Re: [RPSEC] BGP Security Requirements v08

Stephen Kent <kent@bbn.com> Thu, 19 July 2007 19:13 UTC

Return-path: <rpsec-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBbRV-0004JP-Ou; Thu, 19 Jul 2007 15:13:41 -0400
Received: from rpsec by megatron.ietf.org with local (Exim 4.43) id 1IBbRS-0004Ft-5z for rpsec-confirm+ok@megatron.ietf.org; Thu, 19 Jul 2007 15:13:38 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBbRR-0004Fe-Rg for rpsec@ietf.org; Thu, 19 Jul 2007 15:13:37 -0400
Received: from mx11.bbn.com ([128.33.0.80]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IBbRQ-0007rE-LZ for rpsec@ietf.org; Thu, 19 Jul 2007 15:13:37 -0400
Received: from dhcp89-089-071.bbn.com ([128.89.89.71]) by mx11.bbn.com with esmtp (Exim 4.60) (envelope-from <kent@bbn.com>) id 1IBbRQ-0006za-4O; Thu, 19 Jul 2007 15:13:36 -0400
Mime-Version: 1.0
Message-Id: <p06240511c2c566ec0df3@[128.89.89.71]>
In-Reply-To: <469F69D4.2060002@cisco.com>
References: <200707191235.l6JCZZWv043998@harbor.brookfield.occnc.com> <469F69D4.2060002@cisco.com>
Date: Thu, 19 Jul 2007 15:13:52 -0400
To: Russ White <riw@cisco.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [RPSEC] BGP Security Requirements v08
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7aafa0432175920a4b3e118e16c5cb64
Cc: rpsec@ietf.org
X-BeenThere: rpsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Routing Protocol Security Requirements <rpsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/rpsec>
List-Post: <mailto:rpsec@ietf.org>
List-Help: <mailto:rpsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rpsec>, <mailto:rpsec-request@ietf.org?subject=subscribe>
Errors-To: rpsec-bounces@ietf.org

At 9:40 AM -0400 7/19/07, Russ White wrote:
>...
>
>At least that change the processing rules for the AS Path, or change the
>AS Path itself. If we think of the AS Path as being constant end to end,
>and plan security based on that thinking, then we must think in
>exceptions to the rule set for each possible modification to the AS
>Path, and as people think of new ways to modify the AS Path, we have to
>think of new exceptions to the rules.

Of course the path is not an e-2-e constant, since it is legitimate 
for it to change, in certain ways, as the path info passes through 
each AS. However, I don't think we believe that all possible changes 
to the path are legitimate at each hop. That suggests that it may be 
possible to express what the allowed transformations are and develop 
mechanisms that allow the recipient of the path info to verify 
whether the received path is legitimate relative to the 
transformations that have been applied.

>It seems, to me, that it's easier just not to think of the AS Path as
>anything more, or less, than an attribute among attributes, all mutable
>for various reasons. This allows us to stop thinking in terms of an
>"end-to-end" advertisement, and see BGP for what it really is: A
>distributed database system in which each device along the way might
>change the data in subtle or not-so-subtle ways, and for valid reasons.

see comments above that apply here too.

>The question then changes from: "Who has touched this," to: "Is the data
>valid?" Of course, then you have to decide what "valid" means, but,
>there we digress into a lot of other conversations we've already had,
>and I don't want to repeat. :-)

and yet you are repeating them :-(

>Going back to the original question:
>
>The basic point, to me, is that the validity of the data is not a
>"true/false" situation.

I don't think we have a string basis to believe that this is 
undecidable. The examples you cite merely show that it's not trivial, 
but then routing is not trivial even absent security considerations.

>Hence, it's possible that passing information
>through or around a non-implementing AS, whichever way you want to put
>it, has potential benefit. There's no way to know that until you
>actually look at the way the proposed mechanism works, though.

I agree that it MAY have benefit (i.e., potential benefit) but since 
it also might be harmful, or might not be necessary, it seems 
inappropriate to mandate support for it in our requirements.

Steve


_______________________________________________
RPSEC mailing list
RPSEC@ietf.org
https://www1.ietf.org/mailman/listinfo/rpsec