Re: [secdir] New Routing Area Security Design Team

Richard Barnes <rlb@ipv.sx> Mon, 16 April 2018 13:54 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F16121243F3 for <secdir@ietfa.amsl.com>; Mon, 16 Apr 2018 06:54:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wde-Y4uytw-c for <secdir@ietfa.amsl.com>; Mon, 16 Apr 2018 06:54:42 -0700 (PDT)
Received: from mail-oi0-x241.google.com (mail-oi0-x241.google.com [IPv6:2607:f8b0:4003:c06::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0E0612D88D for <secdir@ietf.org>; Mon, 16 Apr 2018 06:54:41 -0700 (PDT)
Received: by mail-oi0-x241.google.com with SMTP id n65-v6so1350003oig.6 for <secdir@ietf.org>; Mon, 16 Apr 2018 06:54:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Eb9qCE2lzVjWfRF5lK30pmtLQeZGHrP4xWqmAE8Tf9Q=; b=IHomefpsU+uJ7U6hBM3rDrDhKk03Yt1OAGr1d0UzUfKfZWwvIzt8AIWaqOBMmX9eqS YeU+Clh+tA7k1yoB6sfSPiJMAgAzgsJwmjC7+M/pTndsmZcfZpMLHD0U8GtuXXyo18to PKMeCN1oIrtrwBSj6k0WNiy+bQ65WPymVJxnIjwJ8azfwSrmBDECXqqP92x0JYA/VVq3 moz+5qmV6651oEmAYM5HMCfaxYc8ezeFCVcAcSJEKf5WysVtYUFlT2c0z0T9v/cNyvLT siHPQUNhh111ufdm0GXAKF7lAMAwTGzCxH0lrzOdG0HBjZYe6NtpSuP7q22P8tAydI3n Ft3Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Eb9qCE2lzVjWfRF5lK30pmtLQeZGHrP4xWqmAE8Tf9Q=; b=gzXmVi4T+hXA15NeeGsfe0hd/ZVKYPf1/fmPzP84gIuN1T36iBGldBJ5rhZlNzpjoS e1/LTbz0OTKA+y+PHEplHW0VUSyH5nN9hlkwkY0GwcZQ8CacZVXlBZWCKocJSfQkoiDz errLnjjw/EvQCvdqjM2xLjj/5FLztQ3OrDDBRX4KD79VYLtcN8GzMLAirsNCNFAySzBW cpt6X4nDTxvrzIwuaY81NgrhXOHcXmcndbfH1v6nGVMTcWFZkya9xfiEuA1ihn6Uk3p4 wM0eCDdz5CO5uYB0HtMlva+j+ikTr9Ybylt+JSfulK/Kas2zfNetyddlqeunfv9tGJeh efoQ==
X-Gm-Message-State: ALQs6tAAVo3VGxqTRgnAa56zmrDORGjarP2vXS8WNOM2/GbOPLv1n61f 1tWuRoHKW1MO0sOwJ/QIRvGjN5L9rmMJA5haqUCdRQ==
X-Google-Smtp-Source: AIpwx4+Vow06XsXBuG19t58Ma1tBZmpvLLAEjKLCxgzpLfll4ELGi3qEO2D6TtzKLFjq+YIfu4b7Qw0utZUmmupb+0s=
X-Received: by 2002:aca:d08c:: with SMTP id j12-v6mr2773644oiy.276.1523886880955; Mon, 16 Apr 2018 06:54:40 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.201.90.67 with HTTP; Mon, 16 Apr 2018 06:54:40 -0700 (PDT)
In-Reply-To: <024301d3d588$2b8ac6a0$82a053e0$@riw.us>
References: <F64C10EAA68C8044B33656FA214632C8882C74A7@MISOUT7MSGUSRDE.ITServices.sbc.com> <CAL02cgS9rZKVtZs4aRWJmaQj-anaSqYj8rn8roDdxP+JhBR++A@mail.gmail.com> <F64B6EFA-1CB3-454B-B827-B5886A723D36@pfrc.org> <d37721c3-8e78-6eb8-c0ae-ba0e57a623c3@huitema.net> <026301d3d4e4$380d8b00$a828a100$@riw.us> <209F0EB5-AC41-4D00-8FE6-755802946061@pfrc.org> <CAL02cgTOOVXUXmvoE4JK97i8EeYnHevk4V9ecTepGLcB1YA-2w@mail.gmail.com> <2AD240AE-DF39-4D76-8D6B-BB8AADC6C267@pfrc.org> <024301d3d588$2b8ac6a0$82a053e0$@riw.us>
From: Richard Barnes <rlb@ipv.sx>
Date: Mon, 16 Apr 2018 09:54:40 -0400
Message-ID: <CAL02cgQaUGi7uq3GA4kdE54z2AUCOqBNYjbYsZT_wAsH-4aYgQ@mail.gmail.com>
To: Russ White <russ@riw.us>
Cc: Jeffrey Haas <jhaas@pfrc.org>, Christian Huitema <huitema@huitema.net>, Stewart Bryant <stewart.bryant@gmail.com>, "Acee Lindem (acee)" <acee@cisco.com>, "BRUNGARD, DEBORAH A" <db3546@att.com>, secdir <secdir@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000037b8060569f790b7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/CTQ0Xy-zgZi77HrUTcW2FctV8_E>
Subject: Re: [secdir] New Routing Area Security Design Team
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Apr 2018 13:54:44 -0000

On Mon, Apr 16, 2018 at 9:38 AM, Russ White <russ@riw.us> wrote:

>
> > - The fact that you can intentionally mis-represent the path an UPDATE
> > traverses either accidentally as part of normal prepending operations or
> > maliciously in an attempt to cause traffic to be misrouted. bgpsec was
> crafted
> > to address this issue in conjunction with the RPKI.
>
> And this is where we get into trouble -- because, IMHO. BGPSEC, beyond
> being undeployable, either fails to provide meaningful security and/or
> makes the problem worse. This isn't just a crypto problem, this is a
> structural problem with the solution itself. The IETF's focus on BGPSEC as
> "the only right solution" has caused many in the community to stop looking
> to the IETF for leadership in solving this problem. At least some folks in
> the community are looking at other solutions to this problem in a way that
> intentionally _avoids_ any sort of "deep" interaction with the IETF because
> of the rut the IETF is in.
>
> Until the IETF starts listening to folks beyond BGPSEC supporters, and
> rethinks what needs to be solved, the IETF will continue to play
> essentially no role in moving any solution for this problem forward. Hint:
> ensuring the "proper operation of BGP" is not a good starting point.
>

I'm fully willing to admit that there has been some intransigence on the
security side of things.  And I'm not trying to argue for BGPSEC in
particular, but for solving the problem.

However, the messages in this thread make me think there's not really a
willingness in the routing community to engage seriously in the problem
either.  Security mechanisms exist to enforce invariants, so if you're not
willing to concede that BGP should adhere to some invariants (which is how
Jeffrey's bullet points read to me), then you're never going to be able to
meaningfully secure the protocol, and we should publish an RFC that says
"here's the security properties you can expect of BGP lolz #YOLO CAVEAT
ROUTOR" -- like RFC 4272, but more honest.



> > What is an open issue is the one that originally brought Stewart to
> > saag: The MPLS protocols are in need of a transport security upgrade.
> > As part of that headache, we want to try to get boilerplate and process
> in
> > place so that the next time someone needs to either invent a new
> protocol or
> > upgrade an existing one, we stop making routing experts who are security
> > n00bs go through a dance they don't know the steps to.
>
> Correct -- this is the problem this design team is attempting to address.
> It is not that routing folk don't think the BGP problem isn't a problem, it
> is that the IETF is not a useful place for discussing this problem. Perhaps
> it will be in the future, but right now there is no hope of having a
> reasoned, reasonable, and productive discussion on this topic.
>
> 😊
>

So maybe this group needs a more focused title :)  Because as this thread
demonstrates, when you say "Routing Area Security", people are going to
think you're going to solve actual problems with the security of routing,
not just better transport security -- which really has nothing to do with
routing, it's just securing the routing protocol as an application.

How about "Better Routing Application Transport Security (BRATS)"?  ;)

--Richard