Re: [OPSAWG] Paul Wouters' Discuss on draft-ietf-opsawg-9092-update-10: (with DISCUSS and COMMENT)

Randy Bush <randy@psg.com> Wed, 14 February 2024 21:15 UTC

Return-Path: <randy@psg.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A6EAC14F68E; Wed, 14 Feb 2024 13:15:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=psg.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3nXaCHz9J3o9; Wed, 14 Feb 2024 13:15:48 -0800 (PST)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:8006::18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F267C14F5FC; Wed, 14 Feb 2024 13:15:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=psg.com; s=rgnet-mail; h=Content-Type:MIME-Version:References:In-Reply-To:Subject:Cc: To:From:Message-ID:Date:Sender:Reply-To:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=U623w4M7CLVSuVCa6p5YwaeY/jMuml4eHyEfJPMcbNI=; b=QOVQDn07mIxaKe1xOGzvPjgure 9gAHNFEZko966ObBEm2k8LBjQocQ1uldZ2hjtYbTTKZ2ZM2djSCNUlK66QbnSLVOkMXC56Z9eIbJt w/xDDo3Cuj1pJaSnqNG8XYoylHDuvC6Tobj/YGBwHcjsLdAN+VNOk5UNRS01Tkuu3Ve9e08lmY1g5 7SfmmmzCs8/jTY8d02L/o9Y0+lLes++FMEqfaY9SENHNiQ3oICtRUA5Q81ZL6vRrQ3D2uxYMKIrlN V9/c7maDxNGVVXF62jLiIHcvKyBrSr3SZfWll+Bunbth6+BzZOEaCumRTBz6KaOVyNT0sdDZId4Fc A600qRAQ==;
Received: from localhost ([127.0.0.1] helo=ryuu.rg.net) by ran.psg.com with esmtp (Exim 4.95) (envelope-from <randy@psg.com>) id 1raMbY-000MM6-GD; Wed, 14 Feb 2024 21:15:44 +0000
Date: Wed, 14 Feb 2024 13:15:42 -0800
Message-ID: <m2sf1ulpc1.wl-randy@psg.com>
From: Randy Bush <randy@psg.com>
To: Russ Housley <housley@vigilsec.com>
Cc: Paul Wouters <paul.wouters@aiven.io>, IESG <iesg@ietf.org>, draft-ietf-opsawg-9092-update@ietf.org, opsawg-chairs@ietf.org, Ops Area WG <opsawg@ietf.org>, mcr+ietf@sandelman.ca
In-Reply-To: <E75F2235-A91D-40D3-A1E5-AA6EB30FCA4F@vigilsec.com>
References: <170784829052.7939.16825522646369028165@ietfa.amsl.com> <E75F2235-A91D-40D3-A1E5-AA6EB30FCA4F@vigilsec.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/27.2 Mule/6.0
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/5P5ySXtEP11nSB2d3uCv1BBF6gE>
Subject: Re: [OPSAWG] Paul Wouters' Discuss on draft-ietf-opsawg-9092-update-10: (with DISCUSS and COMMENT)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Feb 2024 21:15:53 -0000

> Suggested edits:
> 
>    The address range of the signing certificate MUST cover all prefixes
>    in the signed geofeed file.  If not, the authenticator is invalid.
> 
>    The signing certificate MUST NOT include the Autonomous System
>    Identifier Delegation certificate extension [RFC3779]. If it is
>    present, the authenticator is invalid.
> 
>    As with many other RPKI signed objects, the IP Address Delegation
>    certificate extension MUST NOT use the "inherit" capability defined
>    in Section 2.2.3.5 of [RFC3779].  If "inherit" is used, the
>    authenticator is invalid.

sure

>    The consumer of geofeed data SHOULD fetch and process the data
>    themselves.  Importing datasets produced and/or processed by a third-
>    party places significant trust in the third-party.

this is in sec cons already.  you want it moved up or duplicated?  i
kinda like it where it is, but am flexible.

> I think is is probably better to drop the following from Section 6:
> 
>    When using data from a geofeed file, one MUST ignore data outside the
>    referring inetnum: object's inetnum: attribute address range.

this is meant for an unsigned file.  e.g. multiple diverse inetnum:s
refer to the single geofeed file https://rg.net/geofeed.  it allows an
operator not signing to maintain one file.

all geofeeds are not signed for a number of reasons

  o rpki data may not exist for some, cf. decades of difficulty getting
    rpki allowed by all RIRs.  plus, you do not really want to tie the
    two operational processes together.

  o geofeed data are not critical.  they just hints to geoloc obsessed
    content providers

randy