Re: [GROW] I-D Action: draft-ietf-grow-simple-leak-attack-bgpsec-no-help-03.txt

Jared Mauch <jared@puck.nether.net> Mon, 02 December 2013 11:31 UTC

Return-Path: <jared@puck.nether.net>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E71821AE3C7 for <grow@ietfa.amsl.com>; Mon, 2 Dec 2013 03:31:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HvW3W2Ic-GFE for <grow@ietfa.amsl.com>; Mon, 2 Dec 2013 03:31:37 -0800 (PST)
Received: from puck.nether.net (puck.nether.net [IPv6:2001:418:3f4::5]) by ietfa.amsl.com (Postfix) with ESMTP id 6432E1AE3EC for <grow@ietf.org>; Mon, 2 Dec 2013 03:31:30 -0800 (PST)
Received: from [IPv6:2601:4:2180:300:7062:835c:5c6e:65a3] ([IPv6:2601:4:2180:300:7062:835c:5c6e:65a3]) (authenticated bits=0) by puck.nether.net (8.14.7/8.14.5) with ESMTP id rB2BV6e8013231 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 2 Dec 2013 06:31:07 -0500
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
Content-Type: text/plain; charset="windows-1252"
From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <F19C0DE3-FC3C-432B-B2E0-BF14F45DFA54@apnic.net>
Date: Mon, 02 Dec 2013 06:31:05 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <ADFA4F59-51DA-4847-B5F1-F33AF966F3BC@puck.nether.net>
References: <20131118230146.22016.28407.idtracker@ietfa.amsl.com> <77143901-5DA3-4937-8162-509B62A61594@apnic.net> <CAL9jLabPjvXaAUaSEyQXdFvSDPZ_bJX4rjGxOGd0BqYhQcQYdg@mail.gmail.com> <FDFB46E9-ECD0-4CFF-A846-2E6FE9F8C9D7@apnic.net> <CAL9jLaaFszKUR0oZe-3gxR8JeFyTAjoe1BmD2ixXnjhvU7Mv5A@mail.gmail.com> <3EEF9354-766C-4687-8DD4-55759B9826CB@apnic.net> <CAL9jLaaEGpJ-B75EAOCCJDG14B8ZWJQ2FK7=AgXt1WQe=5geiQ@mail.gmail.com> <CAL9jLaa5-f4tmPZXSvZXDn640wm6VkfbYqS5qDBdZDVBZuJkXg@mail.gmail.com> <F19C0DE3-FC3C-432B-B2E0-BF14F45DFA54@apnic.net>
To: Geoff Huston <gih@apnic.net>
X-Mailer: Apple Mail (2.1822)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.1 (puck.nether.net [IPv6:2001:418:3f4::5]); Mon, 02 Dec 2013 06:31:08 -0500 (EST)
Cc: "grow@ietf.org grow@ietf.org" <grow@ietf.org>
Subject: Re: [GROW] I-D Action: draft-ietf-grow-simple-leak-attack-bgpsec-no-help-03.txt
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Dec 2013 11:31:39 -0000

On Nov 26, 2013, at 4:24 PM, Geoff Huston <gih@apnic.net> wrote:

> I reviewed the mailing lists of all three WGs from November last year, when this came up.
> and I was searching for a proposed methodology of defining requirements, proposing mechanisms
> and standardising one of more candidate technologies relating to the issue of path
> control of the propagation of BGP announcements in order to allow BGP speakers
> to detect unintended announcements. My search of the list archives was unsuccessful.
> 
> As I seem to be the only one interested in an answer, I give up.

At $dayjob, we have a list of ASNs that we shouldn’t see from our customers.  We work to update
our AS_PATH filtering to match these as the network evolves.  Our AS_PATH filtering may be
different than your list.

The biggest problems I’ve seen/observed are:

a) People put stuff into an IRR and it never comes out
b) Routers lack sophistication in configuring policy (or the configured policy blows out its config/memory/structure space)
c) Customers will pay to not be filtered at all
d) Networks don’t care to address issues (e.g.: AS-FLAGT expands to how many routes?)

This is a hygiene issue like showering and brushing your teeth.  Vendors figure it’s an operator problem (then freak out when we show them the scale).  Customers and peers don’t address the tragedy of the commons.

We’re left with little traction to put ourselves on a trajectory for a fix as the average BGP speaker is an IOS devices that still today sends/receives all routes learned by default with no policy configured.

- Jared