Re: [sidr] Benjamin Kaduk's No Objection on draft-ietf-sidr-slurm-07: (with COMMENT)

Di Ma <> Fri, 06 April 2018 13:15 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id D931E126DEE for <>; Fri, 6 Apr 2018 06:15:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.235
X-Spam-Status: No, score=-1.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id N02TkKPKdXfn for <>; Fri, 6 Apr 2018 06:15:37 -0700 (PDT)
Received: from ( []) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id AB2A81201FA for <>; Fri, 6 Apr 2018 06:15:36 -0700 (PDT)
X-QQ-mid: bizesmtp3t1523020529trpaq2833
Received: from [] (unknown []) by (ESMTP) with id ; Fri, 06 Apr 2018 21:15:28 +0800 (CST)
X-QQ-SSF: 00400000002000F0FG40000A0000000
X-QQ-FEAT: Me8Xob1wlXIWF7usFVt6LaGiJVBoJbT9Z+BdR2ZO5Qua/nW8Fj9QeOcIg+qA0 VgWhkAU7rWPv77tE6v61ifxmqQIctxqlho7Ug2zwT0FMInOcoheWW6DNs9wVsa926/zvKIg I5TseqbZaIPAzqg+pooot11cGxfA3SzSmByB0ro+9j9s2dKI6ISYvCaRszznfhXoAC+zhqm 7J4MwFgISdVSHNcxrmwnNTF3FYBVzf+Z57etZFm92n9FFNrooitdrFXEvDMAZfO+A3seuLP XREI3Yg0F9QiilCMFz8nTOhaZ1KHx8AHWruvtfaX2CqhCU
X-QQ-GoodBg: 2
Content-Type: text/plain; charset=gb2312
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
From: Di Ma <>
In-Reply-To: <>
Date: Fri, 6 Apr 2018 21:15:28 +0800
Cc: The IESG <>,,,,
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <>
To: Benjamin Kaduk <>
X-Mailer: Apple Mail (2.3445.5.20)
X-QQ-Bgrelay: 1
Archived-At: <>
Subject: Re: [sidr] Benjamin Kaduk's No Objection on draft-ietf-sidr-slurm-07: (with COMMENT)
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Secure Interdomain Routing <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 06 Apr 2018 13:15:43 -0000


Thanks very much for your comments.

Please see my responses in lines.

> 在 2018年3月31日,01:54,Benjamin Kaduk <> 写道:
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-sidr-slurm-07: No Objection
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> Please refer to
> for more information about IESG DISCUSS and COMMENT positions.
> The document, along with other ballot positions, can be found here:
> ----------------------------------------------------------------------
> ----------------------------------------------------------------------
> The directorate reviews have some good comments, especially about expanding
> acronyms/defining terms.
> I think Section 3.3 would benefit from greater clarity about individual
> components of the JSON array that is the value of the "slurmTarget" element,
> versus that element itself.  (Also, slurmTarget appears to be mandatory, so
> talking about cases where it is present seems strange, and presumably a
> nonempty value being present is the desired criterion.)
> I'm also not entirely sure I understand the intended semantics --
> when first introduced in Section 3.2, we say that "all targets MUST
> be acceptable to the RP".  (Presumably that includes both ASN and
> FQDN entries.) Does this mean that if the same SLURM file is
> provided to multiple RPs, those RPs both need to be "responsible
> for" all the ASNs and FQDNS contained therein?  Would this present a
> limit on the ability to reuse SLURM files for multiple recipients
> within a single administrative domain (that may span multiple ASNs
> and FQDNs)?
> Some editorial suggestions follow.
> Abstract:
> OLD:
>   [...] ISPs can also be able to use the RPKI to validate the
>   path of a BGP route.
> NEW:
>   [...] ISPs can also use the RPKI to validate the
>   path of a BGP route.


> Section 3.2
> OLD:
>   o  A SLURM Version indication that MUST be 1
> NEW:
>   o  A SLURM Version indication.  This document specifies version 1.


> Also, in
>      *  Zero or more target elements.  In this version of SLURM, there
>         are two types of values for the target: ASN or Fully Qualified
>         Domain Name(FQDN).  If more than one target line is present,
>         all targets MUST be acceptable to the RP.
> What’s the difference between a target element and a target line?

We authors have decided to drop the slurmTarget element completely. 

Initially the implementation team was thinking that it would be useful to have the ability to offer the same set of SLURM files to all RPs deployed in a network, where local config of the RP would then evaluate the applicability of each file. However, now that both implementations progressed we reconsider and we feel that it would be better to deal with this on the provisioning side. I.e. only offer the SLURM file(s) relevant to each RP.

> Section 3.5 (both subsections):
> "is locally configured with" does not mention SLURM at all as being
> involved in that configuration; perhaps it should.

We authors are going to make changes as follows: 


Each RP is locally configured with a (possibly empty) array of ROA
Prefix Assertions.

SLURM file(s) can be used to configure an RP with a (possibly empty) array of ROA
Prefix Assertions.

And similarly in 3.5.2

Each RP is locally configured with a (possibly empty) array of BGPsec

SLURM file(s) can be used to configure an RP with a (possibly empty) array of
BGPsec Assertions.

> Section 4.2
>   [...] To do so, the RP MUST
>   check the entries of SLURM file with regard to overlaps of the INR
>   assertions and report errors to the sources that created these SLURM
>   files in question.
> The "report errors to the sources" part seems ineligible for
> MUST-level requirement.
> Also, in case of conflict, does the "MUST NOT use them" apply to all
> SLURM files, only the ones with directly conflicting inputs, or only
> enough files to remove the conflict?

There is a MAY in the first sentence after all.

We will add in this section that ‘The RP gets multiple SLURM files as a set, and the whole set MUST be rejected in case of any overlaps between SLURM files.'

> Section 6
> I'm always a little sad to see security-relevant functionality (such
> as the transport with authenticity and integrity protection of SLRUM
> files over the network) left as out of scope with no examples of
> reasonable usage given.

We authors intend to work on a proposed standard mechanism for updating SLURM files through a secure API in the near future.

 The very proposal is intended to be in a separate draft for SIDROPS. 

> I also wonder if we would benefit from a little discussion of the
> potential routing issues that could arise from using a "broken" (or
> deliberately adversarial) SLURM file, though I expect that the
> target audience is probably pretty familiar with these already.

Well, it has been stated in this document:

 'Errors in the SLURM file used by an RP
  can undermine the security offered by the RPKI, to that RP.  It could
  declare as invalid ROAs that would otherwise be valid, and vice
  versa.  As a result, an RP must carefully consider the security
  implications of the SLURM file being used, especially if the file is
  provided by a third party.'

It is not clear to us what more we should cover here.