Re: [sidr] Terry Manderson's Discuss on draft-ietf-sidr-rpsl-sig-11: (with DISCUSS and COMMENT)

Brian Haberman <brian@innovationslab.net> Wed, 18 May 2016 13:08 UTC

Return-Path: <brian@innovationslab.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D388D128E19; Wed, 18 May 2016 06:08:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jrLQnEAEqxtw; Wed, 18 May 2016 06:08:27 -0700 (PDT)
Received: from uillean.fuaim.com (uillean.fuaim.com [206.197.161.140]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B87D612D0BC; Wed, 18 May 2016 06:08:21 -0700 (PDT)
Received: from clairseach.fuaim.com (clairseach-high.fuaim.com [206.197.161.158]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by uillean.fuaim.com (Postfix) with ESMTP id 8A768880E7; Wed, 18 May 2016 06:08:21 -0700 (PDT)
Received: from clemson.jhuapl.edu (swifi-nat.jhuapl.edu [128.244.87.133]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by clairseach.fuaim.com (Postfix) with ESMTP id B4A1A328081A; Wed, 18 May 2016 06:08:20 -0700 (PDT)
To: Terry Manderson <terry.manderson@icann.org>, The IESG <iesg@ietf.org>
References: <20160518033754.24796.52937.idtracker@ietfa.amsl.com>
From: Brian Haberman <brian@innovationslab.net>
Message-ID: <f1770d7b-7a16-6bab-91f7-dd6e41bb60ff@innovationslab.net>
Date: Wed, 18 May 2016 09:08:13 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:45.0) Gecko/20100101 Thunderbird/45.1.0
MIME-Version: 1.0
In-Reply-To: <20160518033754.24796.52937.idtracker@ietfa.amsl.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="fgjMLg424ItRrcU13lH5WA5JdjlMn5gx8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/-cvzP45ZyxuvmrTPht2zWGT2RaA>
Cc: sidr@ietf.org, sidr-chairs@ietf.org, draft-ietf-sidr-rpsl-sig@ietf.org, "Sandra L. Murphy" <sandy@tislabs.com>
Subject: Re: [sidr] Terry Manderson's Discuss on draft-ietf-sidr-rpsl-sig-11: (with DISCUSS and COMMENT)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 May 2016 13:08:30 -0000

Hi Terry,

On 5/17/16 11:37 PM, Terry Manderson wrote:
> Terry Manderson has entered the following ballot position for
> draft-ietf-sidr-rpsl-sig-11: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-sidr-rpsl-sig/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> Thank you for putting substantial effort into this document.
> 
> I have a few discusses. I hope they can be resolved quickly.
> 
> In Section 2.1. The reference to the aligned certificate  which has the
> same private key that signed the RPSL object is mandatory, and defined by
> a RSYNC URL or a HTTP(S) URL. My question surrounds the "or". The
> architecture of RPKI (IIRC) is centered around RSYNC, and thus SIA/AIA
> values MUST have a RSYNC URL, and MAY have other types. By this are you
> leaving it to the issuing party to control the RPKI Distribution
> mechanisms of the Replying Party? I am quite comfortable with "or"
> personally, however this facet of fetching the RPSL Certificate to
> validate the private key usage is seemingly orthogonal to the RPKI
> architecture of RSYNC preferred and should be called out if 'or' is the
> clear intention. Or, has the consensus of the WG moved on from being
> wedded to RSYNC?

I am not aware of the WG moving away from their rsync leanings...

> 
> If it is truely "or", my observation is that the use of the RPKI
> repository is one of  convenience, and that should be called out, in fact
> it does appear that any valid certificate bearing RFC3779 extensions
> could be used to validate the digital signature associated with the RPSL
> object provided the relying party has trust anchor material that leads to
> the corresponding EE certificate and therefore private key. Is this
> observation correct?

You are correct that the use of the RPKI repository is one of
convenience. My original implementation of this approach used non-RPKI
certificates. I would be fine with putting a statement in the
Introduction along the lines of:

"While the approach outlined in this document mandates the use of the
RPKI for certificate distribution, it is not dependent upon the RPKI for
correct functionality. Equivalent functionality can be achieved with a
more traditional certificate authority, RFC 3779 extensions within the
certificates, and the appropriate trust anchor material to verify the
digital signature."

> 
> The Signature expiration time field ("x") currently has no time
> constraints, and I'm very surprised that it is optional with the text in
> s2.5, given that the expiration time, by my reading, could not be beyond
> the 'not after' time of the corresponding certificate. Can you please
> instruct me as to what the consensus position on this was? A criticism of
> many IRRs is that data becomes stale. have the signature expiration time
> field could aide in data freshness models and reduce load on automated
> import and validation of these RPSL signatures.

The validity of the signature is driven by the notAfter field of the
certificate described in 6487. My implementation does the validation
based on notAfter regardless of what is included in the "x" field. I
view "x" as a simple way for RPSL object signers to indicate the
lifetime, but not the authoritative way.

> 
> And lastly, IRRs tend to run over the (legacy?) whois port 43 that
> doesn't provide channel layer security. This means that while signature
> provide a means of detecting modification it may not stop a a MiTM event
> where the entire object is omitted. Do you agree? if so that might be
> appropriate for the Security Considerations section.
> 

I agree with the potential MiTM attack described, but view that as
orthogonal to digital signatures providing integrity protection. This
type of attack could easily occur regardless of whether objects are
signed or not.

> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> one nit:
> 
> "MUST reject the signature and threat the object as a regular" I think
> you mean `s/threat/treat`

Fixed in my pending edit buffer.

> 
> Misc comments:
> 
> * Thank you for the very clear canonicalisation requirements!
> 
> * For route6 objects, where two resource holder's signatures considered
> such that it might address the inability to properly sign the RPSL when
> one holder possesses the ASN and another possesses the prefix? (just a
> comment, nothing more)
> 

Not sure I can parse the above unless s/where/were/... If so, that was
originally in the document prior to -09, but the consensus of the WG was
to remove multiple signature support.

Regards,
Brian