| < draft-ietf-sidrops-rpki-has-no-identity-06.txt | draft-ietf-sidrops-rpki-has-no-identity-07.txt > | |||
|---|---|---|---|---|
| Network Working Group R. Bush | Network Working Group R. Bush | |||
| Internet-Draft Arrcus & Internet Initiative Japan | Internet-Draft Arrcus & Internet Initiative Japan | |||
| Intended status: Standards Track R. Housley | Intended status: Standards Track R. Housley | |||
| Expires: 16 October 2022 Vigil Security | Expires: 21 October 2022 Vigil Security | |||
| 14 April 2022 | 19 April 2022 | |||
| The I in RPKI does not stand for Identity | The I in RPKI does not stand for Identity | |||
| draft-ietf-sidrops-rpki-has-no-identity-06 | draft-ietf-sidrops-rpki-has-no-identity-07 | |||
| Abstract | Abstract | |||
| There is a false notion that Internet Number Resources (INRs) in the | There is a false notion that Internet Number Resources (INRs) in the | |||
| RPKI can be associated with the real-world identity of the 'holder' | RPKI can be associated with the real-world identity of the 'holder' | |||
| of an INR. This document attempts to put that notion to rest. | of an INR. This document specifies that RPKI does not associate to | |||
| the INR holder. | ||||
| Requirements Language | Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 1, line 41 ¶ | skipping to change at page 1, line 42 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 16 October 2022. | This Internet-Draft will expire on 21 October 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| skipping to change at page 2, line 20 ¶ | skipping to change at page 2, line 20 ¶ | |||
| extracted from this document must include Revised BSD License text as | extracted from this document must include Revised BSD License text as | |||
| described in Section 4.e of the Trust Legal Provisions and are | described in Section 4.e of the Trust Legal Provisions and are | |||
| provided without warranty as described in the Revised BSD License. | provided without warranty as described in the Revised BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. The RPKI is for Authorization . . . . . . . . . . . . . . . . 3 | 2. The RPKI is for Authorization . . . . . . . . . . . . . . . . 3 | |||
| 3. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 6 | 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . 6 | 7.1. Normative References . . . . . . . . . . . . . . . . . . 6 | |||
| 7.2. Informative References . . . . . . . . . . . . . . . . . 6 | 7.2. Informative References . . . . . . . . . . . . . . . . . 6 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 1. Introduction | 1. Introduction | |||
| The Resource Public Key Infrastructure (RPKI), see [RFC6480], | The Resource Public Key Infrastructure (RPKI), see [RFC6480], | |||
| "Represents the allocation hierarchy of IP address space and | "Represents the allocation hierarchy of IP address space and | |||
| skipping to change at page 3, line 7 ¶ | skipping to change at page 3, line 7 ¶ | |||
| INR 'holder' of those resources with the inappropriate expectation | INR 'holder' of those resources with the inappropriate expectation | |||
| that the signature will be considered an attestation to the | that the signature will be considered an attestation to the | |||
| authenticity of the document content. But in reality, the RPKI | authenticity of the document content. But in reality, the RPKI | |||
| certificate is only an authorization to speak for the explicitly | certificate is only an authorization to speak for the explicitly | |||
| identified INRs; it is explicitly not intended for authentication of | identified INRs; it is explicitly not intended for authentication of | |||
| the 'holders' of the INRs. This situation is emphasized in | the 'holders' of the INRs. This situation is emphasized in | |||
| Section 2.1 of [RFC6480]. | Section 2.1 of [RFC6480]. | |||
| It has been suggested that one could authenticate real-world business | It has been suggested that one could authenticate real-world business | |||
| transactions with the signatures of INR holders. E.g. Bill's Bait | transactions with the signatures of INR holders. E.g. Bill's Bait | |||
| and Sushi could use the private key attesting to that they are the | and Sushi (BB&S) could use the private key attesting to that they are | |||
| holder of their AS in the RPKI to sign a Letter of Authorization | the holder of their AS in the RPKI to sign a Letter of Authorization | |||
| (LOA) for some other party to rack and stack hardware owned by BB&S. | (LOA) for some other party to rack and stack hardware owned by BB&S. | |||
| Unfortunately, while this may be technically possible, it is neither | Unfortunately, while this may be technically possible, it is neither | |||
| appropriate nor meaningful. | appropriate nor meaningful. | |||
| The I in RPKI actually stands for "Infrastructure," as in Resource | The I in RPKI actually stands for "Infrastructure," as in Resource | |||
| Public Key Infrastructure, not for "Identity". In fact, the RPKI | Public Key Infrastructure, not for "Identity". In fact, the RPKI | |||
| does not provide any association between INRs and the real world | does not provide any association between INRs and the real world | |||
