Re: [sidr] request for agenda items for interim meeting 6 Jun

"Murphy, Sandra" <Sandra.Murphy@sparta.com> Wed, 30 May 2012 16:11 UTC

Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11F4811E8083 for <sidr@ietfa.amsl.com>; Wed, 30 May 2012 09:11:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.535
X-Spam-Level:
X-Spam-Status: No, score=-102.535 tagged_above=-999 required=5 tests=[AWL=0.064, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o98ua+g3TFeU for <sidr@ietfa.amsl.com>; Wed, 30 May 2012 09:11:16 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 324F411E808D for <sidr@ietf.org>; Wed, 30 May 2012 09:11:08 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id q4UGAHmE023420; Wed, 30 May 2012 11:10:17 -0500
Received: from Hermes.columbia.ads.sparta.com ([157.185.80.107]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id q4UGAGLh023121; Wed, 30 May 2012 11:10:17 -0500
Received: from HERMES.columbia.ads.sparta.com ([2002:9db9:506b::9db9:506b]) by Hermes.columbia.ads.sparta.com ([::1]) with mapi id 14.01.0355.002; Wed, 30 May 2012 12:10:16 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "John G. Scudder" <jgs@juniper.net>, Matt Lepinski <mlepinski@bbn.com>
Thread-Topic: [sidr] request for agenda items for interim meeting 6 Jun
Thread-Index: AQHNM6/4vkOTGr4FY0qnZHxk5Z062pbU2chygAFoXoCAAFw9gIAABfwAgArHD4CAARR23g==
Date: Wed, 30 May 2012 16:10:16 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F625F12333@Hermes.columbia.ads.sparta.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F60F70A267@Hermes.columbia.ads.sparta.com> <24B20D14B2CD29478C8D5D6E9CBB29F625F0975D@Hermes.columbia.ads.sparta.com> <4FBBB6D1.9000008@bbn.com> <m2r4ub7vta.wl%randy@psg.com> <4FBC0936.7000905@bbn.com>, <5BA9D6DE-BE0E-4922-9E09-7B85BD6F9342@juniper.net>
In-Reply-To: <5BA9D6DE-BE0E-4922-9E09-7B85BD6F9342@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [157.185.63.118]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "sidr@ietf.org list" <sidr@ietf.org>
Subject: Re: [sidr] request for agenda items for interim meeting 6 Jun
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 May 2012 16:11:17 -0000

Speaking as regular ol' wg member:

Thanks for all of this John.  Excellent thoughts.

>Philosophically, the thing that makes me worry the most is that we're 
>cutting out one of BGP's fundamental elements and replacing it with one 
>which provides only a subset of its semantics. Specific things missing 
>include:

I'm very interested in exploring semantics of the AS_PATH that the signature attribute does not capture.

As for the particular uses you note:

>
>- Confederations. But we are discussing ways to fix this.
>- Extensibility to include new segment types. In principle this is a fairly 
>serious omission, but one can argue that new segment types can't be 
>introduced in practice, since existing implementations will treat them 
>as fatal errors.

As you note, there was a good discussion at the Apr 30 interim about confederations.  We probably need to document it, a minor question being where it belongs (what document).

About extensibility - as you say, any new segment type not built into implementations would result in fatal errors.  So any new segment type would need to be built into implementations before use.  The question then becomes - can the signature attributes also be augmented at the same time to deal with the new segment types?

If a new segment type has a trust model, then there could be a simultaneously developed new security attribute to protect it.  If the new type's trust model matches the existing AS_PATH trust model, then new protections could be a new type or version of the existing  signature attribute.

So the AS_PATH extensibility could be maintained in the security protections - as long as the new extension is "protectable".


>The other issue is one Shane already brought up on this thread -- 
>the fact that some of the more egregious AS_PATH editing hacks 
>that exist in the wild may not be supportable in the AS_PATH-less 
>new world order. 

I am quite sure I don't know the complete list of AS_PATH knobs!

But some of those I do know are hacks that would allow attacks as well.  The fact that the security protections prohibit the attacks is a good thing.  If there's a way to identify good, not evil, uses, then we can design for that.  But in cases where there's no real way to distinguish the good from the evil, we're in a hard place.  Shoot a hole in the protection to allow the hack or prohibit the hack.

--Sandy, speaking as regular ol' wg member

________________________________________
From: sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of John G. Scudder [jgs@juniper.net]
Sent: Tuesday, May 29, 2012 2:21 PM
To: Matt Lepinski
Cc: sidr@ietf.org list
Subject: Re: [sidr] request for agenda items for interim meeting 6 Jun

On May 22, 2012, at 5:46 PM, Matt Lepinski wrote:

> Other than confeds are there any other potentially open issues related to the removal of AS_Path?

(I think this just recapitulates what I said at the interim, but maybe it's worth saying again for the list.)

Philosophically, the thing that makes me worry the most is that we're cutting out one of BGP's fundamental elements and replacing it with one which provides only a subset of its semantics. Specific things missing include:

- Confederations. But we are discussing ways to fix this.
- Extensibility to include new segment types. In principle this is a fairly serious omission, but one can argue that new segment types can't be introduced in practice, since existing implementations will treat them as fatal errors.

And actually, that's it for my list of specifics. I think we can check off the "done, in principle" box for confeds. So the remaining issue is extensibility. One may or may not find the "extensibility doesn't work anyway" argument compelling, I'm not entirely sure *I* do. In any case, I think this deserves a good airing before we commit.

The other issue is one Shane already brought up on this thread -- the fact that some of the more egregious AS_PATH editing hacks that exist in the wild may not be supportable in the AS_PATH-less new world order. (Many of the less egregious ones seem to be OK with appropriate pcount gyrations.) The pros and cons are a bit slippery here since even if we continue to carry AS_PATH, if the BGPSEC_Path_Signatures attribute can't represent the semantics of what's in that AS_PATH, then validation will fail. But at least there's scope for a network operator on the receiving end to tolerate the validation failure and use the route anyway, if desired. In the case where there's no AS_PATH, the data are just gone with no chance for appeal.

It's also worth noting that leaving AS_PATH in would not be without cost. In the cases where the content of AS_PATH is isomorphic to that of BGPSEC_Path_Signatures, there's no problem -- but in those cases AS_PATH clearly could have been left out. In the remaining cases, what is the implementation supposed to do? It would be necessary to carefully specify. The easiest cop-out would be to say that in all such cases, the route fails validation. But I have a feeling that it's not that easy. Leaving AS_PATH out reduces that particular maze of twisty passages, although it replaces it with another: making sure it was really OK to axe AS_PATH to begin with (i.e., the discussion above).

I'm going to forward this to IDR to ensure that those who aren't following SIDR are aware there's a proposal to phase out AS_PATH in favor of a simplified replacement in BGPSEC.

--John
_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr