Internet Engineering Task Force (IETF) R. Bush Request for Comments: 7128 Internet Initiative Japan Category: Informational R. Austein ISSN: 2070-1721 Dragon Research Labs K. Patel Cisco Systems H. Gredler Juniper Networks, Inc. M. Waehlisch FU Berlin February 2014
Resource Public Key Infrastructure (RPKI) Router Implementation Report
Abstract
This document is an implementation report for the Resource Public Key Infrastructure (RPKI) Router protocol as defined in RFC 6810. The authors did not verify the accuracy of the information provided by respondents. The respondents are experts with the implementations they reported on, and their responses are considered authoritative for the implementations for which their responses represent. The respondents were asked to only use the "YES" answer if the feature had at least been tested in the lab.
Status of This Memo
This document is not an Internet Standards Track specification; it is published for informational purposes.
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7128.
Bush, et al. Informational [Page 1]
RFC 7128 RPKI Router Implementation Report February 2014
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
In order to formally validate the origin Autonomous Systems (ASes) of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RPKI) [RFC6810] prefix origin data from a trusted cache. The RPKI Router protocol defined in [RFC6810] provides a mechanism to deliver validated prefix origin data to routers.
This document provides an implementation report for the RPKI Router protocol as defined in RFC 6810 [RFC6810].
The authors did not verify the accuracy of the information provided by respondents or by any alternative means. The respondents are experts with the implementations they reported on, and their responses are considered authoritative for the implementations for which their responses represent. Respondents were asked to only use the "YES" answer if the feature had at least been tested in the lab.
BBN Name: David Mandelberg, Andrew Chi Email: dmandelb@bbn.com Vendor: Raytheon/BBN Technologies Release: RPSTIR 0.2 <http://sourceforge.net/projects/rpstir/> Protocol Role: Server
Note 1: Does not implement Serial Query, thus Incremental Update is never available, so responds to Serial Query with Cache Reset as described in Section 6.3 of [RFC6810]
Note 2: Sends Cache Reset in response to Serial Query when no data; sends Error Report PDU in response to Reset Query when no data.
Bush, et al. Informational [Page 6]
RFC 7128 RPKI Router Implementation Report February 2014
Does the RPKI Router protocol implementation support the different protocol transport mechanisms outlined in Section 7 of [RFC6810]?
+---------+-----+-----+-------+-------+--------+-----+--------+-----+ | | IOS | XR | JUNOS | rpki | rpki | NCC | RTRlib | BBN | | | | | | .net | .net | | | | | | | | | clnt | srvr | | | | +---------+-----+-----+-------+-------+--------+-----+--------+-----+ | SSH | NO | YES | NO | YES | YES | NO | YES | YES | | TLS | NO | NO | NO | NO | NO | NO | NO | NO | | TCP | YES | YES | YES | YES | YES | YES | YES | YES | | TCP-MD5 | NO | NO | NO | NO | NO | NO | NO | NO | | TCP-AO | NO | NO | NO | NO | NO | NO | NO | NO | | IPsec | NO | NO | NO | NO | NO | NO | NO | NO | +---------+-----+-----+-------+-------+--------+-----+--------+-----+
Does the RPKI Router protocol implementation support Incremental session startups with Serial Number and Session ID as defined in Section 5.3 of [RFC6810]?
Cisco: The Cisco IOS and IOS-XR implementation should be interoperable with other vendor RPKI Router Protocol implementations. In particular, we have tested our interoperability with rpki.net's RPKI Router implementation.
Juniper: The Juniper Networks, Inc. JUNOS implementation should be interoperable with other vendor RPKI Router Protocol implementations. In particular, we have tested our interoperability with rpki.net's and NCC's RPKI Router Cache implementation.
rpki.net: The rpki.net implementation should operate with other rpki- rtr implementations. In particular, we have tested our rpki-rtr server's interoperability with Cisco IOS, Cisco IOS-XR, and Juniper.
RIPE NCC: The RIPE NCC validator has been tested by us with other rpki-rtr implementations. In particular, we have tested with RTRlib and CISCO IOS. We received positive feedback from close contacts who tested our validator with JUNOS and Quagga.
RTRlib: The RTRlib has been tested by us with other rpki-rtr implementations. In particular, we have tested with rtr-origin from rpki.net and RIPE NCC Validator.
The authors would like to thank Andrew Chi, David Mandelberg, Fabian Holler, Forhad Ahmed, and Tim Bruijnzeels for their contributions to this document.