rfc9829v1.txt   rfc9829.txt 
skipping to change at line 78 skipping to change at line 78
Section 5.2.3 of [RFC5280] describes the value of the Certificate Section 5.2.3 of [RFC5280] describes the value of the Certificate
Revocation List (CRL) Number extension as a monotonically increasing Revocation List (CRL) Number extension as a monotonically increasing
sequence number, which "allows users to easily determine when a sequence number, which "allows users to easily determine when a
particular CRL supersedes another CRL". In other words, in Public particular CRL supersedes another CRL". In other words, in Public
Key Infrastructures (PKIs) in which it is possible for Relying Key Infrastructures (PKIs) in which it is possible for Relying
Parties (RPs) to encounter multiple usable CRLs, the CRL Number Parties (RPs) to encounter multiple usable CRLs, the CRL Number
extension is a means for an RP to determine which CRLs to rely upon. extension is a means for an RP to determine which CRLs to rely upon.
In the Resource Public Key Infrastructure (RPKI), a well-formed In the Resource Public Key Infrastructure (RPKI), a well-formed
Manifest fileList contains exactly one entry for its associated CRL, manifest fileList contains exactly one entry for its associated CRL,
together with a collision-resistant message digest of that CRL's together with a collision-resistant message digest of that CRL's
contents (see Section 2.2 of [RFC6481] and Section 2 of [RFC9286]). contents (see Section 2.2 of [RFC6481] and Section 2 of [RFC9286]).
Additionally, the target of the CRL Distribution Points extension in Additionally, the target of the CRL Distribution Points extension in
an RPKI Resource Certificate is the same CRL object listed on the an RPKI Resource Certificate is the same CRL object listed on the
issuing Certification Authorities (CAs) current manifest (see issuing Certification Authorities (CAs) current manifest (see
Section 4.8.6 of [RFC6487]). Together, these properties guarantee Section 4.8.6 of [RFC6487]). Together, these properties guarantee
that RPKI RPs will always be able to unambiguously identify exactly that RPKI RPs will always be able to unambiguously identify exactly
one current CRL for each RPKI CA. Thus, in the RPKI, the ordering one current CRL for each RPKI CA. Thus, in the RPKI, the ordering
functionality provided by CRL Numbers is fully subsumed by functionality provided by CRL Numbers is fully subsumed by
monotonically increasing Manifest Numbers (Section 4.2.1 of monotonically increasing manifest numbers (Section 4.2.1 of
[RFC9286]), thereby obviating the need for RPKI RPs to process CRL [RFC9286]), thereby obviating the need for RPKI RPs to process CRL
Number extensions at all. Number extensions at all.
Therefore, although the CRL Number extension is mandatory in RPKI Therefore, although the CRL Number extension is mandatory in RPKI
CRLs for compliance with the X.509 v2 CRL Profile (Section 5 of CRLs for compliance with the X.509 v2 CRL Profile (Section 5 of
[RFC5280]), any use of this extension by RPKI RPs merely adds [RFC5280]), any use of this extension by RPKI RPs merely adds
complexity and fragility to RPKI Resource Certificate path complexity and fragility to RPKI Resource Certificate path
validation. This document mandates that RPKI RPs ignore the CRL validation. This document mandates that RPKI RPs ignore the CRL
Number extension. Number extension.
skipping to change at line 141 skipping to change at line 141
2. Summary 2. Summary
This document clarifies that, in the RPKI, there is exactly one CRL This document clarifies that, in the RPKI, there is exactly one CRL
that is appropriate and relevant for determining the revocation that is appropriate and relevant for determining the revocation
status of a given resource certificate. It is the unique CRL object status of a given resource certificate. It is the unique CRL object
that is simultaneously: that is simultaneously:
* the target of the certificate's CRL Distribution Points extension, * the target of the certificate's CRL Distribution Points extension,
and and
* listed in the issuing CA's current Manifest fileList and has a * listed in the issuing CA's current manifest fileList and has a
matching hash (see Section 4.2.1 of [RFC9286]). matching hash (see Section 4.2.1 of [RFC9286]).
In particular, a resource certificate cannot be validated without In particular, a resource certificate cannot be validated without
recourse to the current Manifest of the certificate's issuer. consulting the current manifest of the certificate's issuer.
3. Updates to RFC 6487 3. Updates to RFC 6487
3.1. Updates to Section 5 3.1. Updates to Section 5
This section updates Section 5 of [RFC6487] as follows: This section updates Section 5 of [RFC6487] as follows:
* First change: * First change:
OLD OLD
skipping to change at line 188 skipping to change at line 188
NEW NEW
| An RPKI CA MUST include exactly two extensions in every CRL | An RPKI CA MUST include exactly two extensions in every CRL
| that it issues: an Authority Key Identifier (AKI) and a CRL | that it issues: an Authority Key Identifier (AKI) and a CRL
| Number. No other CRL extensions are allowed. | Number. No other CRL extensions are allowed.
| |
| - RPs MUST process the AKI extension. | - RPs MUST process the AKI extension.
| |
| - RPs MUST ignore the CRL Number extension except for checking | - RPs MUST ignore the CRL Number extension except for checking
| that it is marked as non-critical and contains a non- | that it is marked as non-critical and contains a non-
| negative integer less than or equal to 2^(159-1). | negative integer less than or equal to 2^159-1.
3.2. Update to Section 7.2 3.2. Update to Section 7.2
This section updates Section 7.2 of [RFC6487] as follows: This section updates Section 7.2 of [RFC6487] as follows:
OLD OLD
| 5. The issuer has not revoked the certificate. A revoked | 5. The issuer has not revoked the certificate. A revoked
| certificate is identified by the certificate's serial number | certificate is identified by the certificate's serial number
| being listed on the issuer's current CRL, as identified by the | being listed on the issuer's current CRL, as identified by the
| CRLDP of the certificate, the CRL is itself valid, and the | CRLDP of the certificate, the CRL is itself valid, and the
| public key used to verify the signature on the CRL is the same | public key used to verify the signature on the CRL is the same
| public key used to verify the certificate itself. | public key used to verify the certificate itself.
NEW NEW
| 5. The issuer has not revoked the certificate. A revoked | 5. The issuer has not revoked the certificate. A revoked
| certificate is identified by the certificate's serial number | certificate is identified by the certificate's serial number
| being listed on the issuer's current CRL, as identified by the | being listed on the issuer's current CRL, as identified by the
| issuer's current Manifest and the CRLDP of the certificate. | issuer's current manifest and the CRLDP of the certificate.
| The CRL is itself valid and the public key used to verify the | The CRL is itself valid and the public key used to verify the
| signature on the CRL is the same public key used to verify the | signature on the CRL is the same public key used to verify the
| certificate itself. | certificate itself.
4. Operational Considerations 4. Operational Considerations
This document has no additional operational considerations compared This document has no additional operational considerations beyond
to Section 9 of [RFC6487]. those described in Section 9 of [RFC6487].
5. Security Considerations 5. Security Considerations
The Security Considerations of [RFC3779], [RFC5280], and [RFC6487] The Security Considerations of [RFC3779], [RFC5280], and [RFC6487]
apply to Resource Certificates and CRLs. apply to Resource Certificates and CRLs.
This document explicates that, in the RPKI, the CRL listed on the This document explicates that, in the RPKI, the CRL listed on the
certificate issuer's current Manifest is the one relevant and certificate issuer's current manifest is the one relevant and
appropriate for determining the revocation status of a resource appropriate for determining the revocation status of a resource
certificate. By way of the hash in the manifest's fileList this certificate. The hash in the manifest's fileList provides a
provides a cryptographic guarantee on the Certification Authority's cryptographic guarantee on the Certification Authority's intent that
intent that this is the most recent CRL and removes possible replay this is the most recent CRL and removes possible replay vectors.
vectors.
6. IANA Considerations 6. IANA Considerations
This document has no IANA actions. This document has no IANA actions.
7. References 7. References
7.1. Normative References 7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
 End of changes. 9 change blocks. 
13 lines changed or deleted 12 lines changed or added

This html diff was produced by rfcdiff 1.48.