[sidr] AD Review of draft-ietf-sidr-bgpsec-ops-10

"Alvaro Retana (aretana)" <aretana@cisco.com> Wed, 02 November 2016 15:35 UTC

Return-Path: <aretana@cisco.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A36A129699; Wed, 2 Nov 2016 08:35:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -16.017
X-Spam-Level:
X-Spam-Status: No, score=-16.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.497, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bWncUD8Gt_wA; Wed, 2 Nov 2016 08:35:20 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53918129430; Wed, 2 Nov 2016 08:35:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=33292; q=dns/txt; s=iport; t=1478100920; x=1479310520; h=from:to:cc:subject:date:message-id:mime-version; bh=737bmepz2SsqYT+7Ukk+Ac/CUQdrrqK6+lTXxREfCLU=; b=dr7CW5fteX8ndGAMEucFhNMtUHHMhzOEjA39LWb+tEEwWYWRJ7YSsZcD b72oIbPSV8Y1Va3+49M7LbckAZxanCtzA0B75aBmzkyLujoI6RsfPEhlI GPyGnODLZTZdJ5VmMhE6DqF8DvpZxYbl3S5uAakkh508nwck/qeh2vbWG E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BtAQDIBhpY/5xdJa1dGgEBAQECAQEBAQgBAQEBgnM5AQEBAQEfWIEDjTCrSIIHKIV6HIIIPxQBAgEBAQEBAQFiHQuEaCMKQwkSAQY6CgIEMCcEDhkHiDsOA49anTaNBgEBAQEBAQEBAQEBAQEBAQEBAQEBARcFhj2BfQiBS4U2gxotgi8FlD+FXgGGMooHgW6Eb4kskRsBHjZnhReHFSuBAoEMAQEB
X-IronPort-AV: E=Sophos;i="5.31,583,1473120000"; d="scan'208,217";a="164813576"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 02 Nov 2016 15:35:18 +0000
Received: from XCH-ALN-005.cisco.com (xch-aln-005.cisco.com [173.36.7.15]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id uA2FZIng005828 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 2 Nov 2016 15:35:19 GMT
Received: from xch-aln-002.cisco.com (173.36.7.12) by XCH-ALN-005.cisco.com (173.36.7.15) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Wed, 2 Nov 2016 10:35:18 -0500
Received: from xch-aln-002.cisco.com ([173.36.7.12]) by XCH-ALN-002.cisco.com ([173.36.7.12]) with mapi id 15.00.1210.000; Wed, 2 Nov 2016 10:35:18 -0500
From: "Alvaro Retana (aretana)" <aretana@cisco.com>
To: "draft-ietf-sidr-bgpsec-ops@ietf.org" <draft-ietf-sidr-bgpsec-ops@ietf.org>
Thread-Topic: AD Review of draft-ietf-sidr-bgpsec-ops-10
Thread-Index: AQHSNR62bJsPySrh80ivtkDVsKGkYA==
Date: Wed, 02 Nov 2016 15:35:18 +0000
Message-ID: <1FBAD3F8-5387-47A3-9988-A49A3133490A@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.1a.0.160910
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.82.232.125]
Content-Type: multipart/alternative; boundary="_000_1FBAD3F8538747A39988A49A3133490Aciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidr/OEIzTnCiPeomrkPpI2asbFZcB8Y>
Cc: Chris Morrow <morrowc@ops-netman.net>, "sidr-chairs@ietf.org" <sidr-chairs@ietf.org>, "sidr@ietf.org" <sidr@ietf.org>
Subject: [sidr] AD Review of draft-ietf-sidr-bgpsec-ops-10
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Nov 2016 15:35:24 -0000

Randy:

Hi!  Thanks for working on this document!

I have two issues I want to highlight upfront, and then some comments (below).  I would like to see these two issues addressed, along with the Major comments below, before moving the document forward.

These two upfront issues are probably more questions for the Chairs/Shepherd.

1. Why is this document a BCP?  A BCP is a document that describes “the community's best current thinking…on what is believed to be the best way to perform some operations” [rfc2026].  This document meets that bar of the description, but there is clearly not a lot of practice behind the considerations – which I think is reflected in the lack of significant comments from the WG.  I would prefer if this document as Informational, pending some actual experience.  But I’ll settle for a good explanation (to be also included in the Shepherd’s write-up) of why BCP.

2. This document, as a companion of draft-ietf-sidr-bgpsec-protocol, is the only place where Operational (or Management) Considerations are discussed.  However, important items recommended in RFC5706 (Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions), such as migration or fault management are not covered anywhere.  Given the tone and current content of this document, I don’t think extending it is the way forward -- so, in my review of draft-ietf-sidr-bgpsec-protocol [1], I asked the authors to include an Operations and Management Section there and to consider using this document as the base.  Merging this document into draft-ietf-sidr-bgpsec-protocol is an action that the WG/authors/Chairs/Shepherds should consider.  While that is my preferred solution, I will move forward with publication of this document if that is the consensus.

Thanks!

Alvaro.

[1] https://mailarchive.ietf.org/arch/msg/sidr/UOSfI4drrFvnO7271ivU3j9RFm4


Major:
M1. In Section 5, you wrote: “As they are not formally verifiable, an eBGP listener SHOULD NOT strongly trust unsigned security markings such as communities received across a trust boundary.”  After reading this piece of text several times, I think I picked up on the subtle message: don’t trust unsigned *security markings* -- vs what I got from the first n-1 readings: don’t trust communities.  I think that this paragraph would greatly benefit from more details or an example related to security markings.

M2. In Section 7. (Routing Policy): “As BGPsec will be rolled out over…a long time.  Hence a normal operator's policy SHOULD NOT be overly strict, perhaps preferring Valid paths and giving very low preference, but still using, Not Valid paths.”  This recommendation concerns me because “Not Valid” talks directly to the fact that the announcement is, well, not valid – vs just unable to be verified (because there’s no BGPsec_Path  attribute, for example).  The next sentence is a reflection of my concern: “Operators should be aware that accepting Not Valid announcements…will often be the equivalent of treating them as fully Valid.”  I-D.sidr-bgpsec-protocol suggests the same thing (in 5.1, pointing to this document).  I am left with the question: why validate at all if the BCP recommendation is to use all announcements no matter the state?  I obviously realize that it is still early days – maybe it is too early for a BCP document if the “practice” is not there yet…

M3. Also in Section 7: “…signed paths that are Not Valid and yet propagated…SHOULD have their signatures kept intact…”  Section 4.2. (Constructing the BGPsec_Path Attribute) of draft-ietf-sidr-bgpsec-protocol says: “a Signature_Block which is not deemed 'Valid'…such Signature_Blocks MUST NOT be removed.”  The “SHOULD” in this document is at odds with the “MUST NOT” in the BGPSec spec; please s/SHOULD/MUST, or (even better) s/SHOULD/should.

M4. Still in Section 7: “To prevent exposure of the internals of BGP Confederations [RFC5065], a BGPsec speaker which is a Member-AS of a Confederation MUST NOT sign updates sent to another Member-AS of the same Confederation.”  This is another case where the BGPSec spec says something different: Section 4.3. (Processing Instructions for Confederation Members) presents a mandatory mechanism that includes signing, but not necessarily validating.  BTW, if the updates are not signed, then the signed path would be broken, even if all the routers in the path support BGPSec, right?  Is that the recommendation?

M5. In Section 8: “…routers' clocks MUST be correct…”  What does this mean?  Correct with respect to what?  Later (2 paragraphs) you do mention RFC5905, should that be the reference here?  Maybe make the clock topic one paragraph to avoid confusion.


References:
R1. The reference to BGPsec should be draft-ietf-sidr-bgpsec-protocol (and not I-D.ietf-sidr-bgpsec-overview).  I think it is ok to reference I-D.ietf-sidr-bgpsec-overview in the Suggested Reading as an Informative reference.  Similarly, rfc6480, rfc6481 and rfc6482 should be made Informative as well.

R2. Section 7: “This implies that the route server creates signatures per client including its own AS in the BGPsec_Path and the target ASes, see 2.2.2 of [I-D.ietf-idr-ix-bgp-route-server].”  I think this reference is not correct because I-D.ietf-idr-ix-bgp-route-server doesn’t say anything about BGPSec.  That section does say the opposite: “the route server SHOULD NOT prepend its own AS number to the AS_PATH segment nor modify the AS_PATH segment in any other way”.  Maybe point at 4.2 of draft-ietf-sidr-bgpsec-protocol instead.

R3. RFC6811 should be a Normative reference.


Minor:
m1. The IPv4 examples in Section 7 should use addressed from rfc6890.

m2. In Section 7: “Therefore, unless local policy ensures otherwise, a signed path learned via iBGP MAY be Not Valid.”  That “MAY” is not normative in this context, but it is stating a fact: s/MAY/may.

m3. Also in Section 7: “If it is known that a BGPsec neighbor is not a transparent route server, and the router provides a knob to disallow a received pCount (prepend count, zero for transparent route servers) of zero, that knob SHOULD be applied.”  There are other cases when pCount 0 is ok, draft-ietf-sidr-as-migration for example.  I know that “SHOULD” allows other cases, but maybe working in the router server as an example might be an improvement.

m4. Section 9. (Security Considerations): “The major security considerations for the BGPsec protocol are described in [I-D.ietf-sidr-bgpsec-protocol].”  Are there other security considerations not mentioned there?



Nits:
n1. Introduction: “…origin validation…will occur over the next two to three years and that BGPsec will start to deploy well after that.”  Recommendation: avoid specific timeframes, be a little vaguer (short/medium/long term).  I noticed that the first version of draft-ymbk-bgpsec-ops also mentioned “two to five years” (in 2011!).

n2. s/ client cone, i.e. an RR client or the transitive closure of their customers' customers' customers' etc./ client cone, i.e. an RR client or reachable transitively through one of them.

n3. “As the vast majority (84%) of ASs are stubs, and they announce the majority of prefixes…” A reference would be nice.

n4. “Because of possible RPKI version skew…”  I guess you mean lack of sync…

n5. Security Considerations.  Please write something along the lines of: “This document describes operational considerations for the deployment of BGPsec.  The security considerations for BGPsec are…”