>In large organizations, INR management is often compartmentalized | ||||
| <t>In large organizations, INR management is often compartmentalized | ||||
| with no authority over anything beyond dealing with INR | with no authority over anything beyond dealing with INR | |||
| registration. The INR manager for Bill's Bait and Sushi is unlikely | registration. The INR manager for Bill's Bait and Sushi is unlikely | |||
| to be authorized to conduct bank transactions for BB&S, or even | to be authorized to conduct bank transactions for BB&S, or even | |||
| to authorize access to BB&S's servers in some colocation | to authorize access to BB&S's servers in some colocation | |||
| facility.</t> | facility.</t> | |||
| <t>Then there is the temporal issue. The holder of that AS may be | ||||
| <t>Then there is the temporal issue. The holder of that AS may be | ||||
| BB&S today when some document was signed, and could be the | BB&S today when some document was signed, and could be the | |||
| Government of Elbonia tomorrow. Or the resource could have been | Government of Elbonia tomorrow. Or the resource could have been | |||
| administratively moved from one CA to another, likely requiring a | administratively moved from one CA to another, likely requiring a | |||
| change of keys. If so, how does one determine if the signature on | change of keys. If so, how does one determine if the signature on | |||
| the real-world document is still valid?</t> | the real-world document is still valid?</t> | |||
| <t>While Ghostbuster Records <xref target="RFC6493"/> may seem to | ||||
| <t>While Ghostbuster Records <xref target="RFC6493"/> may seem to | ||||
| identify real-world entities, their semantic content is completely | identify real-world entities, their semantic content is completely | |||
| arbitrary, and does not attest to holding of any INRs. They are | arbitrary and does not attest to holding of any INRs. They are | |||
| merely clues for operational support contact in case of technical | merely clues for operational support contact in case of technical | |||
| RPKI problems.</t> | RPKI problems.</t> | |||
| <t>Usually, before registering INRs, CAs require proof of an INR | ||||
| <t>Usually, before registering INRs, CAs require proof of an INR | ||||
| holding via external documentation and authorities. It is somewhat | holding via external documentation and authorities. It is somewhat | |||
| droll that the CPS Template, <xref target="RFC7382"/>, does not | droll that the CPS Template <xref target="RFC7382"/> does not | |||
| mention any diligence the CA must, or even might, conduct to assure | mention any diligence the CA must, or even might, conduct to assure | |||
| the INRs are in fact owned by a registrant.</t> | the INRs are in fact owned by a registrant.</t> | |||
| <t>That someone can provide 'proof of possession' of the private key | ||||
| <t>That someone can provide 'proof of possession' of the private key | ||||
| signing over a particular INR should not be taken to imply that they | signing over a particular INR should not be taken to imply that they | |||
| are a valid legal representative of the organization in possession | are a valid legal representative of the organization in possession | |||
| of that INR. They could be just an INR administrative person.</t> | of that INR. They could be in an INR administrative role, and not be a forma | |||
| l | ||||
| <t>Autonomous System Numbers do not identify real-world entities. | representative of the organization.</t> | |||
| <t>Autonomous System Numbers do not identify real-world entities. | ||||
| They are identifiers some network operators 'own' and are only used | They are identifiers some network operators 'own' and are only used | |||
| for loop detection in routing. They have no inherent semantics other | for loop detection in routing. They have no inherent semantics other | |||
| than uniqueness.</t> | than uniqueness.</t> | |||
| </section> | </section> | |||
| <section anchor="security"> | ||||
| <section anchor="security" title="Security Considerations"> | <name>Security Considerations</name> | |||
| <t>Attempts to use RPKI data to authenticate real-world documents or | ||||
| <t>Attempts to use RPKI data to authenticate real-world documents or | ||||
| other artifacts requiring identity, while possibly cryptographically | other artifacts requiring identity, while possibly cryptographically | |||
| valid within the RPKI, are misleading as to any authenticity.</t> | valid within the RPKI, are misleading as to any authenticity.</t> | |||
| <t>When a document is signed with the private key associated with an | ||||
| <t>When a document is signed with the private key associated with an | RPKI certificate, the signer is speaking for the INRs (the IP address | |||
| RPKI certificate, the signer is speaking for the INRs, the IP | space and AS numbers) in the certificate. This is not an identity; this | |||
| address space and Autonomous System (AS) numbers, in the | is an authorization. In schemes such as Resource Tagged Attestations | |||
| certificate. This is not an identity; this is an authorization. In | <xref target="I-D.ietf-sidrops-rpki-rta"/> and Signed Checklists <xref | |||
| schemes such as <xref target="I-D.ietf-sidrops-rpki-rta"/> and <xref | target="I-D.ietf-sidrops-rpki-rsc"/>, the signed message further narrows | |||
| target="I-D.ietf-sidrops-rpki-rsc"/> the signed message further | this scope of INRs. The INRs in the message are a subset of the INRs in | |||
| narrows this scope of INRs. The INRs in the message are a subset of | the certificate. If the signature is valid, the message content comes | |||
| the INRs in the certificate. If the signature is valid, the message | from a party that is authorized to speak for that subset of INRs.</t> | |||
| content comes from a party that is authorized to speak for that | <t>Control of INRs for an entity could be used to falsely authorize | |||
| subset of INRs.</t> | ||||
| <t>Control of INRs for an entity could be used to falsely authorize | ||||
| transactions or documents for which the INR manager has no | transactions or documents for which the INR manager has no | |||
| authority.</t> | authority.</t> | |||
| <!-- | ||||
| <t>RPKI-based credentials of INRs MUST NOT be used to authenticate | ||||
| real-world documents or transactions without some formal external | ||||
| authentication of the INR and the authority for the actually | ||||
| anonymous INR holder to authenticate the particular document or | ||||
| transaction.</t> | ||||
| </section> | ||||
| <section anchor="iana" title="IANA Considerations"> | ||||
| <t>This document has no IANA Considerations.</t> | ||||
| <!-- | ||||
| <t>Note to RFC Editor: this section may be replaced on publication | ||||
| as an RFC.</t> | ||||
| --> | ||||
| </section> | </section> | |||
| <section anchor="iana"> | ||||
| <name>IANA Considerations</name> | ||||
| <t>This document has no IANA actions.</t> | ||||
| </section> | ||||
| </middle> | ||||
| <back> | ||||
| <section anchor="acks" title="Acknowledgments"> | <displayreference target="I-D.ietf-sidrops-rpki-rsc" to="RPKI-RSC"/> | |||
| <displayreference target="I-D.ietf-sidrops-rpki-rta" to="RPKI-RTA"/> | ||||
| <displayreference target="I-D.ietf-sidrops-aspa-profile" to="ASPA-PROFILE"/> | ||||
| <t>The authors thank George Michaelson and Job Snijders for lively | <references> | |||
| discussion, Geoff Huston for some more formal text, Ties de Kock for | <name>References</name> | |||
| useful suggestions, many directorate and IESG reviewers, and last | <references> | |||
| but not least, Biff for the loan of Bill's Bait and Sushi.</t> | <name>Normative References</name> | |||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.2119.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.5280.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.6480.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.7382.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.8174.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.8635.xml"/> | ||||
| </references> | ||||
| <references> | ||||
| <name>Informative References</name> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.3912.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.6493.xml"/> | ||||
| </section> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D .ietf-sidrops-rpki-rsc.xml"/> | |||
| </middle> | <!-- [I-D.ietf-sidrops-rpki-rta] IESG state Expired. | |||
| Full ref in order to correct initials. --> | ||||
| <reference anchor="I-D.ietf-sidrops-rpki-rta"> | ||||
| <front> | ||||
| <title>A profile for Resource Tagged Attestations (RTAs)</title> | ||||
| <author initials="G." surname="Michaelson" fullname="George G. Michaelson" | ||||
| > | ||||
| <organization>Asia Pacific Network Information Centre</organization> | ||||
| </author> | ||||
| <author initials="G." surname="Huston" fullname="Geoff Huston"> | ||||
| <organization>Asia Pacific Network Information Centre</organization> | ||||
| </author> | ||||
| <author initials="T." surname="Harrison" fullname="Tom Harrison"> | ||||
| <organization>Asia Pacific Network Information Centre</organization> | ||||
| </author> | ||||
| <author initials="T." surname="Bruijnzeels" fullname="Tim Bruijnzeels"> | ||||
| <organization>NLNet Labs B.V.</organization> | ||||
| </author> | ||||
| <author initials="M." surname="Hoffmann" fullname="Martin Hoffmann"> | ||||
| <organization>NLNet Labs B.V.</organization> | ||||
| </author> | ||||
| <date month="January" day="21" year="2021" /> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-rta-00" /> | ||||
| </reference> | ||||
| <back> | <!-- [I-D.ietf-sidrops-aspa-profile] IESG state I-D Exists --> | |||
| <references title="Normative References"> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D | |||
| <?rfc include="reference.RFC.2119.xml"?> | .ietf-sidrops-aspa-profile.xml"/> | |||
| <?rfc include="reference.RFC.5280.xml"?> | </references> | |||
| <?rfc include="reference.RFC.6480.xml"?> | ||||
| <?rfc include="reference.RFC.7382.xml"?> | ||||
| <?rfc include="reference.RFC.8174.xml"?> | ||||
| <?rfc include="reference.RFC.8635.xml"?> | ||||
| </references> | </references> | |||
| <references title="Informative References"> | <section anchor="acks" numbered="false"> | |||
| <?rfc include="reference.RFC.3912.xml"?> | <name>Acknowledgments</name> | |||
| <?rfc include="reference.RFC.6493.xml"?> | <t>The authors thank <contact fullname="George Michaelson"/> and <contact | |||
| <?rfc include="reference.I-D.ietf-sidrops-rpki-rsc.xml"?> | fullname="Job Snijders"/> for lively | |||
| <?rfc include="reference.I-D.ietf-sidrops-rpki-rta.xml"?> | discussion, <contact fullname="Geoff Huston"/> for some more formal text, <c | |||
| <?rfc include="reference.I-D.ietf-sidrops-aspa-profile.xml"?> | ontact fullname="Ties de Kock"/> for | |||
| </references> | useful suggestions, many directorate and IESG reviewers, and last | |||
| but not least, Biff for the loan of Bill's Bait and Sushi.</t> | ||||
| </section> | ||||
| </back> | </back> | |||
| </rfc> | </rfc> | |||
| End of changes. 51 change blocks. | ||||
| 186 lines changed or deleted | 199 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||