Re: [sidr] BGPSEC Threat Model ID

Danny McPherson <danny@tcb.net> Sat, 05 November 2011 02:31 UTC

Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6F851F0C65 for <sidr@ietfa.amsl.com>; Fri, 4 Nov 2011 19:31:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.377
X-Spam-Level:
X-Spam-Status: No, score=-102.377 tagged_above=-999 required=5 tests=[AWL=0.221, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V-sC4-BnT83S for <sidr@ietfa.amsl.com>; Fri, 4 Nov 2011 19:31:12 -0700 (PDT)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id E5C9C1F0C58 for <sidr@ietf.org>; Fri, 4 Nov 2011 19:31:11 -0700 (PDT)
Received: by dog.tcb.net (Postfix, from userid 0) id 296E6268063; Fri, 4 Nov 2011 20:31:00 -0600 (MDT)
Received: from dul1dmcphers-m1.home (pool-98-118-240-226.clppva.fios.verizon.net [98.118.240.226]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; for sidr@ietf.org; Fri, 04 Nov 2011 20:30:59 -0600 (MDT) (envelope-from danny@tcb.net)
X-Avenger: version=0.7.8; receiver=dog.tcb.net; client-ip=98.118.240.226; client-port=62605; syn-fingerprint=65535:48:1:64:M1460,N,W3,N,N,T,S MacOS 10.4.8; data-bytes=0
From: Danny McPherson <danny@tcb.net>
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary="Apple-Mail-7-703143558"
Date: Fri, 04 Nov 2011 22:30:43 -0400
In-Reply-To: <m2pqh71hdz.wl%randy@psg.com>
To: sidr wg list <sidr@ietf.org>
References: <E96517DD-BAC7-4DD8-B345-562F71788C6A@tcb.net> <p06240807cad42f85eb7d@193.0.26.186> <32744.216.168.239.87.1320175657.squirrel@webmail.tcb.net> <p06240801cad6ab773279@193.0.26.186> <D9A38669-883D-4090-9F95-BC5C63220950@tcb.net> <p06240801cad800485596@193.0.26.186> <EEBF68E0-FAD9-4AF3-B81B-78760D200D9B@tcb.net> <p06240808cad85ff73d61@193.0.26.186> <080F8FFF-D2C7-4414-B53A-233F88D2009F@vpnc.org> <CAFU7BATC-6DUDNuadakwSa5wj0ryy0=49=XveBXD5Wv=5JL-ag@mail.gmail.com> <m2aa8c489s.wl%randy@psg.com> <53FA9B4A-552C-4998-8F69-592A0F5AA13B@verisign.com> <CAL9jLaZj1wcmDnbm1f9=csUv2Uuq_w3rS6UEYmUHAQDPWT9zFg@mail.gmail.com> <m262iz2xl8.wl%randy@psg.com> <A2661B25-CC2E-44E4-93CE-5AFE4F67E4DA@verisign.com> <m2pqh71hdz.wl%randy@psg.com>
Message-Id: <E1869D97-1EC0-4D43-A660-8999AEDF4A11@tcb.net>
X-Mailer: Apple Mail (2.1084)
Subject: Re: [sidr] BGPSEC Threat Model ID
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Nov 2011 02:31:12 -0000

On Nov 4, 2011, at 9:34 PM, Randy Bush wrote:

> o We can not know intent, should Mary have announced the prefix to Bob
> 
> o But Joe can formally validate that Mary did announce the prefix to Bob
> 
> o Policy on the global Internet changes every 36ms, new customers, new
>  peers, circuit moves, ...
> 
> o We already have a protocol to distribute policy or its effects, it is
>  called BGP 
> 
> o BGPsec validates that the protocol has not been violated, and is not
>  about intent or business policy

o And therefore, BGPsec does not mitigate the leak problem, agreed

o Not mitigating the leak problem could be an unacceptable residual
risk to many looking to better secure BGP, particularly given that it's a 
natural evolution to attackers in a world of "BGPSEC/SBGP", and can 
happen as a simple matter of misconfiguration, as Jared's leak page
illustrates: http://puck.nether.net/bgp/leakinfo.cgi

o BGPSEC is awfully heavy to not address this fundamental "business 
policy" vulnerability

o As for "bits on the wire" solutions, I don't recall seeing that as a hard 
requirement, although I will admit that BGPSEC certainly goes a long 
way to turn RPKI into "bits on the wire", which has _many implications

o I'm pretty sure I can configure static routes every 36ms with far less 
overhead

o By your definition, I'd prefer to solve the "business policy" problem.

-danny