<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekater-scion-pki-09" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SCION CP-PKI">SCION Control Plane PKI</title>
    <seriesInfo name="Internet-Draft" value="draft-dekater-scion-pki-09"/>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>SCION Association</organization>
      <address>
        <email>c_de_kater@gmx.ch</email>
      </address>
    </author>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>SCION Association</organization>
      <address>
        <email>nic@scion.org</email>
      </address>
    </author>
    <author initials="S." surname="Hitz" fullname="Samuel Hitz">
      <organization>Anapaya Systems</organization>
      <address>
        <email>hitz@anapaya.net</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 140?>

<t>This document presents the trust concept and design of the SCION <em>Control Plane Public Key Infrastructure (CP-PKI)</em>. SCION (Scalability, Control, and Isolation On Next-generation networks) is a path-aware, inter-domain network architecture where the Control Plane PKI handles cryptographic material and lays the foundation for the authentication procedures in SCION. It is used by SCION's Control Plane to authenticate and verify path information, and provisions SCION's trust model based on Isolation Domains.</t>
      <t>This document describes the trust model behind the SCION Control Plane PKI, including specifications of the different types of certificates and the Trust Root Configuration. It also specifies how to deploy the Control Plane PKI infrastructure.</t>
      <t>This document contains new approaches to secure path aware networking. It is not an Internet Standard, has not received any formal review of the IETF, nor was the work developed through the rough consensus process. The approaches offered in this work are offered to the community for its consideration in the further evolution of the Internet.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-cppki_I-D/draft-dekater-scion-pki.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekater-scion-pki/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-cppki_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <?line 148?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>SCION is a path-aware internetworking routing architecture as described in <xref target="RFC9217"/>. It allows endpoints and applications to select paths across the network to use for traffic, based on trustworthy path properties. SCION is an inter-domain network architecture and is therefore not concerned with intra-domain forwarding.</t>
      <t>SCION has been developed with the following goals:</t>
      <t><em>Availability</em> - to provide highly available communication that can send traffic over paths with optimal or required characteristics, quickly handle inter-domain link or router failures (both on the last hop or anywhere along the path) and provide continuity in the presence of adversaries.</t>
      <t><em>Security</em> - to introduce a new approach to inter-domain path security that leverages path awareness in combination with a unique trust model. The goal is to provide higher levels of trust in routing information to prevent traffic hijacking, and enable users to decide where their data travels based on routing information that can be unambiguously attributed to an AS, ensuring that packets are only forwarded along authorized path segments. A particular use case is to enable geofencing.</t>
      <t><em>Scalability</em> - to improve the scalability of the inter-domain control plane and data plane, avoiding existing limitations related to convergence and forwarding table size. The advertising of path segments is separated into a beaconing process within each Isolation Domain (ISD) and between ISDs which incurs minimal overhead and resource requirements on routers.</t>
      <t>SCION relies on three main components:</t>
      <t><em>PKI</em> - To achieve scalability and trust, SCION organizes existing ASes into logical groups of independent routing planes called <em>Isolation Domains (ISDs)</em>. All ASes in an ISD agree on a set of trust roots called the <em>Trust Root Configuration (TRC)</em> which is a collection of signed root certificates in X.509 v3 format <xref target="RFC5280"/>. The ISD is governed by a set of <em>core ASes</em> which typically manage the trust roots and provide connectivity to other ISDs. This is the basis of the public key infrastructure which the SCION Control Plane relies upon for the authentication of messages that is used for the SCION Control Plane.</t>
      <t><em>Control Plane</em> - performs inter-domain routing by discovering and securely disseminating path information between ASes. The core ASes use Path-segment Construction Beacons (PCBs) to explore intra-ISD paths, or to explore paths across different ISDs. See <xref target="I-D.dekater-scion-controlplane"/></t>
      <t><em>Data Plane</em> - carries out secure packet forwarding between SCION-enabled ASes over paths selected by endpoints. A SCION border router reuses existing intra-domain infrastructure to communicate to other SCION routers or SCION endpoints within its AS. See <xref target="I-D.dekater-scion-dataplane"/></t>
      <t>This document describes the SCION PKI component used by the Control Plane. It should be read in conjunction with the other components <xref target="I-D.dekater-scion-controlplane"/> and <xref target="I-D.dekater-scion-dataplane"/>.</t>
      <t>The SCION architecture was initially developed outside of the IETF by ETH Zurich with significant contributions from Anapaya Systems. It is deployed in the Swiss finance sector to provide resilient connectivity between financial institutions. The aim of this document is to document the existing protocol specification as deployed, to encourage interoperability among implementations, and to introduce new concepts that can potentially be further improved to address particular problems with the current Internet architecture.</t>
      <t>Note (to be removed before publication): this document, together with the other components <xref target="I-D.dekater-scion-controlplane"/> and <xref target="I-D.dekater-scion-dataplane"/>, deprecates <xref target="I-D.dekater-panrg-scion-overview"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t><strong>Control Plane PKI (CP-PKI)</strong>: The control plane PKI is the public-key infrastructure upon which SCION's Control Plane relies for the authentication of messages. It is a set of policies, roles, and procedures that are used to manage trust root configurations (TRCs) and certificates.</t>
        <t><strong>Autonomous System (AS)</strong>: An autonomous system is a network under a common administrative control. For example, the network of an Internet service provider or organization can constitute an AS.</t>
        <t><strong>Isolation Domain (ISD)</strong>: In SCION, Autonomous Systems (ASes) are organized into logical groups called isolation domains or ISDs. Each ISD consists of ASes that span an area with a uniform trust environment (i.e., a common jurisdiction). A possible model is for ISDs to be formed along national boundaries or federations of nations.</t>
        <t><strong>Core AS</strong>: Each isolation domain (ISD) is administered by a set of distinguished autonomous systems (ASes) called core ASes, which are responsible for initiating the path discovery and path construction process known as "beaconing".</t>
        <t><strong>Trust Root Configuration (TRC)</strong>: A Trust Root Configuration or TRC is a signed collection of certificates pertaining to an isolation domain (ISD). TRCs also contain ISD-specific policies.</t>
        <t><strong>Authoritative AS</strong>: Authoritative ASes are those ASes in an ISD that always have the latest TRCs of the ISD. As a consequence, authoritative ASes also start the announcement of a TRC update.</t>
        <t><strong>Base TRC</strong>: A base TRC is a trust root configuration (TRC) that other parties trust axiomatically. In other words, trust for a base TRC is assumed, not derived from another cryptographic object. Each ISD <bcp14>MUST</bcp14> create and sign a base TRC when the ISD is established. A base TRC is either the first TRC of the ISD or the result of a trust reset.</t>
        <t><strong>TRC Signing Ceremony</strong>: The ceremony during which the very first base TRC of an ISD, called the initial TRC, is signed. The initial TRC is a special case of the base TRC where the number of the ISD is assigned.</t>
        <t><strong>TRC Update</strong>: A <em>regular</em> TRC update is a periodic re-issuance of the TRC where the entities and policies listed in the TRC remain unchanged. A <em>sensitive</em> TRC update is an update that modifies critical aspects of the TRC, such as the set of core ASes. In both cases, the base TRC remains unchanged.</t>
        <t><strong>Voting ASes</strong>: Those ASes within an ISD that may sign TRC updates. The process of appending a signature to a new TRC is called "casting a vote".</t>
        <t><strong>Voting Quorum</strong>: The voting quorum is a trust root configuration (TRC) field that indicates the number of votes (signatures) needed on a successor TRC for it to be verifiable. A voting quorum greater than one will thus prevent a single entity from creating a malicious TRC update.</t>
        <t><strong>Grace Period</strong>: The grace period is an interval during which the previous version of a trust root configuration (TRC) is still considered active after a new version has been published.</t>
        <t><strong>Trust Reset</strong>: A trust reset is the action of announcing a new base TRC for an existing ISD. A trust reset <bcp14>SHOULD</bcp14> only be triggered after a catastrophic event involving the loss or compromise of several important private keys.</t>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="trust-model">
        <name>Trust Model</name>
        <t>Given the diverse nature of the constituents in the current Internet, an important challenge is how to scale authentication of network elements (such as AS ownership, hop-by-hop routing information, name servers for DNS, and domains for TLS) to the global environment. The roots of trust of currently prevalent public key infrastructure (PKI) models do not scale well to a global environment because (1) mutually distrustful parties cannot agree on a single trust root (monopoly model), and because (2) the security of a plethora of roots of trust is only as strong as its weakest link (oligopoly model) - see also <xref target="BARRERA17"/>.</t>
        <t>The monopoly model suffers from two main drawbacks: First, all parties must agree on a single root of trust. Secondly, the single root of trust represents a single point of failure, the misuse of which enables the forging of certificates. Its revocation can also result in a kill switch for all the entities it certifies.</t>
        <t>The oligopoly model relies on several roots of trust, all equally and completely trusted. However, this is not automatically better: whereas the monopoly model has a single point of failure, the oligopoly model has the drawback of exposing more than one point of failure.</t>
        <t>Thus, there is a need for a trust architecture that supports meaningful trust roots in a global environment with inherently distrustful parties. This new trust architecture should provide the following properties:</t>
        <ul spacing="normal">
          <li>
            <t>Trust agility (see further below);</t>
          </li>
          <li>
            <t>Resilience to single root of trust compromise;</t>
          </li>
          <li>
            <t>Multilateral governance; and</t>
          </li>
          <li>
            <t>Support for policy versioning and updates.</t>
          </li>
        </ul>
        <t>Ideally, the trust architecture allows parties that mutually trust each other to form their own trust "union" or "domain", and to freely decide whether to trust other trust unions (domains) outside their own trust bubble.</t>
        <t>To fulfill the above requirements, which in fact apply well to inter-domain networking, SCION introduces the concept of <strong>Isolation Domains</strong>. An Isolation Domain (ISD) is a building block for achieving high availability, scalability, and support for heterogeneous trust. It consists of a logical grouping of ASes that share a uniform trust environment (i.e. a common jurisdiction).</t>
        <t>An ISD is administered by one or multiple ASes, called the <strong>voting ASes</strong>. Furthermore, each ISD has a set of ASes that form the ISD core; these are the <strong>core ASes</strong>. The set of core and voting ASes can, but do not necessarily have to, overlap. It is governed by a policy called the <strong>Trust Root Configuration</strong> (TRC), which is negotiated by the ISD core, and which defines the locally scoped roots of trust used to validate bindings between names and public keys.</t>
        <t>Authentication in SCION is based on digital certificates that bind identifiers to public keys and carry digital signatures that are verified by roots of trust. SCION allows each ISD to define its own set of trust roots, along with the policy governing their use. Such scoping of trust roots within an ISD improves security as compromise of a private key associated with a trust root cannot be used to forge a certificate outside the ISD. An ISD's trust roots and policy are encoded in the TRC, which has a version number, a list of public keys that serves as root of trust for various purposes, and policies governing the number of signatures required for performing different types of actions. The TRC serves as a way to bootstrap all authentication within SCION. Additionally, TRC versioning is used to efficiently revoke compromised roots of trust.</t>
        <t>The TRC also provides <em>trust agility</em>, that is it enables users to select the trust roots used to initiate certificate validation. This implies that users are free to choose an ISD they believe maintains a uncompromised set of trust roots. ISD members can also decide whether to trust other ISDs and thus transparently define trust relationships between parts of the network. The SCION trust model therefore, differs from the one provided by other PKI architectures.</t>
        <t>The need for trust agility also means that SCION does not by design provide IP prefix origin validation as provided by RPKI <xref target="RFC8210"/>. RPKI's trust model is currently reliant on the trust roots provided by the five Regional Internet Registries, and therefore outside of the governance of an ISD.</t>
      </section>
      <section anchor="trust-relations-within-an-isolation-domain">
        <name>Trust Relations within an Isolation Domain</name>
        <t>As previously mentioned, the Control Plane PKI is organized at an ISD level whereby each ISD can independently specify its own Trust Root Configuration (TRC) and build its own verification chain. Each TRC consists of a collection of signed root certificates, which are used to sign CA certificates, which are in turn used to sign AS certificates. The TRC also includes ISD policies that specify, for example, the TRC's usage, validity, and future updates. The so-called <strong>base TRC</strong> constitutes the ISD's trust anchor which is signed during a signing ceremony by the voting ASes and then distributed throughout the ISD.</t>
        <section anchor="trust-reset">
          <name>Updates and Trust Resets</name>
          <t>There are two types of TRC updates: regular and sensitive. A <strong>regular TRC update</strong> is a periodic re-issuance of the TRC where the entities and policies listed in the TRC remain unchanged, whereas a <strong>sensitive TRC update</strong> is an update that modifies critical aspects of the TRC, such as the set of core ASes. In both cases the base TRC remains unchanged.</t>
          <t>If the ISD's TRC has been compromised, it is necessary for an ISD to re-establish the trust root. This is possible with a process called <strong>trust reset</strong> (if permitted by the ISD's trust policy). In this case, a new base TRC is created.</t>
        </section>
        <section anchor="substitutes-to-revocation">
          <name>Substitutes to Certificate Revocation</name>
          <t>The Control Plane PKI does not explicitly support certificate revocation. Instead it relies on the two mechanisms described above and on short-lived certificates. This approach constitutes an attractive alternative to a revocation system for the following reasons:</t>
          <ul spacing="normal">
            <li>
              <t>Both short-lived certificates and revocation lists must be signed by a CA. Instead of periodically signing a new revocation list, the CA can simply re-issue all the non-revoked certificates. Although the overhead of signing multiple certificates is greater than that of signing a single revocation list, the overall complexity of the system is reduced. In the Control Plane PKI the number of certificates that each CA must renew is manageable as it is limited to at most the number of ASes within an ISD.</t>
            </li>
            <li>
              <t>Even with a revocation system, a compromised key cannot be instantaneously revoked. Through their validity period, both short-lived certificates and revocation lists implicitly define an attack window (i.e. a period during which an attacker who managed to compromise a key could use it before it becomes invalid). In both cases, the CA must consider a tradeoff between efficiency and security when picking this validity period.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="overview-of-certificates-keys-and-roles">
        <name>Overview of Certificates, Keys, and Roles</name>
        <t>The base TRC constitutes the root of trust within an ISD. <xref target="_figure-1"/> provides a view of the trust chain within an ISD, based on its TRC. For detailed descriptions, please refer to <xref target="cert-specs"/> and <xref target="trc-specification"/>.</t>
        <figure anchor="_figure-1">
          <name>Chain of trust within an ISD</name>
          <artwork><![CDATA[
                                    TRC 2

