Allow imposing constraints on RPKI trust anchors
authorjob <job@openbsd.org>
Fri, 13 Oct 2023 12:06:49 +0000 (12:06 +0000)
committerjob <job@openbsd.org>
Fri, 13 Oct 2023 12:06:49 +0000 (12:06 +0000)
commit891d6bce9ccec6661931ab61b3d1c59f80ea992d
tree5ae8aab4c16238a991180c39028917a22f8b9369
parent08626ad3732b8d25b4f8c6b4cdc71613c6889c80
Allow imposing constraints on RPKI trust anchors

The ability to constrain a RPKI Trust Anchor's effective signing
authority to a limited set of Internet Number Resources allows
Relying Parties to enjoy the potential benefits of assuming trust,
within a bounded scope.

Some examples: ARIN does not support inter-RIR IPv6 transfers, so
it wouldn't make any sense to see a ROA subordinate to ARIN's trust
anchor covering RIPE-managed IPv6 space. Conversely, it wouldn't
make sense to observe a ROA covering ARIN-managed IPv6 space under
APNIC's, LACNIC's, or RIPE's trust anchor - even if a derived trust
arc (a cryptographically valid certificate path) existed. Along these
same lines, AFRINIC doesn't support inter-RIR transfers of any kind,
and none of the RIRs have authority over private resources like
10.0.0.0/8 and 2001:db8::/32.

For more background see:
https://datatracker.ietf.org/doc/draft-snijders-constraining-rpki-trust-anchors/
https://mailman.nanog.org/pipermail/nanog/2023-September/223354.html

With and OK tb@, OK claudio@
18 files changed:
usr.sbin/rpki-client/Makefile
usr.sbin/rpki-client/as.c
usr.sbin/rpki-client/aspa.c
usr.sbin/rpki-client/cert.c
usr.sbin/rpki-client/constraints.c [new file with mode: 0644]
usr.sbin/rpki-client/extern.h
usr.sbin/rpki-client/filemode.c
usr.sbin/rpki-client/gbr.c
usr.sbin/rpki-client/geofeed.c
usr.sbin/rpki-client/ip.c
usr.sbin/rpki-client/main.c
usr.sbin/rpki-client/mft.c
usr.sbin/rpki-client/parser.c
usr.sbin/rpki-client/rfc3779.c [new file with mode: 0644]
usr.sbin/rpki-client/roa.c
usr.sbin/rpki-client/rpki-client.8
usr.sbin/rpki-client/rsc.c
usr.sbin/rpki-client/tak.c