Internet DRAFT - draft-timbru-sidrops-change-pubserver
draft-timbru-sidrops-change-pubserver
Network Working Group T. Bruijnzeels
Internet-Draft NLnet Labs
Intended status: Informational 24 October 2022
Expires: 27 April 2023
Change Publication Server used by an RPKI CA
draft-timbru-sidrops-change-pubserver-00
Abstract
This draft outlines how Krill, an RPKI CA and Publication Server,
implements the process that allows a CA to change the Publication
Server it uses, migrating its content from the old server, to the new
server's repository.
The current implementation is modelled after the RPKI CA Key Rollover
process defined in RFC 6489, except that in this case a new location
is used for the new key.
It incudes some discussion about possible improvements to the
process.
The goal of this draft is to serve as a starting point for a broader
discussion on how RPKI Repository Migration should be done. If
adopted as a working group item, the status could be changed to
standard or bcp, and the intent would of course be to update the
content to reflect working group consensus rather than what happens
to have been implemented in Krill at this time.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 27 April 2023.
Bruijnzeels Expires 27 April 2023 [Page 1]
Internet-Draft Change Publication Server October 2022
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Requirements notation . . . . . . . . . . . . . . . . . . . . 2
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
3. Migration Process . . . . . . . . . . . . . . . . . . . . . . 3
3.1. Upload new Repository Response . . . . . . . . . . . . . 3
3.2. Create new Key . . . . . . . . . . . . . . . . . . . . . 3
3.3. Manifest and CRL for new Key . . . . . . . . . . . . . . 3
3.4. Staging Period . . . . . . . . . . . . . . . . . . . . . 4
3.5. Activate new Key . . . . . . . . . . . . . . . . . . . . 4
3.6. Revoke old Key . . . . . . . . . . . . . . . . . . . . . 4
4. Possible Improvements . . . . . . . . . . . . . . . . . . . . 4
4.1. AIA . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
4.2. Timing Issues . . . . . . . . . . . . . . . . . . . . . . 5
4.3. Duplication? . . . . . . . . . . . . . . . . . . . . . . 5
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
6. Security Considerations . . . . . . . . . . . . . . . . . . . 6
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6
8. Normative References . . . . . . . . . . . . . . . . . . . . 6
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 7
1. Requirements notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
2. Introduction
There are a number of reasons why a CA may wish to migrate from its
current Publication Server to a new one.
Bruijnzeels Expires 27 April 2023 [Page 2]
Internet-Draft Change Publication Server October 2022
One reason may be that an organisation is running their own
Publication Server, but they wish to migrate to a server operated by
their parent (e.g. a Regional Internet Registry). Possibly because
their parent did not offer this service when they first set up their
CA, but now they do.
Another reason may be that the current Publication Server used by a
CA is failing behind in terms of their availability on either the
publication protocol [RFC8181], or the public rsync or RRDP [RFC8182]
repository compared to other options.
If the current Publication Server has become unavailable, and there
is no sign that it will become available again, then that may
constitute an even more urgent reason to migrate to a new server.
In this document we explain how Krill, an RPKI CA and Publication
Server implementation, currently uses a modified RPKI Key Rollover
[RFC6489] process to allow a CA to change the Publication Server
used.
3. Migration Process
3.1. Upload new Repository Response
The migration to a new Publication Server is initiated by uploading a
new [RFC8183] Repository Response XML for that new server.
When the XML is uploaded the CA verifies that it can communicate with
the new server by sending it an [RFC8181] list query. If the query
is successful, the new server is accepted and the CA proceeds to the
next step.
3.2. Create new Key
The second step in the process is that the CA generates a new key
pair, and then requests a new certificate for this key from its
parent (using [!@RFC6492]). The Certificate Sign Request for this
new key uses the URIs that pertain to the new Publication Server.
3.3. Manifest and CRL for new Key
When the CA receives a certificate for the new key, which uses the
new Publication Server, it generates a CRL and Manifest and publishes
these at the new server.
Bruijnzeels Expires 27 April 2023 [Page 3]
Internet-Draft Change Publication Server October 2022
RPKI signed objects such as ROAs or possibly CA certificates for its
own children are only published under the "current" key. I.e. they
are not yet published at the new server. This is similar to step 3
in the CA Key Rollover Procedure defined in section 2 of [!@RFC6489].
3.4. Staging Period
According to step 4, in section 2 of [!@RFC6489] a staging period of
at least 24 hours SHOULD be used. The current implementation in
Krill leaves this decision to the operators. A shorter period is
advisable if the current Publication Server is unavailable.
3.5. Activate new Key
When the new key is activated all RPKI signed objects are published
under the new key, and therefore published at the new Publication
Server, and they are removed from the current key's manifest and
publication point.
This is essentially the same as defined in step 5 of section 2 of
[!@RFC6489], except that keys use a different Publication Servers and
they will typically use a different [RFC8183] "sia_base" and
"rrdp_notification_uri".
3.6. Revoke old Key
The final step in the process is that the CA requests revocation of
its, previously CURRENT, now OLD key. When this key is revoked the
CA removes all content from the OLD publication server for this key.
4. Possible Improvements
4.1. AIA
It should be noted that the AIA URIs for delegated CA certificates
will change when the new repository is used, even if the child CA
keys and subjects did not change, and even if the produced .cer files
have the same name - they will be published in a different
publication point.
Relying Parties may warn when AIA URIs in the RPKI signed objects
(Manifest, ROAs, etc) and possible certificates (delegated CA or
BGPSec Router certificates) published do not match the location of
the signing CA certificate in the new publication point, but they
would accept them as long as they are otherwise valid.
Bruijnzeels Expires 27 April 2023 [Page 4]
Internet-Draft Change Publication Server October 2022
4.2. Timing Issues
One important thing to note is that the CA needs to publish in two
different locations when the new key is activated in the process
defined here.
This can lead to timing issues where Relying Parties see equivalent
objects under both keys. This happens if they get the NEW objects
before seeing them disappear from the OLD key. This is not expected
to lead to significant issues.
On the other hand, it may also turn out that the Relying Party sees
the objects disappear from under the OLD key, but it has not yet seen
the equivalent objects under the NEW key. This can have a big
impact. All ROAs would disappear temporarily which could impact
routing even if announcements would fall back to the ROV state "Not
Found" ([RFC6811]). But, any delegated CA certificates would also
disappear (temporarily) and as a consequence any ROAs or other
objects published by children. So, if this happens to a CA near the
top of the RPKI tree the impact can be quite significant.
For this reason we may want to change the "Activate Key" step to use
three separate steps:
* publish objects under the NEW key,
* enter a staging period
* only then remove the objects from the (now OLD) key
4.3. Duplication?
If we would use the staging period mentioned in the previous section,
then Relying Parties will find any possible delegated CA certificates
under both publication points for some time. Both CA certificates
will use the same subject key and SIA values. Therefore, Relying
Parties will find the published objects under two paths - and they
will appear valid under both.
This will cause RPs to keep more data. This is not expected to be a
huge issue.. as any duplicated Validated ROA Prefixes [RFC6811] would
be filtered out in the RPKI-RTR protocol ([RFC8210]).
5. IANA Considerations
OID needs to be requested.
Bruijnzeels Expires 27 April 2023 [Page 5]
Internet-Draft Change Publication Server October 2022
6. Security Considerations
TBD
7. Acknowledgements
TBD
8. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC6489] Huston, G., Michaelson, G., and S. Kent, "Certification
Authority (CA) Key Rollover in the Resource Public Key
Infrastructure (RPKI)", BCP 174, RFC 6489,
DOI 10.17487/RFC6489, February 2012,
<https://www.rfc-editor.org/info/rfc6489>.
[RFC6811] Mohapatra, P., Scudder, J., Ward, D., Bush, R., and R.
Austein, "BGP Prefix Origin Validation", RFC 6811,
DOI 10.17487/RFC6811, January 2013,
<https://www.rfc-editor.org/info/rfc6811>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8181] Weiler, S., Sonalker, A., and R. Austein, "A Publication
Protocol for the Resource Public Key Infrastructure
(RPKI)", RFC 8181, DOI 10.17487/RFC8181, July 2017,
<https://www.rfc-editor.org/info/rfc8181>.
[RFC8182] Bruijnzeels, T., Muravskiy, O., Weber, B., and R. Austein,
"The RPKI Repository Delta Protocol (RRDP)", RFC 8182,
DOI 10.17487/RFC8182, July 2017,
<https://www.rfc-editor.org/info/rfc8182>.
[RFC8183] Austein, R., "An Out-of-Band Setup Protocol for Resource
Public Key Infrastructure (RPKI) Production Services",
RFC 8183, DOI 10.17487/RFC8183, July 2017,
<https://www.rfc-editor.org/info/rfc8183>.
Bruijnzeels Expires 27 April 2023 [Page 6]
Internet-Draft Change Publication Server October 2022
[RFC8210] Bush, R. and R. Austein, "The Resource Public Key
Infrastructure (RPKI) to Router Protocol, Version 1",
RFC 8210, DOI 10.17487/RFC8210, September 2017,
<https://www.rfc-editor.org/info/rfc8210>.
Author's Address
Tim Bruijnzeels
NLnet Labs
Email: tim@nlnetlabs.nl
URI: https://www.nlnetlabs.nl/
Bruijnzeels Expires 27 April 2023 [Page 7]