Internet-Draft | RPKI Repository Requirements | October 2021 |
Bruijnzeels, et al. | Expires 25 April 2022 | [Page] |
This document formulates a plan of a phased transition to a state where RPKI repositories and Relying Party software performing RPKI Validation will use the RPKI Repository Delta Protocol (RRDP) [RFC8182] as the preferred access protocol, and require rsync as a fallback option only.¶
In phase 0, today's deployment, RRDP is supported by most, but not all Repositories, and most but not all RP software.¶
In the proposed phase 1 RRDP will become mandatory to implement for Repositories, in addition to rsync. This phase can start as soon as this document is published.¶
Phase 2 will start once the proposed updates are implemented by all compliant Repositories. In this phase RRDP will become mandatory to implement for all compliant RP software, and rsync will be required as a fallback option only.¶
It should be noted that although this document currently includes descriptions and updates to RFCs for each of these phases, we may find that it will be beneficial to have one or more separate documents for these phases, so that it might be more clear to all when the updates to RFCs take effect.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 25 April 2022.¶
Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
The Resource Public Key Infrastructure (RPKI) [RFC6480] as originally defined uses rsync as its distribution protocol, as outlined in [RFC6481]. Later, the RPKI Repository Delta Protocol (RRDP) [RFC8182] was designed to provide an alternative. In order to facilitate incremental deployment RRDP has been deployed as an additional optional protocol, while rsync was still mandatory to implement.¶
While rsync has been very useful in the initial deployment of RPKI, a number of issues observed with it motivated the design of RRDP, e.g.:¶
RRDP was designed to leverage HTTPS CDN infrastructure to provide RPKI Repository content in a resilient way, while reducing the load on the Repository server. It supports updates being published as atomic deltas, which can help prevent most of the issues described in section 6 of [RFC6486].¶
For a longer discussion please see section 1 of [RFC8182].¶
In conclusion: we believe that while RRDP is not perfect, and we may indeed need future work to improve it, it is an improvement over using rsync in the context of RPKI. Therefore, this document outlines a transition plan where RRDP becomes mandatory to implement, and the operational dependency on rsync is reduced to that of a fallback option.¶
Changing the RPKI infrastructure to rely on RRDP instead of rsync is a delicate operation. There is current deployment of Certification Authorities, Repository Servers and Relying Party software which relies on rsync, and which may not yet support RRDP.¶
Therefore we need to have a plan that ultimately updates the relevant RFCs, but which uses a phased approach combined with measurements to limit the operational impact of doing this to (almost) zero.¶
The general outline of the plan is as follows. We will describe each step in more detail below.¶
Phase | Description |
---|---|
0 | RPKI repositories support rsync, and optionally RRDP |
1 | RPKI repositories support both rsync and RRDP |
2 | All RP software prefers RRDP |
This is the situation at the time of writing this document. Relying Parties can prefer RRDP over rsync today. Therefore all repositories should support RRDP at their earliest convenience.¶
Section 3.4.5 of [RFC8182] has the following on "Considerations Regarding Operational Failures in RRDP":¶
Relying Parties could attempt to use alternative repository access mechanisms, if they are available, according to the accessMethod element value(s) specified in the SIA of the associated certificate (see Section 4.8.8 of [RFC6487]).¶
The use of the lower case 'could' in this sentence has led some older versions of RP implementations to conclude that any fallback from RRDP to rsync as an alternative access mechanism is a local choice. However, following discussions on this subject it has become clear that there is a preference to instruct RP software to make use of all possible data sources. The main motivation being that because of RPKI object security using a secondary source of data can never lead to a worse outcome in terms of validation.¶
Per this document text mentioned above is replaced by the following:¶