               +--------------------------------------+
               |+------------------------------------+|
               ||- Version       - Core ASes         ||
+--------+     ||- ID            - Description       ||    +--------+
| TRC 1  |     ||- Validity      - No Trust Reset    ||    | TRC 3  |
| (Base  |---->||- Grace Period  - Voting Quorum     ||--->|        |
|  TRC)  |     ||- ...                               ||    |        |
+--------+     |+------------------------------------+|    +--------+
               |+----------------+  +----------------+|
               || Regular Voting |  |Sensitive Voting||
               ||  Certificate   |  |  Certificate   ||
               |+----------------+  +----------------+|
               |+----------------+  +----------------+|
               ||     Votes      |  |   Signatures   ||
               |+----------------+  +----------------+|
               |+------------------------------------+|
               ||        CP Root Certificates        ||
               |+----------+-------------+-----------+|
               |           |             |            |
               +-----------+-------------+------------+
                           |             |
                           |             |
                           v             v
                 +-----------+         +-----------+
                 |   CP CA   |         |   CP CA   |
                 |Certificate|         |Certificate|
                 +-+-------+-+         +-----+-----+
                   |       |                 |
                   |       |                 |
                   v       v                 v
          +-----------+ +-----------+      +-----------+
          |   CP AS   | |   CP AS   |      |   CP AS   |
          |Certificate| |Certificate|      |Certificate|
          +-----------+ +-----------+      +-----------+
]]></artwork>
        </figure>
        <t>All certificates used in the Control plane PKI are in X.509 v3 format <xref target="RFC5280"/> and additionally the TRC contains self-signed certificates instead of plain public keys. Self-signed certificates have the following advantages over plain public keys: (1) They make the binding between name and public key explicit; and (2) the binding is signed to prove possession of the corresponding private key.</t>
        <t>All ASes in SCION have the task to sign and verify control plane messages. However, certain ASes have additional roles:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Core ASes</strong>: Core ASes are a distinct set of ASes in the SCION Control Plane. For each ISD, the core ASes are listed in the TRC. Each core AS in an ISD has links to other core ASes (in the same or in different ISDs).</t>
          </li>
          <li>
            <t><strong>Certification authorities (CAs)</strong>: CAs are responsible for issuing AS certificates to other ASes and/or themselves.</t>
          </li>
          <li>
            <t><strong>Voting ASes</strong>: Only certain ASes within an ISD may sign TRC updates. The process of appending a signature to a new TRC is called "casting a vote", and the designated ASes that hold the private keys to sign a TRC update are "voting ASes".</t>
          </li>
          <li>
            <t><strong>Authoritative ASes</strong>: Authoritative ASes are those ASes in an ISD that always have the latest TRCs of the ISD. They start the announcement of a TRC update.</t>
          </li>
        </ul>
      </section>
      <section anchor="trust-as-a-function">
        <name>Trust as a Function</name>
        <t>The Control Plane PKI can be seen as a function that transforms potential distrust among different parties into a mutually accepted trust contract including a trust update and reset policy as well as certificates used for authentication procedures in SCION's Control Plane.</t>
        <t>For the function to work, it is not necessary that the ASes of the ISD all trust each other. However, all ASes <bcp14>MUST</bcp14> trust the ISD's core ASes, authoritative ASes, voting ASes, as well as its CA(s). These trusted parties negotiate the ISD trust contract in a "bootstrapping of trust" ceremony, where cryptographic material is exchanged and the ISD's trust anchor (the initial Trust Root Configuration) is created and signed.</t>
        <section anchor="input">
          <name>Input</name>
          <t>Prior to the ceremony, the trusted parties <bcp14>MUST</bcp14> decide about the validity period of the TRC as well as the number of votes required to update a TRC. They <bcp14>MUST</bcp14> also bring the required keys and certificates, the so-called root and voting keys/certificates.</t>
          <t>During the ceremony, the trusted parties decide about the number of the ISD. This <bcp14>MUST</bcp14> be an integer in the inclusive range between 64 and 4094. The next table shows the current allocation of ISD numbers in SCION:</t>
          <table anchor="_table-1">
            <name>ISD Number Allocations</name>
            <thead>
              <tr>
                <th align="left">ISD</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">The wildcard ISD.</td>
              </tr>
              <tr>
                <td align="left">1 - 15</td>
                <td align="left">Reserved for documentation and sample code (analogous to <xref target="RFC5398"/>.</td>
              </tr>
              <tr>
                <td align="left">16 - 63</td>
                <td align="left">Private use (analogous to <xref target="RFC6996"/>). Can be used for testing and private deployments.</td>
              </tr>
              <tr>
                <td align="left">64 - 4094</td>
                <td align="left">Public ISDs. Should be allocated in ascending order, without gaps and "vanity" numbers.</td>
              </tr>
              <tr>
                <td align="left">4095 - 65535</td>
                <td align="left">Reserved for future use.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="output">
          <name>Output</name>
          <t>The output of the bootstrapping of trust ceremony, or the trust "function", are the ISD's initial Trust Root Configuration as well as mutually trusted and accepted CA and AS certificates - the latter are used to verify control plane messages. Together with the ISD's control plane root certificates, the CA and AS certificates build the ISD's trust and verification chain.</t>
        </section>
      </section>
    </section>
    <section anchor="cert-specs">
      <name>Certificate Specification</name>
      <t>This section provides a detailed specification of all certificates used by the Control Plane PKI.</t>
      <section anchor="overview">
        <name>SCION Control Plane PKI Keys and Certificates - Overview</name>
        <t>There are three types of Control Plane (CP) certificates: root certificates, CA certificates, and AS certificates. Together, they build a chain of trust that is anchored in the Trust Root Configuration (TRC) file of the respective Isolation Domain (ISD). Additionally, there are regular and sensitive voting certificates which define the keys to cast votes in a regular or sensitive TRC update.</t>
        <t>All certificates in the Control Plane PKI are in X.509 v3 format <xref target="RFC5280"/>.</t>
        <section anchor="trust-hierarchy">
          <name>Trust Hierarchy</name>
          <t>The trust is anchored in the TRC for each ISD. The trust root is axiomatic: All trust derived from this anchor relies on all parties transitively trusting the TRC.</t>
          <t>The trust hierarchy looks like this:</t>
          <artwork><![CDATA[
TRC
── Regular Voting Certificates
     └── TRC (next version, regular update)
── Sensitive Voting Certificates
     └── TRC (next version, sensitive update)
── CP Root Certificates
     └── CP CA Certificates
          └── CP AS Certificates
]]></artwork>
        </section>
        <section anchor="cp-root-cert">
          <name>Control Plane Root Certificate</name>
          <t>The private key of the Control Plane root certificate is used to sign Control Plane CA certificates. Consequently, the public key of the Control Plane Root certificate is used to verify Control Plane CA certificates, i.e. root certificates determine which ASes act as a CA in an ISD.</t>
          <t>In X.509 terms, Control Plane root certificates are <em>self-signed</em> CA certificates. That is, issuer and subject of the certificate are the same entity, and the public key in the root certificate can be used to verify the root certificate's signature. The public key of the Control Plane root certificate and proof of ownership of the private key are embedded in the TRC of an ISD, via the self-signed Control Plane root certificate. This facilitates the bootstrapping of trust within an ISD, and marks the Control Plane root certificates as the starting point of an ISD's certificate verification path.</t>
          <t>The <bcp14>RECOMMENDED</bcp14> <strong>maximum validity period</strong> of a Control Plane root certificate is 1 year.</t>
          <t><strong>Note</strong>: The TRC of each ISD contains a trusted set of Control Plane root certificates, and this set builds the root of each ISD's verification path. For more information on the selection of this trusted set of root certificates, see <xref target="trc-specification"/>.</t>
        </section>
        <section anchor="control-plane-ca-certificate">
          <name>Control Plane CA Certificate</name>
          <t>The private key of the Control Plane CA is used to sign Control Plane AS certificates. Consequently, Control Plane CA certificates holding the public key of the Control Plane CA are used to verify Control Plane AS certificates.</t>
          <t>The public key needed to verify the CA certificate is in a Control Plane root certificate. CA certificates do not bundle the root certificate needed to verify them. In order to verify a CA certificate, a pool of root certificates must first be extracted from one or more active TRCs (as described in <xref target="signing-verifying-cp-messages"/>).</t>
          <t>The <bcp14>RECOMMENDED</bcp14> <strong>maximum validity period</strong> of a Control Plane CA certificate is 11 days.</t>
        </section>
        <section anchor="control-plane-as-certificate">
          <name>Control Plane AS Certificate</name>
          <t>SCION ASes sign control plane messages, such as Path Construction Beacons, with their AS private key. Consequently, Control Plane AS certificates holding the corresponding AS public key are required to verify control plane messages.</t>
          <t>In X.509 terms, Control Plane AS certificates are end-entity certificates. That is, they cannot be used to verify other certificates.</t>
          <t>The <bcp14>RECOMMENDED</bcp14> <strong>maximum validity period</strong> of a CP AS certificate is 3 days.</t>
        </section>
        <section anchor="cp-voting-cert">
          <name>Voting Certificates</name>
          <t>There are two types of voting certificates: the (1) regular voting certificates and the (2) sensitive voting certificates. They contain the public keys associated with the private keys that <bcp14>MAY</bcp14> cast votes in the TRC update process. Voting certificates are X.509-style certificates.</t>
          <t>Regular and sensitive voting certificates are used to verify regular and sensitive TRC updates, respectively, and are embedded in the TRC.</t>
          <section anchor="regular-voting-certificate">
            <name>Regular Voting Certificate</name>
            <t>Regular voting certificates state which keys <bcp14>MAY</bcp14> cast votes in a regular update. In X.509 terms, regular voting certificates are self-signed end-entity certificates. This means that the issuer and subject of a regular voting certificate are the same entity, and the public key within the certificate can be used to verify the certificate's signature. However, a regular voting certificate cannot be used to verify other certificates.</t>
            <t>The <bcp14>RECOMMENDED</bcp14> <strong>maximum validity period</strong> of a regular voting certificate is 1 year.</t>
          </section>
          <section anchor="sensitive-voting-certificate">
            <name>Sensitive Voting Certificate</name>
            <t>Sensitive voting certificates specify which keys <bcp14>MAY</bcp14> cast votes in a sensitive update. In X.509 terms, sensitive voting certificates are self-signed end-entity certificates. This means that the issuer and subject of a sensitive voting certificate are the same entity, and the public key within the certificate can be used to verify the certificate's signature. However, a sensitive voting certificate cannot be used to verify other certificates.</t>
            <t>The <bcp14>RECOMMENDED</bcp14> <strong>maximum validity period</strong> of a sensitive voting certificate is 5 years.</t>
            <t><strong>Note</strong>:</t>
            <ul empty="true">
              <li>
                <t>Both SCION Control Plane root certificates and Control Plane CA certificates are in fact CA certificates. That is, they can both be used to verify other certificates.</t>
                <t>One important difference between both certificate types lies in their validity period: A SCION Control Plane root certificate has a <bcp14>RECOMMENDED</bcp14> maximum validity period of one year, whereas the <bcp14>RECOMMENDED</bcp14> maximum validity period of a SCION Control Plane CA certificate is 11 days. This is because a root certificate is part of the TRC of an ISD, which itself also has a <bcp14>RECOMMENDED</bcp14> maximum validity period of one year (see Table 2 below). This ensures that the TRC need not be updated all the time and is thus relatively stable.</t>
                <t>The SCION root private key and public key/certificate are used to sign and verify the Control Plane CA certificates, respectively. The control plane CA certificates are explicitly NOT part of the TRC, for reasons of security. The Control Plane CA certificates are used to verify the Control Plane AS certificates, which in turn are used to verify control plane messages. Routing is made more secure if both the SCION Control Plane CA and AS certificates can be renewed on a very regular basis. If the control plane CA and AS certificates were part of the TRC, then the TRC would have to be updated constantly, which is undesirable.</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="formal">
          <name>Certificates - Formal Overview</name>
          <t><xref target="_table-2"/> and <xref target="_table-3"/> below provide an overview of the different types of key pairs and certificates in the control plane PKI.</t>
          <table anchor="_table-2">
            <name>Key chain</name>
            <thead>
              <tr>
                <th align="left">Name</th>
                <th align="left">Notation (1)</th>
                <th align="left">Used to verify/sign</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Sensitive voting key</td>
                <td align="left">K<sub>sens</sub></td>
                <td align="left">TRC updates (sensitive)</td>
              </tr>
              <tr>
                <td align="left">Regular voting key</td>
                <td align="left">K<sub>reg</sub></td>
                <td align="left">TRC updates (regular)</td>
              </tr>
              <tr>
                <td align="left">CP root key</td>
                <td align="left">K<sub>root</sub></td>
                <td align="left">CP CA certificates</td>
              </tr>
              <tr>
                <td align="left">CP CA key</td>
                <td align="left">K<sub>CA</sub></td>
                <td align="left">CP AS certificates</td>
              </tr>
              <tr>
                <td align="left">CP AS key</td>
                <td align="left">K<sub>AS</sub></td>
                <td align="left">CP messages, path segments</td>
              </tr>
            </tbody>
          </table>
          <t>(1)  K<sub>x</sub> = PK<sub>x</sub> + SK<sub>x</sub>, where x = certificate type, PK<sub>x</sub> = public key, and SK<sub>x</sub> = private key</t>
          <table anchor="_table-3">
            <name>Certificates</name>
            <thead>
              <tr>
                <th align="left">Name</th>
                <th align="left">Notation</th>
                <th align="left">Signed with</th>
                <th align="left">Contains</th>
                <th align="left">Validity (2)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">TRC (trust root conf.)</td>
                <td align="left">TRC</td>
                <td align="left">SK<sub>sens</sub>, SK<sub>reg</sub> (1)</td>
                <td align="left">C<sub>root</sub>, C<sub>sens</sub>, C<sub>reg</sub> (1)</td>
                <td align="left">1 year</td>
              </tr>
              <tr>
                <td align="left">Sensitive voting cert.</td>
                <td align="left">C<sub>sens</sub></td>
                <td align="left">SK<sub>sens</sub></td>
                <td align="left">PK<sub>sens</sub></td>
                <td align="left">5 years</td>
              </tr>
              <tr>
                <td align="left">Regular voting cert.</td>
                <td align="left">C<sub>reg</sub></td>
                <td align="left">SK<sub>reg</sub></td>
                <td align="left">PK<sub>reg</sub></td>
                <td align="left">1 year</td>
              </tr>
              <tr>
                <td align="left">CP root certificate</td>
                <td align="left">C<sub>root</sub></td>
                <td align="left">SK<sub>root</sub></td>
                <td align="left">PK<sub>root</sub></td>
                <td align="left">1 year</td>
              </tr>
              <tr>
                <td align="left">CP CA certificate</td>
                <td align="left">C<sub>CA</sub></td>
                <td align="left">SK<sub>root</sub></td>
                <td align="left">PK<sub>CA</sub></td>
                <td align="left">11 days (3)</td>
              </tr>
              <tr>
                <td align="left">CP AS certificate</td>
                <td align="left">C<sub>AS</sub></td>
                <td align="left">SK<sub>CA</sub></td>
                <td align="left">PK<sub>AS</sub></td>
                <td align="left">3 days</td>
              </tr>
            </tbody>
          </table>
          <t>(1) Multiple signatures and certificates of each type <bcp14>MAY</bcp14> be included in a TRC.<br/>
(2) Recommended maximum validity period.<br/>
(3) A validity of 11 days with 4 days overlap between two CA certificates is <bcp14>RECOMMENDED</bcp14> to enable the best possible operational procedures when performing a CA certificate rollover.</t>
          <t><xref target="_figure-2"/> shows the content of a base/initial TRC, and the relationship between a TRC and the five types of certificates. The initial signatures are replaced by those of the Regular Voting Certificates with the first regular update to the base TRC.</t>
          <figure anchor="_figure-2">
            <name>TRC update chain and the different types of associated certificates. Arrows show how signatures are verified; in other words, they indicate that a public key contained in a certificate or TRC can be used to verify the authenticity of another item.</name>
            <artwork><![CDATA[
+--------------------------------------------+
|                   TRC 1                    |
|               (base/initial)               |
|+------------------------------------------+|
|| - Version          - Core ASes           ||
|| - ID               - Description         ||
|| - Validity         - No Trust Reset      ||
|| - Grace Period     - Voting Quorum       ||
|| - ...                                    ||
|+------------------------------------------+|
|+--------------------++--------------------+|
||        Votes       ||   Regular Voting   ||
||  (cert. indices)   ||    Certificates    ||
||                    ||                    ||
||                    || +-----+ +-----+    ||
||       (empty)      || | (1) | | (2) |    ||
||                    || |C    | |C    | ...||
||                    || | reg | | reg |    ||
|+--------------------+| +-----+ +-----+    ||
|+--------------------+|                    ||
||                    ||                    ||
||                    ||                    ||
||     Signatures     |+--------------------+|
||                    |+--------------------+|
||+------------------+||  Sensitive Voting  ||
||| 73 A9 4E AO 0D...|||    Certificates    ||
||+------------------+|| +-----+ +-----+    ||
||+------------------+|| | (3) | | (4) |    ||
||| 53 B7 7C 98 56...||| |C    | |C    |    ||
||+------------------+|| | sens| | sens| ...||
||        ...         || +-----+ +-----+    ||
|+--------------------++--------------------+|
|+------------------------------------------+|
||          CP Root Certificates            ||
||                                          ||
|| +-----+ +-----+ +-----+ +-----+          ||
|| | (5) | | (6) | | (7) | | (8) |          ||
|| |C    | |C    | |C    | |C    |          ||
|| | root| | root| | root| | root| ...      ||
|| +-----+ +--+--+ +-----+ +--+--+          ||
|+------------+---------------+-------------+|
+-------------+---------------+--------------+
              |               |
              v               v
     +-----------+         +-----------+
     |   CP CA   |         |   CP CA   |
     |Certificate|         |Certificate|
     +-----+-----+         +-----+-----+
           |                     |
           v                     v
     +-----------+         +-----------+
     |   CP AS   |         |   CP AS   |
     |Certificate|         |Certificate|
     +-----------+         +-----------+
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="certificate-specification">
        <name>Certificate Specification</name>
        <t>Whilst the certificates used in the Control Plane PKI are X.509 v3 certificates, the SCION specification is more restrictive. This section defines these additional constraints and conditions in comparison to <xref target="RFC5280"/>.</t>
        <section anchor="basic-fields-scion-specific-constraints-and-conditions">
          <name>Basic Fields: SCION-Specific Constraints and Conditions</name>
          <t>The described fields of the Control Plane PKI certificates are relevant for each certificate regardless of the certificate type. For detailed descriptions of the full generic format of X.509 v3 certificates, see <xref target="RFC5280"/> and <xref target="X.509"/> clause 7.2.</t>
          <t><tt>TBSCertificate</tt> sequence: Contains information associated with the subject of the certificate and the CA that issued it. It includes the following fields:</t>
          <ul spacing="normal">
            <li>
              <t><tt>version</tt> field: Describes the version of the encoded certificate. It <bcp14>MUST</bcp14> be set to "v3" (as extensions are <bcp14>REQUIRED</bcp14> in SCION).</t>
            </li>
            <li>
              <t><tt>serialNumber</tt> field: A positive integer assigned by the CA to each certificate. It <bcp14>MUST</bcp14> be unique for each certificate issued by a given CA.</t>
            </li>
            <li>
              <t><tt>signature</tt> field: Contains the identifier for the algorithm used by the CA to sign the certificate.  </t>
              <ul spacing="normal">
                <li>
                  <t><strong>SCION constraints</strong>: Currently, SCION only supports the ECDSA signature algorithm. The details can be found at: <xref target="certsign"/>.</t>
                </li>
                <li>
                  <t><strong>Additional conditions and remarks</strong>: As a consequence, the <tt>parameters</tt> field in the <tt>AlgorithmIdentifier</tt> sequence <bcp14>MUST NOT</bcp14> be used.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><tt>issuer</tt> field: Contains the distinguished name (DN) of the entity that has issued and signed the certificate (usually a CA).  </t>
              <ul spacing="normal">
                <li>
                  <t><strong>SCION constraints</strong>:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>This field <bcp14>MUST</bcp14> be non-empty.</t>
                    </li>
                    <li>
                      <t>SCION implementations <bcp14>MUST</bcp14> ONLY use the “UTF8String” value type for all attributes (including the SCION-specific attribute <tt>ISD-AS number</tt>).</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t><strong>Additional conditions and remarks</strong>: All SCION implementations <bcp14>MUST</bcp14> support the additional SCION-specific attribute <tt>ISD-AS number</tt>. For details, see <xref target="issuer"/> and <xref target="isd-as-nr"/>.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><tt>validity</tt> field: Defines the validity period of the certificate.  </t>
              <ul spacing="normal">
                <li>
                  <t><strong>SCION constraints</strong>: All certificates <bcp14>MUST</bcp14> have a well-defined expiration date. Certificates with a generalized time value are not valid and <bcp14>MUST</bcp14> be rejected.</t>
                </li>
                <li>
                  <t><strong>Additional conditions and remarks</strong>: SCION recommends a specific maximum validity period for each type of certificate. For details, see <xref target="formal"/>. SCION implementations <bcp14>SHOULD</bcp14> adopt these values.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><tt>subject</tt> field: Defines the entity that owns the certificate.  </t>
              <ul spacing="normal">
                <li>
                  <t><strong>SCION constraints</strong>:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>This field <bcp14>MUST</bcp14> be non-empty.</t>
                    </li>
                    <li>
                      <t>SCION implementations <bcp14>MUST</bcp14> ONLY use the “UTF8String” value type for all attributes (including the SCION-specific attribute <tt>ISD-AS number</tt>).</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t><strong>Additional conditions and remarks</strong>: The <tt>subject</tt> field is specified in the same way as the <tt>issuer</tt> field. For details, see <xref target="issuer"/> and <xref target="isd-as-nr"/>.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><tt>subjectPublicKeyInfo</tt> field: Carries the public key of the certificate's subject (the entity that owns the certificate, as defined in the <tt>subject</tt> field). The <tt>subjectPublicKeyInfo</tt> field also identifies which algorithm to use with the key.  </t>
              <ul spacing="normal">
                <li>
                  <t><strong>SCION constraints</strong>: For constraints regarding the algorithm, see the <tt>signature</tt> field.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><tt>issuerUniqueID</tt> field: it <bcp14>MUST NOT</bcp14> be used in SCION.</t>
            </li>
            <li>
              <t><tt>subjectUniqueID</tt> field: it <bcp14>MUST NOT</bcp14> be used in SCION.</t>
            </li>
            <li>
              <t><tt>extensions</tt> sequence: Defines the extensions of the certificate. For a description of all extensions used in SCION, see <xref target="exts"/>.</t>
            </li>
          </ul>
          <section anchor="certsign">
            <name><tt>signature</tt> Field - Additional Information</name>
            <t>For security reasons, SCION uses a custom list of acceptable signature algorithms which is specified in the <tt>signature</tt> field. The list currently only contains the ECDSA signature algorithm (defined in <xref target="X9.62"/>) although this may be extended in future.</t>
            <t>The Object Identifiers (OIDs) for ECDSA are defined as <tt>ecdsa-with-SHA256</tt>, <tt>ecdsa-with-SHA384</tt>, and <tt>ecdsa-with-SHA512</tt> in <xref target="RFC5758"/>.</t>
            <t><strong>Important:</strong> SCION implementations <bcp14>MUST</bcp14> reject cryptographic algorithms not found in this list.</t>
            <t>The only accepted curves for ECDSA are:</t>
            <ul spacing="normal">
              <li>
                <t>NIST P-256 (NISTFIPS186-4, section D.1.2.3) (named <tt>secp256r1</tt> in <xref target="RFC5480"/>)</t>
              </li>
              <li>
                <t>NIST P-384 (NISTFIPS186-4, section D.1.2.4) (named <tt>secp384r1</tt> in <xref target="RFC5480"/>)</t>
              </li>
              <li>
                <t>NIST P-521 (NISTFIPS186-4, section D.1.2.5) (named <tt>secp521r1</tt> in <xref target="RFC5480"/>)</t>
              </li>
            </ul>
            <t>The OIDs for the above curves are specified in section 2.1.1.1 of <xref target="RFC5480"/>.</t>
            <t>The appropriate hash size to use when producing a signature with an ECDSA key is:</t>
            <ul spacing="normal">
              <li>
                <t>ECDSA with SHA-256, for a P-256 signing key</t>
              </li>
              <li>
                <t>ECDSA with SHA-384, for a P-384 signing key</t>
              </li>
              <li>
                <t>ECDSA with SHA-512, for a P-521 signing key</t>
              </li>
            </ul>
            <t><strong>Important:</strong> SCION implementations <bcp14>MUST</bcp14> include support for P-256, P-384, and P-521.</t>
          </section>
          <section anchor="issuer">
            <name><tt>issuer</tt> Field - Additional Information</name>
            <t>The <tt>issuer</tt> field contains the distinguished name (DN) of the CA that created the certificate. <xref target="RFC5280"/>, section 4.1.2.4, describes the field's syntax and attributes. In addition to these attributes, SCION implementations <bcp14>MUST</bcp14> also support the SCION-specific attribute <tt>ISD-AS number</tt>. See <xref target="isd-as-nr"/>.</t>
            <section anchor="isd-as-nr">
              <name><tt>ISD-AS number</tt> Attribute</name>
              <t>The <tt>ISD-AS number</tt> attribute identifies the SCION ISD and AS. In the SCION open source implementation, the attribute type is <tt>id-at-ia</tt>, defined as:<br/>
                <tt>id-at-ia AttributeType ::= {id-scion id-cppki(1) id-at(2) 1}</tt></t>
              <t>where <tt>id-scion</tt> specifies the root SCION object identifier (OID).</t>
              <t><strong>Note</strong>: The root SCION object identifier (OID) for the SCION open-source implementation is the IANA Private Enterprise Number '55324':<br/>
                <tt>id-scion ::= OBJECT IDENTIFIER {1 3 6 1 4 1 55324}</tt></t>
              <t>The string representation of the <tt>ISD-AS number</tt> attribute <bcp14>MUST</bcp14> follow the text representation defined in <xref target="I-D.dekater-scion-controlplane"/>, section "Text Representation". The canonical string formatting of AS numbers in the AS range (0, 2<sup>32-1</sup>) <bcp14>MUST</bcp14> use the decimal form. Larger AS numbers, i.e., from 2<sup>32</sup> to 2<sup>48-1</sup>, <bcp14>MUST</bcp14> use a 16-bit, colon-separated, lower-case, hex encoding with leading zeros omitted: <tt>1:0:0</tt> to <tt>ffff:ffff:ffff</tt>.</t>
              <t>The <tt>ISD-AS number</tt> attribute <bcp14>MUST</bcp14> be present exactly once in the distinguished name of the certificate issuer or owner, specified in the <tt>issuer</tt> or <tt>subject</tt> field respectively. Implementations <bcp14>MUST NOT</bcp14> create nor successfully verify certificates whose <tt>issuer</tt> and <tt>subject</tt> fields do not include the ISD-AS number at all, or include it more than once.</t>
              <t>CA certificates <bcp14>MUST</bcp14> include an ISD-AS number in their distinguished name so the control plane knows from which AS to retrieve the certificate, thereby avoiding circular dependencies.</t>
              <t><strong>Note</strong>: Voting certificates are not required to include the <tt>ISD-AS number</tt> attribute in their distinguished name.</t>
            </section>
          </section>
        </section>
        <section anchor="exts">
          <name>Extensions</name>
          <t><xref target="RFC5280"/>, section 4.2.1, defines the syntax of the <tt>Extensions</tt> sequence in a X.509 certificate. Descriptions of each standard certificate extension can be found in <xref target="RFC5280"/>, section 4.2.1. The corresponding clauses in <xref target="X.509"/> are clause 7.2 and clause 9, respectively.</t>
          <t>Currently, the following extensions are relevant for SCION:</t>
          <ul spacing="normal">
            <li>
              <t><tt>authorityKeyIdentifier</tt></t>
            </li>
            <li>
              <t><tt>subjectKeyIdentifier</tt></t>
            </li>
            <li>
              <t><tt>keyUsage</tt></t>
            </li>
            <li>
              <t><tt>extKeyUsage</tt></t>
            </li>
            <li>
              <t><tt>basicConstraints</tt></t>
            </li>
          </ul>
          <t>The following sections describe the SCION-specifics in regard to these extensions.</t>
          <section anchor="authoritykeyidentifier-extension">
            <name><tt>authorityKeyIdentifier</tt> Extension</name>
            <t>The <tt>authorityKeyIdentifier</tt> extension identifies the public key corresponding to the private key used to sign a certificate.</t>
            <t>For the syntax and definition of the <tt>authorityKeyIdentifier</tt> extension, see <xref target="RFC5280"/>, section 4.2.1.1, and <xref target="X.509"/>, clause 9.2.2.1.</t>
            <t>The <tt>authorityKeyIdentifier</tt> extension provides three attributes to specify the public key:</t>
            <ul spacing="normal">
              <li>
                <t><tt>keyIdentifier</tt></t>
              </li>
              <li>
                <t><tt>authorityCertIssuer</tt></t>
              </li>
              <li>
                <t><tt>authorityCertSerialNumber</tt></t>
              </li>
            </ul>
            <t>In SCION, using the <tt>keyIdentifier</tt> attribute is the preferred way to specify the <tt>authorityKeyIdentifier</tt> extension.</t>
            <t><strong>Important:</strong> SCION implementations <bcp14>MAY</bcp14> also support the use of the <tt>authorityCertIssuer</tt> and <tt>authorityCertSerialNumber</tt> attributes. However, if these attributes are set and support for them is missing, implementations <bcp14>SHOULD</bcp14> error out.</t>
            <t>This extension <bcp14>MUST</bcp14> always be non-critical. However, SCION implementations <bcp14>MUST</bcp14> error out if the extension is not present AND the certificate is not self-signed.</t>
          </section>
          <section anchor="subject-key-id-ext">
            <name><tt>subjectKeyIdentifier</tt> Extension</name>
            <t>The <tt>subjectKeyIdentifier</tt> extension identifies certificates that contain a particular public key. It can be used, for example, by control plane messages to identify which certificate to use for verification. The extension allows for overlapping control plane CA keys, for example during updates.</t>
            <t>For the syntax and definition of the <tt>subjectKeyIdentifier</tt> extension, see <xref target="RFC5280"/>, section 4.2.1.2, and <xref target="X.509"/>, clause 9.2.2.2.</t>
            <t>This extension <bcp14>MUST</bcp14> always be non-critical. However, SCION implementations <bcp14>MUST</bcp14> error out if the extension is not present.</t>
          </section>
          <section anchor="key-usage-ext">
            <name><tt>keyUsage</tt> Extension</name>
            <t>The <tt>keyUsage</tt> extension identifies the intended usage of the public key in the corresponding certificate. For the syntax and definition of the <tt>keyUsage</tt> extension, see <xref target="RFC5280"/>, section 4.2.1.3, and <xref target="X.509"/>, clause 9.2.2.3.</t>
            <t>The attributes of the <tt>keyUsage</tt> extension define possible ways of using the public key. The attributes have the following meaning in SCION:</t>
            <ul spacing="normal">
              <li>
                <t><tt>digitalSignature</tt>: The public key can be used to verify the digital signature of a control plane payload.</t>
              </li>
              <li>
                <t><tt>contentCommitment</tt>: Not used.</t>
              </li>
              <li>
                <t><tt>keyEncipherment</tt>: Not used.</t>
              </li>
              <li>
                <t><tt>dataEncipherment</tt>: Not used.</t>
              </li>
              <li>
                <t><tt>keyAgreement</tt>: Not used.</t>
              </li>
              <li>
                <t><tt>keyCertSign</tt>: The public key can be used to verify the CA signature on a control plane certificate.</t>
              </li>
              <li>
                <t><tt>cRLSign</tt>: Not used.</t>
              </li>
              <li>
                <t><tt>encipherOnly</tt>: Not used.</t>
              </li>
              <li>
                <t><tt>decipherOnly</tt>: Not used.</t>
              </li>
            </ul>
            <t><strong>Important:</strong> If a certificate’s public key is used to verify the signature of a control plane payload (<tt>digitalSignature</tt> attribute), it <bcp14>MUST</bcp14> be possible to trace back the private key used to sign the certificate. This is done by referencing the ISD-AS and the subject key identifier (via the <tt>subjectKeyIdentifier</tt> extension). For more information about the <tt>subjectKeyIdentifier</tt> extension, see <xref target="subject-key-id-ext"/>.</t>
            <t>If present, the <tt>keyUsage</tt> extension <bcp14>SHOULD</bcp14> be marked as "critical". That is, the <tt>critical</tt> Boolean attribute of this extension <bcp14>MUST</bcp14> be set to TRUE (the default is FALSE).</t>
            <t><strong>Note</strong>: If a certificate extension is marked "critical", the public key in the certificate <bcp14>SHOULD</bcp14> only be used for the purpose set in the critical extension.</t>
            <t>Each Control Plane PKI certificate type uses the public key differently, and consequently also specifies the attributes of the <tt>keyUsage</tt> extension differently. The next table shows the specifications per certificate type.</t>
            <table anchor="_table-4">
              <name>keyUsage extension - Specifications per certificate type</name>
              <thead>
                <tr>
                  <th align="left">Certificate Type</th>
                  <th align="left">Root</th>
                  <th align="left">CA</th>
                  <th align="left">AS</th>
                  <th align="left">Voting (regular and sensitive)</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">
                    <em>Attribute:</em></td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>keyUsage</tt> extension itself</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be present</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be present</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be present</td>
                  <td align="left">
                    <bcp14>MAY</bcp14> be present (but is not required)</td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>digitalSignature</tt></td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be set (1)</td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be set (2)</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be set</td>
                  <td align="left">If the extension is present, the <tt>digitalSignature</tt> attribute <bcp14>MUST NOT</bcp14> be set</td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>keyCertSign</tt></td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be set</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be set</td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be set</td>
                  <td align="left">If the extension is present, the <tt>keyCertSign</tt> attribute <bcp14>MUST NOT</bcp14> be set</td>
                </tr>
              </tbody>
            </table>
            <t>(1) The root certificate <bcp14>SHOULD NOT</bcp14> be used to verify control plane messages.<br/>
(2) The CA certificate <bcp14>SHOULD NOT</bcp14> be used to verify control plane messages.</t>
          </section>
          <section anchor="ext-key-usage-ext">
            <name><tt>extKeyUsage</tt> Extension</name>
            <t>The <tt>extKeyUsage</tt> extension specifies additional usages of the public key in the certificate. For the syntax and definition of the <tt>extKeyUsage</tt> extension, see <xref target="X.509"/>, clause 9.2.2.4.</t>
            <t>SCION uses the following attributes of the Extended Key Usage extension, as defined in Section 4.2.1.12 of <xref target="RFC5280"/>:</t>
            <ul spacing="normal">
              <li>
                <t><tt>id-kp-serverAuth</tt>: If set, the public key can be used for SCION Control Plane server authentication.</t>
              </li>
              <li>
                <t><tt>id-kp-clientAuth</tt>: If set, the public key can be used for SCION Control Plane client authentication.</t>
              </li>
              <li>
                <t><tt>id-kp-timeStamping</tt>: If set, the public key can be used for the verification of timestamps.</t>
              </li>
            </ul>
            <t>Additionally, the Extended Key Usage extension sequence <bcp14>MAY</bcp14> include the SCION-specific attributes <tt>id-kp-root</tt>, <tt>id-kp-regular</tt>, and <tt>id-kp-sensitive</tt>. These attributes are used in the TRC setup, to distinguish root certificates, regular voting certificates, and sensitive voting certificates from each other. For more information, see <xref target="cert"/>.</t>
            <t>The specifications of the <tt>extKeyUsage</tt> extension differ per SCION Control Plane PKI certificate type. The next table provides an overview of the specifications per certificate type.</t>
            <table anchor="_table-5">
              <name>extKeyUsage extension - Specifications per certificate type</name>
              <thead>
                <tr>
                  <th align="left">Certificate Type</th>
                  <th align="left">Root</th>
                  <th align="left">CA</th>
                  <th align="left">AS</th>
                  <th align="left">Voting (regular and sensitive)</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">
                    <em>Attribute:</em></td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>extKeyUsage</tt> extension itself</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be present</td>
                  <td align="left">
                    <bcp14>MAY</bcp14> be present (not required)</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be present</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be present</td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>id-kp-serverAuth</tt></td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be included</td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be included</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be included, if the certificate is used on the server-side of a control plane TLS session.</td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be included</td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>id-kp-clientAuth</tt></td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be included</td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be included</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be included, if the certificate is used on the client-side of a control plane TLS session.</td>
                  <td align="left">
                    <bcp14>MUST NOT</bcp14> be included</td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>id-kp-timeStamping</tt></td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be included</td>
                  <td align="left"> </td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be included</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be included</td>
                </tr>
                <tr>
                  <td align="left">SCION-specific</td>
                  <td align="left">
                    <tt>id-kp-root</tt> <bcp14>MUST</bcp14> be included. For details, see <xref target="specatt"/></td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                  <td align="left">Regular voting cert: <tt>id-kp-regular</tt> <bcp14>MUST</bcp14> be included. For details, see <xref target="specatt"/><br/> Sensitive voting cert: <tt>id-kp-sensitive</tt> <bcp14>MUST</bcp14> be included. For details, see <xref target="specatt"/></td>
                </tr>
              </tbody>
            </table>
            <section anchor="specatt">
              <name>SCION-Specific Attributes</name>
              <t>The <tt>id-kp-root</tt>, <tt>id-kp-regular</tt>, and <tt>id-kp-sensitive</tt> attributes <bcp14>MUST</bcp14> be specified as follows:</t>
              <ul spacing="normal">
                <li>
                  <t>Root certificate:<br/> <tt>id-kp-root AttributeType ::= {id-scion id-cppki(1) id-kp(3) 3}</tt></t>
                </li>
                <li>
                  <t>Regular voting certificate:<br/> <tt>id-kp-regular AttributeType ::= {id-scion id-cppki(1) id-kp(3) 2}</tt></t>
                </li>
                <li>
                  <t>Sensitive voting certificate:<br/> <tt>id-kp-sensitive AttributeType ::= {id-scion id-cppki(1) id-kp(3) 1}</tt></t>
                </li>
              </ul>
              <t>where <tt>id-scion</tt> specifies the root SCION object identifier (OID).</t>
              <t><strong>Note</strong>: The root SCION object identifier (OID) for the SCION open-source implementation is the IANA Private Enterprise Number '55324':<br/>
                <tt>id-scion ::= OBJECT IDENTIFIER {1 3 6 1 4 1 55324}</tt></t>
            </section>
          </section>
          <section anchor="basic-constr-ext">
            <name><tt>basicConstraints</tt> Extension</name>
            <t>The <tt>basicConstraints</tt> extension specifies whether the certificate subject may act as a CA. For the syntax and definition of the <tt>basicConstraints</tt> extension, see <xref target="X.509"/>, clause 9.4.2.1.</t>
            <t>The <tt>basicConstraints</tt> extension includes the following attributes relevant for SCION:</t>
            <ul spacing="normal">
              <li>
                <t><tt>cA</tt> attribute: Specifies whether the certificate subject may act as a CA. If yes, this attribute <bcp14>MUST</bcp14> be set to TRUE.</t>
              </li>
              <li>
                <t><tt>pathLenConstraint</tt> attribute: This attribute is only relevant if the <tt>cA</tt> attribute is set to TRUE. It specifies the maximum number of CA certificates that may follow this CA certificate in the certification chain. Value "0" means that this CA may only issue end-entity certificates, but no CA certificates. If the attribute is not set, there is no limit to the maximum length of the certification path.</t>
              </li>
            </ul>
            <t>The settings of the <tt>basicConstraints</tt> extension differ for each SCION Control Plane PKI certificate type. The next table shows the specifications per certificate type.</t>
            <table anchor="_table-6">
              <name>basicConstraints extension - Specifications per certificate type</name>
              <thead>
                <tr>
                  <th align="left">Certificate Type</th>
                  <th align="left">Root</th>
                  <th align="left">CA</th>
                  <th align="left">AS</th>
                  <th align="left">Voting (regular and sensitive)</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">
                    <em>Attribute:</em></td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                  <td align="left"> </td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>basicConstraints</tt> extension itself</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be present</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be present</td>
                  <td align="left">
                    <bcp14>SHOULD NOT</bcp14> be present</td>
                  <td align="left">
                    <bcp14>SHOULD NOT</bcp14> be present</td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>cA</tt></td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be set to TRUE</td>
                  <td align="left">
                    <bcp14>MUST</bcp14> be set to TRUE</td>
                  <td align="left">If the extension is present, this attribute <bcp14>MUST</bcp14> be set to FALSE</td>
                  <td align="left">If the extension is present, this attribute <bcp14>MUST</bcp14> be set to FALSE</td>
                </tr>
                <tr>
                  <td align="left">
                    <tt>pathLenConstraint</tt></td>
                  <td align="left">
                    <bcp14>SHOULD</bcp14> be set to "1", <bcp14>MUST</bcp14> be marked as "critical"</td>
                  <td align="left">
                    <bcp14>SHOULD</bcp14> be set to "0" (1), <bcp14>MUST</bcp14> be marked as "critical"</td>
                  <td align="left">If the extension is present, this attribute <bcp14>MUST</bcp14> be absent.</td>
                  <td align="left">If the extension is present, this attribute <bcp14>MUST</bcp14> be absent.</td>
                </tr>
              </tbody>
            </table>
            <t>(1) Control Plane CAs can only issue end-entity certificates.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="trc-specification">
      <name>Trust Root Configuration Specification</name>
      <t>This section provides an in-depth specification of the Trust Root Configuration (TRC) file (see <xref target="trc-spec"/>). The TRC contains policy information about an ISD and acts as a distribution mechanism for the trust anchors of that ISD. It enables the securing of control plane interactions and is thus an integral part of the SCION infrastructure.</t>
      <t>The initial TRC of an ISD is signed during a signing ceremony and then distributed throughout the ISD. This signing ceremony follows specific rules; <xref target="trc-ceremony"/> describes these rules.</t>
      <section anchor="trc-spec">
        <name>TRC Specification</name>
        <t>The TRC is a signed collection of <xref target="X.509"/> v3 certificates. Additionally, the TRC contains ISD-specific policies encoded in a Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> envelope.</t>
        <t>The TRC's certificates collection consists of a set of control plane root certificates which build the root of the certification chain for the AS certificates in an ISD. The other certificates in the TRC are solely used for signing the next TRC, a process called "voting". The verification of a new TRC thus depends on the policies and voting certificates defined in the previous TRC.</t>
        <t>This section specifies the TRC including format definitions and dpayload fields. The section uses the ITU-T <xref target="X.680"/> syntax.</t>
        <section anchor="trc-states">
          <name>TRC Types and States</name>
          <t>The following types of TRCs exist:</t>
          <ul spacing="normal">
            <li>
              <t>Initial: The very first TRC of an ISD is the initial TRC of that ISD. It is a special case of the base TRC, where the number of the ISD is specified.</t>
            </li>
            <li>
              <t>Base: A base TRC is either the initial TRC, or the first TRC after a trust reset (see <xref target="trust-reset"/>). Trust for a base TRC cannot be inferred by verifying a TRC update; base TRCs are trusted axiomatically, similarly to how root CA certificates are trusted by clients in the Web PKI.</t>
            </li>
            <li>
              <t>Update: All non-base TRCs are updated TRCs. They are the product of either a regular or a sensitive update.</t>
            </li>
          </ul>
          <t>A TRC can have the following states:</t>
          <ul spacing="normal">
            <li>
              <t>Valid: The validity period of a TRC is defined in the TRC itself, in the <tt>validity</tt> field (see <xref target="validity"/>). A TRC is considered valid if the current time falls within its validity period.</t>
            </li>
            <li>
              <t>Active: An active TRC is a valid TRC that can be used for verifying certificate signatures. This is either the latest TRC or the predecessor TRC, if it is still in its grace period (as defined in the <tt>gracePeriod</tt> field of the new TRC, see <xref target="grace"/>). No more than two TRCs can be active at the same time for any ISD.</t>
            </li>
          </ul>
          <t><xref target="_figure-2"/> shows the content of both a base/initial TRC, the changes made with the first regular update to the base TRC. All elements of the TRC is detailed in the following subsections.</t>
        </section>
        <section anchor="trc-format">
          <name>TRC Format</name>
          <t>The TRC defines the roots of trust of an ISD and is the basis of the ISD's Control Plane PKI. It holds the root and voting certificates of the ISD and defines the ISD's trust policy.</t>
          <section anchor="trcpayload">
            <name>TRC Schema</name>
            <t>The following code block shows the format of a TRC specification file (the payload schema):</t>
            <artwork><![CDATA[
   TRCPayload  ::=  SEQUENCE {
       version   TRCFormatVersion,
       iD        TRCID,
       validity  Validity,

       gracePeriod   INTEGER,
       noTrustReset  BOOLEAN DEFAULT FALSE,
       votes         SEQUENCE OF INTEGER (SIZE (1..255)),

       votingQuorum  INTEGER (1..255),

       coreASes           SEQUENCE OF ASN,
       authoritativeASes  SEQUENCE OF ASN,
       description        UTF8String (SIZE (0..1024)),

       certificates       SEQUENCE OF Certificate }

   TRCFormatVersion  ::=  INTEGER { v1(0) }

   TRCID  ::=  SEQUENCE {
       iSD           ISD,
       serialNumber  INTEGER (1..MAX),
       baseNumber    INTEGER (1..MAX) }

   ISD  ::=  INTEGER (1..65535)

   Validity  ::=  SEQUENCE {
       notBefore  Time,
       notAfter   Time }

   ASN  ::=  INTEGER (1..281474976710655)
]]></artwork>
            <t>The <tt>TRCPayload</tt> sequence contains the identifying information of a TRC as well as policy information for TRC updates. Furthermore, it defines the list of certificates that build the trust anchor of the ISD.</t>
            <t>For signature calculation, the data that is to be signed is encoded using ASN.1 distinguished encoding rules (DER) <xref target="X.690"/>. For more details, see <xref target="signed-format"/>.</t>
          </section>
          <section anchor="trcfields">
            <name>TRC Fields</name>
            <t>This section describes the syntax and semantics of all TRC payload fields.</t>
            <section anchor="field">
              <name><tt>version</tt> Field</name>
              <t>The <tt>version</tt> field describes the version of the TRC format specification.</t>
              <t>Currently, the version <bcp14>MUST</bcp14> always be "v1".</t>
            </section>
            <section anchor="id">
              <name><tt>iD</tt> Field</name>
              <t>The <tt>iD</tt> field specifies the unique identifier of the TRC.</t>
              <t>The identifier is a unique sequence of</t>
              <ul spacing="normal">
                <li>
                  <t>ISD number (<tt>iSD</tt> attribute),</t>
                </li>
                <li>
                  <t>base number (<tt>baseNumber</tt> attribute), and</t>
                </li>
                <li>
                  <t>TRC serial number (<tt>serialNumber</tt> attribute).</t>
                </li>
              </ul>
              <t>All numbers <bcp14>MUST</bcp14> be positive integers.</t>
              <ul spacing="normal">
                <li>
                  <t>The <strong>ISD number</strong> <bcp14>MUST</bcp14> be an integer in the inclusive range from 64 to 4094 (i.e., the numbering range for public ISDs, see <xref target="input"/>).</t>
                </li>
                <li>
                  <t>The <strong>base number</strong> indicates the starting point of the current TRC update chain. This starting point is either the ISD's initial TRC or the currently valid base TRC, if the valid base TRC differs from the initial TRC. The latter <bcp14>MUST</bcp14> be the case after a trust reset.</t>
                </li>
                <li>
                  <t>The <strong>serial number</strong> represents the current update cycle, counting from the initial TRC of a specific ISD.</t>
                </li>
              </ul>
              <t>A TRC where the base number is equal to the serial number is a base TRC. The initial TRC is a special case of a base TRC and <bcp14>MUST</bcp14> have a serial number of 1 and a base number of 1. With every TRC update, the serial number <bcp14>MUST</bcp14> be incremented by one. This facilitates uniquely identifying the predecessor and successor TRC in an update chain.</t>
              <t>If a trust reset is necessary, a new base TRC is announced in order to start a new and clean TRC update chain. The base number of this new TRC update chain <bcp14>SHOULD</bcp14> be the number following the serial number of the latest TRC that was produced by a non-compromised TRC update for this ISD.</t>
              <t><strong>Example</strong><br/>
The following simple example illustrates how to specify the ID of the TRCs in an TRC update chain for <em>ISD 74</em>. The IDs are given in a human-readable notation, where Bxx is the base number, and Sxx the serial number.</t>
              <table anchor="_table-7">
                <name>ID of TRCs in TRC update chain</name>
                <thead>
                  <tr>
                    <th align="left">Update</th>
                    <th align="left">TRC ID</th>
                    <th align="left">Remarks</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Initial</td>
                    <td align="left">ISD74-B01-S01</td>
                    <td align="left"> </td>
                  </tr>
                  <tr>
                    <td align="left">Regular</td>
                    <td align="left">ISD74-B01-S02</td>
                    <td align="left">Only the serial number is incremented.</td>
                  </tr>
                  <tr>
                    <td align="left">Regular</td>
                    <td align="left">ISD74-B01-S03</td>
                    <td align="left">Only the serial number is incremented.</td>
                  </tr>
                  <tr>
                    <td align="left">Sensitive</td>
                    <td align="left">ISD74-B01-S04</td>
                    <td align="left">Only the serial number is incremented.</td>
                  </tr>
                  <tr>
                    <td align="left">Trust reset</td>
                    <td align="left">ISD74-<strong>B05</strong>-S05</td>
                    <td align="left">A trust reset includes the creation of a new base TRC. The new base number follows the serial number "04" of the latest TRC resulting from a non-compromised TRC update for this ISD.</td>
                  </tr>
                  <tr>
                    <td align="left">Regular</td>
                    <td align="left">ISD74-B05-S06</td>
                    <td align="left">Only the serial number is incremented.</td>
                  </tr>
                  <tr>
                    <td align="left">Regular</td>
                    <td align="left">ISD74-B05-S07</td>
                    <td align="left">Only the serial number is incremented.</td>
                  </tr>
                  <tr>
                    <td align="left">And so on</td>
                    <td align="left"> </td>
                    <td align="left"> </td>
                  </tr>
                </tbody>
              </table>
            </section>
            <section anchor="validity">
              <name><tt>validity</tt> Field</name>
              <t>The <tt>validity</tt> field defines the validity period of the TRC. This is the period of time during which the TRC is in the "valid" state. The <tt>notBefore</tt> and <tt>notAfter</tt> attributes of the <tt>validity</tt> field specify the lower and upper bound of the time interval during which a TRC can be active.</t>
              <t><strong>Note:</strong> An active TRC is a valid TRC that can be used for verifying certificate signatures. The time period during which a TRC is active can be shorter than the time period during which the TRC is valid. For more information, see <xref target="trc-states"/>.</t>
              <t>The <tt>validity</tt> field consists of a sequence of two dates, as defined in section 7.2. of <xref target="X.509"/>.</t>
              <t>In addition to this standard definition, the following constraint applies to the <tt>validity</tt> field of the TRC:</t>
              <ul spacing="normal">
                <li>
                  <t>All TRCs <bcp14>MUST</bcp14> have a well-defined expiration date. SCION implementations <bcp14>MUST NOT</bcp14> create TRCs that use the "99991231235959Z" generalized time value, and verifiers <bcp14>MUST</bcp14> error out when encountering such a TRC.</t>
                </li>
              </ul>
            </section>
            <section anchor="grace">
              <name><tt>gracePeriod</tt> Field</name>
              <t>The <tt>gracePeriod</tt> field of a TRC specifies the period of time during which the predecessor TRC can still be considered active (the "grace period"). The grace period starts at the beginning of the validity period of the new TRC.</t>
              <t>The validity period of the predecessor TRC ends when:</t>
              <ul spacing="normal">
                <li>
                  <t>the grace period has passed;</t>
                </li>
                <li>
                  <t>the predecessor’s expiration time is reached; or</t>
                </li>
                <li>
                  <t>the successor TRC of the new TRC has been announced.</t>
                </li>
              </ul>
              <t><strong>Note:</strong> The event that happens first marks the end of the predecessor's validity period.</t>
              <t>The <tt>gracePeriod</tt> field defines the grace period as a number of seconds (positive integer).</t>
              <t>The value of the <tt>gracePeriod</tt> field in a base TRC <bcp14>MUST</bcp14> be zero. The value of the <tt>gracePeriod</tt> field in a non-base TRC <bcp14>SHOULD</bcp14> be non-zero. It <bcp14>SHOULD</bcp14> be long enough to provide sufficient overlap between the TRCs in order to facilitate interruption-free operations in the ISD. If the grace period is too short, some Control Plane AS certificates might expire before the corresponding AS can fetch an updated version from its CA.</t>
            </section>
            <section anchor="notrustreset">
              <name><tt>noTrustReset</tt> Boolean</name>
              <t>The <tt>noTrustReset</tt> Boolean specifies whether a trust reset is forbidden by the ISD. Within a TRC update chain, this value <bcp14>MUST NOT</bcp14> be changed by a regular or sensitive update. However, it is possible to change the <tt>noTrustReset</tt> value in the event of a trust reset, where a new base TRC is created.</t>
              <t>The <tt>noTrustReset</tt> field is <bcp14>OPTIONAL</bcp14> and defaults to FALSE.</t>
              <t><strong>Important:</strong> Note that once the <tt>noTrustReset</tt> Boolean is set to TRUE and a trust reset is disallowed, this cannot be reversed. Therefore, ISDs <bcp14>SHOULD</bcp14> always set this value to FALSE, unless they have sufficiently assessed the risks and implications of making a trust reset impossible.</t>
              <t><strong>Note:</strong> A trust reset represents a special use case where a new base TRC is created. It therefore differs from a TRC update (regular or sensitive), as the signatures in the new base TRC cannot be verified with the certificates contained in the predecessor TRC. Instead, a trust reset base TRC must be axiomatically trusted, similarly to how the initial TRC is trusted.</t>
            </section>
            <section anchor="votes">
              <name><tt>votes</tt> Field</name>
              <t>The <tt>votes</tt> field contains a sequence of indices that refer to the voting certificates in the predecessor TRC. If index i is part of the <tt>votes</tt> field, then the voting certificate at position i in the <tt>certificates</tt> sequence of the predecessor TRC casted a vote on the successor TRC. For more information on the <tt>certificates</tt> sequence, see <xref target="cert"/>.</t>
              <t><strong>Note:</strong> In a base TRC, the <tt>votes</tt> sequence is empty.</t>
              <t>Every entry in the <tt>votes</tt> sequence <bcp14>MUST</bcp14> be unique.<br/>
Further restrictions on votes are discussed in <xref target="update"/>.</t>
              <t><strong>Note:</strong> The <tt>votes</tt> sequence of indices is mandatory in order to prevent stripping voting signatures from the TRC. Absence of the <tt>votes</tt> sequence makes it possible to transform a TRC with more voting signatures than the voting quorum into multiple verifiable TRCs with the same payload, but different voting signature sets. This would violate the requirement of uniqueness of a TRC.</t>
            </section>
            <section anchor="quorum">
              <name><tt>votingQuorum</tt> Field</name>
              <t>The <tt>votingQuorum</tt> field defines the number of necessary votes on a successor TRC to make it verifiable.</t>
              <t>A voting quorum greater than one will prevent a single entity from creating a malicious TRC update.</t>
            </section>
            <section anchor="core">
              <name><tt>coreASes</tt> Field</name>
              <t>The <tt>coreASes</tt> field contains the AS numbers of the core ASes in this ISD.</t>
              <t>Each core AS number <bcp14>MUST</bcp14> be unique in the sequence of core AS numbers. That is, each AS number <bcp14>MUST</bcp14> appear only once in the <tt>coreASes</tt> field.</t>
              <section anchor="revoking-or-assigning-core-status">
                <name>Revoking or Assigning Core Status</name>
                <ul spacing="normal">
                  <li>
                    <t>To revoke the core status of a given AS, remove the respective AS number from the sequence of AS numbers in the <tt>coreASes</tt> field.</t>
                  </li>
                  <li>
                    <t>To assign the core status to a given AS, add the respective AS number to the sequence of AS numbers in the <tt>coreASes</tt> field.</t>
                  </li>
                </ul>
                <t><strong>Important:</strong> Revoking or assigning the core status of/to an AS always requires a (sensitive) TRC update.</t>
              </section>
            </section>
            <section anchor="auth">
              <name><tt>authoritativeASes</tt> Field</name>
              <t>The <tt>authoritativeASes</tt> field contains the AS numbers of the authoritative ASes in this ISD.</t>
              <t>Authoritative ASes are those ASes in an ISD that always have the latest TRCs of the ISD. As a consequence, authoritative ASes also start the announcement of a TRC update.</t>
              <ul spacing="normal">
                <li>
                  <t>Every authoritative AS <bcp14>MUST</bcp14> be a core AS and be listed in the <tt>coreASes</tt> field.</t>
                </li>
                <li>
                  <t>Each authoritative AS number <bcp14>MUST</bcp14> be unique in the sequence of authoritative AS numbers. That is, each AS number <bcp14>MUST NOT</bcp14> appear more than once in the <tt>authoritativeASes</tt> field.</t>
                </li>
              </ul>
              <section anchor="revoking-or-assigning-authoritative-status">
                <name>Revoking or Assigning Authoritative Status</name>
                <ul spacing="normal">
                  <li>
                    <t>To revoke the authoritative status of a given AS, remove the respective AS number from the sequence of AS numbers in the <tt>authoritativeASes</tt> field.</t>
                  </li>
                  <li>
                    <t>To assign the authoritative status to a given AS, add the respective AS number to the sequence of AS numbers in the <tt>authoritativeASes</tt> field.</t>
                  </li>
                </ul>
                <t><strong>Important:</strong> Revoking or assigning the authoritative status of/to an AS always requires a (sensitive) TRC update.</t>
              </section>
            </section>
            <section anchor="description">
              <name><tt>description</tt> Field</name>
              <t>The <tt>description</tt> field contains a UTF-8 encoded string that describes the ISD.</t>
              <ul spacing="normal">
                <li>
                  <t>The <tt>description</tt> field <bcp14>SHOULD NOT</bcp14> be empty.</t>
                </li>
                <li>
                  <t>The description of the ISD <bcp14>MUST</bcp14> be in English. Additionally, the <tt>description</tt> field <bcp14>MAY</bcp14> contain information in other languages.</t>
                </li>
              </ul>
            </section>
            <section anchor="cert">
              <name><tt>certificates</tt> Field</name>
              <t>The voting ASes and the certification authorities (CAs) of an ISD are not specified explicitly in the ISD's TRC. Instead, this information is defined by the list of voting and root certificates in the <tt>certificates</tt> field of the TRC payload.</t>
              <t>The <tt>certificates</tt> field is a sequence of self-signed X.509 certificates. Each certificate in the certificate sequence <bcp14>MUST</bcp14> be one of the following types:</t>
              <ul spacing="normal">
                <li>
                  <t>a sensitive voting certificate,</t>
                </li>
                <li>
                  <t>a regular voting certificate, or</t>
                </li>
                <li>
                  <t>a CP root certificate.</t>
                </li>
              </ul>
              <t>A certificate that is no control plane root or voting certificate <bcp14>MUST NOT</bcp14> be included in the sequence of certificates in the <tt>certificates</tt> field.</t>
              <t><strong>Note</strong>: A certificate's type (voting or root) is specified in the <tt>extKeyUsage</tt> extension of the certificate, by means of the SCION-specific attributes <tt>id-kp-regular</tt>, <tt>id-kp-sensitive</tt>, and <tt>id-kp-root</tt>, respectively. For more information, see <xref target="ext-key-usage-ext"/>.</t>
              <t>The following constraints <bcp14>MUST</bcp14> hold for each certificate in the <tt>certificates</tt> field of the TRC payload:</t>
              <ul spacing="normal">
                <li>
                  <t>Each certificate <bcp14>MUST</bcp14> be unique in the sequence of certificates. That is, each certificate <bcp14>MUST NOT</bcp14> appear more than once in the <tt>certificates</tt> field.</t>
                </li>
                <li>
                  <t>The <tt>issuer</tt> / <tt>serialNumber</tt> pair for each certificate <bcp14>MUST</bcp14> be unique.</t>
                </li>
                <li>
                  <t>If an ISD-AS number is present in the distinguished name of the certificate, this ISD number <bcp14>MUST</bcp14> be equal to the ISD number of the TRC (which is defined in the <tt>iD</tt> field (see <xref target="id"/>).</t>
                </li>
                <li>
                  <t>Every certificate <bcp14>MUST</bcp14> have a validity period that fully contains the validity period of this TRC. That is, the <tt>notBefore</tt> date of this TRC's validity period <bcp14>MUST</bcp14> be equal to or later than the certificate's <tt>notBefore</tt> date, and the <tt>notAfter</tt> date of this TRC's validity period <bcp14>MUST</bcp14> be before or equal to the certificate's <tt>notAfter</tt> date.</t>
                </li>
                <li>
                  <t>Per certificate type, every certificate distinguished name <bcp14>MUST</bcp14> be unique.</t>
                </li>
              </ul>
              <t>The following must hold for the entire sequence of certificates in the <tt>certificates</tt> field:</t>
              <ul spacing="normal">
                <li>
                  <t><tt>votingQuorum</tt> &lt;= count (sensitive voting certificates) <br/>
That is, the quorum defined in the TRC's <tt>votingQuorum</tt> field (<xref target="quorum"/>) <bcp14>MUST</bcp14> be smaller than or equal to the number of <em>sensitive</em> voting certificates specified in the TRC's <tt>certificates</tt> field.</t>
                </li>
                <li>
                  <t><tt>votingQuorum</tt> &lt;= count (regular voting certificates) <br/>
That is, the quorum defined in the TRC's <tt>votingQuorum</tt> field (<xref target="quorum"/>) <bcp14>MUST</bcp14> be smaller than or equal to the number of <em>regular</em> voting certificates specified in the TRC's <tt>certificates</tt> field.</t>
                </li>
              </ul>
            </section>
          </section>
        </section>
        <section anchor="signed-format">
          <name>TRC Signature Syntax</name>
          <t>A TRC contains policy information about an ISD and acts as a distribution mechanism for the trust anchors of that ISD.</t>
          <t>Each TRC is digitally signed and the syntax used to sign and encapsulate the TRC payload is the Cryptographic Message Syntax (CMS) as defined in <xref target="RFC5652"/>. The signed TRC payload is of the CMS signed-data content type, as defined in Section 5 of <xref target="RFC5652"/>, and encapsulated in a CMS <tt>ContentInfo</tt> element, as defined in Section 3 of <xref target="RFC5652"/>.</t>
          <t>For detailed information on the general syntax definitions of the Cryptographic Message Syntax, see sections 3 and 5 of <xref target="RFC5652"/>.</t>
          <section anchor="scion-specific-rules">
            <name>SCION-specific rules</name>
            <t>SCION implementations <bcp14>MUST</bcp14> fulfil the following additional rules, as well as the general syntax rules specified in <xref target="RFC5652"/>:</t>
            <ul spacing="normal">
              <li>
                <t><tt>EncapsulatedContentInfo</tt> sequence:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>The <tt>eContentType</tt> field <bcp14>MUST</bcp14> be set to "id-data".</t>
                  </li>
                  <li>
                    <t>The content of the <tt>eContent</tt> field <bcp14>MUST</bcp14> be the DER-encoded TRC payload. This has the benefit that the format is backwards compatible with PKCS #7, as described in Section 5.2.1 of <xref target="RFC5652"/>.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t><tt>SignedData</tt> sequence:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>The <tt>certificates</tt> field <bcp14>MUST</bcp14> be left empty. The certificate pool used to verify a TRC update is already specified in the <tt>certificates</tt> field of the predecessor TRC's payload (see also <xref target="cert"/>).</t>
                  </li>
                  <li>
                    <t>The <tt>version</tt> field <bcp14>MUST</bcp14> be set to "1". This is because SCION uses the "id-data" content type to encapsulate content info, and does not specify any certificate in the <tt>SignedData</tt> sequence (see also Section 5.1 of <xref target="RFC5652"/>).</t>
                  </li>
                </ul>
              </li>
              <li>
                <t><tt>SignerIdentifier</tt> choice:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>The type of signer identifier chosen here <bcp14>MUST</bcp14> be <tt>IssuerAndSerialNumber</tt>.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t><tt>SignerInfo</tt> sequence:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>The <tt>version</tt> field <bcp14>MUST</bcp14> be set to "1". This is because SCION uses the <tt>IssuerAndSerialNumber</tt> type of signer identifier (see also Section 5.3 of <xref target="RFC5652"/>).</t>
                  </li>
                  <li>
                    <t>The algorithm specified in the <tt>signatureAlgorithm</tt> field <bcp14>MUST</bcp14> be one of the algorithms supported by SCION (for details, see <xref target="certsign">signature Field - Additional Information</xref>).</t>
                  </li>
                  <li>
                    <t>The <tt>digestAlgorithm</tt> is determined by the algorithm specified in the <tt>signatureAlgorithm</tt> field.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </section>
          <section anchor="trc-equality">
            <name>TRC Equality</name>
            <t>The signer information in the signed TRC is part of an unordered set, as per <xref target="RFC5652"/>. This implies that the signer information can be reordered without affecting verification, although certain operations require TRCs to be equal im accordance with the following definition:</t>
            <t><strong>Two TRCs are equal, if and only if their payloads are byte equal.</strong></t>
            <t>Two TRCs with byte equal payloads can be considered as equal because the TRC payload exactly defines which signatures must be attached in the signed TRC:</t>
            <ul spacing="normal">
              <li>
                <t>The <bcp14>REQUIRED</bcp14> signatures from voting certificates are explicitly mentioned in the <tt>votes</tt> field of the payload: If index "i" is part of the <tt>votes</tt> field, then the voting certificate at position i in the <tt>certificates</tt> sequence of the predecessor TRC casted a vote on the successor TRC. See also <xref target="votes"/>.</t>
              </li>
              <li>
                <t>The <bcp14>REQUIRED</bcp14> signatures for new certificates are implied by the currently valid TRC payload, and, in case of a TRC update, the predecessor payload.</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="certification-path-trust-anchor-pool">
          <name>Certification Path - Trust Anchor Pool</name>
          <t>The certification path of a  Control PlaneAS certificate starts in a Control Plane root certificate. The Control Plane root certificate for a given ISD is distributed via the TRC.</t>
          <t>However, AS certificates and the corresponding signing CA certificates are <strong>not</strong> part of the TRC, but bundled into certificate chains and distributed separately from the corresponding TRC. This separation makes it possible to extend the validity period of the root certificate, and to update the corresponding TRC without having to modify the certificate chain. To be able to validate a certification path, each AS builds a collection of root certificates from the latest TRC of the relevant ISD.</t>
          <t>The following section explains how to build a trust anchor pool.</t>
          <t><strong>Note:</strong> Any entity sending information that is secured by the Control Plane PKI, such as control plane messages, <bcp14>MUST</bcp14> be able to provide all the necessary trust material, such as certificates, to verify said information. If any cryptographic material is missing in the process, the relying party <bcp14>MUST</bcp14> query the originator of the message for the missing material. If it cannot be resolved, the verification process fails. For more details, see 4.2 "Signing and Verifying Control Plane Messages" <xref target="signing-verifying-cp-messages"/>.</t>
          <section anchor="trc-selection">
            <name>TRC Selection For Trust Anchor Pool</name>
            <t>The selection of the right set of TRCs to build the trust anchor pool depends on the time of verification. The trust anchor pool is usually used to verify control plane messages and this case, the time of verification is the current time. However, if the trust anchor pool will be used for auditing, the time of verification is the point in time to check whether a given signature was verifiable.</t>
            <t>The selection algorithm for building the trust anchor pool is described in pseudo-python code below.</t>
            <sourcecode type="python"><![CDATA[
    def select_trust_anchors(trcs: Dict[(int,int), TRC], \
    verification_time: int) -> Set[RootCert]:
        """
        Args:
            trcs: The dictionary mapping (serial number, \
            base number) to the TRC for a given ISD.
            verification_time: The time of verification.

        Returns:
            The set of CP Root certificates acting as trust anchors.
        """
        # Find highest base number that has a TRC with validity
        # period starting before verification time.
        base_nr = 1
        for trc in trcs.values()
            if trc.id.base_nr > base_nr and trc.validity.not_before \
            <= verification_time:
                base_nr = trc.id.base_nr

        # Find TRC with highest serial number with given base number
        # and a validity period starting before verification time.
        serial_nr = 1
        for trc in trcs[isd].values():
            if trc.id.base_nr != base_nr:
                continue
            if trc.id.serial_nr > serial_nr and \
            trc.validity.not_before <= verification_time:
                serial_nr = trc.id.serial_nr

        candidate = trcs[(serial_nr, base_nr)]

        # If the verification time is not inside the validity period,
        # there is no valid set of trust anchors.
        if not candidate.validity.contains(verification_time):
            return set()

        # If the grace period has passed, only the certificates in
        # that TRC may be used as trust anchors.
        if candidate.validity.not_before + candidate.grace_period \
        < verification_time:
            return collect_trust_anchors(candidate)

        predecessor = trcs.get((serial_nr-1, base_nr))
        if not predecessor or predecessor.validity.not_after < \
        verification_time:
            return collect_trust_anchors(candidate)

        return collect_trust_anchors(candidate) | \
        collect_trust_anchors(predecessor)


    def collect_trust_anchors(trc: TRC) -> Set[RootCert]:
        """
        Args:
            trc: A TRC from which the CP Root Certificates shall \
            be extracted.

