Re: [RPSEC] BGP Security Requirements v08

Curtis Villamizar <curtis@occnc.com> Wed, 18 July 2007 16:56 UTC

Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBCpU-0002OF-4E; Wed, 18 Jul 2007 12:56:48 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43) id 1IBCpS-0002O6-G1 for rpsec-confirm+ok@megatron.ietf.org; Wed, 18 Jul 2007 12:56:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBCpS-0002Ny-6Y for rpsec@ietf.org; Wed, 18 Jul 2007 12:56:46 -0400
Received: from 69.37.59.172.adsl.snet.net ([69.37.59.172] helo=harbor.brookfield.occnc.com) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IBCpQ-0006jj-T5 for rpsec@ietf.org; Wed, 18 Jul 2007 12:56:46 -0400
Received: from harbor.brookfield.occnc.com (harbor.brookfield.occnc.com [69.37.59.172]) by harbor.brookfield.occnc.com (8.13.6/8.13.6) with ESMTP id l6IGtc1o026662; Wed, 18 Jul 2007 12:55:39 -0400 (EDT) (envelope-from curtis@harbor.brookfield.occnc.com)
Message-Id: <200707181655.l6IGtc1o026662@harbor.brookfield.occnc.com>
To: Tony Tauber <ttauber@1-4-5.net>
From: Curtis Villamizar <curtis@occnc.com>
Subject: Re: [RPSEC] BGP Security Requirements v08
In-reply-to: Your message of "Tue, 17 Jul 2007 09:32:43 PDT." <20070717163243.GB1426@1-4-5.net>
Date: Wed, 18 Jul 2007 12:55:38 -0400
X-Spam-Score: 1.7 (+)
X-Scan-Signature: fb6060cb60c0cea16e3f7219e40a0a81
Cc: rpsec@ietf.org, Stephen Kent <kent@bbn.com>, Sandy Murphy <sandy@tislabs.com>
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: curtis@occnc.com
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org

In message <20070717163243.GB1426@1-4-5.net>
Tony Tauber writes:
>  
>  
> What meaning a receiving AS might assign to a partially authenticated
> piece of data is left up to that AS (keeping in the spirit of autonomy).
>  
> Certainly one can envision an attack which exposes the authenticated
> origin info but which nefariously removes intervening hops to draw in
> traffic improperly (e.g., to inspect, alter, or drop).


You could imagine that but ...

The major ISPs have important major customers and peer.  For example
they would not want their routing corrupted by a bad route to a major
content provider.  Therefore many major providers will only accept
these major customer and peer routes from a very limited set of ISPs.

In order to get a short enough AS Path to have an effect on those
routes, you'd need to first break into the ISP infrastructure.

Then there are routes farther away.  For example, a few AS hops might
be required to reach a destination in Europe from the US.  If the AS
in between have both secure infrastructure and reasonable route policy
for any major European customer or peer the same situation exists.

This is why in theory a man-in-th-middle could inject bad information
but in practice it can't happen for most "important" routes (ones that
the ISPs consider most important because they are big paying customers
or having bad routes to them would be a significant disruption and
embarasement).

Add some authentication and you may have further improviment in the
reliability of routing information.  Don't allow that to cross the
major ISPs and the authenticaion is of very little use for ISPs.

A small ISP in the far reaches (less developed world, for example) may
get better connectivity and immunity from injection of bad routing
information for their own routes if they provide authenticaion on
routes they originate, register their routes for policy verification
by other ISPs, and check authentication and registration of routes
they receive.  The standard routing and security hygene also applies.


> > >I believe that you are arguing whether solutions should be REQUIRED
> > >to provide benefit when island hopping.  And Curtis is arguing that
> > >they should, because otherwise incremental deployment will be very
> > >very unattractive.
> > >
> > >The choices seem to boil down to MUST or SHOULD.
> > 
> > Or a MUST/SHOULD vs. MAY.
>  
> Right, based on the discussion thus far, I was leaning toward keeping
> the idea in as a MAY.  One might argue that doing so is effectively the
> same as leaving it out altogether, but the intention and information is
> retained.  Beyond that, asserting it as a "MAY" explicitly blocks any
> interpretation which ends in "... NOT".
>  
> Tony


The MAY or SHOULD words MUST apply only to decisions regarding
deployment (MAY use some featured, SHOULD use some feature, MAY or
SHOULD pass some information ...).

In the requirements the word MUST has to be applied to protocol
definitions and protocol implementations or at the very least a SHOULD
with very strong emphasis.

Curtis


_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www1.ietf.org/mailman/listinfo/rpsec