Re: [sidr] [Idr] Levels of BGPsec/RPKI validation, was: Re: wglc for draft-ietf-sidr-bgpsec-protocol-11

"Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov> Wed, 29 April 2015 21:47 UTC

Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 212121A0141; Wed, 29 Apr 2015 14:47:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kc2WuXSX6kTP; Wed, 29 Apr 2015 14:47:31 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1on0751.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::751]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF5361A00E6; Wed, 29 Apr 2015 14:47:30 -0700 (PDT)
Received: from CY1PR09MB0793.namprd09.prod.outlook.com (25.163.43.143) by CY1PR09MB0795.namprd09.prod.outlook.com (25.163.43.145) with Microsoft SMTP Server (TLS) id 15.1.148.16; Wed, 29 Apr 2015 21:47:08 +0000
Received: from CY1PR09MB0793.namprd09.prod.outlook.com ([25.163.43.143]) by CY1PR09MB0793.namprd09.prod.outlook.com ([25.163.43.143]) with mapi id 15.01.0148.008; Wed, 29 Apr 2015 21:47:09 +0000
From: "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>
To: Iljitsch van Beijnum <iljitsch@muada.com>
Thread-Topic: [sidr] [Idr] Levels of BGPsec/RPKI validation, was: Re: wglc for draft-ietf-sidr-bgpsec-protocol-11
Thread-Index: AQHQgeES7U91mgLFt0G5eeS9M69BR51izU6AgAAyNACAAAewgIABRAfggAApHYCAABDxMA==
Date: Wed, 29 Apr 2015 21:47:08 +0000
Message-ID: <CY1PR09MB079352552ED82496B5A4513D84D70@CY1PR09MB0793.namprd09.prod.outlook.com>
References: <4C184296-F426-40EF-9DB6-3AE87C42B516@tislabs.com> <91148102-DADB-42E8-96A0-E89120642894@tislabs.com> <ECDAD8F2-1C27-4494-887C-59280D7FF973@muada.com> <EF4348D391D0334996EE9681630C83F02D173BEB@xmb-rcd-x02.cisco.com> <B1EDF7B6-1E42-440E-BD3F-29723AD7E4A4@muada.com> <986c7f50a5300c46ad05afb643be3a1d@mail.mandelberg.org> <4C80F9CE-06F9-4FB7-852B-BF1B205738FC@muada.com> <CY1PR09MB079302CC52C7791F3C0C512984D70@CY1PR09MB0793.namprd09.prod.outlook.com> <CF9FE7BA-C934-401C-B2F4-0CE4AF062ECC@muada.com>
In-Reply-To: <CF9FE7BA-C934-401C-B2F4-0CE4AF062ECC@muada.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: muada.com; dkim=none (message not signed) header.d=none;
x-originating-ip: [129.6.140.100]
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR09MB0795;
x-microsoft-antispam-prvs: <CY1PR09MB07951322782CA24E7EE4BDC584D70@CY1PR09MB0795.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(5005006)(3002001); SRVR:CY1PR09MB0795; BCL:0; PCL:0; RULEID:; SRVR:CY1PR09MB0795;
x-forefront-prvs: 05610E64EE
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(19580395003)(2656002)(99286002)(62966003)(86362001)(230783001)(77156002)(54356999)(76176999)(76576001)(110136002)(93886004)(5001960100002)(46102003)(50986999)(92566002)(33656002)(66066001)(15975445007)(2950100001)(2900100001)(102836002)(106116001)(87936001)(40100003)(5001920100001)(122556002)(74316001); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR09MB0795; H:CY1PR09MB0793.namprd09.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Apr 2015 21:47:08.7400 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR09MB0795
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/cPNX6epUtrSm3egxIiAjBIvxRxs>
Cc: "idr@ietf.org" <idr@ietf.org>, "sidr@ietf.org" <sidr@ietf.org>, David Mandelberg <david@mandelberg.org>
Subject: Re: [sidr] [Idr] Levels of BGPsec/RPKI validation, was: Re: wglc for draft-ietf-sidr-bgpsec-protocol-11
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Apr 2015 21:47:33 -0000

>So what we need is a third option, that provides better security than 1. and better reachability than 2.
>In other words, "couldn't validate because of certificate lifetime" 
>and "validation failed because of a bad signature or bad certificate chain" 
>are different enough that we need them to have different effects on the forwarding tables.

My thoughts on this:

First:
There should be operational BCP recommendation based on the principle of make-before-break
( in doc like https://tools.ietf.org/html/draft-ietf-sidr-bgpsec-ops-05 ):
1. Certificate should be renewed and pre-published in advance of expiry of the current certificate; 
There should be overlapping validity period bridging the two (current and new certs).
(See https://tools.ietf.org/html/draft-ietf-sidr-bgpsec-rollover-03  and
https://www.ietf.org/proceedings/92/slides/slides-92-sidr-5.pdf  ) 
2. The update for the prefix should be re-originated (by origin AS) or re-propagated (by a transit AS).
Basically, whoever got a new certificate should do this refresh within the above overlap period. 

The above two BCP steps, if followed, will help prevent "couldn't validate because of certificate lifetime".

Second:
The operational BCP can also say:
Allow a certain grace period before you act on the update that became 'Not Valid' due to cert expiry.
(Earlier Sandy also mentioned this.)  

Your other scenario "validation failed because of a bad signature or bad certificate chain" is fine. 
In this scenario, the update is labeled 'Not Valid' for good reason.

Sriram