Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

Danny McPherson <danny@tcb.net> Wed, 14 May 2014 16:13 UTC

Return-Path: <danny@tcb.net>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33FDA1A02D1 for <grow@ietfa.amsl.com>; Wed, 14 May 2014 09:13:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.551
X-Spam-Level:
X-Spam-Status: No, score=-102.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wJOyTTHxxf_U for <grow@ietfa.amsl.com>; Wed, 14 May 2014 09:13:20 -0700 (PDT)
Received: from mail.tcb.net (mail.tcb.net [64.78.239.70]) by ietfa.amsl.com (Postfix) with ESMTP id BC40F1A0133 for <grow@ietf.org>; Wed, 14 May 2014 09:13:20 -0700 (PDT)
Received: from dspam (unknown [127.0.0.1]) by mail.tcb.net (Postfix) with SMTP id 14FF330004D for <grow@ietf.org>; Wed, 14 May 2014 16:13:14 +0000 (UTC)
Received: from mail2.tcb.net (localhost [127.0.0.1]) by mail.tcb.net (Postfix) with ESMTP id DB16930004C for <grow@ietf.org>; Wed, 14 May 2014 10:13:13 -0600 (MDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Date: Wed, 14 May 2014 10:13:13 -0600
From: Danny McPherson <danny@tcb.net>
To: grow@ietf.org
In-Reply-To: <20140514135804.GJ16861@pfrc>
References: <CAL9jLabRKA2gezfRdzND1TSYMJO+a_4mVV+M302cLBFTUwYmTQ@mail.gmail.com> <CF96AEDB.1B684%wesley.george@twcable.com> <CAL9jLaZ9J52Dt5n1Wk2KYTqwzmefGxvq-bRcfMfhWBNwf_6ZGg@mail.gmail.com> <CF978B01.1B737%wesley.george@twcable.com> <20140514135804.GJ16861@pfrc>
Message-ID: <1b12d69966e5d355074c1ee5a2c32ff8@tcb.net>
X-Sender: danny@tcb.net
User-Agent: Roundcube Webmail/0.8.2
X-DSPAM-Result: Innocent
X-DSPAM-Processed: Wed May 14 10:13:14 2014
X-DSPAM-Confidence: 0.9899
X-DSPAM-Improbability: 1 in 9809 chance of being spam
X-DSPAM-Probability: 0.0000
X-DSPAM-Signature: 5373961942071787263388
X-DSPAM-Factors: 27, to+#+the, 0.01000, Subject*Re+#+WGLC, 0.01000, and+the, 0.01000, the+#+#+the, 0.01000, we+can, 0.01000, we+can, 0.01000, routing+system, 0.01000, to+#+a, 0.01000, to+#+#+#+the, 0.01000, I+think, 0.01000, I+think, 0.01000, the+#+of, 0.01000, the+#+of, 0.01000, From*Danny+#+danny, 0.01000, a+#+#+#+the, 0.01000, From*Danny+#+#+tcb.net, 0.01000, From*Danny+McPherson, 0.01000, Subject*GROW+WGLC, 0.01000, I+#+#+that, 0.01000, the+#+#+to, 0.01000, of+the, 0.01000, Subject*Re+GROW, 0.01000, From*McPherson+danny, 0.01000, From*Danny McPherson <danny@tcb.net>, 0.01000, From*McPherson+#+tcb.net, 0.01000, the+#+is, 0.01000, the+#+is, 0.01000
Archived-At: http://mailarchive.ietf.org/arch/msg/grow/KD9JN_7BshbxMG03cxKpwDGpqkA
Subject: Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 May 2014 16:13:22 -0000

On 2014-05-14 07:58, Jeffrey Haas wrote:

> This to a large extent identifies the problem: BGP *as a protocol* 
> has no
> idea what these boundaries are.  Thus, "intent" is up to the 
> perception of
> the involved parties.

Ans therefore, the solve need not necessarily be IN BGP itself.

> This thread has looped a few iterations with "this is a problem!" and 
> SIDR
> basically saying "there's nothing in BGP here to secure".  Both 
> things are
> still true.

Heh, perhaps.

> I think documenting route-leaks and their potential negative (or 
> malicious)
> consequences is worth GROW doing.

Concur, especially since it's a global routing operations related issue 
that happens all the time, and persists whether BGPSEC is deployed fully 
or not.

> I think this issue exists even without bgpsec being involved.  While 
> it's
> correct that bgpsec doesn't add anything here, until the underlying 
> base
> protocol has some idea of what we can do, picking on bgpsec doesn't 
> help.
> If anything, I'd probably take the route-leak document and say 
> "here's the
> problem" with a one or two sentence note that bgpsec doesn't do much.

I don't agree, and I don't believe this problem needs to be solved IN 
BGP.  And I do believe it's extremely important to provide a stable 
reference to these attacks in order for folks to realize it doesn't 
solve this very basic problem.

> In it's current form, I don't think the document is ready to 
> progress.

What specifically would you change in the document, given that it's 
intent is to highlight how BGPSEC does not address the route leak issue, 
and that it's a real operational issue that at least the authors are 
concerned with?

> I'd even suggest it needs to be rescoped.

If folks are interested in doing work more broadly than this then 
they're certainly welcome to.  If they're not interested in doing the 
work then it's disingenuous to suggest it be rescoped as such, 
particularly at this stage.

> The interesting work is resurrecting the thread on injecting routing 
> policy
> intent into some system we can secure. :-)

I suppose degrees of "interesting" is a matter of perspective, and the 
notion of strict linear thinking that suggests "injecting" it into the 
active routing system is the only way to solve the problem is perhaps 
why we keep dancing around this (and other adjacent topics such as 
anti-spoofing in the datapath).  Quite frankly, I prefer inter-domain 
static routing or SDN over what I see BGPSEC-enabled RPKI bringing to 
the table - and I seriously mean that --  and they might well beat 
BGPSEC off the launchpad :-)

-danny