Relying Parties MUST attempt to use alternative repository access mechanisms, if they are available, according to the accessMethod element value(s) specified in the SIA of the associated certificate (see Section 4.8.8 of [RFC6487]).¶
Note that there is a risk that the rsync repository, as the alternative access mechanism, becomes overloaded in case all Relying Parties fall back to it at roughly the same time due to an issue with RRDP. Therefore it is RECOMMENDED that Relying Parties use a retry strategy and/or random jitter time before falling back to rsync. But, the fallback to rsync MUST NOT be postponed for more than 1 hour.¶
Section 3.3 of [RFC8182] stipulates that RRDP files MUST be made available by repositories which support RRDP. In other words [RFC8182] expects that RRDP repository availability is treated as a critical service wherever it is supported.¶
Per this document the following bullet point is added to the considerations listed in in section 3 of [RFC6481]:¶
During this phase we will make RRDP mandatory to support for Repository Servers, and measure whether the deployed Repository Servers have been upgraded to do so, in as far as they don't support RRDP already.¶
In this phase the bullet point update to section 3 of [RFC6481] mentioned above, where it was said the publication repository MAY be available using the RPKI Repository Delta Protocol is replaced by:¶
We can find out whether all RPKI repositories support RRDP by running (possibly) modified Relying Party software that keeps track of this.¶
When it is found that Repositories do not yet support RRDP, outreach should be done to them individually. Since the number of Repositories is fairly low, and it is in their interest to run RRDP because it addresses availability concerns, we have confidence that we will find these Repositories willing to make changes.¶
Once all Repositories support RRDP we can proceed to make RRDP mandatory to implement for Relying Party software. But note that RP software is not prohibited from implementing this support sooner. At the time of this writing all known RP software supports RRDP, although it is not known to the authors whether all of them have RRDP enabled and use it as the preferred protocol.¶
From this phase onwards the first paragraph of section 3.4.1 of [RFC8182] is replaced by the following:¶
When a Relying Party performs RPKI validation and learns about a valid certificate with an SIA entry for the RRDP protocol, it MUST use this protocol with preference.¶
Relying Parties MUST NOT attempt to fetch objects using alternate access mechanisms, if object retrieval through this protocol is successful.¶
However, as stipulated in section 3.4.5, Relying Parties MUST attempt to use alternative repository access mechanisms, if object retrieval through RRDP is unsuccessful.¶
Although the tools may support RRDP, users will still need to install updated versions of these tools in their infrastructure. Any Repository operator can measure this transition by observing access to their RRDP and rsync repositories respectively.¶
But even after new versions have been available, it is expected that there will be a long, low volume, tail of users who did not upgrade and still depend on rsync.¶
Note that this section is included for tracking purposes during the discussion phase of this document and is not intended to be included in an RFC.¶
The currently known support for RRDP for repositories is as follows:¶
Repository Implementation | Support for RRDP |
---|---|
afrinic | yes |
apnic | yes |
arin | yes |
lacnic | ongoing |
ripe ncc | yes |
Dragon Research Labs | yes(1,2) |
krill | yes(1) |
(1) in use at various National Internet Registries, as well as other resource holders under RIRs. (2) not all organizations using this software have upgraded to using RRDP.¶
All current versions of known Relying Party software support RRDP:¶
Relying Party Implementation | support | version | since |
---|---|---|---|
DRL | yes | ? | ? |
FORT | yes | 1.2.0 | 02/2021 |
OctoRPKI | yes | 1.0.0 | 02/2019 |
Routinator | yes | 0.6.0 | 09/2019 |
rpki-client | yes | 0.7.0 | 04/2021 |
RPSTIR2 | yes | 2.0 | 04/2020 |
But, support for RRDP does not necessarily mean that it is also enabled and preferred over rsync by default. The authors kindly request that RP implementors provide the following information:¶
Relying Party Implementation | prefer | version | since |
---|---|---|---|
DRL | ? | ? | ? |
FORT | yes | ? | ? |
OctoRPKI | ? | ? | ? |
Routinator | yes | 0.6.0 | 09/2019 |
rpki-client | ? | ? | ? |
RPSTIR2 | ? | ? | ? |
This document has no IANA actions.¶
TBD¶