summaryrefslogtreecommitdiff
path: root/usr.sbin/rpki-client/rpki-client.8
AgeCommit message (Collapse)Author
2024-11-04Update referenceJob Snijders
2024-10-07update crl number draft linkTheo Buehler
2024-09-10Use doc/html link for consistencyTheo Buehler
2024-09-10Add reference to the manifest numbers draftTheo Buehler
ok job
2024-09-04Remove deprecated '-r' command line optionJob Snijders
OK tb@ claudio@
2024-08-20Update Geofeed referenceJob Snijders
RFC 9632 introduced additional constraints and requirements for RPKI-based Geofeed authenticators (at my request).
2024-06-20Add missing ref & reorderJob Snijders
OK tb@ claudio@
2024-06-12rpki-client: mention same-origin policy draft in STANDARDSTheo Buehler
ok job
2024-05-29Clean up the list of standards a littleTheo Buehler
No need to spell out RPKI and a few other things every time they appear in titles. Replace an obsolete standard with a new draft. with/ok job
2024-05-24Update references to new and not quite so new RFCsTheo Buehler
Four warnings now contain "RFC 9582" rather than "RFC 6482bis". Also update some references to I-Ds. ok claudio
2024-03-01Add -x to opt into experimental file formatsTheo Buehler
Instead of burning one letter for each new file format (sidrops is known to crank out new things faster than a normal person can read), use -x to opt into parsing and processing file formats that aren't yet considered stable. This is currently only the Signed Prefix List. While a repetition of the ASPA debacle, this code hasn't yet seen enough stress testing to be enabled by default. ok claudio job
2024-02-22wrap an overlong line to appease mandoc -TlintTheo Buehler
2024-02-22Add support for RPKI Signed Prefix ListsJob Snijders
Signed Prefix List are a CMS protected content type for use with the RPKI to carry the complete list of prefixes which an Autonomous System may originate to all or any of its routing peers. The validation of a Signed Prefix List confirms that the holder of the listed ASN produced the object, and that this list is a current, accurate and complete description of address prefixes that may be announced into the routing system originated by this AS. https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-prefixlist with and OK claudio@ tb@
2024-01-31Add reference to RRDP Session Desynchronization draftJob Snijders
2024-01-16Update standards referenceJob Snijders
2023-10-13Allow imposing constraints on RPKI trust anchorsJob Snijders
The ability to constrain a RPKI Trust Anchor's effective signing authority to a limited set of Internet Number Resources allows Relying Parties to enjoy the potential benefits of assuming trust, within a bounded scope. Some examples: ARIN does not support inter-RIR IPv6 transfers, so it wouldn't make any sense to see a ROA subordinate to ARIN's trust anchor covering RIPE-managed IPv6 space. Conversely, it wouldn't make sense to observe a ROA covering ARIN-managed IPv6 space under APNIC's, LACNIC's, or RIPE's trust anchor - even if a derived trust arc (a cryptographically valid certificate path) existed. Along these same lines, AFRINIC doesn't support inter-RIR transfers of any kind, and none of the RIRs have authority over private resources like 10.0.0.0/8 and 2001:db8::/32. For more background see: https://datatracker.ietf.org/doc/draft-snijders-constraining-rpki-trust-anchors/ https://mailman.nanog.org/pipermail/nanog/2023-September/223354.html With and OK tb@, OK claudio@
2023-06-26Decode and validate ASPA objects following the v1 syntaxJob Snijders
Through draft-ietf-sidrops-aspa-profile-15, the ASPA profile was made AFI-agnostic. This represents a simplification for both operators and implementers in both the RPKI and BGP layers of the stack. This update changes the JSON structure. No effort was made to simultaneously support ASPA v0 and v1 objects. OK tb@ claudio@
2023-06-07Document CMS signing-time <> mod-time trickJob Snijders
2023-04-30document that - with recent changes - the -A option now also excludesSebastian Benoit
the ASPA data from the JSON output. ok claudio@
2023-04-26Add a -P option to rpki-client to specify the evaluation timeBob Beck
This is intended to be able to test rpki-client in a reproducable way without worrying about the system time changing the results ok claudio@
2023-03-06For conciseness sake' remove non-optional items in references in STANDARDSJob Snijders
Discussed with deraadt@ tb@ claudio@
2023-03-06spellingTheo de Raadt
2023-03-06Add check for RSA key pair modulus & public exponentJob Snijders
Both the SPKI inside a CA's .cer TBS section and Signers wrapped in CMS must be RSA, with mod 2048 & (e) 0x10001 OK tb@
2023-03-06Fix URL to RFCJob Snijders
2023-02-17Update AUTHORS sectionJob Snijders
2023-02-17Use %R technical report macro for RFCsJob Snijders
2023-02-16- remove a leftover .ElJason McIntyre
- escape "An" as this is also a macro
2023-02-16Update references in STANDARDS section to use Rs blocksJob Snijders
Also drop largely irrelevant references like IPv6 and CIDR (as we didn't reference IPv4 either), remove obsoleted RFCs and add their successors.
2023-02-16explain why ARIN TAL is not included.Theo de Raadt
ok job
2023-01-18The default output format is -o (openbgpd) but it now includes bothClaudio Jeker
roa-set and aspa-set by default. So make the man page less specific. OK tb@ job@ kn@
2023-01-13Add aspa-set to openbgpd config output.Claudio Jeker
Change the way the validated ASPA tree is built since OpenBGPD config follows more the ASPA profile and puts the optional AFI to each provider ASnum instead of duplicated everything into an IPv4 and IPv6 tree. The JSON output of ASPA is still the same. The inclusion of the aspa-set can currently be disabled by the -A flag. OK tb@
2022-12-15Rework statistic collection to be per repository and add metric output optionClaudio Jeker
Many statistic values are now accounted by repository via repo_stat_inc() At end of the run sum_stats() accumulates these stats per TAL and globally. The new output file metrics is written when the -m output flag is specified. The metrics file is written in OpenMetrics format (with a few tweaks to allow node_exporter to parse the file as well). The ometric code is a copy from bgpctl(8) and should be kept in sync. OK tb@
2022-11-26Add support for authenticating geofeed data CSV files in filemodeJob Snijders
RFC 9092 describes a scheme in which an authenticator is appended to a geofeed (RFC 8805) file. It is a digest of the main body of the file signed by the private key of the relevant RPKI certificate for a covering address range. The authenticator is a detached CMS signature. with and OK tb@
2022-11-17Add shortlist functionality, a compagnion to the skiplistJob Snijders
If the operator specifies the '-H' option once (or more) followed by a FQDN, the utility will *only* connect to those hosts and skip all others. OK claudio@ tb@
2022-11-10Indicate compliance with work-in-progress spec for ROA objectsJob Snijders
2022-11-03don't needlessy uppercase Nd;Jason McIntyre
2022-11-03shorten Autonomous System Provider AuthorizationsJob Snijders
2022-11-03Add notion of ASPAJob Snijders
2022-11-02Reference RSC RFC-to-be instead of internet-draftJob Snijders
2022-11-02Add support for draft-ietf-sidrops-signed-tal-12Job Snijders
Add support validation of Signed Objects containing Trust Anchor Keys (TAKs - aka 'Signed TALs'). Signed TALs provide a mechanism for RIRs to distribute and sign the next Trust Anchor with the current Trust Anchor. This might be an improvement over visiting RIR websites and copy+pasting TAL data by hand. OK tb@
2022-09-05Update to most recent specJob Snijders
2022-09-03Clarify timeout/deadlineJob Snijders
2022-08-30Add support for ASPA objects (draft-ietf-sidrops-aspa-profile-10)Job Snijders
ASPA objects are published in the RPKI and can be used to detect and mitigate BGP route leaks. Validated ASPA Payloads are visible through filemode (-f) and the JSON output format (-j). With feedback from tb@ OK claudio@ tb@
2022-08-25Make PEM printing available through increased verbosity (-vvf)Job Snijders
Suggestion from claudio@ OK tb@
2022-08-25In verbose filemode print details about encapsulated certificates.Job Snijders
Add command line flag to print the certificate in PEM format. OK tb@
2022-06-30zap whitespaceJob Snijders
2022-06-28Remove superfluous 'any'Job Snijders
2022-06-27Add skiplist option to steer clear of skiplisted hostsJob Snijders
Blocking outbound connections towards RPKI publication servers based on IP or IPv6 address in external instrumentation like HTTP proxies or pf(4) rules is somewhat unwieldy. It might be easier for operators if we offer a mechanism that cuts at the CA cert SIA parsing step. OK claudio@ tb@
2022-05-31Update reference to RSC draft 08Theo Buehler
ok claudio job
2022-05-20Add RFC 7318Job Snijders