Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

Sandra Murphy <sandy@tislabs.com> Sat, 17 May 2014 03:59 UTC

Return-Path: <sandy@tislabs.com>
X-Original-To: grow@ietfa.amsl.com
Delivered-To: grow@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 989D91A005E; Fri, 16 May 2014 20:59:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.552
X-Spam-Level:
X-Spam-Status: No, score=-2.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8JtqDCLcqhR8; Fri, 16 May 2014 20:59:14 -0700 (PDT)
Received: from walnut.tislabs.com (walnut.tislabs.com [192.94.214.200]) by ietfa.amsl.com (Postfix) with ESMTP id DB0251A0045; Fri, 16 May 2014 20:59:13 -0700 (PDT)
Received: from nova.tislabs.com (unknown [10.66.1.77]) by walnut.tislabs.com (Postfix) with ESMTP id 3680C28B0041; Fri, 16 May 2014 23:59:06 -0400 (EDT)
Received: from [127.0.0.1] (localhost.localdomain [127.0.0.1]) by nova.tislabs.com (Postfix) with ESMTP id 2737C1F8032; Fri, 16 May 2014 23:59:04 -0400 (EDT)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\))
From: Sandra Murphy <sandy@tislabs.com>
In-Reply-To: <CAL9jLaZ9J52Dt5n1Wk2KYTqwzmefGxvq-bRcfMfhWBNwf_6ZGg@mail.gmail.com>
Date: Fri, 16 May 2014 23:59:06 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <EFD759C6-6F35-4397-A27E-BF1E650663BC@tislabs.com>
References: <CAL9jLabRKA2gezfRdzND1TSYMJO+a_4mVV+M302cLBFTUwYmTQ@mail.gmail.com> <CF96AEDB.1B684%wesley.george@twcable.com> <CAL9jLaZ9J52Dt5n1Wk2KYTqwzmefGxvq-bRcfMfhWBNwf_6ZGg@mail.gmail.com>
To: Christopher Morrow <christopher.morrow@gmail.com>
X-Mailer: Apple Mail (2.1510)
Archived-At: http://mailarchive.ietf.org/arch/msg/grow/pKiJsV-mDBadSS6NYDtwcczLJXI
Cc: grow-chairs@ietf.org, "grow@ietf.org grow@ietf.org" <grow@ietf.org>
Subject: Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help
X-BeenThere: grow@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Grow Working Group Mailing List <grow.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/grow>, <mailto:grow-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/grow/>
List-Post: <mailto:grow@ietf.org>
List-Help: <mailto:grow-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/grow>, <mailto:grow-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 17 May 2014 03:59:15 -0000

On May 12, 2014, at 11:35 PM, Christopher Morrow <christopher.morrow@gmail.com> wrote:

>> 
>> This document provides no actionable guidance beyond articulating the
>> basics of the attack, certainly no meaningful discussion of policy vs
>> intent other than to note that discerning intent is difficult, and as such
> 
> possibly the authors are aiming at just defining what a leak is (one
> example type) so discussions can progress beyond 'what is a route leak
> again? can you point me at an RFC/definition of same?'
> 
> I think this was part of the impetus for the document, or that's what I recall.

Sort of a late reply to this, but…

The draft's simple example of this behavior serves as a way to frame its discussion of some of the problems that can result.  But it does not produce a definition.  If that was the wg's purpose for this document, then this doesn't suit.

The draft itself says that it is not intended to provide a definition:

   While the formal definition of a 'route-leak' has proven elusive in
   literature, the rampant occurrence and persistent operational threats
   have proven to be anything but uncommon.  This document is intended
   to serve as a proof of existence for the referenced attack vector and
   any supplementary formal models are left for future work.

As a motivating example, this draft works.  As a definition of what is and is not a route leak, it does not.

I suspect if an explicit definition is not worked out now, it will get worked out in the middle of trying to work out a solution, which will be very messy.  It is always hard to work toward a solution when you aren't working from a common understanding of what you are solving.

--Sandy