Re: BGP-4+

Brad Smith <brad@cse.ucsc.edu> Thu, 19 December 1996 23:23 UTC

Received: from cnri by ietf.org id aa16689; 19 Dec 96 18:23 EST
Received: from merit.edu by CNRI.Reston.VA.US id aa24078; 19 Dec 96 18:23 EST
Received: (from daemon@localhost) by merit.edu (8.8.4/merit-2.0) id SAA16589 for idr-outgoing; Thu, 19 Dec 1996 18:00:46 -0500 (EST)
Received: from interlock.ans.net (interlock.ans.net [147.225.5.5]) by merit.edu (8.8.4/merit-2.0) with SMTP id SAA16584 for <bgp@merit.edu>; Thu, 19 Dec 1996 18:00:43 -0500 (EST)
Received: by interlock.ans.net id AA04307 (InterLock SMTP Gateway 3.0 for bgp@ans.net); Thu, 19 Dec 1996 18:00:41 -0500
Received: by interlock.ans.net (Internal Mail Agent-1); Thu, 19 Dec 1996 18:00:41 -0500
Message-Id: <199612192300.PAA11954@toltec.cse.ucsc.edu>
To: Tony Li <tli@jnx.com>
Cc: bgp@ans.net
Subject: Re: BGP-4+
In-Reply-To: Your message of "Thu, 19 Dec 1996 14:03:35 PST." <199612192203.OAA23260@chimp.jnx.com>
Date: Thu, 19 Dec 1996 15:00:23 PST
From: Brad Smith <brad@cse.ucsc.edu>
Sender: owner-idr@merit.edu
Precedence: bulk

>    > A comment and question.  TCP and similar peer-to-peer security does
>    > not protect against a subverted speaker.  If an intruder is able to
>    > break into a speaker, where it would get access to all TCP security
>    > related keys, it would then be able to have it's way with the protocol
>    > (e.g. fabricate, modify, and replay routing information).
> 
>    Permit me to observe here that when there is subverted speaker, change
>    to BGP protocol spec isn't good enough to contain possible damage.
> 
> True.  In fact, Radia Perlman has looked at the subverted speaker problem
> quite a bit.  It turns out that you basically need a link state protocol to
> disseminate enough information to still have a functioning network.  And
> the cost in redundancy and additional computation is non-trivial.  
> 
> It's a major architectural change, which I haven't seen any willingness to
> pay for either in the enterprise market or in the Internet backbone.

True, although Radia's goal (in her PhD thesis) of what she called
Byzantine Robustness (the ability to continue correct operation in
the presence of arbitrary nodes with Byzantine failures) is quite
high.  It may be possible that there are lower goals that are still
very useful that can be acheived with information available in current
BGP updates.  I had the beginnings of a proposal for such a solution
until I talked to Sue Hares at the IETF... she "clarified":) a few issues
that pretty much shot my proposal, although I think there's still hope.

However, I should re-lurk on this specific issue until I have something
more concrete to say.

My main point/question was that providing only peer-to-peer measures
leaves the protocol vulnerable to subverted speakers, and whether this
was considered a significant threat.  I think my question was answered
(yes, it is significant, but not worth the pain that current solutions
would incur).

Brad