Re: [RPSEC] BGP Security Requirements v08
Stephen Kent <kent@bbn.com> Tue, 17 July 2007 15:15 UTC
Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
by megatron.ietf.org with esmtp (Exim 4.43)
id 1IAolv-0008Kj-4f; Tue, 17 Jul 2007 11:15:31 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43)
id 1IAolu-0008KV-CQ
for rpsec-confirm+ok@megatron.ietf.org; Tue, 17 Jul 2007 11:15:30 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.43) id 1IAolu-0008KN-2u
for rpsec@ietf.org; Tue, 17 Jul 2007 11:15:30 -0400
Received: from mx11.bbn.com ([128.33.0.80])
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IAolt-0003Aj-QS
for rpsec@ietf.org; Tue, 17 Jul 2007 11:15:30 -0400
Received: from dhcp89-089-071.bbn.com ([128.89.89.71])
by mx11.bbn.com with esmtp (Exim 4.60) (envelope-from <kent@bbn.com>)
id 1IAols-0002aN-3t; Tue, 17 Jul 2007 11:15:29 -0400
Mime-Version: 1.0
Message-Id: <p0624051cc2c286f29523@[128.89.89.71]>
In-Reply-To: <200707171426.l6HEQJiK090507@harbor.brookfield.occnc.com>
References: <200707171426.l6HEQJiK090507@harbor.brookfield.occnc.com>
Date: Tue, 17 Jul 2007 11:09:48 -0400
To: curtis@occnc.com
From: Stephen Kent <kent@bbn.com>
Subject: Re: [RPSEC] BGP Security Requirements v08
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: d0bdc596f8dd1c226c458f0b4df27a88
Cc: rpsec@ietf.org, Russ White <riw@cisco.com>
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>,
<mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>,
<mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org
At 10:26 AM -0400 7/17/07, Curtis Villamizar wrote: >In message <p06240507c2c167b442a1@[128.89.89.71]> >Stephen Kent writes: >> >> I think the question is why, if the path info received by an "island >> AS" has a number of unverified hops, is this path info useful, in a >> security sense, to the AS that receives? How does the requirement to >> send such info promote adoption of the protocol? >> >> Steve > > >Because it is likely to be more reliable than information with no >authentication at all. > >The major ISPs are fairly reliable at getting their internal routing >right so if the non-authenticating routers in the middle are entirely >in a set of ISPs that are known to generally not have breakins into >their own infrastructure. For the purposes of commercial traffic >among other ISPs that want to distinguish their services as having >somewhat more reliable routing due to the use of authentication, there >is a great deal of value. > >It may be optimistic to think that this value would be enough to give >any routing authentication sufficient value to gain critical mass in >the commercial world. If there is no value for islands of deployment >except to authenticate within the island this is a non-starter from >day one in the commercial world. If so it may be a non-starter at >router vendors without a very large influx of money from elsewhere, >such as government funding specifically for something that is not >being implemented because it will never get commercially deployed. If >you are sure that the money is out there waiting for this spec to >publish, then fine. Otherwise you may be wasting your time and ours >if the requirement to add value to disconnected islands is ignored. > >That's just an opinion and I don't know how widely held it is today. >This might be a good question to ask at the WG meeting. > >Curtis Curtis, I think our difference of opinion arises from the different perspectives we bring to the problem. As a "security guy" I would not agree with your opening statement. We usually worry that mixing unverified info with verified info, in any context, is a recipe for trouble, as it encourages folks to accept the mixed info and treat it as verified. You give an example of ISPs wanting to " ... distinguish their services as having somewhat more reliable routing due to the use of authentication ..." That is precisely the sort of claim most security folks would worry about :-). As for what will make incremental valuable enough to ISPs to warrant their buy-in, I think that's a hard call for anyone to make right now. One possible deployment scenario is that the biggest ISPs will deploy first. If so, then the fact that most of these folks have direct peering arrangements with one another would allow them to benefit, irrespective of the issue of intermediaries who are not yet playing. If the next set of adopters are ISPs directly connected to the big ISPs, and often to one another (e.g., via IXPs), then they too can derive benefits in many instances, even without passing verified path info through unverified ASes. So, given possible deployment scenarios like these, the uncertainty about which deployment scenarios may happen, and the security principle of avoiding situations that may encourage folks to accept mixed data as all authentic, I feel it's inappropriate to mandate support for passing such data along. Steve _______________________________________________ RPSEC mailing list RPSEC@ietf.org https://www1.ietf.org/mailman/listinfo/rpsec
- [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- RE: [RPSEC] BGP Security Requirements v08 Barry Greene (bgreene)
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- RE: [RPSEC] BGP Security Requirements v08 Barry Greene (bgreene)
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Joe Touch
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Michael H. Behringer
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Robert Loomans
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- RE: [RPSEC] BGP Security Requirements v08 James Ko
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Tony Tauber
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Sandy Murphy
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Russ White
- Re: [RPSEC] BGP Security Requirements v08 tom.petch
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Curtis Villamizar
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent
- Re: [RPSEC] BGP Security Requirements v08 Stephen Kent