Re: [sidr] Route Leak fix: V free routing

Jakob Heitz <jakob.heitz@ericsson.com> Tue, 22 November 2011 17:10 UTC

Return-Path: <jakob.heitz@ericsson.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D4BF21F8C4E for <sidr@ietfa.amsl.com>; Tue, 22 Nov 2011 09:10:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.412
X-Spam-Level:
X-Spam-Status: No, score=-6.412 tagged_above=-999 required=5 tests=[AWL=0.187, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0ABDk5yhS1uT for <sidr@ietfa.amsl.com>; Tue, 22 Nov 2011 09:10:23 -0800 (PST)
Received: from imr4.ericy.com (imr4.ericy.com [198.24.6.9]) by ietfa.amsl.com (Postfix) with ESMTP id B2AAC21F8C4F for <sidr@ietf.org>; Tue, 22 Nov 2011 09:10:18 -0800 (PST)
Received: from eusaamw0712.eamcs.ericsson.se ([147.117.20.181]) by imr4.ericy.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id pAMHA9JK002017; Tue, 22 Nov 2011 11:10:14 -0600
Received: from EUSAACMS0701.eamcs.ericsson.se ([169.254.1.20]) by eusaamw0712.eamcs.ericsson.se ([147.117.20.181]) with mapi; Tue, 22 Nov 2011 12:10:08 -0500
From: Jakob Heitz <jakob.heitz@ericsson.com>
To: Brian Dickson <brian.peter.dickson@gmail.com>
Date: Tue, 22 Nov 2011 12:11:04 -0500
Thread-Topic: [sidr] Route Leak fix: V free routing
Thread-Index: AcypOZWOZyuUrp69Rv+bh5C3PX+aKQ==
Message-ID: <DEA0EFCF-F9A4-4184-A3DB-B80F56B95503@ericsson.com>
References: <F45661E8FBC74F4EB7E1E0386B562A7502B85C80@ftrdmel0.rd.francetelecom.fr> <CAEFE521.704A0%dougm@nist.gov> <m2aa7onudn.wl%randy@psg.com> <CAH1iCipJPGHLzLsUnAK1r0+KY-sEvVQNZjNUbb_=FnL1hyRorQ@mail.gmail.com>
In-Reply-To: <CAH1iCipJPGHLzLsUnAK1r0+KY-sEvVQNZjNUbb_=FnL1hyRorQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] Route Leak fix: V free routing
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Nov 2011 17:10:25 -0000

That's like making the British drive on the right: you can not incrementally deploy.

--
Jakob Heitz.


On Nov 22, 2011, at 8:51 AM, "Brian Dickson" <brian.peter.dickson@gmail.com> wrote:

> On Tue, Nov 22, 2011 at 8:45 AM, Randy Bush <randy@psg.com> wrote:
> 
>> 
>> do you expect it to be covered by the signature?  if so, then the
>> business relationship is published globally.  do you see a way to assure
>> veracity and non-repudiation while not exposing globally?
> 
> I see a way...
> 
> [I'm assuming here, that the the places where business relation ships
> need to be possible to hide, are only where there is the potential for
> that hiding to have some effect:
> 
> - Transit providers know the relationship they have with their
> customers, and their customers' customers...
> - Peers expect to only hear their peers' customers (and customers' customers)
> - (Leaving aside "special" arrangements)
> - The only place where any announcement of non-customer routes occurs
> is from transit to customer
> 
> end assumption]
> 
> What is needed, is a separate signature chain, "provenance".
> 
> The provenance chain is required ONLY when sending a customer prefix
> to a non-customer.
> 
> The provenance chain consists of signatures over (the current "apex"
> bit + previous signature)
> The apex bit is either zero (on customer->transit AS path hops), or
> one (peer->peer).
> 
> Once received from a peer or transit provider, and validated (if
> present), the provenance chain MAY be stripped from the prefix.
> 
> If a prefix has no provenance chain, it is to be treated as if it has
> at least one apex bit set.
> 
> Transit providers SHOULD reject any prefix from a customer, if any
> "apex" bit is set (or if there is no provenance chain).
> 
> Peers SHOULD reject a prefix from a peer, which has no provenance
> chain, or has a provenance chain with the "apex" bit set anywhere
> except on the peers' entry on the chain.
> 
> Note that the vast majority of prefixes received by any AS, will be
> non-customers' and can have their provenance chains removed. This
> significantly reduces the impact of another set of signatures.
> 
> The absence of a provenance chain achieves the hiding of business relationships.
> 
> The absence of a provenance chain also permits the receiver of routes
> to detect and stop leaked prefixes.
> 
> This mechanism would be applied on a prefix basis, not blindly on an
> neighbor AS basis, although it would require knowledge of the
> relationship with the neighbor to function correctly.
> 
> I think this meets all Randy's requirements, as well as Danny's.
> 
> Brian
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr