Relying parties are hereby warned that the data in a RPKI Signed Checklist is self-asserted.
When determining the meaning of any data contained in an RPKI Signed Checklist, Relying Parties MUST NOT make any assuptions about the signer beyond the fact that it had sufficient control of the issuing CA to create the object.
These data have not been verified by the Certificate Authority (CA) that issued the CA certificate to the entity that issued the EE Certificate used to validate the Signed Checklist.¶
RPKI Certificates are not bound to real world identities, see [I-D.ymbk-sidrops-rpki-has-no-identity] for an elaboration.
Relying Parties can only associate real world entities to Internet Number Resources by additionally consulting an exogenous authority.
Signed Checklists are a tool to communicate assertions 'signed with Internet Number Resources', not about any other aspect of the resource holder's business operations such as the identity of the resource holder itself.¶
RSC objects are not distributed through the RPKI Repository system.
From this, it follows that third parties who do not have a copy of a given RSC, may not be aware of the existence of that RSC.
Since RSC objects use EE Certificates, but all other currently defined types of RPKI object profiles are published in public CA repositories, an observer may infer from discrepancies in the Repository that RSC object(s) may exist.
For example, if a CA does not use random serial numbers for Certificates, an observer could detect gaps between the serial numbers of the published EE Certificates.
Similarly, if the CA includes a serial number on a CRL that does not match any published object, an observer could postulate an RSC EE Certificate was revoked.¶
Conversely, a gap in serial numbers does not imply that an RSC exists.
Nor does an arbitrary (to the RP unknown) serial in a CRL imply an RSC object exists: the implicitly referenced object might not be a RSC, it might never have been published, or was revoked before it was visible to RPs.
In general, it is not possible to confidentiality infer the existence or non-existence of RSCs from the Repository state without access to a given RSC.¶
While an one-time-use EE Certificate must only be used to generate and sign a single RSC object, CAs technically are not restricted from generating and signing multiple different RSC objects with a single keypair.
Any RSC objects sharing the same EE Certificate can not be revoked individually.¶