<?xml version="1.0" encoding="utf-8"?>
<!-- name="GENERATOR" content="github.com/mmarkdown/mmark Mmark Markdown Processor - mmark.miek.nl" -->
<rfc version="3" ipr="trust200902" docName="draft-timbru-sidrops-change-pubserver-00" submissionType="IETF" category="info" xml:lang="en" xmlns:xi="http://www.w3.org/2001/XInclude" indexInclude="false" consensus="true">

<front>
<title abbrev="Change Publication Server">Change Publication Server used by an RPKI CA</title><seriesInfo value="draft-timbru-sidrops-change-pubserver-00" status="informational" name="Internet-Draft"></seriesInfo>
<author initials="T." surname="Bruijnzeels" fullname="Tim Bruijnzeels"><organization>NLnet Labs</organization><address><postal><street></street>
</postal><email>tim@nlnetlabs.nl</email>
<uri>https://www.nlnetlabs.nl/</uri>
</address></author><date/>
<area>Internet</area>
<workgroup></workgroup>

<abstract>
<t>This draft outlines how Krill, an RPKI CA and Publication Server,
implements the process that allows a CA to change the Publication Server
it uses, migrating its content from the old server, to the new server's
repository.</t>
<t>The current implementation is modelled after the RPKI CA Key Rollover
process defined in RFC 6489, except that in this case a new location is
used for the new key.</t>
<t>It incudes some discussion about possible improvements to the process.</t>
<t>The goal of this draft is to serve as a starting point for a broader
discussion on how RPKI Repository Migration should be done. If adopted
as a working group item, the status could be changed to standard or bcp,
and the intent would of course be to update the content to reflect working
group consensus rather than what happens to have been implemented in
Krill at this time.</t>
</abstract>

</front>

<middle>

<section anchor="requirements-notation"><name>Requirements notation</name>
<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, &quot;SHOULD&quot;,
&quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in
this document are to be interpreted as described in BCP 14 <xref target="RFC2119"></xref>
<xref target="RFC8174"></xref> when, and only when, they appear in all capitals, as shown here.</t>
</section>

<section anchor="introduction"><name>Introduction</name>
<t>There are a number of reasons why a CA may wish to migrate from its
current Publication Server to a new one.</t>
<t>One reason may be that an organisation is running their own Publication
Server, but they wish to migrate to a server operated by their parent
(e.g. a Regional Internet Registry). Possibly because their parent did
not offer this service when they first set up their CA, but now they do.</t>
<t>Another reason may be that the current Publication Server used by a CA
is failing behind in terms of their availability on either the publication
protocol <xref target="RFC8181"></xref>, or the public rsync or RRDP <xref target="RFC8182"></xref> repository
compared to other options.</t>
<t>If the current Publication Server has become unavailable, and there is
no sign that it will become available again, then that may constitute
an even more urgent reason to migrate to a new server.</t>
<t>In this document we explain how Krill, an RPKI CA and Publication Server
implementation, currently uses a modified RPKI Key Rollover <xref target="RFC6489"></xref>
process to allow a CA to change the Publication Server used.</t>
</section>

<section anchor="migration-process"><name>Migration Process</name>

<section anchor="upload-new-repository-response"><name>Upload new Repository Response</name>
<t>The migration to a new Publication Server is initiated by uploading a
new <xref target="RFC8183"></xref> Repository Response XML for that new server.</t>
<t>When the XML is uploaded the CA verifies that it can communicate with
the new server by sending it an <xref target="RFC8181"></xref> list query. If the query
is successful, the new server is accepted and the CA proceeds to the
next step.</t>
</section>

<section anchor="create-new-key"><name>Create new Key</name>
<t>The second step in the process is that the CA generates a new key pair,
and then requests a new certificate for this key from its parent (using
[!@RFC6492]). The Certificate Sign Request for this new key uses the
URIs that pertain to the new Publication Server.</t>
</section>

<section anchor="manifest-and-crl-for-new-key"><name>Manifest and CRL for new Key</name>
<t>When the CA receives a certificate for the new key, which uses the new
Publication Server, it generates a CRL and Manifest and publishes these
at the new server.</t>
<t>RPKI signed objects such as ROAs or possibly CA certificates for its own
children are only published under the &quot;current&quot; key. I.e. they are not
yet published at the new server. This is similar to step 3 in the CA Key
Rollover Procedure defined in section 2 of [!@RFC6489].</t>
</section>

