Re: [RPSEC] BGP Security Requirements v08
Stephen Kent <kent@bbn.com> Thu, 19 July 2007 19:13 UTC
Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
by megatron.ietf.org with esmtp (Exim 4.43)
id 1IBbRV-0004Hc-GG; Thu, 19 Jul 2007 15:13:41 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43)
id 1IBbRR-0004FK-PA
for rpsec-confirm+ok@megatron.ietf.org; Thu, 19 Jul 2007 15:13:37 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.43) id 1IBbRR-0004FB-FM
for rpsec@ietf.org; Thu, 19 Jul 2007 15:13:37 -0400
Received: from mx11.bbn.com ([128.33.0.80])
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IBbRP-0007r7-T1
for rpsec@ietf.org; Thu, 19 Jul 2007 15:13:37 -0400
Received: from dhcp89-089-071.bbn.com ([128.89.89.71])
by mx11.bbn.com with esmtp (Exim 4.60) (envelope-from <kent@bbn.com>)
id 1IBbRO-0006za-4w; Thu, 19 Jul 2007 15:13:35 -0400
Mime-Version: 1.0
Message-Id: <p06240501c2c52582b920@[128.89.89.71]>
In-Reply-To: <200707181905.l6IJ5MdD029754@harbor.brookfield.occnc.com>
References: <200707181905.l6IJ5MdD029754@harbor.brookfield.occnc.com>
Date: Thu, 19 Jul 2007 15:03:12 -0400
To: curtis@occnc.com
From: Stephen Kent <kent@bbn.com>
Subject: Re: [RPSEC] BGP Security Requirements v08
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: c83ccb5cc10e751496398f1233ca9c3a
Cc: rpsec@ietf.org
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>,
<mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>,
<mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org
At 3:05 PM -0400 7/18/07, Curtis Villamizar wrote: >In message <p0624050fc2c3ec645621@[128.89.89.71]> >Stephen Kent writes: >> >> >What we are talking about here is prevention of DOS, not protection of >> >secrets. >> >> DoS is the primary concern, but not the only one. Misrouting to >> effect active or passive wiretapping also was cited as a concern in >> RFC 4272 (BGP Security Vulnerabilities Analysis). > > >Steve, > >As a security guy wouldn't you consider relying on routing to protect >secrets to be more than just a slightly bad idea? WRT content disclosure one certainly ought not rely on the path for confidentiality. Hiwever, very little Internet traffic is encrypted today, so it still makes sense to consider this as a valid concern. Moreover, traffic analysis is a confidentiality concern for some folks, e.g., in the DoD. Avoding routes that would cause traffic to pass through an AS where TA might be effected is a reasonable goal as well. >For secure applications you must always assume an insecure channel >even if its in the same building. I have no idea what you're saying above. >With enough snooped data breaking some forms of encryption is >possible so I know what you are getting at. No, you don't :-). >In terms of real world, it might be possible to divert information >that is supposed to go to some major bank from some far away place and >have a go at the SSL encryption but I suspect its orders of magnitudes >easier to take over the client's Windows box and record keystrokes. That's not what I am alluding to, so let's not waste time arguing over what you think I might have said, but didn't really say :-). > > I have to admit that whenever I hear someone argue that a proposed >> security approach is striving for perfection at the expense of >> practicality, I wince. Thus is a reasonable argument in principle, >> but very often folks disagree about what constitutes a practical (or >> impractical) solution, or a what constitutes reasonable threat model, >> etc. So, let;s try to not go down this path as a basis for deciding >> about these requirements, as it is unlikely to be a fruitful wa to >> resolve our disagreements. > >At what point do we set theory aside and look at whether we are >addressing any sort of real world problem? Is your answer "never"? Sounds like you're asking if I have stopped beating my wife yet? :-) SSL/TLS is very widely used, yet it's primary protection is against wiretapping attacks that rarely occur. (It also is supposed to provide authentication that we are connected the the site we think, but the PKI model used with browsers limits the ability to achieve that goal.) In reality, your credit card data is at much greater risk when it arrives at a web server vs. while it is in transit. I believe that the concerns we're addressing here are at least as valid as those addressed by TLS. > > The second argument you cited was not the principle one, but rather >> an example of why mandating this as a requirement might be >> problematic. I think the argument I have made in this and previous >> messages is that there are a number of incremental deployment >> scenarios where the need for the sort of transitive property you cite >> is not needed, and there are scenarios where it could lead to bad >> decisions. > >OK. Lets have some specifics. What deployment scenarios? Where >could transitive behaviour that only applies to selecting among >incompletely authenticated results (and can be administratively >disabled) lead to bad decisions? In a message earlier this week I suggested that a likely deployment scenario might be that big ISPs are the early adopters, followed by their customers. In such instances there are no intermediary ASes to worry about. Your second question seems to be a mix of two things. Let try to re-phrase.: What bad thing might happen if an ISP uses partially verified data to select a path when the only paths he has for the NLRI in question are all unverified? You also add in a parenthetical allusion to the ability to administratively disable something, presumably you mean the ability to turn off checking the verified path data when it is only part of an overall path. A bad thing that might happen is that the ISP might configure the router to automatically prefer any route that has at least SOME verified path components, an easy policy to express, but one that also is naive. Trying to express a more reasonable policy, e.g., one that take into account known "trusted" ASes and a mix of verified and unverified path elements is very complex. We developed a set of policy controls that tried to do this a fee years ago, and decided that the result was so complex as to create more problems than it was worth. We decided that only a simple policy setting, i.e., my peer has security enabled or not, was easy enough to be practical. It seems that many ISPs have trouble predicting the impact of route configuration choices today (c.f. RFC 4264 "BGP Wedgies"). I think it is not unreasonable to extrapolate this sort of experience with complexity to the routing security context and come the the conclusion that we ought not create an environment that makes it likely that folks will have the same problems. Steve _______________________________________________ RPSEC mailing list RPSEC@ietf.org https://www1.ietf.org/mailman/listinfo/rpsec
- [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- RE: [RPSEC] BGP Security Requirements v08 Barry Greene (bgreene)
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- RE: [RPSEC] BGP Security Requirements v08 Barry Greene (bgreene)
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Michael H. Behringer
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Robert Loomans
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- RE: [RPSEC] BGP Security Requirements v08 James Ko
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 tom.petch
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent