Re: [secdir] SecDir Review of draft-ietf-sidr-bgpsec-protocol-20

"Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov> Wed, 28 December 2016 17:30 UTC

Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B943B12962E; Wed, 28 Dec 2016 09:30:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4SfVDq3N00Fi; Wed, 28 Dec 2016 09:30:56 -0800 (PST)
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0112.outbound.protection.outlook.com [23.103.201.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAC87129470; Wed, 28 Dec 2016 09:30:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Ncw0eyAaXFdJoSFq9ZBnX1oSj5mEb4AOC2LK+t3HmYk=; b=PA76pEM329nOHx54NxlF1/eKRFelbKut0o4SpPxjxl6LMrta4uHnu8FR8qeyByb6kxf5HxzFKXoCS8Ag0jxbdgkJfXwHsBKhCCBiz9ntjCbWeotNikviZMZRq7BTqxSHk9Y8/kBXOfDxUH5yEjXJpdD7He36CNx1iEUQ8WejKPM=
Received: from DM2PR09MB0446.namprd09.prod.outlook.com (10.161.252.145) by DM2PR09MB0447.namprd09.prod.outlook.com (10.161.252.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.789.14; Wed, 28 Dec 2016 17:30:54 +0000
Received: from DM2PR09MB0446.namprd09.prod.outlook.com ([10.161.252.145]) by DM2PR09MB0446.namprd09.prod.outlook.com ([10.161.252.145]) with mapi id 15.01.0789.028; Wed, 28 Dec 2016 17:30:54 +0000
From: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
To: Russ Housley <housley@vigilsec.com>, "draft-ietf-sidr-bgpsec-protocol.all@ietf.org" <draft-ietf-sidr-bgpsec-protocol.all@ietf.org>
Thread-Topic: SecDir Review of draft-ietf-sidr-bgpsec-protocol-20
Thread-Index: AQHSUW/sFNMfOkGS20CKc0VjvBxafaEdrPtg
Date: Wed, 28 Dec 2016 17:30:53 +0000
Message-ID: <DM2PR09MB04468E344A052BFE55830D2D84680@DM2PR09MB0446.namprd09.prod.outlook.com>
References: <D915BDA3-A15D-4445-8C18-DA155A73E0D0@vigilsec.com>
In-Reply-To: <D915BDA3-A15D-4445-8C18-DA155A73E0D0@vigilsec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=kotikalapudi.sriram@nist.gov;
x-originating-ip: [129.6.140.122]
x-microsoft-exchange-diagnostics: 1; DM2PR09MB0447; 7:aDLBE0GAnC1vD3TFxzh9tTyM+gmcKIFSaA0mezGQjyQaDtyVeJ1c6R9noPQSoCHhFOM1IjUPl63fzBH4SMK2b2KbdGRI1QbZJ4UNfdHwFliYZCR73LfvQDAQosmb9E0OKkcPg6nsu84D2IWhvemjq0CF33l29/5FNnCAtrdwLEdiqDWaSLeW0MZlN90Dhy/DqGdp7g+wx75SLm7QbcZJMbYB4doSZt78AP5ISTCqgHDKqkva0q4qu9Hdqu3hfIvb17JKbKBQx+4eIZP3X6ExmoTgSyWTWXTjkbZ2WlQGQnKPrUmRZgLwfyFFd1STdt06Jvhwb2EHVDr4FbdHUmXbtHwH2BJ2jCrUIZ6vhvc0ppEHF1WDU/j5HUmJbyCKDhh8vuunMaNajxj7KPqMFYmFOcSOHfkAZleaZ8Qzp2NP2352cn2i5gluHVAaviIagKPTelngGu5NWZHQ2/dZUt37Xg==
x-forefront-antispam-report: SFV:SKI; SCL:-1SFV:NSPM; SFS:(10019020)(6009001)(7916002)(39850400002)(39860400002)(39840400002)(39450400003)(39410400002)(189002)(377454003)(13464003)(199003)(377424004)(25786008)(230783001)(2950100002)(3660700001)(7696004)(81166006)(77096006)(345774005)(5660300001)(81156014)(6436002)(3280700002)(106356001)(105586002)(106116001)(8676002)(66066001)(99286002)(305945005)(76576001)(74316002)(6116002)(2906002)(4326007)(3846002)(2501003)(102836003)(6506006)(55016002)(9686002)(92566002)(54356999)(101416001)(5001770100001)(97736004)(4001150100001)(50986999)(76176999)(2900100001)(38730400001)(189998001)(122556002)(33656002)(86362001)(7736002)(229853002)(68736007)(8936002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR09MB0447; H:DM2PR09MB0446.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
x-ms-office365-filtering-correlation-id: 9d848f63-d58e-4bd0-8a7a-08d42f4746c1
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:DM2PR09MB0447;
x-microsoft-antispam-prvs: <DM2PR09MB04479577D1657DFB3169C5E984680@DM2PR09MB0447.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(192374486261705)(17755550239193);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026)(6041248)(20161123562025)(20161123560025)(20161123564025)(20161123555025)(6072148); SRVR:DM2PR09MB0447; BCL:0; PCL:0; RULEID:; SRVR:DM2PR09MB0447;
x-forefront-prvs: 0170DAF08C
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Dec 2016 17:30:53.9252 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR09MB0447
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/jOZIV-2ugn283Rw8LJtcgrpyq4U>
Cc: IETF SecDir <secdir@ietf.org>
Subject: Re: [secdir] SecDir Review of draft-ietf-sidr-bgpsec-protocol-20
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Dec 2016 17:30:58 -0000

Russ,

Thanks once again for your detailed review and very helpful comments.
The recently submitted version-21 of the draft incorporates changes to reflect
all your comments except two minor comments that have to do with packet format tweaks.
(Please see Oliver's response on the SIDR list about the latter.)  

Please see my specific responses inline below marked with [Sriram].  
Please let me know if there is anything that I have missed.

Sriram


-----Original Message-----
From: Russ Housley [mailto:housley@vigilsec.com] 
Sent: Thursday, December 08, 2016 11:26 AM
To: draft-ietf-sidr-bgpsec-protocol.all@ietf.org
Cc: IETF SecDir <secdir@ietf.org>
Subject: SecDir Review of draft-ietf-sidr-bgpsec-protocol-20

I reviewed this document as part of the Security Directorate's ongoing effort to review all IETF documents being processed by the IESG.  These comments were written primarily for the benefit of the Security Area Directors.  Document authors, document editors, and WG chairs should treat these comments just like any other IETF Last Call comments.

Document: draft-ietf-sidr-bgpsec-protocol-20
Reviewer: Russ Housley
Review Date: 2016-12-08
IETF LC End Date: 2016-12-16
IESG Telechat date: Unknown

Summary: Almost Ready

I also did a review for Gen-ART.  This SecDir review is identical to that Gen-ART review.

I was involved in the design of BGPsec, but I have not reviewed the document for a long time.


Question

I do not see any guidance on the handling of private AS numbers.  I'm not sure whether it belongs in the document or not.  I am thinking about a BGP stub customer that employs a private AS.  If I understand properly, that stub customer cannot publish a ROA for the private AS number and the prefixes that it uses.  So, the stub customer cannot become a BGPsec speaker.  So, my question is about the BGPsec speaker that receives an announcement from the stub customer.  Does that BGPsec speaker strip the private AS and sign an announcement?  Will their ROA that cover the prefixes used by the stub customer?

[Sriram] There are new paragraphs added in the ops and mgmt. section (S 7)  
to discuss proper handling of private ASNs that may be used for stub ASes 
or inside confederations.


Major Concerns

Section 2.2 says:

   ...  A BGP speaker MAY
   announce BGPsec capability only if it supports the BGP multiprotocol
   extension [RFC4760].  ...

This needs to be worded as a MUST NOT statement.  
The current wording does not align with the definition of MAY in RFC 2119.

[Sriram]: Done

I think an additional consideration is needed in Section 6.2.  This protocol design assumes a signer will compute a message digest and then digitally sign that digest.  If someone wants to use a digital signature that works differently, there may be a significant change to this protocol.

[Sriram]: Please refer to our earlier discussion in this thread on this topic. 
I have left the section as is.