        Returns:
            The set of CP Root certificates acting as trust anchors.
        """
        roots = set()
        for cert in trc.certificates:
            if not cert.basic_constraints.ca:
                continue
            roots.add(cert)
        return roots
]]></sourcecode>
          </section>
        </section>
        <section anchor="update">
          <name>TRC Updates</name>
          <t>All non-base TRCs of an ISD are updates of the ISD's base TRC(s). The TRC update chain consists of regular and sensitive TRC updates, and the type of update determines the (payload) information that changes in the updated TRC.</t>
          <t>This section describes the rules that apply to updating a TRC in regard to the payload information contained in the TRC. Some rules are valid for both update types whilst some only apply to a regular or a sensitive TRC update. Based on the type of update, different sets of voters are needed to create a verifiable TRC update and the corresponding voting (signing) process is also described. To verify a TRC update, a relying party <bcp14>MUST</bcp14> perform a couple of checks which are also listed.</t>
          <section anchor="change-new">
            <name>Changed or New Certificates</name>
            <t>In the context of a TRC update,</t>
            <ul spacing="normal">
              <li>
                <t>A certificate is <em>changing</em>, if the certificate is part of the <tt>certificates</tt> sequence in the predecessor TRC, but no longer part of the <tt>certificates</tt> sequence in the updated TRC. Instead, the <tt>certificates</tt> sequence of the updated TRC holds another certificate of the <em>same type</em> and with the <em>same distinguished name</em>.</t>
              </li>
              <li>
                <t>A certificate is <em>new</em>, if there is <strong>no</strong> certificate of the same type and distinguished name at all in the <tt>certificates</tt> sequence of the predecessor TRC.</t>
              </li>
            </ul>
            <t><strong>Note:</strong> Every new sensitive or regular voting certificate in a TRC attaches a signature to the TRC. This is done to ensure that the freshly included voting entity agrees with the contents of the TRC it is now part of.</t>
          </section>
          <section anchor="update-rules-overview">
            <name>Update Rules - Overview</name>
            <t>The following table gives an overview of the types of TRC update as well as the rules that must apply in regard to the updated TRC's payload information.</t>
            <t>The sections that follow provide more detailed descriptions of each rule.</t>
            <table anchor="_table-8">
              <name>Overview of the update types and corresponding rules</name>
              <thead>
                <tr>
                  <th align="left">Type of Update</th>
                  <th align="left">Payload Updated TRC - Unchanged Elements</th>
                  <th align="left">Payload Updated TRC - Required Changes</th>
                  <th align="left">Payload Updated TRC: Other Rules to Hold</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">Both Regular AND Sensitive Updates</td>
                  <td align="left">- <tt>iD</tt> field: <tt>iSD</tt> and <tt>baseNumber</tt> <br/> - <tt>noTrustReset</tt> field</td>
                  <td align="left">
                    <tt>iD</tt> field: <tt>serialNumber</tt> <bcp14>MUST</bcp14> be incremented by 1</td>
                  <td align="left">
                    <tt>votes</tt> field: Number of votes (indices) =&gt; number set in the <tt>votingQuorum</tt> field of the predecessor TRC</td>
                </tr>
                <tr>
                  <td align="left">Regular TRC Update</td>
                  <td align="left">- Quorum in the <tt>votingQuorum</tt> field<br/>- Core ASes in the <tt>coreASes</tt> field<br/>- ASes in the <tt>authoritativeASes</tt> field<br/>- Nr. and distinguished names of root &amp; voting certificates in the <tt>certificates</tt> field<br/>- Set of sensitive voting certificates in the <tt>certificates</tt> field</td>
                  <td align="left"> </td>
                  <td align="left">
                    <tt>votes</tt> field:<br/> - All votes <bcp14>MUST</bcp14> only refer to <em>regular</em> voting certificates in the predecessor TRC<br/>- Must include votes of each changed regular voting certificate from the predecessor TRC<br/> <tt>signatures</tt> field:<br/> - Must include signatures of each changed root certificate from the predecessor TRC</td>
                </tr>
                <tr>
                  <td align="left">Sensitive TRC Update</td>
                  <td align="left">If the update does not qualify as a regular update, it is a sensitive update</td>
                  <td align="left"> </td>
                  <td align="left">
                    <tt>votes</tt> field: <br/> - All votes <bcp14>MUST</bcp14> only refer to <em>sensitive</em> voting certificates in the predecessor TRC</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="general-update-rules">
            <name>General Update Rules</name>
            <t>The following rules <bcp14>MUST</bcp14> hold for each updated TRC, independent of the update type:</t>
            <ul spacing="normal">
              <li>
                <t>The <tt>iSD</tt> and <tt>baseNumber</tt> in the <tt>iD</tt> field <bcp14>MUST NOT</bcp14> change (see also <xref target="id"/>).</t>
              </li>
              <li>
                <t>The <tt>serialNumber</tt> in the <tt>iD</tt> field <bcp14>MUST</bcp14> be incremented by one.</t>
              </li>
              <li>
                <t>The <tt>noTrustReset</tt> field <bcp14>MUST NOT</bcp14> change (see also <xref target="notrustreset"/>).</t>
              </li>
              <li>
                <t>The <tt>votes</tt> sequence of the updated TRC <bcp14>MUST</bcp14> only contain indices that refer to sensitive or regular voting certificates in the predecessor TRC. This guarantees that the updated TRC only contains valid votes authenticated by sensitive or regular voting certificates in the predecessor TRC. For more information, see <xref target="votes"/> and <xref target="cert"/>.</t>
              </li>
              <li>
                <t>The number of votes in the updated TRC <bcp14>MUST</bcp14> be greater than or equal to the number set in the <tt>votingQuorum</tt> field of the predecessor TRC (see <xref target="quorum"/>). The number of votes corresponds to the number of indices in the <tt>votes</tt> field of the updated TRC.</t>
              </li>
            </ul>
          </section>
          <section anchor="regular-trc-update">
            <name>Regular TRC Update</name>
            <t>A regular TRC update is a periodic re-issuance of the TRC where the entities and policies listed in the TRC remain unchanged.</t>
            <t>A TRC update qualifies as a regular update, if the following rules apply in regard to the TRC's payload information.</t>
            <ul spacing="normal">
              <li>
                <t>The settings of the following fields in the updated TRC <bcp14>MUST</bcp14> remain the same compared to the predecessor TRC:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>The voting quorum set in the <tt>votingQuorum</tt> field.</t>
                  </li>
                  <li>
                    <t>The core ASes specified in the <tt>coreASes</tt> field.</t>
                  </li>
                  <li>
                    <t>The authoritative ASes specified in the <tt>authoritativeASes</tt> field.</t>
                  </li>
                  <li>
                    <t>The number of sensitive and regular voting certificates as well as Control Plane root certificates included in the <tt>certificates</tt> field, and their distinguished names.</t>
                  </li>
                  <li>
                    <t>The set of sensitive voting certificates specified in the <tt>certificates</tt> field.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>For every regular voting certificate that changes, the regular voting certificate in the predecessor TRC is part of the voters on the updated TRC. That is, for each changed regular voting certificate, an index in the <tt>votes</tt> field of the updated TRC <bcp14>MUST</bcp14> refer to the changed regular voting certificate in the predecessor TRC.</t>
              </li>
              <li>
                <t>For every Control Plane root certificate that changes, the updated TRC <bcp14>MUST</bcp14> include a signature created with the private key belonging to the changed Control Plane root certificate (which is part of the predecessor TRC).</t>
              </li>
              <li>
                <t>In order for a regular TRC update to be verifiable, all votes <bcp14>MUST</bcp14> be cast by <em>regular</em> voting certificates. That is, each index in the <tt>votes</tt> field of the regularly updated TRC <bcp14>MUST</bcp14> refer to a <em>regular</em> voting certificate in the <tt>certificates</tt> field of the predecessor TRC.</t>
              </li>
            </ul>
          </section>
          <section anchor="sensitive-trc-update">
            <name>Sensitive TRC Update</name>
            <t>If a TRC update does not qualify as a regular update, it is considered a sensitive update.</t>
            <ul spacing="normal">
              <li>
                <t>In order for a sensitive update to be verifiable, all votes <bcp14>MUST</bcp14> be cast by <em>sensitive</em> voting certificates. That is, each index in the <tt>votes</tt> field of the sensitively updated TRC <bcp14>MUST</bcp14> refer to a <em>sensitive</em> voting certificate in the <tt>certificates</tt> field of the predecessor TRC.</t>
              </li>
            </ul>
          </section>
          <section anchor="signing-a-trc-update">
            <name>Signing a TRC Update</name>
            <t>As described above, a set of voters <bcp14>MUST</bcp14> cast votes on the updated TRC to make it verifiable. The <tt>votingQuorum</tt> field of the predecessor TRC (see <xref target="quorum"/>) defines the required number of voters, which will represent regular or sensitive voting certificates, respectively.</t>
            <t>Furthermore, if one or more <em>new</em> certificates are added to the updated TRC, the corresponding voting representatives <bcp14>MUST</bcp14> also sign the updated TRC in order to show that they have access to the private keys listed in these fresh certificates. This is called "showing proof-of-possession", and done by signing the TRC with the respective private key. For the distinction between changed and new certificates in a TRC update, see <xref target="change-new"/>.</t>
            <t>It is up to the ISD members to decide how the "casting a vote" procedure for updated TRCs will take place. Some ISDs will make a distinction between regular and sensitive updates. These ISDs divide the regular and sensitive signing keys in different security classes and act accordingly, e.g. they keep the regular key in an online vault while the sensitive key would be stored offline. This way, the regular TRC update would lend itself to being automated (since the keys are accessible online) whereas the sensitive one would require manual actions to access the offline key. However, other ISDs keep both regular and sensitive keys online and perform both updates automatically.</t>
          </section>
          <section anchor="trc-update-verification">
            <name>TRC Update Verification</name>
            <t>To verify a TRC update, the relying party <bcp14>MUST</bcp14> perform the following checks:</t>
            <ul spacing="normal">
              <li>
                <t>Check that the specified update rules as described above are respected.</t>
              </li>
              <li>
                <t>Check whether the update is regular or sensitive.
                </t>
                <ul spacing="normal">
                  <li>
                    <t>In case of a regular update,
                    </t>
                    <ul spacing="normal">
                      <li>
                        <t>check that the signatures for the changing certificates are present and verifiable, and</t>
                      </li>
                      <li>
                        <t>check that all votes are cast by a regular voting certificate.</t>
                      </li>
                    </ul>
                  </li>
                  <li>
                    <t>In case of a sensitive update, check that all votes are cast by a sensitive voting certificate.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>In both cases, check that all signatures are verifiable, and no superfluous signatures are attached.</t>
              </li>
            </ul>
            <t>If one or more of the above checks gives a negative result, the updated TRC <bcp14>SHOULD</bcp14> be rejected.</t>
          </section>
        </section>
      </section>
      <section anchor="trc-ceremony">
        <name>Initial TRC Signing Ceremony</name>
        <t>The very first base TRC of an ISD - called the initial TRC - is a special case of the base TRC where the number of the ISD is chosen. The initial TRC <bcp14>MUST</bcp14> be signed during a special signing ceremony - all voting representatives of the initial TRC need to take part in this signing ceremony to sign this and exchange their public keys. Following this, all entities within an ISD can obtain the TRC by means of a secure offline or online mechanism.</t>
        <t><xref target="initial-ceremony"/> describes a possible procedure for the signing ceremony of an ISD's initial TRC. It is in principle up to the initial members of an ISD how to organize the signing ceremony. However, it is recommended having a process in line with the ceremony described in the Appendix.</t>
      </section>
    </section>
    <section anchor="deploy-cp-pki">
      <name>Deploying the CP PKI - Specifications</name>
      <t>This section provides several specifications regarding the deployment of the control plane PKI.</t>
      <section anchor="deploying-a-trc">
        <name>Deploying a TRC</name>
        <section anchor="base-trc">
          <name>Base TRC</name>
          <t>Base TRCs are trust anchors and thus axiomatically trusted. All ASes within an ISD <bcp14>MUST</bcp14> be pre-loaded with the currently valid base-version TRC of their own ISD. For all specifications regarding the creation and distribution of initial/base TRCs, see <xref target="trc-ceremony"/>.</t>
        </section>
        <section anchor="trc-update">
          <name>TRC Update</name>
          <t>All non-base TRCs of an ISD are updates of the ISD's base TRC(s). The TRC update chain consists of regular and sensitive TRC updates. The specifications and rules that apply to updating a TRC are described in <xref target="update"/>.</t>
          <section anchor="discover-trcupdate">
            <name>TRC Update Discovery</name>
            <t>Relying parties <bcp14>MUST</bcp14> have at least one valid TRC available. Relying parties <bcp14>MUST</bcp14> discover TRC updates within the grace period defined in the updated TRC. They <bcp14>SHOULD</bcp14> discover TRC updates in a matter of minutes to hours. Additionally, the following requirement <bcp14>MUST</bcp14> be satisfied:</t>
            <t><strong>Requirement</strong><br/>
Any entity sending information that is secured by the Control Plane PKI <bcp14>MUST</bcp14> be able to provide all the necessary trust material to verify said information.</t>
            <t>SCION provides the following mechanisms for discovering TRC updates and fulfilling the above requirement:</t>
            <ul spacing="normal">
              <li>
                <t><em>Beaconing Process</em><br/>
The TRC version is announced in the beaconing process. Each AS <bcp14>MUST</bcp14> announce what it considers to be the latest TRC, and <bcp14>MUST</bcp14> include the hash value of the TRC contents to facilitate the discovery of discrepancies. Therefore, relying parties that are part of the beaconing process discover TRC updates passively, i.e. a core AS notices TRC updates for remote ISDs that are on the beaconing path. A non-core AS only notices TRC updates for the local ISD through the beaconing process. The creation of a new TRC <bcp14>SHOULD</bcp14> trigger the generation of new control plane messages, as the propagation of control plane messages will help other ASes rapidly discover the new TRC.</t>
              </li>
              <li>
                <t><em>Path Lookup</em><br/>
In every path segment, all ASes <bcp14>MUST</bcp14> reference the latest TRC of their ISD. Therefore, when resolving paths, every relying party will notice TRC updates, even remote ones.<br/></t>
              </li>
              <li>
                <t><em>Active Discovery</em><br/>
Any TRC can be obtained at any time from the sender of the information it secures; either in a specific version or in its latest available version. The necessary query and response is described in <xref target="I-D.dekater-scion-controlplane"/>, section "Control Service gRPC API - Trust Material".</t>
              </li>
            </ul>
            <t><strong>Note:</strong> The first two mechanisms above only work when there is active communication between the relying party and the ISD in question.</t>
          </section>
        </section>
      </section>
      <section anchor="signing-verifying-cp-messages">
        <name> Signing and Verifying Control Plane Messages</name>
        <t>SCION requires that control plane messages are signed. The main purpose of the Control Plane PKI is providing a mechanism to distribute and authenticate public keys that are used to verify control plane messages and information, e.g. each hop information in a path segment is signed by the respective AS. Consequently, all relying parties <bcp14>MUST</bcp14> be able to verify signatures with the help of the Control Plane PKI.</t>
        <t>The following sections specify the requirements that apply to the signing and verification of control plane messages.</t>
        <section anchor="signing-a-control-plane-message">
          <name>Signing a Control Plane Message</name>
          <t>An AS signs control plane messages with the private key that corresponds to the (valid) AS' certificate.</t>
          <t>The AS <bcp14>MUST</bcp14> attach the following information as signature metadata. It is the minimum information a relying party requires to identify which certificate to use to verify the signed message.</t>
          <ul spacing="normal">
            <li>
              <t>ISD-AS number: The ISD-AS number of the signing entity. For specification details, see <xref target="isd-as-nr"/>.</t>
            </li>
            <li>
              <t>Subject key identifier: The identifier of the public key that <bcp14>MUST</bcp14> be used to verify the message. For specification details, see <xref target="subject-key-id-ext"/>.</t>
            </li>
          </ul>
          <t>Additionally, the signer <bcp14>SHOULD</bcp14> include the following information:</t>
          <ul spacing="normal">
            <li>
              <t>Serial and base number of the latest TRC: Including this information allows relying parties to discover TRC updates and trust resets. For specification details, see <xref target="id"/>.</t>
            </li>
            <li>
              <t>Timestamp: For many messages, the time at which it was signed is useful information to ensure freshness.</t>
            </li>
          </ul>
        </section>
        <section anchor="verifying-a-control-plane-message">
          <name>Verifying a Control Plane Message</name>
          <t>When the relying party receives a control plane message they want to verify, the relying party first needs to identify the certificate needed to validate the corresponding signature on the message.</t>
          <t>AS certificates are bundled together with the corresponding signing CA certificate into certificate chains. For efficiency, SCION distributes these certificate chains separately from the signed messages.</t>
          <t>A certificate chain is verified against the Control Plane root certificate, although the the root certificate is bunded with the TRC and <strong>not</strong> in the chain. This makes it possible to extend the validity period of the root certificate and update the corresponding TRC without having to modify the certificate chain.</t>
          <t>To verify a control plane message, the relying party <bcp14>MUST</bcp14> perform the following steps:</t>
          <ol spacing="normal" type="1"><li>
              <t>Build a collection of root certificates from the latest TRC of the relevant ISD (that is, the ISD referenced in the signature metadata of the message). If the grace period (see <xref target="grace"/>) introduced by the latest TRC is still on-going, the root certificates in the second-to-latest TRC <bcp14>MUST</bcp14> also be included. For a description on how to build the correct collection of certificates, see <xref target="trc-selection"/>.</t>
            </li>
            <li>
              <t>If the signature metadata of the message contains the serial and base number of the latest TRC, the relying party <bcp14>MUST</bcp14> check that they have this latest TRC. If not, the relying party <bcp14>MUST</bcp14> request the latest TRC.</t>
            </li>
            <li>
              <t>After constructing the pool of root certificates, the relying party <bcp14>MUST</bcp14> select the certificate chain used to verify the message. The AS certificate included in this certificate chain <bcp14>MUST</bcp14> have the following properties:
              </t>
              <ul spacing="normal">
                <li>
                  <t>The ISD-AS number in the subject of the AS certificate <bcp14>MUST</bcp14> match the ISD-AS number in the signature metadata. See also <xref target="isd-as-nr"/>.</t>
                </li>
                <li>
                  <t>The subject key identifier of the AS certificate <bcp14>MUST</bcp14> match the subject key identifier in the signature metadata. See also <xref target="subject-key-id-ext"/>.</t>
                </li>
                <li>
                  <t>The AS certificate <bcp14>MUST</bcp14> be valid at verification time. Normally, this will be the current time. In special cases, e.g., auditing, the time can be set to the past to check if the message was verifiable at the given time.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>After selecting a certificate chain to verify the control plane messages, the relying party <bcp14>MUST</bcp14> verify the certificate chain, by:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Executing the regular X.509 verification procedure. For details, see <xref target="X.509"/>.</t>
                </li>
                <li>
                  <t>Checking that
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>all subjects of the certificates in the chain carry the same ISD number (see also <xref target="isd-as-nr"/>,</t>
                    </li>
                    <li>
                      <t>each certificate is of the correct type (see also <xref target="overview"/>), and</t>
                    </li>
                    <li>
                      <t>the CA certificate validity period covers the AS certificate validity period.</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t>If the verification of the certificate chain was successful, the relying party can now verify the control plane messages, with the root certificates from the certificate chain.</t>
            </li>
          </ol>
          <t>If any cryptographic material is missing in the process, the relying party <bcp14>MUST</bcp14> query the originator of the message for the missing material. If it cannot be resolved, the verification process fails.</t>
          <t><strong>Important:</strong> An implication of the above procedure is that path segments <bcp14>SHOULD</bcp14> be verifiable at time of use. It is not enough to rely on path segments being verified on insert since TRC updates that change the root key can invalidate a certificate chain.</t>
        </section>
      </section>
      <section anchor="creating-a-new-control-plane-as-certificate">
        <name>Creating a New Control Plane AS Certificate</name>
        <t>The steps <bcp14>REQUIRED</bcp14> to create a new AS certificate are the following:</t>
        <ol spacing="normal" type="1"><li>
            <t>The AS creates a new key pair and a certificate signing request (CSR) using that key pair.</t>
          </li>
          <li>
            <t>The AS sends the certificate signing request to the relevant CA within the ISD.</t>
          </li>
          <li>
            <t>The CA uses its CA key and the CSR to create the new AS certificate.</t>
          </li>
          <li>
            <t>The CA sends the AS certificate back to the AS.</t>
          </li>
        </ol>
        <t>When an AS joins an ISD, the first CSR is sent out of band to one of the CAs as part of the formalities to join the ISD. Subsequent certificate renewals <bcp14>MAY</bcp14> be automated and can leverage the control plane communication infrastructure.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The goal of SCION is to provide a secure inter-domain network architecture, therefore this section focuses on <em>inter</em>-AS security considerations. All <em>intra</em>-AS trust- and security aspects are out of scope.</t>
      <section anchor="dependency-on-certificates">
        <name>Dependency on Certificates</name>
        <t>In PKIs, CAs have both the responsibility and power to issue and revoke certificates. A compromised or misbehaving CA could refuse to issue certificates to legitimate entities and/or issue illegitimate certificates to allow impersonation of another entity. In the context of the Control Plane PKI, refusing to issue or renew a certificate to an AS will ultimately cut that AS off from the network, turning the Control Plane PKI into a potential network kill switch, so within each ISD there are usually multiple independent CAs.</t>
        <t>SCION fundamentally differs from a global monopolistic trust model as each ISD manages its own trust roots instead of a single global entity providing those roots. This structure gives each ISD autonomy in terms of key management and in terms of trust, and prevents the occurrence of a global kill switch affecting all ISDs at once. However, each ISD is still susceptible to compromises that could affect or halt other components (control plane and forwarding).</t>
        <section anchor="compromise-of-an-isd">
          <name>Compromise of an ISD</name>
          <t>In SCION there is no central authority that could "switch off" an ISD as each relies on its own independent trust roots. Each AS within an ISD is therefore dependant on its ISD's PKI for its functioning, although the following compromises are potentially possible:</t>
          <ul spacing="normal">
            <li>
              <t>At TRC level: The private root keys of the root certificates contained in an TRC are used to sign CA certificates. If one of these private root keys is compromised, the adversary could issue illegitimate CA certificates which may be used in further attacks. To maliciously  perform a TRC update, an attacker would need to compromise multiple voting keys, the number of which is dependent on the voting quorum set in the TRC - the higher the quorum, the more unlikely a malicious update will be.</t>
            </li>
            <li>
              <t>At CA level: The private keys of an ISD's CA certificates are used to sign the AS certificates and all ASes within an ISD obtain certificates directly from the CAs. If one of the CA’s keys is compromised, an adversary could issue illegitimate AS certificates, which may be used in further attacks.</t>
            </li>
            <li>
              <t>At AS level: Each AS within an ISD signs control plane messages with their AS private key. If the keys of an AS are compromised by an adversary, this adversary can illegitimately sign control plane messages including Path Construction Beacons (PCBs). This means that the adversary can manipulate the PCBs and propagate them to neighboring ASes or register/store them as path segments.</t>
            </li>
          </ul>
        </section>
        <section anchor="recovery-from-compromise">
          <name>Recovery from Compromise</name>
          <t>This section deals with possible recovery from the compromises discussed in the previous paragraph.
As described in <xref target="substitutes-to-revocation"/>, there is no revocation in the Control Plane PKI.</t>
          <ul spacing="normal">
            <li>
              <t>At TRC level: If any of the root keys or voting keys contained in the TRC are compromised, the TRC <bcp14>MUST</bcp14> be updated as described in <xref target="update"/>. A trust reset is only required in the case the number of compromised  keys at the same time is greater or equal than the TRC's quorum (see <xref target="quorum"/>) and a invalid update has been produced and distributed in the network.</t>
            </li>
            <li>
              <t>At CA level: If the private key related to a CA certificate is compromised, the impacted CA AS <bcp14>MUST</bcp14> obtain a new CA certificate from the corresponding root AS. CA certificates are generally short lived to limit the impact of compromise. Alternatively, with a TRC update, a new root keys can also be forced, invalidating the compromised CA.</t>
            </li>
            <li>
              <t>At AS level: In the event of a key compromise of a (non-core) AS, the impacted AS needs to obtain a new certificate from its CA. This process will vary depending on internal issuance protocols.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="denial-of-service-attacks">
        <name>Denial of Service Attacks</name>
        <t>The Control Plane PKI lays the foundation for the authentication procedures in SCION by providing each AS within a specific ISD with a certified key pair. These keys enable the authentication of all control plane messages - every AS and endpoint can verify all control plane messages by following the certificate chain.</t>
        <t>The relying party <bcp14>MUST</bcp14> be able to discover and obtain new or updated cryptographic material. For the control plane messages, this is simplified by the observation that the sender of a message (e.g. of a path construction beacon during path exploration or a path segment during a path lookup) always has all the cryptographic material to verify it. Thus, the receiver can always immediately obtain all the cryptographic material from the message originator.
As the corresponding PKI messaging thus only occurs when the control plane is already communicating, these requests to obtain cryptographic material are not prone to additional denial of service attacks. We therefore refer to <xref target="I-D.dekater-scion-controlplane"/> for a more detailed description of DoS vulnerabilities of control-plane messages.</t>
        <t>For certificate renewal, on the other hand, this does not apply. Denial of Service on the CA infrastructure or on the communication links from the individual ASes to the CA could be used by an attacker to prevent victim ASes from renewing their certificates, halting the path discovery process. This risk can be mitigated in multiple ways:</t>
        <ul spacing="normal">
          <li>
            <t>CAs only need to be accessible from ASes within the ISD, reducing the potential DoS attack surface</t>
          </li>
          <li>
            <t>ISDs usually rely on multiple CAs</t>
          </li>
          <li>
            <t>ISDs could create policies and processes to renew certificates out-of-band</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <t>The SCION AS and ISD number are SCION-specific numbers. They are currently allocated by Anapaya Systems, a provider of SCION-based networking software and solutions (see <xref target="ISD-AS-assignments"/>). This task is currently being transitioned from Anapaya to the SCION Association.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.dekater-scion-controlplane">
          <front>
            <title>SCION Control Plane</title>
            <author fullname="Corine de Kater" initials="C." surname="de Kater">
              <organization>SCION Association</organization>
            </author>
            <author fullname="Nicola Rustignoli" initials="N." surname="Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <author fullname="Samuel Hitz" initials="S." surname="Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document describes the Control Plane of the path-aware, inter-
   domain network architecture SCION (Scalability, Control, and
   Isolation On Next-generation networks).  A fundamental characteristic
   of SCION is that it gives path control to SCION-capable endpoints
   that can choose between multiple path options, thereby enabling the
   optimization of network paths.  The Control Plane is responsible for
   discovering these paths and making them available to the endpoints.

   The SCION Control Plane creates and securely disseminates path
   segments between SCION Autonomous Systems (AS) which can then be
   combined into forwarding paths to transmit packets in the data plane.
   This document describes mechanisms of path exploration through
   beaconing and path registration.  In addition, it describes how
   Endpoints construct end-to-end paths from a set of possible path
   segments through a path lookup process.

   This document contains new approaches to secure path aware
   networking.  It is not an Internet Standard, has not received any
   formal review of the IETF, nor was the work developed through the
   rough consensus process.  The approaches offered in this work are
   offered to the community for its consideration in the further
   evolution of the Internet.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dekater-scion-controlplane-08"/>
        </reference>
        <reference anchor="I-D.dekater-scion-dataplane">
          <front>
            <title>SCION Data Plane</title>
            <author fullname="Corine de Kater" initials="C." surname="de Kater">
              <organization>SCION Association</organization>
            </author>
            <author fullname="Nicola Rustignoli" initials="N." surname="Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <author fullname="Jean-Christophe Hugly" initials="J." surname="Hugly">
              <organization>SCION Association</organization>
            </author>
            <author fullname="Samuel Hitz" initials="S." surname="Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date day="24" month="December" year="2024"/>
            <abstract>
              <t>   This document describes the data plane of the path-aware, inter-
   domain network architecture SCION (Scalability, Control, and
   Isolation On Next-generation networks).  One of the basic
   characteristics of SCION is that it gives path control to endpoints.
   The SCION Control Plane is responsible for discovering these paths
   and making them available as path segments to the endpoints.  The
   role of the SCION Data Plane is to combine the path segments into
   end-to-end paths, and forward data between endpoints according to the
   specified path.

   The SCION Data Plane fundamentally differs from today's IP-based data
   plane in that it is _path-aware_: In SCION, interdomain forwarding
   directives are embedded in the packet header.  This document provides
   a detailed specification of the SCION data packet format as well as
   the structure of the SCION header.  SCION also supports extension
   headers, which are additionally described.  The document continues
   with the life cycle of a SCION packet while traversing the SCION
   Internet, followed by a specification of the SCION path authorization
   mechanisms and the packet processing at routers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dekater-scion-dataplane-04"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5480">
          <front>
            <title>Elliptic Curve Cryptography Subject Public Key Information</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="K. Yiu" initials="K." surname="Yiu"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Polk" initials="T." surname="Polk"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography. This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5480"/>
          <seriesInfo name="DOI" value="10.17487/RFC5480"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC5758">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
            <author fullname="Q. Dang" initials="Q." surname="Dang"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="T. Polk" initials="T." surname="Polk"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm. This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs). This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5758"/>
          <seriesInfo name="DOI" value="10.17487/RFC5758"/>
        </reference>
        <reference anchor="RFC9217">
          <front>
            <title>Current Open Questions in Path-Aware Networking</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
              <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9217"/>
          <seriesInfo name="DOI" value="10.17487/RFC9217"/>
        </reference>
        <reference anchor="X.509" target="https://handle.itu.int/11.1002/1000/13031">
          <front>
            <title>ITU-T X.509 (10/2016) | Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="X.680" target="https://handle.itu.int/11.1002/1000/14468">
          <front>
            <title>ITU-T X.680 (02/2021) | Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="X.690" target="https://handle.itu.int/11.1002/1000/14472">
          <front>
            <title>ITU-T X.690 (02/2021) | Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="X9.62">
          <front>
            <title>ANSI X9.62-1998 | Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm</title>
            <author>
              <organization/>
            </author>
            <date year="1998"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.dekater-panrg-scion-overview">
          <front>
            <title>SCION Overview</title>
            <author fullname="Corine de Kater" initials="C." surname="de Kater">
              <organization>SCION Association</organization>
            </author>
            <author fullname="Nicola Rustignoli" initials="N." surname="Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <author fullname="Adrian Perrig" initials="A." surname="Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date day="7" month="May" year="2024"/>
            <abstract>
              <t>   The Internet has been successful beyond even the most optimistic
   expectations and is intertwined with many aspects of our society.
   But although the world-wide communication system guarantees global
   reachability, the Internet has not primarily been built with security
   and high availability in mind.  The next-generation inter-network
   architecture SCION (Scalability, Control, and Isolation On Next-
   generation networks) aims to address these issues.  SCION was
   explicitly designed from the outset to offer security and
   availability by default.  The architecture provides route control,
   failure isolation, and trust information for end-to-end
   communication.  It also enables multi-path routing between hosts.

   This document discusses the motivations behind the SCION architecture
   and gives a high-level overview of its fundamental components,
   including its authentication model and the setup of the control- and
   data plane.  As SCION is already in production use today, the
   document concludes with an overview of SCION deployments.

   For detailed descriptions of SCION's components, refer to
   [I-D.dekater-scion-pki], [I-D.dekater-scion-controlplane], and
   [I-D.dekater-scion-dataplane].  A more detailed analysis of
   relationships and dependencies between components is available in
   [I-D.rustignoli-scion-components].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dekater-panrg-scion-overview-06"/>
        </reference>
        <reference anchor="ISD-AS-assignments" target="https://docs.anapaya.net/en/latest/resources/isd-as-assignments/">
          <front>
            <title>SCION ISD and AS Assignments</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="RFC5398">
          <front>
            <title>Autonomous System (AS) Number Reservation for Documentation Use</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <date month="December" year="2008"/>
            <abstract>
              <t>To reduce the likelihood of conflict and confusion when relating documented examples to deployed systems, two blocks of Autonomous System numbers (ASNs) are reserved for use in examples in RFCs, books, documentation, and the like. This document describes the reservation of two blocks of ASNs as reserved numbers for use in documentation. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5398"/>
          <seriesInfo name="DOI" value="10.17487/RFC5398"/>
        </reference>
        <reference anchor="RFC6996">
          <front>
            <title>Autonomous System (AS) Reservation for Private Use</title>
            <author fullname="J. Mitchell" initials="J." surname="Mitchell"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document describes the reservation of Autonomous System Numbers (ASNs) that are for Private Use only, known as Private Use ASNs, and provides operational guidance on their use. This document enlarges the total space available for Private Use ASNs by documenting the reservation of a second, larger range and updates RFC 1930 by replacing Section 10 of that document.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="6996"/>
          <seriesInfo name="DOI" value="10.17487/RFC6996"/>
        </reference>
        <reference anchor="RFC8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="BARRERA17">
          <front>
            <title>The SCION internet architecture</title>
            <author fullname="David Barrera" initials="D." surname="Barrera">
              <organization>ETH Zürich in Switzerland</organization>
            </author>
            <author fullname="Laurent Chuat" initials="L." surname="Chuat">
              <organization>ETH Zürich in Switzerland</organization>
            </author>
            <author fullname="Adrian Perrig" initials="A." surname="Perrig">
              <organization>ETH Zürich in Switzerland</organization>
            </author>
            <author fullname="Raphael M. Reischuk" initials="R." surname="Reischuk">
              <organization>ETH Zürich in Switzerland</organization>
            </author>
            <author fullname="Pawel Szalachowski" initials="P." surname="Szalachowski">
              <organization>ETH Zürich in Switzerland</organization>
            </author>
            <date month="May" year="2017"/>
          </front>
          <seriesInfo name="Communications of the ACM" value="vol. 60, no. 6, pp. 56-65"/>
          <seriesInfo name="DOI" value="10.1145/3085591"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
          <front>
            <title>The Complete Guide to SCION</title>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Legner" fullname="Markus Legner">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Hausheer" fullname="David Hausheer">
              <organization>Otto von Guericke University Magdeburg</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <author initials="P." surname="Mueller" fullname="Peter Mueller">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
        </reference>
        <reference anchor="SCIONLAB" target="https://ieeexplore.ieee.org/abstract/document/9259355">
          <front>
            <title>SCIONLAB - A Next-Generation Internet Testbed</title>
            <author initials="J." surname="Kown" fullname="Jonghoon Kwon">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="J." surname="García-Pardo" fullname="Juan A. García-Pardo">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Legner" fullname="Markus Legner">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="F." surname="Wirz" fullname="François Wirz">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Frei" fullname="Matthias Frei">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Hausheer" fullname="David Hausheer">
              <organization>Otto von Guericke University Magdeburg</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1401?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks go to Fritz Steinmann (SIX Group AG), Juan A. Garcia Prado (ETH Zurich) and Russ Housley (IETF) for reviewing this document. We are also very grateful to Adrian Perrig (ETH Zurich), for providing guidance and feedback about each aspect of SCION. Finally, we are indebted to the SCION development teams of Anapaya and ETH Zurich, for their practical knowledge and for the documentation about the CP PKI, as well as to the authors of <xref target="CHUAT22"/> - the book is an important source of input and inspiration for this draft.</t>
    </section>
    <section numbered="false" anchor="deployment-testing-scionlab">
      <name>Deployment Testing: SCIONLab</name>
      <t>SCIONLab is a global research network that is available to test the SCION architecture. You can create and use your ASes using your own computation resources which allows you to gain real-world experience of deploying and managing a SCION network.</t>
      <t>More information can be found on the SCIONLab website and in the <xref target="SCIONLAB"/> paper.</t>
    </section>
    <section numbered="false" anchor="initial-ceremony">
      <name>Appendix A. Signing Ceremony Initial TRC</name>
      <t>A Signing Ceremony is used to create the initial (first) Trust Root Configuration of an ISD. Each ISD may decide how to conduct this ceremony, but it is <bcp14>RECOMMENDED</bcp14> to establish a procedure similar to the one described below:</t>
      <section numbered="false" anchor="ceremony-participants">
        <name> Ceremony Participants</name>
        <t>The Signing Ceremony <bcp14>SHOULD</bcp14> include the following participants:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Ceremony Administrator</strong> - an individual in charge of moderating the signing process, guiding the participants through the steps, and acting as an intermediary for sharing information. The Ceremony Administrator is typically appointed by the ISD Manager or by resolution of the Voting ASes.</t>
          </li>
          <li>
            <t><strong>Voting AS Representatives</strong> - individuals representing each Voting AS who are able to create voting signatures on the TRC. They are in possession of a device with the private keys of their respective certificates in the TRC.</t>
          </li>
          <li>
            <t><strong>Witness(es)</strong> - individual(s) who have no active role in the Signing Ceremony but may stop the process and request more information if they feel its integrity may have been compromised. The Witness(es) are typically appointed by resolution of the Voting ASes.</t>
          </li>
        </ul>
        <t><strong>Note:</strong> The ISD members <bcp14>MUST</bcp14> decide on the roles of the Signing Ceremony participants in advance of Signing Ceremony, and <bcp14>MUST</bcp14> have reached agreement about the Certificate Authority (CA) ASes (that will also issue the root certificates). It is assumed that all parties are trustworthy and issues encountered during the Signing Ceremony may be assumed to be caused by honest mistakes and not by malicious intent. Hash comparison checks are included to counter mistakes and so that every participant can ensure they are operating on the same data, and the private keys of each participant never leave their machine. The Ceremony Administrator does not have to be entrusted with private keys.</t>
      </section>
      <section numbered="false" anchor="ceremonyprep">
        <name>Ceremony Preparations</name>
        <t>The participants <bcp14>MUST</bcp14> decide in advance on the physical location of the Signing Ceremony, the devices that will be used, and the ISD policy as follows:</t>
        <ul spacing="normal">
          <li>
            <t>ISD number - usually obtained from the SCION registry, see <xref target="id"/>;</t>
          </li>
          <li>
            <t>The description of the TRC, see <xref target="description"/>;</t>
          </li>
          <li>
            <t>Validity period of the TRC, see <xref target="validity"/>;</t>
          </li>
          <li>
            <t>Voting quorum for the TRC, see <xref target="quorum"/>;</t>
          </li>
          <li>
            <t>AS numbers of the Core ASes, see <xref target="core"/>;</t>
          </li>
          <li>
            <t>AS numbers of the Authoritative ASes, see <xref target="auth"/>;</t>
          </li>
          <li>
            <t>The list of Control Plane Root Certificates.</t>
          </li>
        </ul>
        <t>Each representative of a Voting AS <bcp14>MUST</bcp14> also create the following before the ceremony:</t>
        <ul spacing="normal">
          <li>
            <t>A sensitive voting private key and a certificate holding the corresponding public key.</t>
          </li>
          <li>
            <t>A regular voting private key and a certificate holding the corresponding public key.</t>
          </li>
        </ul>
        <t>In addition, each Certificate Authority <bcp14>MUST</bcp14> create a control plane root private key and a certificate holding the corresponding public key. A representative of the Certificate Authority need not be present at the ceremony as they do not need to sign the TRC, but they <bcp14>MUST</bcp14> provide their root certificate to be shared at the ceremony. The validity period of the certificates generated in advance <bcp14>MUST</bcp14> cover the full TRC validity period.</t>
        <t>The location <bcp14>MUST</bcp14> provide electricity and power sockets for each participant, and should provide a monitor or projector that allows the Ceremony Administrator to display proceedings.</t>
        <t>The Ceremony Administrator and Voting ASes <bcp14>MUST</bcp14> each bring to the Signing Ceremony a secure machine capable of signing and verifying TRCs and computing the SHA-512 digest of the files. For voting ASes, the machine requires access to their own sensitive and regular voting private keys.</t>
        <t>The Ceremony Administrator <bcp14>MUST</bcp14> provide or be provided with a device to exchange data between the ceremony participants.</t>
        <t>The Signing Ceremony <bcp14>SHOULD</bcp14> include a procedure to verify that all devices are secure.</t>
      </section>
      <section numbered="false" anchor="ceremonyprocess">
        <name> Ceremony Process</name>
        <t>The number of Voting ASes present at the Signing Ceremony must be equal to or larger than the specified voting quorum.</t>
        <t>The signing process has four phases of data sharing, led by the Ceremony Administrator who provides instructions to the other participants:</t>
        <section numbered="false" anchor="phase1">
          <name>Phase 1: Certificate Exchange</name>
          <t>All parties share the certificates that must be part of the TRC with the Ceremony Administrator. For the Voting ASes, these are the sensitive and the regular voting certificates, and for the Certificate Authority these are the Control Plane root certificates.</t>
          <t>Each representative copies the requested certificates from their machine onto a data exchange device provided by the Ceremony Administrator that is passed between all representatives, before being returned to the Ceremony Administrator. Representatives <bcp14>MUST NOT</bcp14> copy the corresponding private keys onto the data exchange device as this invalidates the security of the ceremony.</t>
          <t>The Ceremony Administrator then checks that the validity period of each provided certificate covers the previously agreed upon TRC validity, that the signature algorithms are correct, and that the certificate type is valid (root, sensitive voting or regular voting certificate). If these parameters are correct, the Ceremony Administrator computes the SHA256 hash value for each certificate, aggregates and bundles all the provided certificates, and finally calculates the SHA512 hash value for the entire bundle. All hash values must be displayed to the participants.</t>
          <t>The Ceremony Administrator <bcp14>MUST</bcp14> then share the bundle with the representatives of the voting ASes who <bcp14>MUST</bcp14> validate on their machine that the hash value of their certificates and that of the bundled certificates is the same as displayed by the Ceremony Administrator.</t>
          <t>Phase 1 concludes when every representative has confirmed the SHA256 sums are correct. If there is any mismatch then this phase <bcp14>MUST</bcp14> be repeated.</t>
        </section>
        <section numbered="false" anchor="phase2">
          <name>Phase 2: Generation of the TRC Payload</name>
          <t>The Ceremony Administrator generates the TRC payload based on the bundled certificates and the <xref target="trcfields"/> completed in accordance with ISD policy, see <xref target="ceremonyprep"/>.</t>
          <t>Once the voting representatives have verified the TRC data, the Ceremony Administrator computes the DER encoding of the data according to <xref target="trcpayload"/> and the SHA256 hash value of the TRC payload file. The TRC payload file is then shared with the voting representatives via the data exchange device who verify the TRC payload hash value by computing this on their machine and checking it matches the one displayed by the Ceremony Administrator.</t>
          <t>Phase 2 concludes when all voting representatives confirm that the contents of the TRC payload are correct.</t>
        </section>
        <section numbered="false" anchor="phase3">
          <name>Phase 3: TRC Signing</name>
          <t>Each voting representative attaches a signature created with their own private voting key to the TRC (payload file), using their own machine. This serves to prove possession of the private keys.</t>
          <t>Phase 3 concludes when all voting representatives have attached their signatures to the TRC.</t>
        </section>
        <section numbered="false" anchor="phase4">
          <name>Phase 4: TRC Validation</name>
          <t>All voting representatives copy the TRC payload signed with their private voting keys to the data exchange device and return this to the Ceremony Administrator. The Ceremony Administrator assembles the final TRC by aggregating the payload data and verifying the signatures based on the certificates exchanged during Phase 1. The Ceremony Administrator then shares the assembled TRC with all participants who <bcp14>MUST</bcp14> again inspect the signatures and verify them based on the certificates exchanged in Phase 1.</t>
          <t>The Signing Ceremony is completed once when every voting representative confirms that the signatures match. All participants can then use the TRC to distribute trust anchors for the ISD.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="change-log">
      <name>Change Log</name>
      <t>Changes made to drafts since ISE submission. This section is to be removed before publication.</t>
      <section numbered="false" anchor="draft-dekater-scion-pki-09">
        <name>draft-dekater-scion-pki-09</name>
        <ul spacing="normal">
          <li>
            <t>Signing ceremony and introduction - improved text</t>
          </li>
          <li>
            <t>Clarified why a CA must have an ISD-AS number assigned</t>
          </li>
          <li>
            <t>Mention Active Discovery as a TRC discovery mechanism</t>
          </li>
          <li>
            <t>Abstract: mention goal and that document is not an Internet Standard</t>
          </li>
        </ul>
      </section>
      <section numbered="false" anchor="draft-dekater-scion-pki-08">
        <name>draft-dekater-scion-pki-08</name>
        <ul spacing="normal">
          <li>
            <t>Fix some oversized diagrams</t>
          </li>
          <li>
            <t>Introduction text rewording</t>
          </li>
        </ul>
      </section>
      <section numbered="false" anchor="draft-dekater-scion-pki-07">
        <name>draft-dekater-scion-pki-07</name>
        <t>Minor changes:</t>
        <ul spacing="normal">
          <li>
            <t>Clarified relationship with RPKI.</t>
          </li>
          <li>
            <t>Added this changelog</t>
          </li>
          <li>
            <t>General text editing</t>
          </li>
          <li>
            <t>References: fixed ITU, ANSI, Assigned ISD-AS, fixed cross-reference to text formatting in the CP draft</t>
          </li>
        </ul>
      </section>
      <section numbered="false" anchor="draft-dekater-scion-pki-06">
        <name>draft-dekater-scion-pki-06</name>
        <t>Major changes:</t>
        <ul spacing="normal">
          <li>
            <t>Added overview of SCION components to Introduction section.</t>
          </li>
        </ul>
        <t>Minor changes:</t>
        <ul spacing="normal">
          <li>
            <t>General edits to make terminology consistent, remove duplication and rationalize text.</t>
          </li>
          <li>
            <t>Removed forward references.</t>
          </li>
          <li>
            <t>Added RFC2119 compliant terminology.</t>
          </li>
        </ul>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
