Re: [sidr] BGPSEC Threat Model ID

Russ White <russw@riw.us> Sat, 05 November 2011 13:00 UTC

Return-Path: <russw@riw.us>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E30EF21F86F6 for <sidr@ietfa.amsl.com>; Sat, 5 Nov 2011 06:00:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.346
X-Spam-Level:
X-Spam-Status: No, score=-2.346 tagged_above=-999 required=5 tests=[AWL=0.253, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nrOlpExp32g1 for <sidr@ietfa.amsl.com>; Sat, 5 Nov 2011 06:00:13 -0700 (PDT)
Received: from ecbiz91.inmotionhosting.com (ecbiz91.inmotionhosting.com [173.205.124.250]) by ietfa.amsl.com (Postfix) with ESMTP id 59EE721F84BA for <sidr@ietf.org>; Sat, 5 Nov 2011 06:00:13 -0700 (PDT)
Received: from rtp-isp-nat1.cisco.com ([64.102.254.33]:14635 helo=[10.117.153.102]) by ecbiz91.inmotionhosting.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <russw@riw.us>) id 1RMfr2-0003Y3-BW for sidr@ietf.org; Sat, 05 Nov 2011 09:00:12 -0400
Message-ID: <4EB53360.1080109@riw.us>
Date: Sat, 05 Nov 2011 09:00:16 -0400
From: Russ White <russw@riw.us>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: sidr@ietf.org
References: <E96517DD-BAC7-4DD8-B345-562F71788C6A@tcb.net> <p06240807cad42f85eb7d@193.0.26.186> <32744.216.168.239.87.1320175657.squirrel@webmail.tcb.net> <p06240801cad6ab773279@193.0.26.186> <D9A38669-883D-4090-9F95-BC5C63220950@tcb.net> <p06240801cad800485596@193.0.26.186> <EEBF68E0-FAD9-4AF3-B81B-78760D200D9B@tcb.net> <p06240808cad85ff73d61@193.0.26.186> <080F8FFF-D2C7-4414-B53A-233F88D2009F@vpnc.org> <CAFU7BATC-6DUDNuadakwSa5wj0ryy0=49=XveBXD5Wv=5JL-ag@mail.gmail.com> <m2aa8c489s.wl%randy@psg.com> <53FA9B4A-552C-4998-8F69-592A0F5AA13B@verisign.com> <CAL9jLaZj1wcmDnbm1f9=csUv2Uuq_w3rS6UEYmUHAQDPWT9zFg@mail.gmail.com> <F83858F5-1505-433B-8B60-EE4F9F6E3E25@castlepoint.net> <CAL9jLaYw140egPh6g5PQsg5f-zSkjSyHeK8nq4ZGtC7RkyNyGQ@mail.gmail.com> <70A18355-789E-4FF2-8789-1AFB00CD9B8F@castlepoint.net> <CAL9jLaZ2aaR9SFSmOsjHiFVpkHTuCANdPpTcF8yu8zZtA=Vwwg@mail.gmail.com>
In-Reply-To: <CAL9jLaZ2aaR9SFSmOsjHiFVpkHTuCANdPpTcF8yu8zZtA=Vwwg@mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 8bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ecbiz91.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - riw.us
Subject: Re: [sidr] BGPSEC Threat Model ID
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Nov 2011 13:00:14 -0000

>> Please note that, for the specific case above, I did not mention "complicated"&  "burdensome" prefix-list filtering … just AS_PATH sanity check filtering, i.e.: if you see AS (FOO|BAR|BAZ) in the path, drop (don't learn) the route.  Also, I would note that this type of configuration re-emphasizes what Russ White has said, specifically that (this) policy is local to each AS and is _not_ 'shared' with any other ASN.
>
> understood, don't disagree... and yes, Russ's point about the local
> policy not being exposed publicly means ... we can't today figure this
> out easily.

Unless you're willing to expose your policy publicly, or at least within 
the realm of partners you expect to help you enforce it. One of the 
problems with SIDR has been the constant insistence that "policy not be 
exposed publicly."

I'll say it again.

1. All security is about exposing and enforcing intent.

2. You can only secure intent you know and understand. You can't expect 
someone who doesn't know what you mean to do what you want, no matter 
how nicely you ask.

3a. We can decide that those who want to secure anything must publicly 
(or semi-publicly) declare what it is they want secured.

3b. We can decide that we "only want to secure the BGP spec," which 
opens another wormhole (though if that's the wormhole you'd like to go 
down, I'd be happy to transfer this work to IDR, where the experts on 
that spec live).

3c. We can continue down the path of, "we can't tell anyone what we want 
them to do, we just expect them to read our minds and do what we intended."

SIDR seems determined to do 3c, no matter how unwise or how unrealistic.

:-)

Russ