Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

Danny McPherson <danny@tcb.net> Mon, 12 May 2014 22:06 UTC

Return-Path: <danny@tcb.net>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1638B1A0785 for <grow@ietfa.amsl.com>; Mon, 12 May 2014 15:06:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.851
X-Spam-Level:
X-Spam-Status: No, score=-99.851 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RP_MATCHES_RCVD=-0.651, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wf8XztzMm70V for <grow@ietfa.amsl.com>; Mon, 12 May 2014 15:06:26 -0700 (PDT)
Received: from mail.tcb.net (mail.tcb.net [64.78.239.70]) by ietfa.amsl.com (Postfix) with ESMTP id 8AB201A077F for <grow@ietf.org>; Mon, 12 May 2014 15:06:26 -0700 (PDT)
Received: from dspam (unknown [127.0.0.1]) by mail.tcb.net (Postfix) with SMTP id 6C31D30004D for <grow@ietf.org>; Mon, 12 May 2014 22:06:20 +0000 (UTC)
Received: from mail2.tcb.net (localhost [127.0.0.1]) by mail.tcb.net (Postfix) with ESMTP id 2F53C30004A for <grow@ietf.org>; Mon, 12 May 2014 16:06:20 -0600 (MDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Date: Mon, 12 May 2014 16:06:20 -0600
From: Danny McPherson <danny@tcb.net>
To: grow@ietf.org
In-Reply-To: <CF96AEDB.1B684%wesley.george@twcable.com>
References: <CAL9jLabRKA2gezfRdzND1TSYMJO+a_4mVV+M302cLBFTUwYmTQ@mail.gmail.com> <CF96AEDB.1B684%wesley.george@twcable.com>
Message-ID: <90570d084588512427a42c996c7827fe@tcb.net>
X-Sender: danny@tcb.net
User-Agent: Roundcube Webmail/0.8.2
X-DSPAM-Result: Innocent
X-DSPAM-Processed: Mon May 12 16:06:20 2014
X-DSPAM-Confidence: 1.0000
X-DSPAM-Improbability: 1 in 98689409 chance of being spam
X-DSPAM-Probability: 0.0023
X-DSPAM-Signature: 537145dc42071214129809
X-DSPAM-Factors: 27, vs+#+#+than, 0.40000, attack+#+#+success, 0.40000, precisely+#+#+#+not, 0.40000, mainly+#+#+why, 0.40000, makes+#+think, 0.40000, to+#+#+#+or, 0.40000, does+#+#+#+in, 0.40000, comments+#+document, 0.40000, first+#+#+#+then, 0.40000, that+#+address, 0.40000, the+#+#+Chris, 0.40000, problem+#+it, 0.40000, every+#+reason, 0.40000, be+happy, 0.40000, to+#+#+#+to, 0.40000, to+#+#+#+to, 0.40000, date+#+no, 0.40000, that's+#+purpose, 0.40000, what+the, 0.40000, more+#+leak, 0.40000, absolutely+#+#+#+publication, 0.40000, to+#+#+#+comments, 0.40000, are+#+#+#+designing, 0.40000, note+#+there, 0.40000, IETF+#+to, 0.40000, to+#+#+#+date, 0.40000, is+#+we, 0.40000
Archived-At: http://mailarchive.ietf.org/arch/msg/grow/FWFsodzqbH3Em3C0_oqTjJRuBss
Subject: Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 May 2014 22:06:29 -0000

On 2014-05-12 15:42, George, Wes wrote:
> I see a thread dated 2013 Nov in GROW, in which substantive 
> discussion and
> comments were provided after -03 was published, in which the authors
> mainly just expressed why they were frustrated with SIDR and the IETF 
> in
> general for in their minds, ignoring this problem because it was 
> hard,
> rather than addressing the concerns raised within the WG. -04 is a
> keepalive to reset the expiration date with no substantive updates. 
> Why
> are we now talking about WGLC?

Because we'd like this memorialized in an Informational RFC, that's the 
purpose, methinks.

> Chris, you were one of the ones who said that your comments hadn’t 
> been
> addressed yet.
> 
> (https://mailarchive.ietf.org/arch/msg/grow/0ho_RU3e15TCvp4p8ScCeObk42Y)

Eric owns comments follow-up, I'll defer to him on responding to that 
bit....

> Substantive comments:
> This document provides one example of a route leak causing a problem 
> that
> BGPSec does not protect against, but still does not do much to 
> provide
> guidance on how such a leak would be systematically identified,

Nor does it have to in any programmatic way, IMO.  It's easy for an 
entry level routing person to understand what the problem is here, hell, 
they have to deal with them every day.  It doesn't have to expand to 
every possible reason or define detection mechanisms.  We hope folks 
that read such things will be as clever as the SIDR folks and solve this 
solution :-)

However, if you can be more specific about examples not covered or send 
text then we'd be happy to incorporate it.

> It does
> note that there are data supporting the assertion that this is a real
> problem, and imply that perhaps additional analysis of that data 
> would
> reveal more information. I don’t think that anyone would dispute that 
> this
> is a valid attack. However:
>         "This document is meant to provide input into routing 
> protocol design
> choices being
>         considered within the IETF, and to foster discussion of the 
> practical
>         implications of "policy" and "intent" in operational routing 
> system
>         security."
>
> This document provides no actionable guidance beyond articulating the
> basics of the attack, certainly no meaningful discussion of policy vs
> intent other than to note that discerning intent is difficult, and as 
> such
> the draft is absolutely not ready for publication if the above is its
> goal.

We didn't say we'd proclaim all is accomplished, we said we'd like to 
foster discussions of policy v. intent.  This very discussion makes me 
think it works, and given that even you don't think anyone would dispute 
that this is a valid attack, I claim success and request publication -- 
although perhaps we should update with more recent leak references and 
we can certainly encourage more folks to do research, with a stable 
reference, which was precisely the intent.

> We’re not hiding behind SIDR’s carefully crafted requirements and
> charter here, so let’s actually have the discussion about policy and
> intent and see if we can come to some consensus on how to use that 
> info to
> define a route leak such that we can first systematically find, and 
> then
> protect against it.

I'm glad you agree it was carefully crafted.  This draft is only meant 
to document the issue above, which you seem to agree that no one would 
dispute.  It doesn't need to be the kitchen sink for attack vectors.

> I absolutely want to see a solution to this problem,
> but one example/existence proof isn’t enough to get us moving in that
> direction.

I don't think that's a surprise Wes.  We should document what some 
believe the problems are before we begin designing solutions, else we'll 
end up with more complicated solutions that don't address what me 
operators believe to be the key issues.


-danny