Re: [sidr] the need for speed

Eric Osterweil <eosterweil@verisign.com> Thu, 20 December 2012 18:53 UTC

Return-Path: <eosterweil@verisign.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8E1721F84F2 for <sidr@ietfa.amsl.com>; Thu, 20 Dec 2012 10:53:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.622
X-Spam-Level:
X-Spam-Status: No, score=-5.622 tagged_above=-999 required=5 tests=[AWL=0.377, BAYES_00=-2.599, J_CHICKENPOX_46=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f563X0RHJffg for <sidr@ietfa.amsl.com>; Thu, 20 Dec 2012 10:53:44 -0800 (PST)
Received: from exprod6og109.obsmtp.com (exprod6og109.obsmtp.com [64.18.1.23]) by ietfa.amsl.com (Postfix) with ESMTP id 42BA621F84E9 for <sidr@ietf.org>; Thu, 20 Dec 2012 10:53:41 -0800 (PST)
Received: from peregrine.verisign.com ([216.168.239.74]) (using TLSv1) by exprod6ob109.postini.com ([64.18.5.12]) with SMTP ID DSNKUNNetUUyDeftKYJT4T/DVdaNllbj3Ear@postini.com; Thu, 20 Dec 2012 10:53:43 PST
Received: from dul1wnexcn03.vcorp.ad.vrsn.com (dul1wnexcn03.vcorp.ad.vrsn.com [10.170.12.113]) by peregrine.verisign.com (8.13.6/8.13.4) with ESMTP id qBKIrbCa026095; Thu, 20 Dec 2012 13:53:37 -0500
Received: from dul1eosterwe-m1.vcorp.ad.vrsn.com ([10.88.29.242]) by dul1wnexcn03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Thu, 20 Dec 2012 13:53:37 -0500
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset="us-ascii"
From: Eric Osterweil <eosterweil@verisign.com>
In-Reply-To: <50D35892.5080402@lacnic.net>
Date: Thu, 20 Dec 2012 13:53:37 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <931B485F-D061-4C05-8C95-7920995A85CE@verisign.com>
References: <m2vcbzqgzx.wl%randy@psg.com> <CAHUKT2CLZsUakDYB=PpyR9zArSxN_KhKC_UFZ5C+=+yUs2NvFA@mail.gmail.com> <CAL9jLaZjPyuFtE8ZQU88iW5p2H8NWAfmzX0z5u7q7wawvem9ZA@mail.gmail.com> <487F9F23-F609-48A2-BE67-6361291BDFCF@ripe.net> <50D34405.8080807@lacnic.net> <22421E49-82E5-4BEE-A3E3-BEE6C8BFEA3C@verisign.com> <50D35892.5080402@lacnic.net>
To: Arturo Servin <aservin@lacnic.net>
X-Mailer: Apple Mail (2.1085)
X-OriginalArrivalTime: 20 Dec 2012 18:53:37.0206 (UTC) FILETIME=[51A0FD60:01CDDEE3]
Cc: sidr@ietf.org
Subject: Re: [sidr] the need for speed
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2012 18:53:45 -0000

On Dec 20, 2012, at 1:27 PM, Arturo Servin wrote:

> That's is not true. We have seen some challenges in the current
> architecture since long ago and some are trying to address them:
> 
> https://datatracker.ietf.org/doc/draft-rogaglia-sidr-multiple-publication-points/
> 
> https://datatracker.ietf.org/doc/draft-tbruijnzeels-sidr-delta-protocol/
> 
> https://datatracker.ietf.org/doc/draft-tbruijnzeels-sidr-validation-local-cache/

I totally appreciate the efforts behind these design enhancements, and I am trying impugn the work that has clearly gone into them (or the people who did the work).  However, my concern is that without requirements analysis around the core of the architecture that these enhancements speak to, how do you know that you're not just building on a shaky/unstable foundation, or trying to overcome fundamental flaws in its architecture?  We haven't taken the time to outline what bgpsec needs to do in order for us to be protected by it.  Therefore, we can't describe when we've met our goals.

Note: a lot of the above work (I believe) surrounds just the RPKI, and bgpsec's requirements on _it_ may change dramatically in the face of what bgpsec ultimately needs to do.  I am becoming increasingly convinced that it is important to make the rpki vs. rpki+bgpsec distinction crystal clear.

>> My 0.02 about the above is that the first part of Tim's para talks about finding a requirement, but the 2nd part presumes the existence of a design (repos and structures)...  
> 
> Yes. That is what we have now. If you have a better way I would like to
> hear a proposal.

So, despite my suggestions to start with requirements, you're asking for a design?  :)

Throwing something together in a tit-for-tat would be reckless, as we don't have a solid agreement of _what_ we are trying to protect against, and therefore, we don't know _how_ we want to protect ourselves from it.  Admittedly, opinions in this group seem to vary, but we do not have a reasonable/accepted draft.

I am so glad meatspace bridges aren't built this way... We'd be driving down the road trying to convince ourselves that a 1,000 meter wide gorge up ahead was really just 900 meters of meaningful danger, and the 900 meter bridge that we built part of the way across it is good enough.

> Let's talk about requirements, what do you think is a reasonable time to
> propagate?


I'm happy to have the requirements discussion, but it starts with higher level questions like: what (specifically) are we trying to accomplish?  What are we trying to protect ourselves against?  What is the nature of that danger?  How do we address it? etc.  Then we can go to lower level requirements that may come out of that, like freshness.  Without understanding the high level requirements, I would worry that deciding we need to enshrine a specific deadline, and then choosing a value could be as dangerous as presuming we don't need one at all.

Eric