It is very unusual for the IANA Considerations to contain a figure, and Figure 10 really seems out of place.  The version number can be put in an IANA registry, but there really is no need until a second value is needed.  There is no reason to put Dir in an IANA registry, there are only two values and both are fully specified in this document.  The unassigned bits must be zero until a new version is specified.

[Sriram]  I have modified Figures 10 to make clear that the Dir values 
are fully specified by the RFC-to-be.  I have similarly added more clarity in Figure 11 also.
The IANA reviewer Sabrina Tanamal has used Figure 10 in her response.
Seems like she found it useful. So I am keeping it in the document for now.
In the IANA section (including Figs. 10 and 11), it is now clearly stated
that the unassigned bits must be set to zero. 

Minor Concerns

I find the Abstract misses some important information.  Also, the old wording suggests that the attribute contains a single digital signature.
I suggest:

   This document describes BGPsec, an extension to the Border Gateway
   Protocol (BGP) that provides security for the path of autonomous
   systems (ASes) through which a BGP update message passes.  BGPsec is
   implemented via an optional non-transitive BGP path attribute that
   carries digital signatures produced by each autonomous system that
   propagates the update message.  The digital signatures provide
   confidence that every AS on the path of ASes listed in the update
   message has explicitly authorized the advertisement of the route.

[Sriram] Thanks for providing the additional wording. The document now has 
the modified version of the abstract that you've provided above. 

Section 2.1 says:

   ...  The BGP speaker
   sets this bit to 0 to indicate the capability to receive BGPsec
   update messages.  The BGP speaker sets this bit to 1 to indicate the
   capability to send BGPsec update messages.

It seems a bit wasteful to repeat the whole capability for each direction.  Wouldn't it be better to follow the example used in other capability definitions (such as RFC 7911) by using one of the unassigned bits?  The Send/Receive pair of bits would have these
semantics:

   This field indicates whether the sender is (a) able to receive
   BGPsec update messages from its peer (value 1), (b) able to send
   BGPsec update messages to its peer (value 2), or (c) both (value 3)
   for the address family identified in the AFI.

[Sriram]: I have followed your suggestion to put this out on the SIDR list for comments. 
Please see Oliver's response on the SIDR list. Let us see if anyone else comments.
         
For completeness, please add a paragraph to the end of Section 3.1 that describes the 4-octet AS Number field.  Please state how an old 16-bit AS number is carried.

[Sriram] Done.

In Section 3.2, the Signature Length within the Signature Segment does not count the length field itself.  It seems that all of the other length values in this specification count the size of the length too.
Consistency will avoid implementation errors.

[Sriram] I have followed your suggestion to put this out on the SIDR list for Comments. 
Please see Oliver's response on the SIDR list. Let us see if anyone else comments.

Section 4.2 references the MP_REACH_NLRI attribute; please add a citation to the RFC that defines that attribute.


[Sriram]  Done. RFC7460 added as citation.

Nits

Section 2.1 says:

   The second and third octets contain the 16-bit Address Family
   Identifier (AFI) which indicates the address family for which the
   BGPsec speaker is advertising support for BGPsec.  This document only
   specifies BGPsec for use with two address families, IPv4 and IPv6,
   AFI values 1 and 2 respectively.  BGPsec for use with other address
   families may be specified in future documents.

Please reference RFC 4760 for a place to learn about AFI.

[Sriram]  Done.

In Section 4.1, the comma is in the wrong place, but when I tried to offer a correction, I thought that a slight rewording would also improve the clarity:

OLD:

   If a BGPsec router has received only a non-BGPsec update message
   (without the BGPsec_Path attribute), containing the AS_PATH
   attribute, from a peer for a given prefix then it MUST NOT ...

NEW:

   If a BGPsec router has received only a non-BGPsec update message
   containing the AS_PATH attribute (instead of the BGPsec_Path
   attribute) from a peer for a given prefix, then it MUST NOT ...

[Sriram]  Done. Thank you for providing the better wording for this.

Please reword the first paragraph of Section 4.2 to avoid the phrase "said route advertisement".  While it is not wrong, it does feel very awkward.  This is not a patent claim.

[Sriram]  Done. Now the document avoids patent-like usage of "said". 

The acronym "ASN" is not used until Section 4.4, and it is not expanded there.  I suggest that all uses of ASN should be expanded to AS number.

[Sriram]  Done.