Re: [Idr] I-D Action: draft-ietf-idr-next-hop-capability-03.txt

<bruno.decraene@orange.com> Thu, 05 July 2018 15:53 UTC

Return-Path: <bruno.decraene@orange.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0070B130ED9 for <idr@ietfa.amsl.com>; Thu, 5 Jul 2018 08:53:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dWztLW6yStnp for <idr@ietfa.amsl.com>; Thu, 5 Jul 2018 08:53:47 -0700 (PDT)
Received: from orange.com (mta239.mail.business.static.orange.com [80.12.66.39]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9933130EDA for <idr@ietf.org>; Thu, 5 Jul 2018 08:53:46 -0700 (PDT)
Received: from opfedar01.francetelecom.fr (unknown [xx.xx.xx.2]) by opfedar22.francetelecom.fr (ESMTP service) with ESMTP id 41M2TP3Fb2z308p; Thu, 5 Jul 2018 17:53:45 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.62]) by opfedar01.francetelecom.fr (ESMTP service) with ESMTP id 41M2TP2MByzBrLQ; Thu, 5 Jul 2018 17:53:45 +0200 (CEST)
Received: from OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06]) by OPEXCLILM5E.corporate.adroot.infra.ftgroup ([fe80::6958:931c:a396:f51e%19]) with mapi id 14.03.0399.000; Thu, 5 Jul 2018 17:53:45 +0200
From: bruno.decraene@orange.com
To: Randy Bush <randy@psg.com>
CC: Interminable Discussion Room <idr@ietf.org>
Thread-Topic: [Idr] I-D Action: draft-ietf-idr-next-hop-capability-03.txt
Thread-Index: AQHUD7tjV9AUMg5HA0yhNHH3IN7qaKSAzjSg
Date: Thu, 05 Jul 2018 15:53:44 +0000
Message-ID: <11040_1530806025_5B3E3F09_11040_342_3_53C29892C857584299CBF5D05346208A47AE004D@OPEXCLILM21.corporate.adroot.infra.ftgroup>
References: <153008684965.15406.536825824891886594@ietfa.amsl.com> <m2o9fvptr9.wl-randy@psg.com> <19553_1530173556_5B349874_19553_6_1_53C29892C857584299CBF5D05346208A47AB766D@OPEXCLILM21.corporate.adroot.infra.ftgroup> <m2h8lmq4rl.wl-randy@psg.com> <32389_1530204755_5B351253_32389_173_1_53C29892C857584299CBF5D05346208A47AB8A0A@OPEXCLILM21.corporate.adroot.infra.ftgroup> <m2r2kqo4rs.wl-randy@psg.com> <6235_1530257497_5B35E059_6235_365_1_53C29892C857584299CBF5D05346208A47AB997A@OPEXCLILM21.corporate.adroot.infra.ftgroup> <m24lhlocfv.wl-randy@psg.com>
In-Reply-To: <m24lhlocfv.wl-randy@psg.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.168.234.4]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/0o3l_4PR4BGgm6PpCjcE-7Qt6vo>
Subject: Re: [Idr] I-D Action: draft-ietf-idr-next-hop-capability-03.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jul 2018 15:54:02 -0000

Randy,

Thanks for taking the time for the suggestion.
More inline

> From: Randy Bush [mailto:randy@psg.com]
 > Sent: Friday, June 29, 2018 5:11 PM
> 
 > mornin' bruno,
 > 
 > > I generally agree that there are cases where you don't trust the
 > > source of the information. In such case, you can filter it a priori or
 > > a posteriori.  That doesn't mean that the ability to share an
 > > information is bad.
 > 
 > then make clear what the boundaries are and how to ameliorate this
 > exposure.  the example from ov-signal's sec cons specifically mandates
 > the defense.

Thanks for the useful example. I've also looked at a recent RFC which has passed security review: BGP Large Community.
https://tools.ietf.org/html/rfc8092#section-7

Based on this, as of today, I'd propose the following text:

This document does not introduce new security vulnerabilities in BGP. Specifically, an operator who is relying on the information carried
   in BGP must have a transitive trust relationship back to the source of the information. Specifying the mechanism(s) to provide such a
   relationship is beyond the scope of this document. Please refer to the Security Considerations section of <xref target="RFC4271"></xref> for security mechanisms applicable to BGP.
As this attribute is removed when the BGP Next-Hop is changed, the source of the information is the router which IP address is indicated in the BGP Next-Hop. Such Next-Hop is typically either within the AS when a BGP Next-Hop Self policy is configured, or in the neighboring AS with which an interconnection and an EBGP has been established. If this neighboring AS is not trusted with regards to information carried in the BGP attribute, or carried in a specific capability, this attribute or specific capability should be removed when received. Note that in some cases, this Next-Hop may advertise information based on information it has received from its own downstream BGP Next-Hop, hence the transitive trust relationship. If the underlying transport between both ASes is not trusted, BGP transport should be protected for integrity and authentification
The advertisement of BGP Next-Hop capabilities to EBGP peers may disclose, to the peer AS, some capabilities of the BGP node and may help fingerprinting its hardware model and software version. This may be mitigated by filtering the capability advertised to EBGP peers.
Security of the Entropy Label capability advertisement is unchanged compared to  <xref target="RFC6790"></xref> which originally defined this signaling.




Also, as per the IDR requirement for 2 implementations, I don't expect this document to be sent to the IESG in the short term. Since then, I would expect improvement in term of BGP security consideration. e.g. improved transport security, guidance on BGP security considerations. 

Thanks,
--Bruno
 
 > randy

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.