RE: [RPSEC] Re: draft-convery-bgpattack-00

Randy Bush <randy@psg.com> Fri, 08 November 2002 17:20 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA29510 for <rpsec-archive@odin.ietf.org>; Fri, 8 Nov 2002 12:20:26 -0500 (EST)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id gA8HMUP12914 for rpsec-archive@odin.ietf.org; Fri, 8 Nov 2002 12:22:30 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id gA8HMUv12911 for <rpsec-web-archive@optimus.ietf.org>; Fri, 8 Nov 2002 12:22:30 -0500
Received: from www1.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA29471 for <rpsec-web-archive@ietf.org>; Fri, 8 Nov 2002 12:19:52 -0500 (EST)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id gA8HM6v12874; Fri, 8 Nov 2002 12:22:06 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id gA8HLAv12792 for <rpsec@optimus.ietf.org>; Fri, 8 Nov 2002 12:21:10 -0500
Received: from rip.psg.com (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA29386 for <rpsec@ietf.org>; Fri, 8 Nov 2002 12:18:35 -0500 (EST)
Received: from localhost ([127.0.0.1] helo=rip.psg.com.psg.com) by rip.psg.com with esmtp (Exim 4.10) id 18ACob-000DkW-00; Fri, 08 Nov 2002 09:21:05 -0800
From: Randy Bush <randy@psg.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
To: "Joel M. Halpern" <joel@stevecrocker.com>
Cc: rpsec@ietf.org
Subject: RE: [RPSEC] Re: draft-convery-bgpattack-00
References: <20021106171433.J58530-100000@sequoia.muada.com> <5.1.0.14.0.20021107220526.02713900@mail.stevecrocker.com>
Message-Id: <E18ACob-000DkW-00@rip.psg.com>
Date: Fri, 08 Nov 2002 09:21:05 -0800
Content-Transfer-Encoding: 7bit
Sender: rpsec-admin@ietf.org
Errors-To: rpsec-admin@ietf.org
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit

> 1) An approach that attempts to comprehensively provide security for BGP
> 2) An approach that for deployment probably requires significant 
> enhancements in the actual routing hardware (storage, increased memory, 
> crypto hardware).
> 
> It seems this overlooks several things:
> A) The indications are that operators are not interested in (or possibly 
> even capable of) deploying solutions with this complexity
> B) We could probably get a lot of coverage (but not as complete) with a 
> much simpler solution or set of solutions.
> C) Securing BGP this carefully when the rest of the infrastructure is 
> completely insecure seems almost counter-productive.
> 
> Note that currently many operators do not deploy source address
> filtering, or even martian address filtering with their
> customers.  And that is only the tip of the iceberg of simple
> things that need to be done.  It would seem that whatever energy
> it would take to even begin serious development and deployment of
> S-BGP could be much better spent getting some of the simple steps
> that are necessary deployed.  Then we could examine again to
> determine what makes sense to do next based on that experience.

what this analysis omits is what we will have to do in a month or
three years when we get _serious_ widespread routing attacks [0].
as serious defense will, as you well point out, take some time to
deploy, it seems prudent to start now, rather than have a large
window of major problems while we deploy too late.

randy

---

[0] - note that we have already seen real non-trivial routing
      attacks.  folk just don't talk about them in public.

_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www1.ietf.org/mailman/listinfo/rpsec