Re: [sidr] FW: New Version Notification for draft-sriram-replay-protection-design-discussion-00.txt

"Roque Gagliano (rogaglia)" <rogaglia@cisco.com> Mon, 22 October 2012 08:56 UTC

Return-Path: <rogaglia@cisco.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1559821F872E for <sidr@ietfa.amsl.com>; Mon, 22 Oct 2012 01:56:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id okhFsRBAPX0K for <sidr@ietfa.amsl.com>; Mon, 22 Oct 2012 01:56:40 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) by ietfa.amsl.com (Postfix) with ESMTP id AA00C21F8549 for <sidr@ietf.org>; Mon, 22 Oct 2012 01:56:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9354; q=dns/txt; s=iport; t=1350896201; x=1352105801; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=0qSlu9kay82LPOTaDMReOcuIkI9jB8XAeXOVFYXW0X0=; b=l5qdT1G37kpqrZSgjWys5faw/1GTEm03Yg7WFsMtYznfarWX0R7qABUW EQqs8x0m7XGt0hJw4S4nETJumWfrVi1CGH7GLZqaDJ5FinprBUkj9tEaz kfERJStqtlaYIV8XXFO1XEsfq26PzvEQvVg1Yowe2PJYey1VFQZv/OdzZ 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av8EAIEJhVCtJV2Z/2dsb2JhbABFwQuBCIIgAQEBAgEBEgEnMgoBAgULAgEIIhQFCzIcCQIEDg0ah1wGC5tbnx+RbmADi0ORAId8gWuCb4FaAgUCFwYY
X-IronPort-AV: E=Sophos;i="4.80,628,1344211200"; d="scan'208";a="133974162"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-2.cisco.com with ESMTP; 22 Oct 2012 08:56:40 +0000
Received: from xhc-rcd-x09.cisco.com (xhc-rcd-x09.cisco.com [173.37.183.83]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id q9M8ueMq005169 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 22 Oct 2012 08:56:40 GMT
Received: from xmb-rcd-x01.cisco.com ([169.254.1.176]) by xhc-rcd-x09.cisco.com ([173.37.183.83]) with mapi id 14.02.0318.001; Mon, 22 Oct 2012 03:56:39 -0500
From: "Roque Gagliano (rogaglia)" <rogaglia@cisco.com>
To: "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>
Thread-Topic: [sidr] FW: New Version Notification for draft-sriram-replay-protection-design-discussion-00.txt
Thread-Index: AQHNrTENYVfUFBdyXUOH4ZzYAxQB0Q==
Date: Mon, 22 Oct 2012 08:56:39 +0000
Message-ID: <EF4348D391D0334996EE9681630C83F0206C9D12@xmb-rcd-x01.cisco.com>
References: <D7A0423E5E193F40BE6E94126930C4930BA86CE472@MBCLUSTER.xchange.nist.gov> <EF4348D391D0334996EE9681630C83F0206BEF8F@xmb-rcd-x01.cisco.com> <EF4348D391D0334996EE9681630C83F0206C8BCE@xmb-rcd-x01.cisco.com> <D7A0423E5E193F40BE6E94126930C4930BA93472E0@MBCLUSTER.xchange.nist.gov>
In-Reply-To: <D7A0423E5E193F40BE6E94126930C4930BA93472E0@MBCLUSTER.xchange.nist.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.147.19.38]
x-tm-as-product-ver: SMEX-10.2.0.1135-7.000.1014-19294.004
x-tm-as-result: No--32.732700-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: text/plain; charset="us-ascii"
Content-ID: <C9249FF950A5F647A5AFEB57D0FFB68A@cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>
Subject: Re: [sidr] FW: New Version Notification for draft-sriram-replay-protection-design-discussion-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Oct 2012 08:56:42 -0000

Sriram,

Let me re-comment on some of the points.

(skip)

>> 
>> Particularly, I was surprised that in your assessment for the PKR method you did not considered the points highlighted in section 4.2 of our draft (Advantages/Disadvantages).
>> 
> 
> In your Section 4.2, you have proposed what looks like a hybrid of PKR and EKR methods
> (without using that specific taxonomy). We consider PKR and EKR as separate design choices, 
> and hence discussed their pros/cons separately. But I think we have captured many of 
> the same advantages/disadvantages you have outlined and some additional ones. 
> We are open to taking in comments and revising the document as needed; 
> so we will be happy to relook at that.

(Roque) As expressed in our document, there are many reasons to do key rollover for BGPSEC certificates, just like in any PKI. Using your taxonomy, can we consider EKR as emergency rollovers due to a key been compromised, changes on the certificate information or local policies? 

In my mind, the only thing that we we need to care about is if we follow the periodic scheduled periodic rollover process or an emergency rollover. In general the difference between the two is that in the emergency case there may not be the time to wait for the RPKI process to propagate the information.


> I have a question for you on your Section 4.2 regarding why you propose 
> to implement a hybrid of PKR and EKR. Let me take that up in a separate thread.
> 

(Roque) ok, I will take a look at that other email.

