Re: [sidr] WGLC: draft-ietf-sidr-bgpsec-reqs

Brian Dickson <brian.peter.dickson@gmail.com> Mon, 14 November 2011 15:05 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AE121F0C6E; Mon, 14 Nov 2011 07:05:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.431
X-Spam-Level:
X-Spam-Status: No, score=-3.431 tagged_above=-999 required=5 tests=[AWL=-0.059, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, SARE_SUB_OBFU_Q1=0.227]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nO9AGzon0FAC; Mon, 14 Nov 2011 07:05:41 -0800 (PST)
Received: from mail-fx0-f44.google.com (mail-fx0-f44.google.com [209.85.161.44]) by ietfa.amsl.com (Postfix) with ESMTP id F0F5F1F0C6C; Mon, 14 Nov 2011 07:05:37 -0800 (PST)
Received: by faap16 with SMTP id p16so1054164faa.31 for <multiple recipients>; Mon, 14 Nov 2011 07:05:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=BHOWmR/R/A0+LZRUHrTf9+owWTkqOMyboj2Rm0xTBfc=; b=ZFLQGhElcgidxc+TDK5BBesQWdnUHLEZ+IXBiOXDy5SwvRIL31bl2NbNgKKN/Ttb8/ ZyKLwTC+g7r8SSF0ZcicnD5W5vyylDXspKa733PaVDp+WYn9rTqEpgEktjUklXqhoJZN It1Adfa3dxwYfVrxiHyT6w1/p/Kcji/j+Q0Ms=
MIME-Version: 1.0
Received: by 10.204.136.211 with SMTP id s19mr12797251bkt.28.1321283137003; Mon, 14 Nov 2011 07:05:37 -0800 (PST)
Received: by 10.223.54.15 with HTTP; Mon, 14 Nov 2011 07:05:36 -0800 (PST)
In-Reply-To: <CAL9jLaa+L-C7+Gp54BpM8FjAj+EFMabwQB9SsPW0N4QnFEfVGw@mail.gmail.com>
References: <CAL9jLaa+L-C7+Gp54BpM8FjAj+EFMabwQB9SsPW0N4QnFEfVGw@mail.gmail.com>
Date: Mon, 14 Nov 2011 10:05:36 -0500
Message-ID: <CAH1iCiqZ_+PvWhhpaM7bi_YdNm6wVmu4kboWoWk=8Lc5kWjHdA@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Christopher Morrow <christopher.morrow@gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"
Cc: sidr-chairs@ietf.org, draft-ietf-sidr-bgpsec-reqs@tools.ietf.org, sidr@ietf.org
Subject: Re: [sidr] WGLC: draft-ietf-sidr-bgpsec-reqs
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Nov 2011 15:05:42 -0000

On Fri, Oct 28, 2011 at 2:40 PM, Christopher Morrow
<christopher.morrow@gmail.com> wrote:
> Seems that the authors, at least, expect this doc to be prepared for
> WGLC, could we do that concluding 11/11/11 please?

Sorry, didn't notice the date in the request.

I do have some brief comments about a few bullet points.

3.17 says "no requiring revealing new inter-domain policy info".
3.21 says "don't infer anything regarding intent".
3.22 says "don't trust non-BGPsec markings across trust boundaries".
e.g. communities.

However (whether this has been acknowledged in the "threat" doc or
not), one of the concerns is the ability of BGP speakers, and
presumably this will include BGPsec speakers, to manipulate route
attributes to attract traffic. Another concern is "route leaks" (which
we may not all yet agree on either a definition of, or the scope of
what is/isn't a "route leak").

It'd be a long proof to show this, but I believe it is the case that:
- route path manipulation (outside of the "expected" paths) can only
occur if "route-leak" capabilities exist, i.e. that "route-leaks" are
not prevented via some BGPsec mechanisms. Suggestion: A BGPsec design
MAY include elements designed to mitigate "route leaks".
- (refuting 3.21) This may require marking intent. Suggested text: A
BGPsec design MAY require explicit signaling of intent between
neighbor ASes, and to "mark" in some limited form, that intent inside
a (presumably mandatory) element of a BGPsec design (e.g. via a BGPsec
path element).
- (leads to negation of 3.17) It MAY be necessary to reveal some
aspect of inter-domain policy which can already be accurately inferred
via third-party data and tools -- specifically, and limited only, to
customer/transit/peer.

Additionally:
- BGPsec design(s) SHOULD mark attributes used in path selection which
are transitive, and MAY mark attributes used in path selection which
are non-transitive. (This is necessary for 3.22 to apply and still
avoid path manipulation occurring.)

Brian