Re: [sidr] Draft minutes from IETF78 Maastricht

Sandra Murphy <Sandra.Murphy@sparta.com> Wed, 25 August 2010 08:55 UTC

Return-Path: <Sandra.Murphy@cobham.com>
X-Original-To: sidr@core3.amsl.com
Delivered-To: sidr@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF8C43A67F3 for <sidr@core3.amsl.com>; Wed, 25 Aug 2010 01:55:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.458
X-Spam-Level:
X-Spam-Status: No, score=-102.458 tagged_above=-999 required=5 tests=[AWL=0.141, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LombgMnisxqw for <sidr@core3.amsl.com>; Wed, 25 Aug 2010 01:55:34 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by core3.amsl.com (Postfix) with ESMTP id 255583A67F0 for <sidr@ietf.org>; Wed, 25 Aug 2010 01:55:33 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id o7P8u6eD015259 for <sidr@ietf.org>; Wed, 25 Aug 2010 03:56:06 -0500
Received: from mailbin2.ads.sparta.com (mailbin.sparta.com [157.185.85.6]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id o7P8u70J016355 for <sidr@ietf.org>; Wed, 25 Aug 2010 03:56:07 -0500
Received: from SMURPHY-LT.columbia.ads.sparta.com ([10.71.0.201]) by mailbin2.ads.sparta.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675); Wed, 25 Aug 2010 04:56:06 -0400
Date: Wed, 25 Aug 2010 04:56:05 -0400
From: Sandra Murphy <Sandra.Murphy@sparta.com>
To: sidr@ietf.org
In-Reply-To: <Pine.WNT.4.64.1008250324190.5868@SMURPHY-LT.columbia.ads.sparta.com>
Message-ID: <Pine.WNT.4.64.1008250455120.5868@SMURPHY-LT.columbia.ads.sparta.com>
References: <Pine.WNT.4.64.1008250324190.5868@SMURPHY-LT.columbia.ads.sparta.com>
X-X-Sender: sandy@mailbin.sparta.com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-OriginalArrivalTime: 25 Aug 2010 08:56:06.0296 (UTC) FILETIME=[5A864180:01CB4433]
Subject: Re: [sidr] Draft minutes from IETF78 Maastricht
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Aug 2010 08:55:41 -0000

And this one, too:

On Wed, 25 Aug 2010, Sandra Murphy wrote:

> Here are the draft minutes from IETF78 in Maastricht.  Thanks to Vesna 
> Manojlovic for volunteering to produce the minutes.
>
> Please send corrections, comments, additions, etc., to the list.  Final 
> minutes are due 15 Sept.
>
> These minutes have been uploaded to the IETF web site.
>
> --Sandy

   --Sandy, speaking as wg chair

>
> Secure Inter-Domain Routing WG (sidr)
> 78th IETF, Maastricht WEDNESDAY, July 28, 2010 1300-1530  Afternoon Session I
> Auditorium 2
> =====================================================
> CHAIR(s): Sandra Murphy <Sandra.Murphy at Sparta.com>
>          Chris Morrow <morrowc@ops-netman.net>
> 	(audio recording available)
> AGENDA:
> 1) Administrivia
>   - Mailing list: http://www.ietf.org/mail-archive/web/sidr/index.html
>   - WG Resources: http://tools.ietf.org/wg/sidr/
>   - Minute taker: Vesna Manojlovic
>   - Jabber Scribe: Warren Kumari
>   - Blue Sheets
>   - Agenda Bashing
>
> Last Call status (slide #5)
> New WG documents (slide #6)
>
>
> 2) Requested Discussion Topics
>
> a) Removing TLS from the Provisioning Protocol Rob Austein 
> http://www.ietf.org/proceedings/78/slides/sidr-0.pdf
>
> TLS was added to  "up-down protocol" specification.
> TLS would theoretically protect from Replay Attack (example).
> Easier Replay protection; CMS timestamps, serial numbers,
> CMS introduces another problem, with MitM.
>
> Gregory: reboot.
> There are details that need to be worked out.
> A: Serial number
>
> Robert K.: if the MitM consistently keeps dropping messages, that is DoS.
>
> Jabber: Mike Hammond: if you include in your message which time-stampt you 
> are obsoleting, that solves it.
> A: Gaps in the sequence, clock is not good enough.
>
> Speaker: We do not currently have with TLS protection against MitM. It could 
> be a good additional requirement, but we would not lose it if we drop TLS.
>
> b) Alternative to the Trust Anchor Format Samuel Weiler
> http://www.ietf.org/proceedings/78/slides/sidr-11.pdf
> draft-weiler-sidr-trust-anchor-format
>
> Randy Bush: I disagree, we often have opportunities to simplify the drafts. I 
> suggest we do not pass on this one.
>
> Robert: I prefer this one.
> Steve Kent: 1) it tries to re-define trust anchors, no need.
> 3779 tells you.
> This is the alternative.
> Q: What do you call it?
> Mechanism to verify the ... (?!)
> "something different".
> If this is going to become an Equivalent alternative, I've already suggested 
> some changes in the comments to the list...
>
> Sandy: So, I hear there are some wording issues, no significant objection?
>
> A: If you add Second level, and the CRL.
>
> Randy: I would stress "explicit requirements".
>
> Rob Austin: I support it.
> A question to Steve: level of indirection, two level approach is a MUST?
> Does the WG agree to it being a MUST, or a SHOULD?
> I seem to recall the list supports the SHOULD. Why MUST?
> Steve Kent: Mandating good security practices.
> Sandy: I'll put the question to the mailing list.
>
> 3) Key Rollover
>    (a) Key Rollover at RIPE     NCC
>        Presenter: Tim Bruijnzeels
> http://www.ietf.org/proceedings/78/slides/sidr-1.pdf
>
> Roque: Is deletion also manual, or the batch process?
> A: The start is manual, the rest is automated. I'm happy to do it either way.
>
> Rob Austin: I understood that all the algorithms are the same.
> Differences: no waiting period (?!) [staging period?]
> A: We go straight to the publication.
>
>    (b) Key Rollover
>        Presenter: Steve Kent
> http://www.ietf.org/proceedings/78/slides/sidr-7.pdf
> http://tools.ietf.org/id/draft-huston-sidr-aao-profile-0-keyroll-00.txt
> http://tools.ietf.org/id/draft-huston-sidr-repos-struct-02.txt
>
> Geoff: Step 5 happens after the staging period, not during.
> Geoff: "short" period means  Minutes, not hours.
>
> This is the new document, so it needs review.
>
> Rob: all the implementations are doing more-less this.
> Comment: Lock around rsync will be .. pain in the but.
> I am not sure if the staging is necessary at all.
>
> Steve: We disagree. Let me explain why...
> Rob: OK, I have less problem with that.
>
> Rob: Do we really need to have the waiting period and locking so many things 
> out?
> Geoff: The reason for suspension is to generate the clean overwrite.
>
> Sandy: It would be useful for this to happen as the conversation on the list.
>
> 4) Algorithm Migration
>   Presenter: Roque Gagliano
> http://www.ietf.org/proceedings/78/slides/sidr-2.pdf
>
> Requested by Security AD.
>
> Summary: 3 questions:
> 1) Do we want to support only top-down algorithm transitions?
> 2) Do we want to support multiple signatures in CMS objects?
> 3) Any validation issue...?
>
> Robert: No, No, and "as long as there is *one* ROA that validates, you should 
> accept"
>
> Paul Hofman: 1) No "top down". It will get in the way...
> Argue towards the "laisser faire".
>
> Rob:
> 1) I would like to understand it as "the Top-down is the minimum ..." 
> (what?!)
> relying party is only
> 2) I am not sure it is worth going through all the trouble...
> I could live with the (...??)
>
> Steve Kent: You can not stop using the OLD algorithm, until the "end of life" 