| holder(s) of those INRs. The RPKI provides authorization to make | holder(s) of those INRs. The RPKI provides authorization to make | |||
| assertions only regarding named IP address blocks, AS numbers, etc. | assertions only regarding Internet Number Resources, such as IP | |||
| prefixes or AS numbers, and data such as ASPA | ||||
| [I-D.ietf-sidrops-aspa-profile]records. | ||||
| In short, avoid the desire to use RPKI certificates for any purpose | In short, avoid the desire to use RPKI certificates for any purpose | |||
| other than the verification of authorizations associated with the | other than the verification of authorizations associated with the | |||
| delegation of INRs or attestations related to INRs. Instead, | delegation of INRs or attestations related to INRs. Instead, | |||
| recognize that these authorizations and attestations take place | recognize that these authorizations and attestations take place | |||
| irrespective of the identity of a RPKI private key holder. | irrespective of the identity of a RPKI private key holder. | |||
| 2. The RPKI is for Authorization | 2. The RPKI is for Authorization | |||
| The RPKI was designed and specified to sign certificates for use | The RPKI was designed and specified to sign certificates for use | |||
| within the RPKI itself and to generate Route Origin Authorizations | within the RPKI itself and to generate Route Origin Authorizations | |||
| (ROAs), [RFC6480], for use in routing. Its design intentionally | (ROAs), [RFC6480], for use in routing. Its design intentionally | |||
| precluded use for attesting to real-world identity as, among other | precluded use for attesting to real-world identity as, among other | |||
| issues, it would expose the Certification Authority (CA) to | issues, it would expose the Certification Authority (CA) to | |||
| liability. | liability. | |||
| That the RPKI does not authenticate real-world identity is by design. | That the RPKI does not authenticate real-world identity is by design. | |||
| If it tried to do so, aside from the liability, it would end in a | If it tried to do so, aside from the liability, it would end in a | |||
| world of complexity with no proof of termination, as X.400 learned. | world of complexity with no proof of termination. | |||
| Registries such as the Regional Internet Registries (RIRs) provide | Registries such as the Regional Internet Registries (RIRs) provide | |||
| INR to real-world identity mapping through WHOIS, [RFC3912], and | INR to real-world identity mapping through WHOIS, [RFC3912], and | |||
| similar services. They claim to be authoritative, at least for the | similar services. They claim to be authoritative, at least for the | |||
| INRs which they allocate. | INRs which they allocate. | |||
| PKI operations MUST NOT be performed with RPKI certificates other | That is, RPKI-based credentials of INRs MUST NOT be used to | |||
| than exactly as described, and for the purposes described, in | authenticate real-world documents or transactions. That might be | |||
| [RFC6480]. That is, RPKI-based credentials of INRs MUST NOT be used | done with some formal external authentication of authority allowing | |||
| to authenticate real-world documents or transactions without some | an otherwise anonymous INR holder to authenticate the particular | |||
| formal external authentication of the INR and the authority for the | document or transaction. Given such external, i.e. non-RPKI, | |||
| actually anonymous INR holder to authenticate the particular document | verification of authority, the use of RPKI-based credentials adds no | |||
| or transaction. | authenticity. | |||
| I.e., RPKI-based credentials of INRs MUST NOT be used to authenticate | ||||
| real-world documents or transactions without some formal external | ||||
| authentication of the INR and the authority for the actually | ||||
| anonymous INR holder to authenticate the particular document or | ||||
| transaction. | ||||
| Given sufficient external, i.e. non-RPKI, verification of authority, | ||||
| the use of RPKI-based credentials seems superfluous. | ||||
| 3. Discussion | 3. Discussion | |||
| The RPKI base document, [RFC6480], Section 2.1 says explicitly "An | The RPKI base document, [RFC6480], Section 2.1 says explicitly "An | |||
| important property of this PKI is that certificates do not attest to | important property of this PKI is that certificates do not attest to | |||
| the identity of the subject." | the identity of the subject." | |||
| The Template for a Certification Practice Statement (CPS) for the | The Template for a Certification Practice Statement (CPS) for the | |||
| Resource PKI (RPKI) [RFC7382] Section 3.1, Naming, makes very clear | Resource PKI (RPKI) [RFC7382] Section 3.1, Naming, makes very clear | |||
| that "The Subject name in each certificate SHOULD NOT be meaningful;" | that "The Subject name in each certificate SHOULD NOT be meaningful;" | |||
| skipping to change at page 5, line 36 ¶ | skipping to change at page 5, line 28 ¶ | |||
| that INR. They could be just an INR administrative person. | that INR. They could be just an INR administrative person. | |||
