Re: [sidr] BGPSEC Threat Model ID

Eric Osterweil <eosterweil@verisign.com> Sat, 05 November 2011 01:30 UTC

Return-Path: <eosterweil@verisign.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41EEE1F0C4F for <sidr@ietfa.amsl.com>; Fri, 4 Nov 2011 18:30:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.586
X-Spam-Level:
X-Spam-Status: No, score=-6.586 tagged_above=-999 required=5 tests=[AWL=0.013, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P+CU3hShXwDN for <sidr@ietfa.amsl.com>; Fri, 4 Nov 2011 18:30:01 -0700 (PDT)
Received: from exprod6og116.obsmtp.com (exprod6og116.obsmtp.com [64.18.1.37]) by ietfa.amsl.com (Postfix) with ESMTP id 421681F0C3F for <sidr@ietf.org>; Fri, 4 Nov 2011 18:30:01 -0700 (PDT)
Received: from peregrine.verisign.com ([216.168.239.74]) (using TLSv1) by exprod6ob116.postini.com ([64.18.5.12]) with SMTP; Fri, 04 Nov 2011 18:30:01 PDT
Received: from dul1wnexcn03.vcorp.ad.vrsn.com (dul1wnexcn03.vcorp.ad.vrsn.com [10.170.12.113]) by peregrine.verisign.com (8.13.6/8.13.4) with ESMTP id pA51TNxY009555; Fri, 4 Nov 2011 21:29:23 -0400
Received: from dul1eosterwe-m1.vcorp.ad.vrsn.com ([10.100.0.35]) by dul1wnexcn03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 4 Nov 2011 21:29:23 -0400
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Eric Osterweil <eosterweil@verisign.com>
In-Reply-To: <m262iz2xl8.wl%randy@psg.com>
Date: Fri, 04 Nov 2011 21:29:22 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <A2661B25-CC2E-44E4-93CE-5AFE4F67E4DA@verisign.com>
References: <E96517DD-BAC7-4DD8-B345-562F71788C6A@tcb.net> <p06240807cad42f85eb7d@193.0.26.186> <32744.216.168.239.87.1320175657.squirrel@webmail.tcb.net> <p06240801cad6ab773279@193.0.26.186> <D9A38669-883D-4090-9F95-BC5C63220950@tcb.net> <p06240801cad800485596@193.0.26.186> <EEBF68E0-FAD9-4AF3-B81B-78760D200D9B@tcb.net> <p06240808cad85ff73d61@193.0.26.186> <080F8FFF-D2C7-4414-B53A-233F88D2009F@vpnc.org> <CAFU7BATC-6DUDNuadakwSa5wj0ryy0=49=XveBXD5Wv=5JL-ag@mail.gmail.com> <m2aa8c489s.wl%randy@psg.com> <53FA9B4A-552C-4998-8F69-592A0F5AA13B@verisign.com> <CAL9jLaZj1wcmDnbm1f9=csUv2Uuq_w3rS6UEYmUHAQDPWT9zFg@mail.gmail.com> <m262iz2xl8.wl%randy@psg.com>
To: Randy Bush <randy@psg.com>
X-Mailer: Apple Mail (2.1084)
X-OriginalArrivalTime: 05 Nov 2011 01:29:23.0112 (UTC) FILETIME=[5919B280:01CC9B5A]
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] BGPSEC Threat Model ID
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Nov 2011 01:30:02 -0000

On Nov 4, 2011, at 8:59 PM, Randy Bush wrote:

>> Point being that in cases like this (or really all route leak cases)
>> the only thing that stops this is filtering routes between bgp peers.
>> (transits, customers, SFP peers) There isn't anything in the protocol
>> itself (which is Stephen's, Russ's, Randy's comment through out) that
>> tells you/me/them that 12989 should not be permitted to announce this
>> route. (looking at available data, it seems that they SHOULD, perhaps
>> not with this ASPath, but...)
> 
> we can not know intent.
> 
> to take it to one extreme, did the pakistani operator mean to 'leak'
> youtube's prefix or not?

So, in the spirit of not forking the thread too many more times than necessary, I'll try to speak to both of these comments here.  Sorry, if this misses some of context from the snipped text, lemme know if there was important context I missed and I'll backup to that).

I think the distinction between a leak and something more intentional s a matter of policy.  Knowing the policy associated with the adjacencies that an AS is leaking over would allow leaked announcements to be identified, right (or am I in the weeds on this)?  If so, then one could use policy to filter announcements that violate that.  If an intentional leak (i.e. path hijack) were launched, one could use the policy statements that authorized the leak as evidence of intent, or at least a hammer to hit someone over the head with.

As for Pakistan, iirc that was an origin hijack.  In this case, the origin authenticity was the issue, and that problem should be solved through resource certification.

Eric