Re: [RPSEC] BGP Security Requirements v08

Stephen Kent <kent@bbn.com> Wed, 11 July 2007 15:13 UTC

Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1I8dsr-00042r-BW; Wed, 11 Jul 2007 11:13:41 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43) id 1I8dsq-00042m-NM for rpsec-confirm+ok@megatron.ietf.org; Wed, 11 Jul 2007 11:13:40 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1I8dsq-00042e-Cd for rpsec@ietf.org; Wed, 11 Jul 2007 11:13:40 -0400
Received: from mx11.bbn.com ([128.33.0.80]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1I8dsq-0002qK-4q for rpsec@ietf.org; Wed, 11 Jul 2007 11:13:40 -0400
Received: from dhcp89-089-071.bbn.com ([128.89.89.71]) by mx11.bbn.com with esmtp (Exim 4.60) (envelope-from <kent@bbn.com>) id 1I8dsp-0007Z3-5q; Wed, 11 Jul 2007 11:13:39 -0400
Mime-Version: 1.0
Message-Id: <p0624052ac2baa2788ebc@[128.89.89.71]>
In-Reply-To: <4694ED10.4030503@cisco.com>
References: <20070711143219.97D2E3F481@pecan.tislabs.com> <4694ED10.4030503@cisco.com>
Date: Wed, 11 Jul 2007 11:13:58 -0400
To: Russ White <riw@cisco.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [RPSEC] BGP Security Requirements v08
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0ddefe323dd869ab027dbfff7eff0465
Cc: rpsec@ietf.org, Sandy Murphy <sandy@tislabs.com>
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org

At 10:45 AM -0400 7/11/07, Russ White wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>
>>>  Why? Because if you can validate the originator and the first (second)
>>>  hop (the second entry in the AS Path), then you have a good bit more
>>>  assurance the destination is valid/etc, than if you just drop this
>>>  information out.
>>
>>  As many people have said (I recall particularly Danny McPherson at NANOG),
>>  a deliberate attack would just take the valid initial info and add
>>  invalid info to it.  So it is best to be cautious about the good bit
>>  more assurance.
>
>Right--the more information you have, the more assurance you have. Just
>the origination authorization is easy to fool. Including the second AS
>in the AS Path (the first hop) makes it harder to fool but still not
>impossible. As you add more path information, you add more assurance.
>
>So, I would say it's not an "all or nothing" affair, and retaining
>information through a non-supporting AS is useful.
>
>:-)
>
>Russ

I think it's a matter of what you security goals are.

	- If you want assurance that the traffic you are forwarding 
will NOT go through a certain AS, then any gap in the secured path 
undermines this goal, irrespective of the number of "good" hops on 
the path you receive.

	- If you assurance that the path you receive is one that will 
likely cause your traffic to be delivered, again the number of "good" 
hops on the path you receive is irrelevant, as an attacker could grab 
a valid long or short path and add themselves onto it.

So I'm not sure that one can generalize about the increased assurance 
afforded by a path with more hops that can be verified as accurate.

Also, I worry that it is asking a lot for an operator to try to take 
a mix of unauthenticated paths, authenticated paths, and partially 
authenticated paths and decide how to weight them in making a route 
selection. We have a fair number of examples in other areas where 
adding this sort of complexity leads to more config errors with 
adverse security implications.

Steve


_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www1.ietf.org/mailman/listinfo/rpsec