[Sidr] Minutes of the SIDR WG meeting @ ietf 71

Geoff Huston <gih@apnic.net> Tue, 18 March 2008 04:23 UTC

Return-Path: <sidr-bounces@ietf.org>
X-Original-To: ietfarch-sidr-archive@core3.amsl.com
Delivered-To: ietfarch-sidr-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 44BF63A6E3D; Mon, 17 Mar 2008 21:23:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.669
X-Spam-Level:
X-Spam-Status: No, score=-100.669 tagged_above=-999 required=5 tests=[AWL=-0.232, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pOUaJBZ8rzBQ; Mon, 17 Mar 2008 21:23:42 -0700 (PDT)
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D885E3A6BCA; Mon, 17 Mar 2008 21:23:42 -0700 (PDT)
X-Original-To: sidr@core3.amsl.com
Delivered-To: sidr@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0005928C153 for <sidr@core3.amsl.com>; Mon, 17 Mar 2008 21:23:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SAN9f7sV+eY3 for <sidr@core3.amsl.com>; Mon, 17 Mar 2008 21:23:40 -0700 (PDT)
Received: from mint.apnic.net (mint.apnic.net [202.12.29.58]) by core3.amsl.com (Postfix) with ESMTP id A831D28C145 for <sidr@ietf.org>; Mon, 17 Mar 2008 21:23:38 -0700 (PDT)
Received: from dhcp6.potaroo.net (dhcp6.potaroo.net [203.10.60.6]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mint.apnic.net (Postfix) with ESMTP id 13ED5D5F2D for <sidr@ietf.org>; Tue, 18 Mar 2008 14:21:18 +1000 (EST)
Message-ID: <47DF4337.2040102@apnic.net>
Date: Tue, 18 Mar 2008 15:21:11 +1100
From: Geoff Huston <gih@apnic.net>
User-Agent: Thunderbird 2.0.0.12 (Macintosh/20080213)
MIME-Version: 1.0
To: sidr@ietf.org
References: <478F6BFA.8090301@bbn.com> <DB5A214A-E425-477F-B729-B5B84E64FC70@tcb.net>
In-Reply-To: <DB5A214A-E425-477F-B729-B5B84E64FC70@tcb.net>
Subject: [Sidr] Minutes of the SIDR WG meeting @ ietf 71
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: sidr-bounces@ietf.org
Errors-To: sidr-bounces@ietf.org

Thanks to Russ Mundy for these minutes.

   Geoff & Sandy



SIDR - IETF 71
Securing Inter-Domain Routing (SIDR) WG Meeting

10 Mar 2008, 1740 - 1950

CHAIRS:
  Geoff Huston &; Sandy Murphy

NOTE TAKER:
  Russ Mundy

AGENDA:

  1. Administrivia
      Mailing list: http://www.ietf.org/mail-archive/web/sidr/index.html
      Blue Sheets
      Agenda Bashing


  2. SIDR and Origin Validation - Geoff Huston

  3. Certificate Policy and CPS drafts -  Steve Kent
        Certificate Policy
          http://www.ietf.org/internet-drafts/draft-ietf-sidr-cp-03.txt
        CPS for ISPs
          http://www.ietf.org/internet-drafts/draft-ietf-sidr-cps-isp-02.txt
        CPS for Registries
          http://www.ietf.org/internet-drafts/draft-ietf-sidr-cps-irs-03.txt

  4. RPKI Architecture Update - Matt Lepinski
        http://www.ietf.org/internet-drafts/draft-ietf-sidr-arch-03.txt

  5. Route Originations - Matt Lepinski
        http://www.ietf.org/internet-drafts/draft-ietf-sidr-roa-format-02.txt

  6. Repository Structure  - George Michaelson
        http://www.ietf.org/internet-drafts/draft-huston-sidr-repos-struct-01.txt

  7. ROA Validation  -  George Michaelson
        http://www.ietf.org/internet-drafts/draft-huston-sidr-roa-validation-00.txt

  8. Bogon Origin Attestations - Geoff Huston
        http://www.ietf.org/internet-drafts/draft-huston-sidr-bogons-00.txt



SUMMARY:

  The WG agenda items covered the overall approach being used by the
  WG to address the issues of origin validation and then examined a
  number of specific aspects of routing origination attestations in
  relation to a Resource PKI.

  Following a report to the WG from RPSEC on requirements for BGP
  routing security, it was noted that no clear guidance on the topic
  of AS Path validation was forthcoming. SIDR should undertake a
  solution for AS Path validation. The AD suggested that the charter
  revision should be done by IETF72.

  One general comment at the end of the meeting was that it would be
  useful to have a roadmap for the relationship and anticipated timing
  of completion of the various work items discussed during the
  meeting.  The co-chairs acknowledged that this might be useful, but
  should be discussed further on the WG mailing list.

  

NOTES:

  SIDR and Origin Validation

    Geoff Huston presented a status report on the SIDR Working Group
    activities relating to origination validation in inter-domain
    routing.

    The presentation provided a summary of the reason for creation of
    SIDR and set of requirements for the working group.  The main
    focus of the working group is the specification of a PKI that
    supports validation of origination information contained in the
    routing system, and the manner in which validation tools could be
    incorporated into the routing architecture.
  
    Questions / Comments:

    There was no controversy related to the presentation but the AD
    asked where the information was described.  Geoff acknowledged
    that he needed to write an RFC to document much of what he
    presented in his summary.

    During the presentation, there was also a discussion about the
    SIDR requirements and work being "locked to RPSEC".  The general
    sense of the room was that this should be changed in the SIDR
    charter - no one in the room objected to this change.  Part of
    this discussion of SIDR working group scope was taking on solving
    the problem of path validation.  The sense of the room was that
    SIDR should undertake a solution for path validation.  The AD
    suggested that the charter revision should be done by IETF 72.

    ACTIONS:

    - Chairs to propose a revised charter for the SIDR WG to address
      the topic of measures to support validation of the AS Path.

    - Draft to be proposed to the WG on the overall approach to
      Origination validation. Geoff Huston will work on this draft.

  Certificate Policy and CPS drafts

    Steve Kent presented on three CP and CPS drafts. The most
    significant changes since the previous WG meeting has been with
    the CPS template for RIRs.  The majority of this work focused on
    enhancing the template so that less work will be needed on the
    part of RIRs using the templates.  Steve has worked with APNIC in
    completing their CPS, which they were able to do in two days.  One
    important aspect pointed during the presentation was that a
    business PKI that is separate from the resource PKI will be
    required.

    Questions / Comments:

    During the discussion from the floor, there was a suggestion that
    a complete template be created that could be used by ISPs. This
    was accepted as a good suggestion.

    Another comment was that it would be useful to have a template that
    says the ISP has no liability of any sort.

  RPKI Architecture Update
  
     Matt Lepinski presented on the RPKI architecture. The opening
     request is for everyone to read and comment on the draft.  Matt
     considers the current text is to be inadequate in certain areas,
     and requests inputs with specific, new text.

    Questions / Comments:

    There was some discussion about changing the scope of this
    document so that it would align with the expected charter changes.
    The general sense of the room was to keep the current scope and
    focus on completing the document. The document probably needs some
    clarification regarding intended scope. Additionally, the document
    is intended to provide examples rather than explicit directions so
    some words need to be updated.

    ACTIONS:

    - Draft to be revised to clarify intended scope
      regarding the architecture of the RPKI and reference related
      documents concerning further details of the use of Manifests,
      ROAs, BOAs and the forms of potential use in supporting routing
      activities.
    
  Route Originations
     	
    Matt Lepinski presented on the current ROA specification document
    and the current issue relating to whether to add the capability for
    multiple signatures into a ROA or not. A specification as to how
    multiple signatures could be included in the ROA was presented.