> / twilight.
> That is why the top down makes lots of sense.
>
> Geoff: I suspect that the transition means the relying party using "current" 
> and "new"
> Sandy: this validates Steve's argumentation.
>
> 6) Updated Drafts
>    (a) Certificate Policy
>    Certificate Policy (CP) for the Resource PKI (RPKI)
>    http://tools.ietf.org/html/draft-ietf-sidr-cp-09
>    Presenter: Karen Seo
>
> http://www.ietf.org/proceedings/78/slides/sidr-6.pdf
>
> (b) RPSL Signatures
>    Securing RPSL Objects with RPKI Signatures
>    http://tools.ietf.org/html/draft-ietf-sidr-rpsl-sig-03
>    Presenter: Robert Kisteleki
>
> http://www.ietf.org/proceedings/78/slides/sidr-5.pdf
>
>
> (c) Use Cases
>    Use Cases and interpretation of RPKI objects for issuers and relying
>    parties
>    http://tools.ietf.org/html/draft-ietf-sidr-usecases-00
>    Presenter: Sriram Kotikalapudi
>
> http://www.ietf.org/proceedings/78/slides/sidr-3.pdf
>
> 7) New Drafts
>    (a) Publication Protocol
>    A Publication Protocol for the Resource Public Key Infrastructure
>    (RPKI)
>    http://tools.ietf.org/html/draft-weiler-sidr-publication-00
>
>    Presenter: Sam Weiler
>
> http://www.ietf.org/proceedings/78/slides/sidr-12.pdf
>
> Are we ready to adopt this to the work item?
>
> Sandy: Will send a question to the mailing list.
>
>
> 8) New Topic
>
>    (a) AS_SET, Aggregator Stats and Implications for the {Prefix, Origin}
>        Validation Algorithm
>
>    Presenter: Sriram Kotikalapudi
>
> http://www.ietf.org/proceedings/78/slides/sidr-4.pdf
>
> Q: Closest to the origin?
> A: The most recent AS is the extreme left, origin AS is the extreme right.
>
> Almost in all cases, the first AS after the AS_SET is the origin AS, 
> therefore the Recommendation - disregard the aggregator!
>
> John Scutter, Juniper networks: OK
>
> ?: Can not treat the agreggator like that, ....
>
> 4-bite AS purposes: additional consistency checks need to be performed.
>
> AS SET is optional
>
> Rudiger: I am not sure if the new attack type is any different then any other 
> attack that can be performed by such attacker.
>
> Private ASN should not show up. BGP specs need clean-up.
>
> Gregory, France Telecom: Conclusions based on current statistics. If we base 
> the algorithm on this, add recommendation to do have the correct ASN behind 
> the aggregator.
>
> John Scudder: It does make sense from the PoV of how the AS path is 
> constructed.
>
> 5) Use of RPKI in Routers
>
>    (a) RPKI Use in Routers
>    The RPKI/Router Protocol
>    draft-ymbk-rpki-rtr-protocol-06.txt
>    http://tools.ietf.org/html/draft-ymbk-rpki-rtr-protocol-06
>   Presenter: Randy Bush
>
> http://www.ietf.org/proceedings/78/slides/sidr-8.pdf
>
> Q: Alexis: should it also reevaluate discarded prefixes?
> A: (?)
>
> Q: What happens when there is no other cache?
> A: Start paddling!
>
>     (b) BGP Prefix Origin Validation
>    draft-pmohapat-sidr-pfx-validate-07
>    http://tools.ietf.org/id/draft-pmohapat-sidr-pfx-validate-07.txt
>   Presenter: Randy Bush
>
> http://www.ietf.org/proceedings/78/slides/sidr-9.pdf
>
> Solution: allow the operator to test the validity, and set local policy
>
> Q: Does something prevents the router to rewrite the policy?
> A: (?)
>
> John: you want all the routers to follow the same policies
> Jeff: advertise best-external-always
>
> Q: Alexei: if all 3 have different state...
> A: The reason for this is: Incremental deployment. When I add my first router 
> (with RPKI), I can add this to my existing policy.
>
> Dani: If your different routers can have different cashes... then you have 
> bigger problem.
>
> Rob Austin: Global distributed DB. They will not have the same view nor 
> consistent state.
>
> 6) Updated Drafts
>
>    Validation Signaling
>    BGP Prefix Origin Validation State Extended Community
>
> http://tools.ietf.org/id/draft-pmohapat-sidr-origin-validation-signaling-00.txt
>     Presenter: Keyur Patel
>
> http://www.ietf.org/proceedings/78/slides/sidr-13.pptx
>
> Defining the new extended community.
>
> Randy: Let's have this as the WG draft, so I can disagree with it.
>
> Alexis: I don't see why do we need 3 new community space for 3 new 
> communities. Nor global well knows communities. You cna just choose
> A: It's just one, with 3 bits.
> Anyway, it is in my opinion, polluting the number space.
>
> John Scudder: I mostly agree, but with regular communities there is no 
> transitivity bit.
>
> Dani: I support this.
>
> Randy: I think it could be useful for diagnostics.
>
> Final comment by the Chair: NRO has the deadline at 1.1.2011 to start 
> operations with RPKI.
> It would be good if our documents be out of the Last Call. Before the 
> Beijging meeting.
>
> Please comment on drafts!
>
> (next meeting - please send the slides before the day of the session).
>
>
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
>