Re: [RPSEC] BGP Security Requirements v08

Curtis Villamizar <curtis@occnc.com> Wed, 18 July 2007 16:33 UTC

Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBCSy-0007Ly-0E; Wed, 18 Jul 2007 12:33:32 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43) id 1IBCSw-0007Jd-II for rpsec-confirm+ok@megatron.ietf.org; Wed, 18 Jul 2007 12:33:30 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBCSw-0007JV-7T for rpsec@ietf.org; Wed, 18 Jul 2007 12:33:30 -0400
Received: from 69.37.59.172.adsl.snet.net ([69.37.59.172] helo=harbor.brookfield.occnc.com) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IBCSu-0007I1-Od for rpsec@ietf.org; Wed, 18 Jul 2007 12:33:30 -0400
Received: from harbor.brookfield.occnc.com (harbor.brookfield.occnc.com [69.37.59.172]) by harbor.brookfield.occnc.com (8.13.6/8.13.6) with ESMTP id l6IGY7h1026467; Wed, 18 Jul 2007 12:34:07 -0400 (EDT) (envelope-from curtis@harbor.brookfield.occnc.com)
Message-Id: <200707181634.l6IGY7h1026467@harbor.brookfield.occnc.com>
To: sandy@tislabs.com (Sandy Murphy)
From: Curtis Villamizar <curtis@occnc.com>
Subject: Re: [RPSEC] BGP Security Requirements v08
In-reply-to: Your message of "Tue, 17 Jul 2007 11:55:19 EDT." <20070717155519.EBC053F47D@pecan.tislabs.com>
Date: Wed, 18 Jul 2007 12:34:07 -0400
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 3002fc2e661cd7f114cb6bae92fe88f1
Cc: rpsec@ietf.org
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: curtis@occnc.com
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org

In message <20070717155519.EBC053F47D@pecan.tislabs.com>
Sandy Murphy writes:
>  
> Curtis writes:
> >In message <p06240507c2c167b442a1@[128.89.89.71]>
> >Stephen Kent writes:
> >>  
> >> I think the question is why, if the path info received by an "island 
> >> AS" has a number of unverified hops, is this path info useful, in a 
> >> security sense, to the AS that receives? How does the requirement to 
> >> send such info promote adoption of the protocol?
> >>  
> >> Steve
> >
> >
> >Because it is likely to be more reliable than information with no
> >authentication at all.
> >
> >The major ISPs are fairly reliable at getting their internal routing
> >right so if the non-authenticating routers in the middle are entirely
> >in a set of ISPs that are known to generally not have breakins into
> >their own infrastructure.
>  
> Curtis, I'm not sure exactly what you mean here, but Steve was talking
> about AS hops, not router hops.  I *think* that's what you mean, also,
> but I'm not sure.

What I meant is that 1) major ISPs do a very good job of filtering
customer routes and not originating bogus information into the global
BGP routing and 2) major ISP security is good enough that it is very
hard for an attacker to inject BGP information into an ISP from within
the ISP's own infrastructure.

That Internet routing for the most part works is partially due to the
above and that places where this is not true are enough AS hops away
from the major ISPs that bogus information is localized to those far
reaches that may be a little behind on the operations learning curve.

> Steve, I strongly believe that incremental deployment scenarios WILL
> include cases where non-upgradable ASs will be provided with other,
> operational or algorithmic, protections, so that ISPs in the know will
> trust paths that come to them from those ASs.  I am less strongly
> convinced that incremental deployment scenarios MUST include such cases.
> But I see no way to provide benefit in incremental deployment otherwise.
>  
> I do not think that you are saying that solutions COULD NOT provide
> benefit when island hopping.  The work being done in the sidr wg
> (to provide an infrastructure that would provide authorization for
> prefix origination) would be an example of protections that would
> still provide benefit when island hopping, as the origin authorization
> check is of value no matter how many clueless ASs touch the UPDATE.
>  
> I believe that you are arguing whether solutions should be REQUIRED
> to provide benefit when island hopping.  And Curtis is arguing that
> they should, because otherwise incremental deployment will be very
> very unattractive.
>  
> The choices seem to boil down to MUST or SHOULD.
>  
> --Sandy

IMO if we are down to SHOULD and MUST:

  The protocol MUST support a mechanism ... [to connect islands, sic]

  The protocol MUST keep authentication information reasonable small.
  If that information needs to be large in order to be robust, then
  the protocol SHOULD provide an alternate smaller digest that is less
  likely to get tossed.

  ISPs SHOULD try to pass information to non-authenticating peers.

  ISPs SHOULD prefer information from a subset or trustworthy
  non-authenticating peer AS with partial authentication covering all
  less known AS over information where untrusted non-authenticating AS
  are in the path.

  Non-authenticating AS should pass the authentication information
  unchanged unless doing so is infeasible due to router memory
  constraints.

This needs rewording but I hope its clear enough for discussion.

Curtis


_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www1.ietf.org/mailman/listinfo/rpsec