Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

Danny McPherson <danny@tcb.net> Tue, 20 May 2014 01:02 UTC

Return-Path: <danny@tcb.net>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7C801A045B for <grow@ietfa.amsl.com>; Mon, 19 May 2014 18:02:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.851
X-Spam-Level:
X-Spam-Status: No, score=-99.851 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RP_MATCHES_RCVD=-0.651, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7wpF6gFFFkTx for <grow@ietfa.amsl.com>; Mon, 19 May 2014 18:02:55 -0700 (PDT)
Received: from mail.tcb.net (mail.tcb.net [64.78.239.70]) by ietfa.amsl.com (Postfix) with ESMTP id 72B691A045A for <grow@ietf.org>; Mon, 19 May 2014 18:02:55 -0700 (PDT)
Received: from dspam (unknown [127.0.0.1]) by mail.tcb.net (Postfix) with SMTP id 4717D300098 for <grow@ietf.org>; Tue, 20 May 2014 01:02:55 +0000 (UTC)
Received: from [192.168.1.8] (pool-98-118-253-16.clppva.fios.verizon.net [98.118.253.16]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mail.tcb.net (Postfix) with ESMTPSA id 9D362300090; Mon, 19 May 2014 19:02:53 -0600 (MDT)
Content-Type: multipart/signed; boundary="Apple-Mail=_ADAC644E-2C18-444C-8933-2F15C3510C33"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Danny McPherson <danny@tcb.net>
In-Reply-To: <EFD759C6-6F35-4397-A27E-BF1E650663BC@tislabs.com>
Date: Mon, 19 May 2014 21:02:52 -0400
Message-Id: <34076248-B77A-418F-9ED2-E5A607D39B51@tcb.net>
References: <CAL9jLabRKA2gezfRdzND1TSYMJO+a_4mVV+M302cLBFTUwYmTQ@mail.gmail.com> <CF96AEDB.1B684%wesley.george@twcable.com> <CAL9jLaZ9J52Dt5n1Wk2KYTqwzmefGxvq-bRcfMfhWBNwf_6ZGg@mail.gmail.com> <EFD759C6-6F35-4397-A27E-BF1E650663BC@tislabs.com>
To: Sandra Murphy <sandy@tislabs.com>
X-Mailer: Apple Mail (2.1874)
X-DSPAM-Result: Innocent
X-DSPAM-Processed: Mon May 19 19:02:55 2014
X-DSPAM-Confidence: 0.9899
X-DSPAM-Improbability: 1 in 9809 chance of being spam
X-DSPAM-Probability: 0.0000
X-DSPAM-Signature: 537aa9bf42072980719636
X-DSPAM-Factors: 27, a+real, 0.01000, Cc*ietf.org+grow, 0.01000, Cc*ietf.org+grow, 0.01000, Mime-Version*OS+X, 0.01000, Cc*ietf.org+#+ietf.org, 0.01000, Cc*ietf.org+#+ietf.org, 0.01000, Subject*Re+#+WGLC, 0.01000, Mime-Version*X+#+#+1874, 0.01000, a+solution, 0.01000, a+solution, 0.01000, a+#+to, 0.01000, Mime-Version*Mac+#+#+#+7.2, 0.01000, Mime-Version*Mail+#+1874, 0.01000, is+#+to, 0.01000, to+#+a, 0.01000, Cc*grow+#+#+ietf.org, 0.01000, Cc*grow+#+#+ietf.org, 0.01000, Mime-Version*OS+#+#+7.2, 0.01000, On+May, 0.01000, On+#+#+2014, 0.01000, Subject*Re+#+#+draft-ietf-grow-simple-leak-attack-bgpsec-no-help, 0.01000, Mime-Version*Mail+7.2, 0.01000, some+#+the, 0.01000, Mime-Version*1.0+Mac, 0.01000, the+#+of, 0.01000, in+the, 0.01000, in+the, 0.01000
Archived-At: http://mailarchive.ietf.org/arch/msg/grow/lSu5MYtnyVVqnlJxDESJxOtUYEs
Cc: grow-chairs@ietf.org, "grow@ietf.org grow@ietf.org" <grow@ietf.org>
Subject: Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 May 2014 01:02:58 -0000

[top post only]

Good point Sandy, this was definitely meant to serve as more of a motivation, illustrating a real problem that smart people should focus on because it happens all the time and some real heavy solutions being consider wholly ignore it.  Quibbling about “definitions” that satisfy those in the know (some of which are heavily invested in solutions that don’t consider this an issue) at this stage is likely futile, and I’d at least be happy just publishing this as a “motivational” and if it only collects dust, so be it..

-danny


On May 16, 2014, at 11:59 PM, Sandra Murphy <sandy@tislabs.com> wrote:
> 
> Sort of a late reply to this, but…
> 
> The draft's simple example of this behavior serves as a way to frame its discussion of some of the problems that can result.  But it does not produce a definition.  If that was the wg's purpose for this document, then this doesn't suit.
> 
> The draft itself says that it is not intended to provide a definition:
> 
>   While the formal definition of a 'route-leak' has proven elusive in
>   literature, the rampant occurrence and persistent operational threats
>   have proven to be anything but uncommon.  This document is intended
>   to serve as a proof of existence for the referenced attack vector and
>   any supplementary formal models are left for future work.
> 
> As a motivating example, this draft works.  As a definition of what is and is not a route leak, it does not.
> 
> I suspect if an explicit definition is not worked out now, it will get worked out in the middle of trying to work out a solution, which will be very messy.  It is always hard to work toward a solution when you aren't working from a common understanding of what you are solving.
> 
> --Sandy
> _______________________________________________
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
>