| Autonomous System Numbers do not identify real-world entities. They | Autonomous System Numbers do not identify real-world entities. They | |||
| are identifiers some network operators 'own' and are only used for | are identifiers some network operators 'own' and are only used for | |||
| loop detection in routing. They have no inherent semantics other | loop detection in routing. They have no inherent semantics other | |||
| than uniqueness. | than uniqueness. | |||
| 4. Security Considerations | 4. Security Considerations | |||
| Attempts to use RPKI data to authenticate real-world documents or | Attempts to use RPKI data to authenticate real-world documents or | |||
| other artifacts requiring identity are invalid and misleading. | other artifacts requiring identity, while possibly cryptographically | |||
| valid within the RPKI, are misleading as to any authenticity. | ||||
| When a document is signed with the private key associated with an | When a document is signed with the private key associated with an | |||
| RPKI certificate, the signer is speaking for the INRs, the IP address | RPKI certificate, the signer is speaking for the INRs, the IP address | |||
| space and Autonomous System (AS) numbers, in the certificate. This | space and Autonomous System (AS) numbers, in the certificate. This | |||
| is not an identity; this is an authorization. In schemes such as | is not an identity; this is an authorization. In schemes such as | |||
| [I-D.ietf-sidrops-rpki-rta] and [I-D.ietf-sidrops-rpki-rsc] the | [I-D.ietf-sidrops-rpki-rta] and [I-D.ietf-sidrops-rpki-rsc] the | |||
| signed message further narrows this scope of INRs. The INRs in the | signed message further narrows this scope of INRs. The INRs in the | |||
| message are a subset of the INRs in the certificate. If the | message are a subset of the INRs in the certificate. If the | |||
| signature is valid, the message content comes from a party that is | signature is valid, the message content comes from a party that is | |||
| authorized to speak for that subset of INRs. | authorized to speak for that subset of INRs. | |||
| skipping to change at page 6, line 13 ¶ | skipping to change at page 6, line 9 ¶ | |||
| transactions or documents for which the INR manager has no authority. | transactions or documents for which the INR manager has no authority. | |||
| 5. IANA Considerations | 5. IANA Considerations | |||
| This document has no IANA Considerations. | This document has no IANA Considerations. | |||
| 6. Acknowledgments | 6. Acknowledgments | |||
| The authors thank George Michaelson and Job Snijders for lively | The authors thank George Michaelson and Job Snijders for lively | |||
| discussion, Geoff Huston for some more formal text, Ties de Kock for | discussion, Geoff Huston for some more formal text, Ties de Kock for | |||
| useful suggestions, and last but not least, Biff for the loan of | useful suggestions, many directorate and IESG reviewers, and last but | |||
| Bill's Bait and Sushi. | not least, Biff for the loan of Bill's Bait and Sushi. | |||
| 7. References | 7. References | |||
| 7.1. Normative References | 7.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| skipping to change at page 6, line 50 ¶ | skipping to change at page 6, line 46 ¶ | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| [RFC8635] Bush, R., Turner, S., and K. Patel, "Router Keying for | [RFC8635] Bush, R., Turner, S., and K. Patel, "Router Keying for | |||
| BGPsec", RFC 8635, DOI 10.17487/RFC8635, August 2019, | BGPsec", RFC 8635, DOI 10.17487/RFC8635, August 2019, | |||
| <https://www.rfc-editor.org/info/rfc8635>. | <https://www.rfc-editor.org/info/rfc8635>. | |||
| 7.2. Informative References | 7.2. Informative References | |||
| [I-D.ietf-sidrops-aspa-profile] | ||||
| Azimov, A., Uskov, E., Bush, R., Patel, K., Snijders, J., | ||||
| and R. Housley, "A Profile for Autonomous System Provider | ||||
| Authorization", Work in Progress, Internet-Draft, draft- | ||||
| ietf-sidrops-aspa-profile-07, 31 January 2022, | ||||
| <https://www.ietf.org/archive/id/draft-ietf-sidrops-aspa- | ||||
| profile-07.txt>. | ||||
| [I-D.ietf-sidrops-rpki-rsc] | [I-D.ietf-sidrops-rpki-rsc] | |||
| Snijders, J., Harrison, T., and B. Maddison, "Resource | Snijders, J., Harrison, T., and B. Maddison, "Resource | |||
| Public Key Infrastructure (RPKI) object profile for Signed | Public Key Infrastructure (RPKI) object profile for Signed | |||
| Checklist (RSC)", Work in Progress, Internet-Draft, draft- | Checklist (RSC)", Work in Progress, Internet-Draft, draft- | |||
| ietf-sidrops-rpki-rsc-06, 12 February 2022, | ietf-sidrops-rpki-rsc-06, 12 February 2022, | |||
| <https://www.ietf.org/archive/id/draft-ietf-sidrops-rpki- | <https://www.ietf.org/archive/id/draft-ietf-sidrops-rpki- | |||
| rsc-06.txt>. | rsc-06.txt>. | |||
| [I-D.ietf-sidrops-rpki-rta] | [I-D.ietf-sidrops-rpki-rta] | |||
| Michaelson, G. G., Huston, G., Harrison, T., Bruijnzeels, | Michaelson, G. G., Huston, G., Harrison, T., Bruijnzeels, | |||
| End of changes. 12 change blocks. | ||||
| 29 lines changed or deleted | 32 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||