<section anchor="staging-period"><name>Staging Period</name>
<t>According to step 4, in section 2 of [!@RFC6489] a staging period of at
least 24 hours SHOULD be used. The current implementation in Krill
leaves this decision to the operators. A shorter period is advisable if
the current Publication Server is unavailable.</t>
</section>

<section anchor="activate-new-key"><name>Activate new Key</name>
<t>When the new key is activated all RPKI signed objects are published under
the new key, and therefore published at the new Publication Server, and
they are removed from the current key's manifest and publication point.</t>
<t>This is essentially the same as defined in step 5 of section 2 of
[!@RFC6489], except that keys use a different Publication Servers and
they will typically use a different <xref target="RFC8183"></xref> &quot;sia<em>base&quot; and
&quot;rrdp</em>notification_uri&quot;.</t>
</section>

<section anchor="revoke-old-key"><name>Revoke old Key</name>
<t>The final step in the process is that the CA requests revocation of its,
previously CURRENT, now OLD key. When this key is revoked the CA removes
all content from the OLD publication server for this key.</t>
</section>
</section>

<section anchor="possible-improvements"><name>Possible Improvements</name>

<section anchor="aia"><name>AIA</name>
<t>It should be noted that the AIA URIs for delegated CA certificates will
change when the new repository is used, even if the child CA keys and
subjects did not change, and even if the produced .cer files have the
same name - they will be published in a different publication point.</t>
<t>Relying Parties may warn when AIA URIs in the RPKI signed objects (Manifest,
ROAs, etc) and possible certificates (delegated CA or BGPSec Router
certificates) published do not match the location of the signing CA
certificate in the new publication point, but they would accept them
as long as they are otherwise valid.</t>
</section>

<section anchor="timing-issues"><name>Timing Issues</name>
<t>One important thing to note is that the CA needs to publish in two
different locations when the new key is activated in the process defined
here.</t>
<t>This can lead to timing issues where Relying Parties see equivalent
objects under both keys. This happens if they get the NEW objects before
seeing them disappear from the OLD key. This is not expected to lead
to significant issues.</t>
<t>On the other hand, it may also turn out that the Relying Party sees the
objects disappear from under the OLD key, but it has not yet seen the
equivalent objects under the NEW key. This can have a big impact.
All ROAs would disappear temporarily which could impact routing even if
announcements would fall back to the ROV state &quot;Not Found&quot; (<xref target="RFC6811"></xref>).
But, any delegated CA certificates would also disappear (temporarily) and
as a consequence any ROAs or other objects published by children. So, if
this happens to a CA near the top of the RPKI tree the impact can be
quite significant.</t>
<t>For this reason we may want to change the &quot;Activate Key&quot; step to use three
separate steps:</t>

<ul>
<li>publish objects under the NEW key,</li>
<li>enter a staging period</li>
<li>only then remove the objects from the (now OLD) key</li>
</ul>
</section>

<section anchor="duplication"><name>Duplication?</name>
<t>If we would use the staging period mentioned in the previous section, then
Relying Parties will find any possible delegated CA certificates under
both publication points for some time. Both CA certificates will use the
same subject key and SIA values. Therefore, Relying Parties will find
the published objects under two paths - and they will appear valid under
both.</t>
<t>This will cause RPs to keep more data. This is not expected to be a huge
issue.. as any duplicated Validated ROA Prefixes <xref target="RFC6811"></xref> would be
filtered out in the RPKI-RTR protocol (<xref target="RFC8210"></xref>).</t>
</section>
</section>

<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>OID needs to be requested.</t>
</section>

<section anchor="security-considerations"><name>Security Considerations</name>
<t>TBD</t>
</section>

<section anchor="acknowledgements"><name>Acknowledgements</name>
<t>TBD</t>
</section>

</middle>

<back>
<references><name>Normative References</name>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6489.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6811.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8181.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8182.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8183.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8210.xml"/>
</references>

</back>

</rfc>
