Re: [sidr] bgpsec-spec S. 4.2 comments

Jakob Heitz <jakob.heitz@ericsson.com> Wed, 02 May 2012 15:06 UTC

Return-Path: <jakob.heitz@ericsson.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B57A21F8541 for <sidr@ietfa.amsl.com>; Wed, 2 May 2012 08:06:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.353
X-Spam-Level:
X-Spam-Status: No, score=-6.353 tagged_above=-999 required=5 tests=[AWL=0.246, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qkeAihC2dYv9 for <sidr@ietfa.amsl.com>; Wed, 2 May 2012 08:06:25 -0700 (PDT)
Received: from imr4.ericy.com (imr4.ericy.com [198.24.6.9]) by ietfa.amsl.com (Postfix) with ESMTP id F14E911E807F for <sidr@ietf.org>; Wed, 2 May 2012 08:06:16 -0700 (PDT)
Received: from eusaamw0706.eamcs.ericsson.se ([147.117.20.31]) by imr4.ericy.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id q42F6Fda004125; Wed, 2 May 2012 10:06:16 -0500
Received: from EUSAACMS0701.eamcs.ericsson.se ([169.254.1.6]) by eusaamw0706.eamcs.ericsson.se ([147.117.20.31]) with mapi; Wed, 2 May 2012 11:06:10 -0400
From: Jakob Heitz <jakob.heitz@ericsson.com>
To: "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>
Date: Wed, 02 May 2012 11:06:37 -0400
Thread-Topic: [sidr] bgpsec-spec S. 4.2 comments
Thread-Index: Ac0odRsrcoeHB3mOQ+e9bOwx5Ui5gw==
Message-ID: <01068404-27B5-42B6-B1BF-9F1CABA8B3AA@ericsson.com>
References: <D7A0423E5E193F40BE6E94126930C4930B98F86215@MBCLUSTER.xchange.nist.gov>
In-Reply-To: <D7A0423E5E193F40BE6E94126930C4930B98F86215@MBCLUSTER.xchange.nist.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "John Scudder (jgs@juniper.net)" <jgs@juniper.net>, "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>
Subject: Re: [sidr] bgpsec-spec S. 4.2 comments
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 May 2012 15:06:26 -0000

that's also flawed.
You should be able to sign anything that you can.

Suppose you receive it from an ibgp peer that sourced it but didn't sign it.

--
Jakob Heitz.


On May 2, 2012, at 7:21 AM, "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov> wrote:

> John Scudder asked the following question in an email to the
> authors of draft-ietf-sidr-bgpsec-protocol:
> 
>> From: John G. Scudder <jgs@juniper.net>
>> Date: Wed, Apr 18, 2012 at 8:00 PM
>> Subject: bgpsec-spec S. 4.2 comments
>> 
>> A few misc questions/comments I noticed while perusing S. 4.2:
>> 
>> "A BGPSEC speaker MUST NOT generate an update message containing the
>> BGPSEC_Path_Signatures attribute unless it has selected, as the best
>> route to the given prefix, a route that it received in an update
>> message containing the BGPSEC_Path_Signatures attribute."
>> 
>> What's the rationale for this MUST NOT? Certainly it's an assumption of the base
>> protocol, but I assume it wouldn't need to be called out here unless it bore on
>> some BGPSEC-specific issue. This is relevant in the context of draft-ietf-idr-add-
>> paths, which allows non-best paths to be sent in BGP.
>> 
> 
> The authors have agreed that the above text in the bgpsec spec 
> document (quoted by John) certainly seems problematic.
> The authors agreed to make the following text substitution:
> (there was also consensus on this at the SIDR Interim meeting April 30, 2012):
> 
> "If a BGPSEC router has received an _unsigned_ route from a peer and
> if it chooses to propagate that route, then it MUST NOT attach any
> BGPSEC_Path_Signatures attribute to the corresponding update being propagated."
> 
> It was also agreed that we further add (if not already clearly stated
> elsewhere in the spec):
> 
> "If a BGPSEC router has received a _signed_ update,
> and if it chooses to propagate that route, then the router SHOULD propagate
> the corresponding update with BGPSEC_Path_Signatures attribute
> (after adding its own signature)."
> 
> These substitutions would help keep the text unambiguous, and
> also inclusive of (or at least not conflicting with) draft-ietf-idr-add-paths.
> 
> Sriram
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr