Re: [RPSEC] BGP Security Requirements v08

Curtis Villamizar <curtis@occnc.com> Wed, 18 July 2007 19:59 UTC

Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBFg5-0003md-JT; Wed, 18 Jul 2007 15:59:17 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43) id 1IBFg2-0003jq-Ci for rpsec-confirm+ok@megatron.ietf.org; Wed, 18 Jul 2007 15:59:14 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBFg2-0003j1-0m for rpsec@ietf.org; Wed, 18 Jul 2007 15:59:14 -0400
Received: from 69.37.59.172.adsl.snet.net ([69.37.59.172] helo=harbor.brookfield.occnc.com) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IBFg1-00055K-Ji for rpsec@ietf.org; Wed, 18 Jul 2007 15:59:13 -0400
Received: from harbor.brookfield.occnc.com (harbor.brookfield.occnc.com [69.37.59.172]) by harbor.brookfield.occnc.com (8.13.6/8.13.6) with ESMTP id l6IK0570030774; Wed, 18 Jul 2007 16:00:05 -0400 (EDT) (envelope-from curtis@harbor.brookfield.occnc.com)
Message-Id: <200707182000.l6IK0570030774@harbor.brookfield.occnc.com>
To: Russ White <riw@cisco.com>
From: Curtis Villamizar <curtis@occnc.com>
Subject: Re: [RPSEC] BGP Security Requirements v08
In-reply-to: Your message of "Wed, 18 Jul 2007 15:11:51 EDT." <469E65F7.8010509@cisco.com>
Date: Wed, 18 Jul 2007 16:00:05 -0400
X-Spam-Score: 1.7 (+)
X-Scan-Signature: 7baded97d9887f7a0c7e8a33c2e3ea1b
Cc: rpsec@ietf.org, Sandy Murphy <sandy@tislabs.com>
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: curtis@occnc.com
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org

In message <469E65F7.8010509@cisco.com>
Russ White writes:
>  
>  
> >> o The authentication information may be passed between authenticating
> >> implementations outside the BGP protocol.
> > 
> > Is this practical?  Pass information out of band to every far distant
> > BGP speaker rather than just to peers.
> > 
> > This seems to break the "must be scalable" requirement for everything
> > related to routing.
>  
> Aren't the ROAs already being transmitted that way?
>  
> :-)
>  
> Russ


The ROAs do not provide authentication information to accompany a
packet or that pert of an AS path might be legitimate.  It just serves
to verify that a route could be originated at all by a given AS.

If you want to authenticate a routing packet you need a signature over
the packet or a digest.  Its fine to then provide the public keys OOB.

For example, if the AS Path is A X Y Z and I trust my peer A but not X
and Y, the ROA only tells me that its OK for Z to have originated this
route and nothing about whether this could have legitimately passed
through Y and Z.  An authentication would be Z signature, Y signing
that, X signing that, and A passing along the signatures.  If 128
bytes are used per signature that is 384 bytes.

OTOH if some OOB mechanism also addressed whether a peering might be
legitimate, then requirements would be met.  So maybe its just that
the current ROA scheme (or schema) is inadequate.

Curtis


_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www1.ietf.org/mailman/listinfo/rpsec