[ppml] Policy Proposal: Documentation of the X.509 AuthenticationMethod

Thank you!
I support all of three of these.

David Divins
Principal Engineer
ServerVault Corp.


From: ppml-bounces at [mailto:ppml-bounces at] On Behalf Of
Bill Woodcock
Sent: Tuesday, October 24, 2006 5:39 PM
To: ppml at
Subject: [ppml] Policy Proposal: Documentation of the X.509

   1. Policy Proposal Name: Documentation of the X.509 Authentication

   2. Authors:

         1. name: Paul Vixie
         2. email: paul at
         3. telephone: +1 650 423 1300
         4. organization: Internet Systems Consortium

         1. name: Mark Kosters
         2. email: markk at
         3. telephone: +1 703 948 3200
         4. organization: Verisign

         1. name: Chris Morrow
         2. email: christopher.morrow at
         3. telephone: +1 703 886 3823
         4. organization: Verizon Business/UUnet

         1. name: Jared Mauch
         2. email: jmauch at
         3. telephone: +1 214 915 1356
         4. organization: NTT/Verio

         1. name: Bill Woodcock
         2. email: woody at
         3. telephone: +1 415 831 3100
         4. organization: Packet Clearing House

   3. Proposal Version: 1

   4. Submission Date: Tuesday, October 24, 2006

   5. Proposal type: New

   6. Policy term: Permanent

   7. Policy statement:


         3.5.3 X.509
               This section intentionally left blank.


         3.5.3 X.509
               ARIN accepts X.509-signed transactions as authentic
               communication from authorized Points of Contact. POCs
               may denote their records "crypt-auth," subsequent to
               which unsigned communications shall not be deemed
               authentic with regard to those records.

   8. Rationale:

      This policy complements the previously-proposed "Reinstatement of
      PGP Authentication Method" which introduces section 3.5 to the
      NRPM. Section 3.5 relates the existence of three authentication
      methods. Two of those, mail-from and X.509, were preexisting but
      not documented within the NRPM.
      This policy proposal simply seeks to provide brief documentation
      of the existence of the X.509 authentication method. Because the
      specific wording of the documentation may be subject to debate,
      and is in no way interdependent upon the documentation of the
      other two methods, it is being proposed in a separate policy, so
      that consensus may be more easily reached.

   9. Timetable for implementation: Immediate

  10. Meeting presenter: Bill Woodcock


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>