Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

"George, Wes" <wesley.george@twcable.com> Tue, 13 May 2014 13:51 UTC

Return-Path: <wesley.george@twcable.com>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92C571A00B4 for <grow@ietfa.amsl.com>; Tue, 13 May 2014 06:51:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.483
X-Spam-Level: *
X-Spam-Status: No, score=1.483 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id op8JHwyJSCQh for <grow@ietfa.amsl.com>; Tue, 13 May 2014 06:51:08 -0700 (PDT)
Received: from cdpipgw02.twcable.com (cdpipgw02.twcable.com [165.237.59.23]) by ietfa.amsl.com (Postfix) with ESMTP id 5F2AF1A00C2 for <grow@ietf.org>; Tue, 13 May 2014 06:51:08 -0700 (PDT)
X-SENDER-IP: 10.136.163.10
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.97,1044,1389762000"; d="scan'208";a="301441179"
Received: from unknown (HELO PRVPEXHUB01.corp.twcable.com) ([10.136.163.10]) by cdpipgw02.twcable.com with ESMTP/TLS/RC4-MD5; 13 May 2014 09:50:42 -0400
Received: from PRVPEXVS15.corp.twcable.com ([10.136.163.78]) by PRVPEXHUB01.corp.twcable.com ([10.136.163.10]) with mapi; Tue, 13 May 2014 09:51:01 -0400
From: "George, Wes" <wesley.george@twcable.com>
To: Danny McPherson <danny@tcb.net>, "grow@ietf.org" <grow@ietf.org>
Date: Tue, 13 May 2014 09:51:06 -0400
Thread-Topic: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help
Thread-Index: Ac9usmAo1cJf2b1xQ6qiE3K4DVjMeA==
Message-ID: <CF978ED2.1B75C%wesley.george@twcable.com>
References: <CAL9jLabRKA2gezfRdzND1TSYMJO+a_4mVV+M302cLBFTUwYmTQ@mail.gmail.com> <CF96AEDB.1B684%wesley.george@twcable.com> <90570d084588512427a42c996c7827fe@tcb.net>
In-Reply-To: <90570d084588512427a42c996c7827fe@tcb.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.1.140326
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/grow/WxraQr26_XOnSog0MDg-F7bquAc
Subject: Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 May 2014 13:51:09 -0000

On 5/12/14, 6:06 PM, "Danny McPherson" <danny@tcb.net> wrote:


>>still does not do much to provide
>> guidance on how such a leak would be systematically identified,
>
>Nor does it have to in any programmatic way, IMO.  It's easy for an
>entry level routing person to understand what the problem is here, hell,
>they have to deal with them every day.  It doesn't have to expand to
>every possible reason or define detection mechanisms.

That’s exactly my point. We don’t need better understanding of the
symptom, which is what documenting an example (or many examples) provides.
What we need is a discussion around WHY it’s not possible or practical to
prevent unintentional route leaks with existing or proposed (BGPSec) tools
- i.e. can’t know intent and/or may not be able to represent intent in
existing policy language such that it can be derived from available info.

>We didn't say we'd proclaim all is accomplished, we said we'd like to
>foster discussions of policy v. intent.  This very discussion makes me
>think it works,
Well, yes, the words “policy” and “intent” did occur more than once, so I
guess that’s a discussion in the strictest sense of the word. However I
don’t think that it’s been adequately covered in the document even to the
point that it would spur a follow-on document. And though it might seem
otherwise, IETF shouldn’t be generating documents for the sake of having
documents. I don’t see any reason why the discussion of some of the
challenges around this problem should be punted to a separate
document/discussion. Put another way, I don’t think that this document has
enough meat to stand alone with just the example of the problem.

>we can certainly encourage more folks to do research, with a stable
>reference, which was precisely the intent.
>
>This draft is only meant
>to document the issue above, which you seem to agree that no one would
>dispute.  It doesn't need to be the kitchen sink for attack vectors.
I’m not suggesting that it needs to be the kitchen sink for attack
vectors. I’m suggesting that it needs to discuss this *one* more
thoroughly, such that folks can actually understand the underlying
challenge about why it hasn’t already been addressed and still exists as a
real problem in the wild. That will be significantly more helpful if folks
are to do research into solutions, or even see if data analysis can lead
to a way to derive things like intent and policy more effectively.

> We should document what some
>believe the problems are before we begin designing solutions, else we'll
>end up with more complicated solutions that don't address what me
>operators believe to be the key issues.

Yes. That’s what I’m asking you to do. I’m not asking for you to design a
solution, but discussing existing solutions that don’t work, and why they
don’t work helps to more completely define the problem. I consider that a
key issue that the document currently does not discuss.

Thanks
Wes


This E-mail and any of its attachments may contain Time Warner Cable proprietary information, which is privileged, confidential, or subject to copyright belonging to Time Warner Cable. This E-mail is intended solely for the use of the individual or entity to which it is addressed. If you are not the intended recipient of this E-mail, you are hereby notified that any dissemination, distribution, copying, or action taken in relation to the contents of and attachments to this E-mail is strictly prohibited and may be unlawful. If you have received this E-mail in error, please notify the sender immediately and permanently delete the original and any copy of this E-mail and any printout.