Re: [sidr] WGLC draft-sidr-rpki-rtr - take 2?

"t.petch" <ietfc@btconnect.com> Mon, 16 May 2011 20:27 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 645C7E07C4 for <sidr@ietfa.amsl.com>; Mon, 16 May 2011 13:27:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[AWL=-0.600, BAYES_00=-2.599, J_CHICKENPOX_12=0.6, J_CHICKENPOX_15=0.6]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yoDF-SnRRWEx for <sidr@ietfa.amsl.com>; Mon, 16 May 2011 13:27:18 -0700 (PDT)
Received: from mail.btconnect.com (c2beaomr06.btconnect.com [213.123.26.184]) by ietfa.amsl.com (Postfix) with ESMTP id 33507E07AA for <sidr@ietf.org>; Mon, 16 May 2011 13:27:16 -0700 (PDT)
Received: from host217-43-155-221.range217-43.btcentralplus.com (HELO pc6) ([217.43.155.221]) by c2beaomr06.btconnect.com with SMTP id DBL46741; Mon, 16 May 2011 21:27:13 +0100 (BST)
Message-ID: <017b01cc13ff$0cb6da40$4001a8c0@gateway.2wire.net>
From: "t.petch" <ietfc@btconnect.com>
To: Christopher Morrow <morrowc.lists@gmail.com>
References: <4DAF44AC.8060408@isi.edu><E3076C4C-F27C-40A8-A033-2EBB8C39A3D2@cisco.com><4DAF796C.7010807@isi.edu><BANLkTi=Oc-fEKOYCRQqM97wPxSSXjrdTRw@mail.gmail.com><409BDC5C-FE86-444A-BC0D-6DA00E7BF0F3@isi.edu><BANLkTikLi2p7UipJ!TRSQqVOL6GkLn=j9iA@mail.gmail.com><F0FABE61-FC1D-45ED-A21D-ED7A1228A997@isi.edu><01eb01cc0325$6e4fd260$4001a8c0@gateway.2wire.net><4DB592B3.3090805@isi.edu><033e01cc05a8$0a82f160$4001a8c0@gateway.2wire.net><4DB9A456.3060709@isi.edu> <BANLkTikg18FV5H0bOdOfWMzpTcm_B__EVQ@mail.gmail.com>
Date: Mon, 16 May 2011 21:25:38 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
X-Mirapoint-IP-Reputation: reputation=Fair-1, source=Queried, refid=tid=0001.0A0B0303.4DD188A1.004A, actions=TAG
X-Junkmail-Premium-Raw: score=7/50, refid=2.7.2:2011.5.16.194215:17:7.586, ip=217.43.155.221, rules=__HAS_MSGID, __OUTLOOK_MSGID_1, __SANE_MSGID, __TO_MALFORMED_2, __BOUNCE_CHALLENGE_SUBJ, __BOUNCE_NDR_SUBJ_EXEMPT, __MIME_VERSION, __CT, __CT_TEXT_PLAIN, __CTE, __HAS_X_PRIORITY, __HAS_MSMAIL_PRI, __HAS_X_MAILER, USER_AGENT_OE, __OUTLOOK_MUA_1, __USER_AGENT_MS_GENERIC, __ANY_URI, __FRAUD_BODY_WEBMAIL, __URI_NO_WWW, __URI_NO_PATH, BODY_SIZE_3000_3999, __MIME_TEXT_ONLY, RDNS_GENERIC_POOLED, BODY_SIZE_5000_LESS, RDNS_SUSP_GENERIC, __OUTLOOK_MUA, RDNS_SUSP, __FRAUD_WEBMAIL, BODY_SIZE_7000_LESS
X-Junkmail-Status: score=10/50, host=c2beaomr06.btconnect.com
X-Junkmail-Signature-Raw: score=unknown, refid=str=0001.0A0B020A.4DD188A2.014B, ss=1, fgs=0, ip=0.0.0.0, so=2010-07-22 22:03:31, dmn=2009-09-10 00:05:08, mode=multiengine
X-Junkmail-IWF: false
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] WGLC draft-sidr-rpki-rtr - take 2?
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 May 2011 20:27:19 -0000

Chris

Stepping back from the immediate technical question, I would be surprised
if the Security ADs would accept the Security Considerations in 2011.

I lack the knowledge of where these sessions will be from and too,
and see no guidance in any of the other I0Ds, but
suspect that they will span the Internet, ie totally different to an IDR
session.
And that suggests that anyone anywhere can attack them, so I would expect
to see a threat analysis and counters thereto.

Just my 0.02£

Tom Petch

----- Original Message -----
From: "Christopher Morrow" <morrowc.lists@gmail.com>
To: "Joe Touch" <touch@isi.edu>
Cc: "t.petch" <ietfc@btconnect.com>; "sidr wg list" <sidr@ietf.org>
Sent: Monday, May 16, 2011 8:25 PM
Subject: Re: [sidr] WGLC draft-sidr-rpki-rtr - take 2?


So.. this spun along for a time, the last real bit of controversy was
"to AO or not to AO"... The author(s) I think are off looking at
alternate options. For now we'll withdraw this WGLC and start another
once the authors have updates to report.

thanks though folks!
-Chris

On Thu, Apr 28, 2011 at 1:31 PM, Joe Touch <touch@isi.edu> wrote:
>
>
> On 4/28/2011 6:27 AM, t.petch wrote:
>>
>> ----- Original Message -----
>> From: "Joe Touch"<touch@isi.edu>
>> To: "t.petch"<ietfc@btconnect.com>
>> Cc: "Christopher Morrow"<morrowc.lists@gmail.com>; "sidr wg list"
>> <sidr@ietf.org>
>> Sent: Monday, April 25, 2011 5:26 PM
>>
>>> Hi, Tom,
>>>
>>> On 4/25/2011 1:47 AM, t.petch wrote:
>>> ....
>>>>
>>>> I think that the point is not that it is or is not a BGP connection
>>>> but that security for BGP was predicated on the assumption that
>>>> the TCP connection would be short in terms of hops, ie none,
>>>> and it was that that made a less stringent approach to security
>>>> acceptable, one that would not be acceptable for an Internet
>>>> wide access for - say - a Web site.
>>>
>>> Hopcount security, i.e., GTSM (RFC 3682) is not at all related to TCP-AO.
>>
>> Understood; I was thinking of RFC4278 which calls out the unusual nature
>> of
>> BGP sessions and the impact on security requirements.
>
> That document explains why TCP MD5 was considered appropriate for BGP, given
> the variance in the maturity level of the standards of the two docs.
>
> TCP-AO has no such assertions or qualifications. It is a general purpose
> mechanism that includes some properties useful for BGP, but that are also
> very relevant to exchanges between clients and caches as well.
>
>> I am familiar with TCP-AO from the TCPM list, but am not enough of a
>> cryptanalyst to know whether or not it is appropriate for rpki-rtr.
>>
>> By contrast, I have seen SSH and TLS discussed much more extensively
>> on their lists and have been part of the pain of adding them to syslog and
>> SNMP.
>>
>> And I do not know where these rpki-rtr sessions will go to and from but
>> suspect that they will not be BGP-like.
>
> BGP-like presumably means:
> - long lived
> - between known endpoints
> - over short IP hops
>
> Of these, only "long lived" had any impact on the TCP-AO design.
>
> Of these, any can be relevant to rpki-rtr sessions, from the traffic I've
> seen on this list.
>
> Keying is another relevant issue; configuration of SSH and TLS for
> pre-shared keys is different than for TCP MD5 (and TCP-AO, which uses
> similar master keys), and not the typical case.
>
> My point is that TCP-AO wasn't designed for BGP; it was designed as a
> general purpose mechanism.
>
> Joe
>
>