Re: [sidr] draft-ietf-sidr-bgpsec-threats-02: Path shortening & lengthening

Andrew Chi <achi@bbn.com> Fri, 06 April 2012 14:26 UTC

Return-Path: <achi@bbn.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B7EA21F853F for <sidr@ietfa.amsl.com>; Fri, 6 Apr 2012 07:26:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZYOs4dOHqfJt for <sidr@ietfa.amsl.com>; Fri, 6 Apr 2012 07:26:55 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id B9B3821F853E for <sidr@ietf.org>; Fri, 6 Apr 2012 07:26:55 -0700 (PDT)
Received: from dhcp89-089-139.bbn.com ([128.89.89.139]:64782 helo=[127.0.0.1]) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <achi@bbn.com>) id 1SGA7V-0006QK-H8; Fri, 06 Apr 2012 10:26:33 -0400
Message-ID: <4F7EFD25.5020709@bbn.com>
Date: Fri, 06 Apr 2012 10:26:45 -0400
From: Andrew Chi <achi@bbn.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:11.0) Gecko/20120327 Thunderbird/11.0.1
MIME-Version: 1.0
To: Shane Amante <shane@castlepoint.net>
References: <64B29EFD-5C6E-4D0C-8E4F-92A2B5A86279@castlepoint.net> <p06240803cb99d283e548@[10.108.69.44]> <8D2985D4-07C3-42EE-A694-DAF24D34F84A@castlepoint.net>
In-Reply-To: <8D2985D4-07C3-42EE-A694-DAF24D34F84A@castlepoint.net>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] draft-ietf-sidr-bgpsec-threats-02: Path shortening & lengthening
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Apr 2012 14:26:56 -0000

On 3/29/2012 9:04 AM, Shane Amante wrote:
>Regardless, I think
> that its best to acknowledge, in this draft, that there is a threat of
> DoS to the availability of the BGP control plane

Maybe I'm missing something.

Intermediate routers or MITM entities can always drop updates.  If 
BGPSEC is enabled, then forging an AS4_PATH or modifying 
BGPSEC_PATH_Signature achieves no more than dropping the update.

Can you give a specific example of DoS that applies only to 
BGPSEC-enabled routers?

-Andrew