Re: [sidr] BGPSEC Threat Model ID

Danny McPherson <danny@tcb.net> Thu, 10 November 2011 02:56 UTC

Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DA6F21F86F6 for <sidr@ietfa.amsl.com>; Wed, 9 Nov 2011 18:56:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.418
X-Spam-Level:
X-Spam-Status: No, score=-102.418 tagged_above=-999 required=5 tests=[AWL=0.181, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aqelmIbiGEai for <sidr@ietfa.amsl.com>; Wed, 9 Nov 2011 18:56:19 -0800 (PST)
Received: from uu.ops-netman.net (morrowc-1-pt.tunnel.tserv13.ash1.ipv6.he.net [IPv6:2001:470:7:36e::2]) by ietfa.amsl.com (Postfix) with ESMTP id B3DA721F86EE for <sidr@ietf.org>; Wed, 9 Nov 2011 18:56:19 -0800 (PST)
Received: from mailserver.ops-netman.net (mailserver.ops-netman.net [208.76.12.119]) by uu.ops-netman.net (Postfix) with ESMTP id 57F9F1900D2 for <sidr@ietf.org>; Thu, 10 Nov 2011 02:56:19 +0000 (UTC)
Received: from dul1dmcphers-m1.home (pool-98-118-240-226.clppva.fios.verizon.net [98.118.240.226]) (Authenticated sender: danny@OPS-NETMAN.NET) by mailserver.ops-netman.net (Postfix) with ESMTPSA id 547FE32017A for <sidr@ietf.org>; Thu, 10 Nov 2011 02:56:18 +0000 (UTC)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Apple Message framework v1084)
From: Danny McPherson <danny@tcb.net>
In-Reply-To: <60C11709-5D46-474A-A4DB-ADE0675E73D8@apnic.net>
Date: Wed, 09 Nov 2011 21:56:18 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <E0B12990-5A2D-4F2E-97FF-DBD473C64B1D@tcb.net>
References: <E96517DD-BAC7-4DD8-B345-562F71788C6A@tcb.net> <p06240807cad42f85eb7d@193.0.26.186> <32744.216.168.239.87.1320175657.squirrel@webmail.tcb.net> <p06240801cad6ab773279@193.0.26.186> <D9A38669-883D-4090-9F95-BC5C63220950@tcb.net> <p06240801cad800485596@193.0.26.186> <EEBF68E0-FAD9-4AF3-B81B-78760D200D9B@tcb.net> <p06240808cad85ff73d61@193.0.26.186> <080F8FFF-D2C7-4414-B53A-233F88D2009F@vpnc.org> <CAFU7BATC-6DUDNuadakwSa5wj0ryy0=49=XveBXD5Wv=5JL-ag@mail.gmail.com> <m2aa8c489s.wl%randy@psg.com> <53FA9B4A-552C-4998-8F69-592A0F5AA13B@verisign.com> <CAL9jLaZj1wcmDnbm1f9=csUv2Uuq_w3rS6UEYmUHAQDPWT9zFg@mail.gmail.com> <m262iz2xl8.wl%randy@psg.com> <A2661B25-CC2E-44E4-93CE-5AFE4F67E4DA@verisign.com> <m2pqh71hdz.wl%randy@psg.com> <10A3F6FD-1392-4E6E-A048-A8EED1E8C329@apnic.net> <p06240806caddeb4faae0@[128.89.89.6]> <60C11709-5D46-474A-A4DB-ADE0675E73D8@apnic.net>
To: sidr wg list <sidr@ietf.org>
X-Mailer: Apple Mail (2.1084)
Subject: Re: [sidr] BGPSEC Threat Model ID
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Nov 2011 02:56:20 -0000

On Nov 9, 2011, at 2:56 PM, Geoff Huston wrote:
> 
> I did not claim it existed - I merely disagreed with the claim of its 
> impossibility of existence.
> 
> In the same way that the only way you can eliminate the "unknown" validation
> outcome is to achieve universal adoption of the generation of credentials,
> the general visibility of intent relies on universal adoption on the generation
> of routing policy. It is not impossible per se, it just relies on universal adoption!
> 
> In the case of the efforts relating to RPSL, reality has not achieved such targets
> of universal adoption, as you point out.
> 
> In the case of the efforts relating to the BGP security mechanisms you are working
> on, it is an open issue as to how many folk would adopt it, but our experiences
> of other technologies, including 4 byte ASN support indicate that universal
> adoption is an extremely challenging objective.

I completely agree with you here Geoff - and a resource certification 
infrastructure to bootstrap IRRs, coupled with a few lessons learned 
from the RIPE playbook and beyond, and their potential utility is orders 
of magnitude beyond where it currently is and addresses that residual 
risk (my primary concern) that current solutions fail to address.

-danny