Re: [RPSEC] BGP Security Requirements v08
Curtis Villamizar <curtis@occnc.com> Wed, 18 July 2007 16:56 UTC
Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
by megatron.ietf.org with esmtp (Exim 4.43)
id 1IBCpU-0002OF-4E; Wed, 18 Jul 2007 12:56:48 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43)
id 1IBCpS-0002O6-G1
for rpsec-confirm+ok@megatron.ietf.org; Wed, 18 Jul 2007 12:56:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.43) id 1IBCpS-0002Ny-6Y
for rpsec@ietf.org; Wed, 18 Jul 2007 12:56:46 -0400
Received: from 69.37.59.172.adsl.snet.net ([69.37.59.172]
helo=harbor.brookfield.occnc.com)
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IBCpQ-0006jj-T5
for rpsec@ietf.org; Wed, 18 Jul 2007 12:56:46 -0400
Received: from harbor.brookfield.occnc.com (harbor.brookfield.occnc.com
[69.37.59.172])
by harbor.brookfield.occnc.com (8.13.6/8.13.6) with ESMTP id
l6IGtc1o026662; Wed, 18 Jul 2007 12:55:39 -0400 (EDT)
(envelope-from curtis@harbor.brookfield.occnc.com)
Message-Id: <200707181655.l6IGtc1o026662@harbor.brookfield.occnc.com>
To: Tony Tauber <ttauber@1-4-5.net>
From: Curtis Villamizar <curtis@occnc.com>
Subject: Re: [RPSEC] BGP Security Requirements v08
In-reply-to: Your message of "Tue, 17 Jul 2007 09:32:43 PDT."
<20070717163243.GB1426@1-4-5.net>
Date: Wed, 18 Jul 2007 12:55:38 -0400
X-Spam-Score: 1.7 (+)
X-Scan-Signature: fb6060cb60c0cea16e3f7219e40a0a81
Cc: rpsec@ietf.org, Stephen Kent <kent@bbn.com>,
Sandy Murphy <sandy@tislabs.com>
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: curtis@occnc.com
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>,
<mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>,
<mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org
In message <20070717163243.GB1426@1-4-5.net> Tony Tauber writes: > > > What meaning a receiving AS might assign to a partially authenticated > piece of data is left up to that AS (keeping in the spirit of autonomy). > > Certainly one can envision an attack which exposes the authenticated > origin info but which nefariously removes intervening hops to draw in > traffic improperly (e.g., to inspect, alter, or drop). You could imagine that but ... The major ISPs have important major customers and peer. For example they would not want their routing corrupted by a bad route to a major content provider. Therefore many major providers will only accept these major customer and peer routes from a very limited set of ISPs. In order to get a short enough AS Path to have an effect on those routes, you'd need to first break into the ISP infrastructure. Then there are routes farther away. For example, a few AS hops might be required to reach a destination in Europe from the US. If the AS in between have both secure infrastructure and reasonable route policy for any major European customer or peer the same situation exists. This is why in theory a man-in-th-middle could inject bad information but in practice it can't happen for most "important" routes (ones that the ISPs consider most important because they are big paying customers or having bad routes to them would be a significant disruption and embarasement). Add some authentication and you may have further improviment in the reliability of routing information. Don't allow that to cross the major ISPs and the authenticaion is of very little use for ISPs. A small ISP in the far reaches (less developed world, for example) may get better connectivity and immunity from injection of bad routing information for their own routes if they provide authenticaion on routes they originate, register their routes for policy verification by other ISPs, and check authentication and registration of routes they receive. The standard routing and security hygene also applies. > > >I believe that you are arguing whether solutions should be REQUIRED > > >to provide benefit when island hopping. And Curtis is arguing that > > >they should, because otherwise incremental deployment will be very > > >very unattractive. > > > > > >The choices seem to boil down to MUST or SHOULD. > > > > Or a MUST/SHOULD vs. MAY. > > Right, based on the discussion thus far, I was leaning toward keeping > the idea in as a MAY. One might argue that doing so is effectively the > same as leaving it out altogether, but the intention and information is > retained. Beyond that, asserting it as a "MAY" explicitly blocks any > interpretation which ends in "... NOT". > > Tony The MAY or SHOULD words MUST apply only to decisions regarding deployment (MAY use some featured, SHOULD use some feature, MAY or SHOULD pass some information ...). In the requirements the word MUST has to be applied to protocol definitions and protocol implementations or at the very least a SHOULD with very strong emphasis. Curtis _______________________________________________ RPSEC mailing list RPSEC@ietf.org https://www1.ietf.org/mailman/listinfo/rpsec
- [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- RE: [RPSEC] BGP Security Requirements v08 Barry Greene (bgreene)
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- RE: [RPSEC] BGP Security Requirements v08 Barry Greene (bgreene)
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Michael H. Behringer
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Robert Loomans
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- RE: [RPSEC] BGP Security Requirements v08 James Ko
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 tom.petch
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent