Re: [secdir] New Routing Area Security Design Team

Jeffrey Haas <jhaas@pfrc.org> Fri, 13 April 2018 23:51 UTC

Return-Path: <jhaas@pfrc.org>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFFB112711B for <secdir@ietfa.amsl.com>; Fri, 13 Apr 2018 16:51:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X5zSyaiH8T7W for <secdir@ietfa.amsl.com>; Fri, 13 Apr 2018 16:51:38 -0700 (PDT)
Received: from slice.pfrc.org (slice.pfrc.org [67.207.130.108]) by ietfa.amsl.com (Postfix) with ESMTP id F32A41270AE for <secdir@ietf.org>; Fri, 13 Apr 2018 16:51:37 -0700 (PDT)
Received: from dresden.attlocal.net (99-59-193-67.lightspeed.livnmi.sbcglobal.net [99.59.193.67]) by slice.pfrc.org (Postfix) with ESMTPSA id 668AB1E403; Fri, 13 Apr 2018 19:52:25 -0400 (EDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_C4EC7928-869B-433D-B577-1B248B975847"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
From: Jeffrey Haas <jhaas@pfrc.org>
In-Reply-To: <CAL02cgS9rZKVtZs4aRWJmaQj-anaSqYj8rn8roDdxP+JhBR++A@mail.gmail.com>
Date: Fri, 13 Apr 2018 19:51:35 -0400
Cc: "BRUNGARD, DEBORAH A" <db3546@att.com>, "secdir@ietf.org" <secdir@ietf.org>, "russ@riw.us" <russ@riw.us>, "Stewart Bryant (stewart.bryant@gmail.com)" <stewart.bryant@gmail.com>, "Acee Lindem (acee) (acee@cisco.com)" <acee@cisco.com>
Message-Id: <F64B6EFA-1CB3-454B-B827-B5886A723D36@pfrc.org>
References: <F64C10EAA68C8044B33656FA214632C8882C74A7@MISOUT7MSGUSRDE.ITServices.sbc.com> <CAL02cgS9rZKVtZs4aRWJmaQj-anaSqYj8rn8roDdxP+JhBR++A@mail.gmail.com>
To: Richard Barnes <rlb@ipv.sx>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/Zl94CFExETM43kF7JyExCONCXhw>
Subject: Re: [secdir] New Routing Area Security Design Team
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Apr 2018 23:51:41 -0000

Richard,

This is where I have to say that I think we're too broadly chartered.  It's also a bit more than I believed I was signing up for.

The initial motivation to start this was the further "what do we do about tcp-md5" that the MPLS protocols are dealing with now.  And further, it's a bit about how to reduce the frustrating dance we have between routing (and other areas?) and security-focused groups during the RFC process.

See my slides I did for IEPG to give an idea of some of what at least I think we'd like to see come out of this:

http://iepg.org/2018-03-18-ietf101/haas-iepg-101.pdf

I would like to see us start by focusing on transport security considerations for routing protocols.  KARP obviously covered a lot of this ground, especially surrounding bootstrapping issues. I'd love to see pragmatic answers that fit into what we want to deploy today and tomorrow rather than perfect answers which require full new technology sets to be built.

An output of this would be a set of common boilerplates that can be maintained by the security experts for inclusion into routing protocol documents.  These boilerplates would vary based on needed transport properties required by the protocol and its data.  (And yes, this may include a null profile, no security, no authentication, no authorization, and no integrity.)  The goal is that when it's time for a protocol to be written, transport security is understood up front  and may simply be included in the document in text that is consistent with verbiage expected by the security community, and understandable by the authors of the new protocol.

A related and separate bit of work would be recommendations and practices for taking older insecure protocols and adding appropriate transport security on top of them.

---

As a complete aside, I think an effort like this is inappropriate for "BGP abuse".  I consider myself moderately studied in a good portion of the RPKI problem space, although the certificate juggling makes my head hurt.  The issues that are present in that area are deployment related, chicken-and-egg bootstrapping and honestly simple demand.  IMNSHO, the IETF has done its work.  The rest of the work needs to come from operational forums and vendors.  

I'm happy to offer commentary there, but I really don't believe this is the best place to put our initial effort.

-- Jeff

> On Apr 13, 2018, at 4:20 PM, Richard Barnes <rlb@ipv.sx> wrote:
> 
> (trimming the CC list a bit)
> 
> Hey Deborah,
> 
> Delighted to hear this news.  Do you have an idea of what the initial deliverables are for this group?  What security problems are they going to try to address?
> 
> TBH, it seems like the headline problem at the Internet level is BGP abuse.  The base RPKI docs have been out for several years now, and BGPSEC is pretty much finished, but the deployment numbers continue to hover around 8-9% for even the most basic protections.  It would be delightful to have a group take a look at what the deployment blockers are here, and whether there's anything the IETF could do to help, whether it's updating protocols, producing deployment guides, writing code, etc.  We shouldn't think that RFCs are the only tool in our arsenal.
> 
> Thanks,
> --Richard
> 
> [1] https://rpki-monitor.antd.nist.gov/ <https://rpki-monitor.antd.nist.gov/>  
> 
> 
> On Fri, Apr 13, 2018 at 4:11 PM, BRUNGARD, DEBORAH A <db3546@att.com <mailto:db3546@att.com>> wrote:
> The Routing ADs have chartered a design team as described below.
> 
>  
> 
> I will be the AD-contact: db3546@att.com <mailto:db3546@att.com>
>  
> 
> Routing Area Security Design Team Charter
> 
>  
> 
> Internet security threats have evolved in the last couple of years and questions are arising about the security properties of many long-standing IETF routing protocols and new protocols under development. This is an opportunity for the Routing Area to evaluate current assumptions and make recommendations for new work.
> 
>  
> 
> The Routing Area will kick off a Routing Area-wide Design team with support from the OPS Area and Security Area. The first phase will consist of a small team:
> 
>  
> 
> Stewart Bryant stewart.bryant@gmail.com <mailto:stewart.bryant@gmail.com>
> Jeff Haas jhaas@pfrc.org <mailto:jhaas@pfrc.org>
> Acee Lindem acee@cisco.com <mailto:acee@cisco.com>
> Russ White russ@riw.us <mailto:russ@riw.us>
>  
> 
> They will be responsible to set up an environment (e..g. wiki), identify work items, and coordinating overall the work effort. It is the expectation this initial phase will be done by May 1. A second phase will consist of small teams working  on targeted items. Work items will include review of current deployments (use models) and threat models, evaluation criteria and useful advice when doing new work (on existing protocols and new protocols), and recommendations on where new work is needed in cooperation with the responsible working group. The work will have support from the Security Area and OPS Area.
> 
>  
> 
> The design team will have a private mailing list for this first phase and can be reached at rt-dt-security@ietf.org <mailto:rt-dt-security@ietf.org>.
> 
>  
> 
> Regards,
> 
> Deborah
> 
>  
> 
>  
> 
> 
> _______________________________________________
> secdir mailing list
> secdir@ietf.org <mailto:secdir@ietf.org>
> https://www.ietf.org/mailman/listinfo/secdir <https://www.ietf.org/mailman/listinfo/secdir>
> wiki: http://tools.ietf.org/area/sec/trac/wiki/SecDirReview <http://tools.ietf.org/area/sec/trac/wiki/SecDirReview>
> 
>