>> 
>> 2) Your summary statement: "The Expire Time (ET) method is best" does not represent the WG consensus when our draft was accepted as WG item and when the timestamp field was removed from the Protocol Specification. 
>> 
> 
> We are fully mindful of the WG consensus and we are in no way promoting 
> the ET method in the document. You took a piece of the whole statement 
> and made it appear like that was the summary of our document. 
> The actual statement (in Section 7) in the document is as follows:
> 
> "1.  The Expire Time (ET) method is best (on par with the PKR method)
>       in terms of preventing huge update workloads during peering and
>       policy change events at transit routers with several peers.  It
>       has no added RPKI churn.  But the ET method has the disadvantage
>       of requiring on-the-wire protocol change if some parameters
>       (e.g., the units of beacon interval) change."
> 
> The intent here was just to equate the ET and PKR methods in terms of update workload. 
> We would change the first sentence (when revised) to read: 
> "The ET and PKR method are on par in terms of preventing huge update workloads ......"  

(Roque) Again, the problem that the WG was concerned about when studying the ET value (and that was not covered in your document) was not the changes "on the wire" (although some discussion happened on who had control over the expiration time) but rather the changes on the BGP logic that has been around for decades. This point is not covered in your document.

> 
>> 
>> IMHO, the problem with your comparison between ET and PKR is that you did not mentioned that implementing ET introduces important changes to current BGP implementations. The design decision is to either maintain states in every BGP speaker (having to allocate an expiration time to every update and needing to check if that time is old) vs increase the churn at the RPKI repository system and more admin processes in the RPKI. The group took the second path.
>> 
> 
> It depends on how you see it. How would you keep track of the NotValidAfter time 
> of update signatures (as determined by the NotValidAfter time of the respective certs) 
> in the PKR method? If keeping track of this is done in the router, 
> then there is a need to maintain state even in the PKR method. OTOH, 
> if the RPKI cache server is sending a withdraw of the public key 
> when the cert's NotValidAfter time is reached, even then the BGP process needs 
> to scan the update tables and prune out the ones that are affected. 
> I think that also implies changes to the current BGP implementations anyway. 
> However, we did observe that with the ET method we have the disadvantage 
> that the expire-time field is built into on-the-wire BGPSEC protocol 
> and that is not a desirable feature.

(Roque) The need for the router (if the certificate signing requests are originated by the router) to keep track of the NotValidAfter time is ONLY for its own certificates. We covered this in our draft, particularly when we express as an advantage that the AS that wants to protect itself against a replay attacks pays most of the "Administrative cost" (Steve later corrected us that Relying Parties also pay a tax which will be included in our next release). Now, to keep track of the "NotValidAfter" time for the rest of the BGPSEC certificates you follow the traditional RPKI process: the caches fetch the repositories, if a certificate is not longer valid, they send a withdrawn to the routers for that SKI. The routers do not need to keep track of it because the cache will do it.

Moreover, we mention in the draft that the automatic process to make this to work (certificate provisioning, changes to the RTR protocol and how a router should react to a SKI withdrawn message) are not yet documented but we worked under the assumption that it would be shortly. We understand that other members of the SIDR WG are working on this piece and that is why we did not cover it. 

>> 
>> 3) Your study of EKR is very bias because the effect of event-driven key rollovers will depends on the event that is driving that key rollover. Particularly, and putting it on the same words that our draft uses, in this particular case you are comparing a rollover of the "transit" certificate key vs a rollover of the "origin" certificate key.
>> 
> 
> I think you are referring to slides 6-8 in
> http://www.nist.gov/itl/antd/upload/replay-discussion.pdf
> No, we are not comparing apples and oranges here. In these comparisons (see slide 8), 
> we do not focus at all on the rollover of the "origin" certificate key. 

(Roque) Ok, so you are focussing on the "transit" certificate rollover. This means that this is a different discussion and has nothing to do with the re-play attack as the technique we are pushing forward to control the windows of exposure are periodic rollovers of "origin" certificates keys. Is the goal then to compare the router's behavior when dealing with periodic vs emergency rollovers?

> That actually has a very minor impact on updates (as illustrated in slide 5) and 
> we don't focus on that in the plot in slide 8. Instead, what we consider in slides 6-8 is that 
> when the event occurs, in the PKR method no cert is rolled (by design). 

(Roque) I do not understand your comment " in the PKR method no cert is rolled (by design)". The transit certificate, as any PKI certificate, will need to be rollover due to two possible reasons: periodically (it has a long validity period but one day it will expire) and emergency (particularly key compromised). Now, in each of these cases, you need to perform a rollover process and you want to "do before break" (sometimes in emergency process you do not have this option and you break).

> But even then a certain amount of BGPSEC updates would be propagated similar to 
> what happens in conventional BGP-4. That is because the router will recompute new best paths 
> for the prefixes affected by the event, and those updates need to be propagated 
> even though no key has been rolled due to the event. 
> In some scenarios such as Scenario 1 in slide #6, no updates are generated in PKR 
> under those circumstances. But in another scenario such as Scenario 2 in slide #7, 
> a moderate burst of updates is generated in PKR (same number as in BGP-4). 
> However, in both scenarios, a huge burst of updates is generated in the EKR method 
> due to the transit key rollover which causes all prefix routes to be propagated 
> or re-propagated at that router. I hope this explanation helps.

(Roque) Sorry but I am still confused. In my view an emergency or a periodic key rollover will have the same effect on the BGPSEC layer with the difference that in the emergency case you may not have the chance to wait for the RPKI information to be propagated and thus you risk that the new BGP UPDATES do not validate. 

> 
>> 
>> As you wrote in the document, when you rollover the transit certificate, you gain the possibility to refresh transit policies which is not the case with either ET or only rolling over the origin certificate key using PKR. But rolling over the transit certificate key should be very rare because of the reasons that you and us mention.
>> 
> 
> I agree.
> 
> Thank you once again for reading and commenting on the document.
> 
> Regards,
> Sriram