    Questions / Comments:

    There was a significant discussion about the ROA format and number
    of signatures on a ROA. There were generally two (opposing) views
    expressed there were largely the same as have been expressed on
    the mail list. The minute takers' general summary of the issue is:

      Supporters of multiple signatures: SIDR work should not
      constrain or restrict the way in which the routing system and
      resource assignments operate currently or in the future.

      Opponents of multiple signatures: This is an effort to solve a
      problem that is extremely small (or non-existent) which
      introduces significant complexity of the validation
      implementations (and possibly all validations).
 
    During the discussions, some new ideas such as specifying the use
    of multiple signatures on a ROA but defining that only one
    signature will be used initially on a ROA - a request was made for
    Jeffrey Hass write up this idea for the WG.

    There was also a suggestion that if multiple signatures were used,
    they should only be applied when multiple parties were involved.

    Geoff suggested that it might be useful to specify that validation
    of a ROA would not be done over any larger address space than
    contained in the ROA. A ROA cannot be used to validate any object
    that is larger than the span of the address in the ROA. The
    implication of this limitation is that if it is required to sign an
    aggregate address object where the components are drawn from
    distinct validation paths, then multiple signatures in the ROA would
    be necessary.
 
    ACTIONS:

    - Jeffrey Hass to describe an approach to multiple signatures on a
      ROA where the case of multiple signatures is defined, but note
      intended use to be constrained to single signatures.

    - Multiple signatures in a ROA to be taken to the WG mailing list.
   
  Repository Structure
  
    George Michaelson next presented on the Repository Structure
    draft. The draft has been pretty much rewritten since the -00
    draft, in response to a batch of inputs.  The slides provide a
    summary of the changes from the 00 version.
  
    The authors believe that the 01 version incorporates the comments
    they received to date.  They would also like to have further
    review and comments on the draft.
      
    Questions / Comments: 

    During this presentation, a member of the
    working group asked if this was the right time to discuss the
    issues around the use of rsync as defined in the specification.
    There have been discussions about this on the WG list but they
    have not been conclusive.  After some discussion in the meeting,
    Sandy took an action to write a description and summary of the
    rsync related issues and send it to the WG list and AD.  At this
    point, it sounds like the working group members in the room see
    the need to have specific agenda time to discuss these issues at
    the IETF72 SIDR WG meeting.

    ACTIONS:

    - Sandy Murphy to write a description of the issues in the use of
      RSYNC in the RPKI specification, and circulate this to the AD
      and the WG.

  ROA Validation

    George Michaelson presented on ROA Validation.  The list of issues
    in the last slide of the presentation may not be complete but are
    likely the ones that need to be worked on first - comments are
    solicited.

    Questions / Comments:

    Some of the substantive comments that were raised from WG members
    in the room related to operational timeliness and the amount of
    time needed to effect changes to signed originations, e.g., an ISP
    moves all traffic from one link to another (changing origination
    point and issuing a new ROA) but their traffic is not being
    delivered everywhere since some places are validating on the old
    ROA - a 24 hour cycle to get the new information in place is not
    operationally acceptable.  Geoff & Steve both pointed out that
    relying parties can update information more frequently than 24
    hours but there is no way to force people to update information on
    any particular period of time. The generic response to this was to
    pre-provision the necessary security credentials in the RPKI in
    advance of the use of a particular origination arrangement in the
    routing system.

    There was also discussion about approaches that were needed during
    the transition period of particular adoption, when ROAs are being
    issued for some but not all originations. Some ideas are included
    in the draft and summarized in the slides. The working group was
    asked to think about transition and contribute additional ideas.

  Bogon Origin Attestations

    Geoff Huston presented on Bogon Origin Attestations. The concept
    motivating the BOA idea is to provide a mechanism for legitimate
    holders of resources to make an authenticatable statement the
    certain resources should not be appearing in the routing system.
    In general, BOAs are modelled after ROAs but if a relying party
    encounters both a ROA and a BOA for a given space, the ROA will
    always override a BOA.

 
_______________________________________________
Sidr mailing list
Sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr