Re: [sidr] WGLC draft-sidr-rpki-rtr - take 2?

Christopher Morrow <morrowc.lists@gmail.com> Mon, 04 April 2011 13:16 UTC

Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidr@core3.amsl.com
Delivered-To: sidr@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0F7133A69EA for <sidr@core3.amsl.com>; Mon, 4 Apr 2011 06:16:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.467
X-Spam-Level:
X-Spam-Status: No, score=-103.467 tagged_above=-999 required=5 tests=[AWL=0.132, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZfQ8WjvgnF4l for <sidr@core3.amsl.com>; Mon, 4 Apr 2011 06:16:36 -0700 (PDT)
Received: from mail-wy0-f172.google.com (mail-wy0-f172.google.com [74.125.82.172]) by core3.amsl.com (Postfix) with ESMTP id 424A33A693B for <sidr@ietf.org>; Mon, 4 Apr 2011 06:16:36 -0700 (PDT)
Received: by wyb29 with SMTP id 29so5235839wyb.31 for <sidr@ietf.org>; Mon, 04 Apr 2011 06:18:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=/Cr6BLBycxV4hnf+cs8MlRPuCrv1xqzdSoH7QADfiVo=; b=HryN1ZPGWvL+39NPpHk33SAtYiwt8ImBmgMo8MUkr0wXumHto7jaUo40bZeakbhpPo FLp6KETN1I+uCJdiZsIihdbHk42PX7TYjTjCilUL/WIVur19HXzgJQBgGeqskH/iBH4/ plS89UZ4HQ1WkOpuHOPTfsANAQn7y54HKOT9Q=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; b=QwgOMTEYqIfM3B8mhJvwsH91BAe0q7ergtSJpBwGiXqKbQltf4bj0JsVs13ioS3f3l G8pe3W6NEgfr9Fb7lWuhOmXdYhT7+rrYK2wm2DDhcup6f7kdhSB8y1W6gxG1/r9azLBt DLZPhw5PnLOvOWfBHf9cg5y81rf5B1XXUWchY=
MIME-Version: 1.0
Received: by 10.216.191.168 with SMTP id g40mr204010wen.60.1301923098256; Mon, 04 Apr 2011 06:18:18 -0700 (PDT)
Sender: christopher.morrow@gmail.com
Received: by 10.216.185.16 with HTTP; Mon, 4 Apr 2011 06:18:17 -0700 (PDT)
In-Reply-To: <20110404125015.GA3277@juniper.net>
References: <AANLkTimq3hcdK7-f_Pa9sWJJOTzF_GBLcYu36sB3WszN@mail.gmail.com> <AANLkTikfn_ZRQNQx0QLV7fJa8DDeqMa=yRqWUH4krMHD@mail.gmail.com> <AANLkTinV88U3cF6z51eNtPeF-xKG1aWVgALd06CPq4kE@mail.gmail.com> <m2d3l6cj2l.wl%randy@psg.com> <289DB32D-D175-49DE-AA82-100407F64C23@juniper.net> <Pine.WNT.4.64.1104012156360.4612@mw-PC> <20110401210506.GA3082@juniper.net> <Pine.WNT.4.64.1104021120430.4612@mw-PC> <20110404083237.GA1860@juniper.net> <FFD0D281-AA3C-4CF2-8AF2-E1A2FE0A53A0@tcb.net> <20110404125015.GA3277@juniper.net>
Date: Mon, 04 Apr 2011 09:18:17 -0400
X-Google-Sender-Auth: 7AcFmua3xbisMChx9qv0iTcfnuw
Message-ID: <BANLkTi=eZ=pQ2gJfiPBfeb4frH8Tncempw@mail.gmail.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
To: Hannes Gredler <hannes@juniper.net>
Content-Type: text/plain; charset="ISO-8859-1"
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] WGLC draft-sidr-rpki-rtr - take 2?
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Apr 2011 13:16:37 -0000

On Mon, Apr 4, 2011 at 8:50 AM, Hannes Gredler <hannes@juniper.net> wrote:
> On Mon, Apr 04, 2011 at 08:22:42AM -0400, Danny McPherson wrote:
> |
> | On Apr 4, 2011, at 4:32 AM, Hannes Gredler wrote:
> |
> | >
> | > so my question is: "why do we need to solve the same problem
> | > (= protecting message integrity) 2 times in different ways" ?
> |
> | This new machinery simply introduces object-level integrity functions
> | in the application (i.e., BGP), it does nothing to ameliorate attacks
> | at lower layers - all those substrate attack vectors (e.g., transport
> | connection resets, injection or replay attacks) still exist and
> | require controls as well -- else things might break in even uglier ways
> | at higher layers.
>
> still that does not answer my question: why do we need to solve the problem
> of transport integrity twice (or to play devils advocate:
> shall we encapsulate BGP into SSH up until something better than MD5
> is available ;-))

some folks (not me) suggest that ipsec is the way to go here... (bgp I mean)
I think one point to keep in mind is that tcp-ao has exactly zero
implementations... while SSH implementations abound.

-chris