Re: [GROW] last call for draft-ietf-grow-unique-origin-as-00

Roland Dobbins <roland.dobbins@gmail.com> Tue, 21 December 2010 20:44 UTC

Return-Path: <roland.dobbins@gmail.com>
X-Original-To: grow@core3.amsl.com
Delivered-To: grow@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5D2D43A688B for <grow@core3.amsl.com>; Tue, 21 Dec 2010 12:44:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.486
X-Spam-Level:
X-Spam-Status: No, score=-3.486 tagged_above=-999 required=5 tests=[AWL=0.113, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 07mvTq832DNu for <grow@core3.amsl.com>; Tue, 21 Dec 2010 12:44:40 -0800 (PST)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by core3.amsl.com (Postfix) with ESMTP id 75E8D3A68BA for <grow@ietf.org>; Tue, 21 Dec 2010 12:44:40 -0800 (PST)
Received: by yxt33 with SMTP id 33so2094955yxt.31 for <grow@ietf.org>; Tue, 21 Dec 2010 12:46:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:content-type:mime-version :subject:from:in-reply-to:date:content-transfer-encoding:message-id :references:to:x-mailer; bh=vjpRm3x0WADqBRyW9EcwtjfbSOCVX7L5Fr9FfAwWMHQ=; b=T/vP9IDRqyxsXp3kwa1mg7kNkXVHDhNo7oS1m6Fm3rstVYwHPGYl6LDnsTjKcBtVeZ pZZvx5Jxsw2eGTR/DUdNRROvnmvTefxG3iaFVmLA2tNQoQ8mB7pQjwr+fx8kJtZ08ACO 5RtljmWxT/KKc1zA+UzbAElxvh+tzyiaP0Lmk=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=content-type:mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to:x-mailer; b=X1ALsN0/rV3eABxwWoJqlLrV4/vvvi9HpfSTGJ1L3UIZBXG6EjYPzfapdKfoaBsoTC 1uOctBt5Tb40cvoqNMG6bVPWN165xsOzxF1G7d0UcJL6psd/asXt4YtNe5n+TawMzR85 +3/hzu4hrfYKuB+HAyXHg65ivhKL6qnyla+/g=
Received: by 10.150.92.19 with SMTP id p19mr9049530ybb.144.1292964396949; Tue, 21 Dec 2010 12:46:36 -0800 (PST)
Received: from [192.168.1.100] (202-176-81-112.static.asianet.co.th [202.176.81.112]) by mx.google.com with ESMTPS id r41sm5272366yba.4.2010.12.21.12.46.33 (version=TLSv1/SSLv3 cipher=RC4-MD5); Tue, 21 Dec 2010 12:46:36 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Apple Message framework v1082)
From: Roland Dobbins <roland.dobbins@gmail.com>
In-Reply-To: <4D1110EB.7020400@it.uc3m.es>
Date: Wed, 22 Dec 2010 03:46:29 +0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <2837CC8E-940D-4B8C-8FCB-C05A6A8BFD03@gmail.com>
References: <050e01cb9da6$95d88c80$c189a580$@lugs.com> <4D10C0B5.1040404@it.uc3m.es> <81071856-247B-4155-912B-A45F3C9AC257@gmail.com> <4D110B69.6090102@it.uc3m.es> <9F68D21F-60AD-4FAC-AAF0-B68D4ADD1167@gmail.com> <4D1110EB.7020400@it.uc3m.es>
To: grow@ietf.org
X-Mailer: Apple Mail (2.1082)
Subject: Re: [GROW] last call for draft-ietf-grow-unique-origin-as-00
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/grow>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Dec 2010 20:44:41 -0000

On Dec 22, 2010, at 3:41 AM, marcelo bagnulo braun wrote:

> Now that doesn't imply afaict that the surface of the attack will be bigger, just that it is harder to identify.

Disagree.  Confusion in and of itself represents a broadening of the attack surface.

> Second, it is not obvious to me why having different origins for each anycast location makes this situation any easier in the case of a malicious attacker (Who is could potentially include a false origin in its announcement)

At the moment, there are out-of-band mechanisms which in many (not all) instances can be utilized to sort the sheep from the goats.  Obviously, technological - and therefore more automagic - mechanisms for doing so are preferred, and there is considerable activity in that regard (i.e., rPKI).