Re: [sidr] RPKI <-> allocation consistency

Brian Dickson <brian.peter.dickson@gmail.com> Tue, 04 September 2012 19:08 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E24721E8054 for <sidr@ietfa.amsl.com>; Tue, 4 Sep 2012 12:08:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.598
X-Spam-Level:
X-Spam-Status: No, score=-4.598 tagged_above=-999 required=5 tests=[AWL=1.000, BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L1PUPlcTLPwt for <sidr@ietfa.amsl.com>; Tue, 4 Sep 2012 12:08:15 -0700 (PDT)
Received: from mail-wg0-f44.google.com (mail-wg0-f44.google.com [74.125.82.44]) by ietfa.amsl.com (Postfix) with ESMTP id 98DDF21E804E for <sidr@ietf.org>; Tue, 4 Sep 2012 12:08:14 -0700 (PDT)
Received: by wgbdr13 with SMTP id dr13so3645945wgb.13 for <sidr@ietf.org>; Tue, 04 Sep 2012 12:08:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=eFXt3p/NqyRg6eKqYWI1UoxwUFvHUB+MUF3jdMsPCFE=; b=UGwAayQdESfGvNdg0wh8YwKbWQxgUJTjFIItiVNc+8A6fY6hu+nxtx9nSqyVPm13bL zn7INLGYJLH43YnVrj3QeB03f/wBdqxkoQ5S/8jK4p9PtXtj6Xt5yxpCyNIotSqYWPNY HxZrcOhgRua3VvXcZbf6xUmpNWmHD8/Fmpgfvy9xOgpywgCy7d6Cl/XpclcNV9dBvCAa HlUCf5gPj9POVp9ovWWXU/9E8W4Jluo8gcT+d2nGNRVfovcAa2xLdztkkkPjC8Ed7kkc BXVGNAzA7JGNFotlo3imUednYO27NsxMS0ACVJq6WYh1E7vrT+l6dLVUQVFCm7NKpK8S lBJQ==
MIME-Version: 1.0
Received: by 10.180.103.136 with SMTP id fw8mr32542726wib.20.1346785693762; Tue, 04 Sep 2012 12:08:13 -0700 (PDT)
Received: by 10.223.61.12 with HTTP; Tue, 4 Sep 2012 12:08:13 -0700 (PDT)
In-Reply-To: <50464081.4020305@bbn.com>
References: <24B20D14B2CD29478C8D5D6E9CBB29F625F555CB@Hermes.columbia.ads.sparta.com> <D857A4BB-E484-45A4-A09F-FB8FAF2215AC@tcb.net> <C5B88834-3A10-41F7-A4F3-2B7C9B540197@verisign.com> <50389897.3040503@bbn.com> <97856400-9F70-4AEC-AF91-A0673A6D716D@verisign.com> <503C47A8.7030700@bbn.com> <303C576D-D1F8-4F62-8E0E-0D74A28B2771@verisign.com> <503D141F.1060404@bbn.com> <3A791D9E-4F16-4481-94AE-BD38A5389593@verisign.com> <CAL9jLaaew6HLdHK4=UrsUF2JKsRRV=sbXzCOFiDnLRKtVSK1tw@mail.gmail.com> <CAH1iCirWo+JYOpFjVhtxXYKGB86nLhcogC20bEy0-Ldkp7Oc8A@mail.gmail.com> <CAL9jLaY3JLBf7H5H2zWvxv2T=9ZsSQbOAxM+mTixefZkF8oVFw@mail.gmail.com> <CAH1iCiqScOwzcAWEuFfHKH4kP6gj45fKqs6rdPq97PsYO+uEMQ@mail.gmail.com> <50461289.1040907@bbn.com> <CAH1iCiqR3A2wdCo7Gs1RWmLZnJLUuO8=-WXj9QN-bfxBwnX02Q@mail.gmail.com> <50464081.4020305@bbn.com>
Date: Tue, 04 Sep 2012 15:08:13 -0400
Message-ID: <CAH1iCiqMS2N6TKLeZ6yEb0opQxNHmxBkyLZiXBZKYBhZSX1JOg@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary="f46d04430446dd854404c8e4fa6c"
Cc: sidr@ietf.org
Subject: Re: [sidr] RPKI <-> allocation consistency
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Sep 2012 19:08:16 -0000

On Tue, Sep 4, 2012 at 1:55 PM, Stephen Kent <kent@bbn.com> wrote:

>
>
>> Make-before-break is fully possible with exclusivity.
>>
> In the general case, the resources are transferred between two CAs, and
> these CAs need not be
> ISPs, e.g., they might be RIRs. So, before an ISP can issue ROAs for the
> newly-received INRs,
> the ISP has to have these INRs added to it's CA cert. If the parent of
> that CA was not the parent
> for the ISP that previously held the resources, then it too has to have
> the INRs in question added
> to its cert, and so on. Thus means that, in general, there will be more
> that one CA, at corresponding
> tiers of the RPKI, that will have the same INRs in their 3779 extensions.
> Equivalently, this means
> that some CA will have issued certs to two of its children, where the
> certs overlap (wrt the INrs
> being transferred).


Let's work a straw man example.

First, the assumptions:
(1) We have existing delegations, CA_1A -> CA_1B -> CA_1C
(2) The 3779 extensions of each of these includes some INR, call it
INR_A.B.C.D/N (with exact match on each delegation)
(3) The whole of INR_A.B.C.D/N is being moved somewhere else
(3a) IMPORTANT => No "hole" in an original INR is going to exist, i.e.
there does not exist some A.B.C.E/(N-M) which covers A.B.C.D/N, which is an
INR in the 3779 of CA_1A, CA_1B, or CA_1C.
(4) It is possible to update a {CA, manifest, CRL} set to replace an
earlier instance of {CA, manifest, CRL} which includes the same set of
INRs, with different INR delegations. This is the basic mechanism for
allocation or reaping INRs.
(5) Moving an INR from CA_X to CA_Y, where CA_X and CA_Y are both children
of CA_W, is possible in a single move (using step (4) mechanics).

In all of the following, if the letter N appears in an object's name, it
means the 3779 extension includes A.B.C.D/N.

First, step by step, create new CA objects and "move" the INR up the tree
using them in an iterative fashion:
CA_1A->CA_1B->{CA_1C', CA_1CN} where CA_1CN contains *only* INR_A.B.C.D/N,
and CA_1C' no longer has A.B.C.D/N in its 3779.
CA_1A->{CA_1B', CA_1BN}
{CA_1A', CA_1AN} (signed by CA_1A's RIR or by root TAL)

Now, move the INR to the new CA parent, and then move it down the tree to
its final location (each X' is X plus 3779 addition of A.B.C.D/N):
{CA_2A, CA_2AN}
CA_2A'->{CA_2B, CA_2BN}
CA_2A'->CA_2B'->{CA_2C, CA_2CN}

And finally merge the new INR with its new owner's main CA:
CA_2A->CA_2B->CA_2C' (with CA_2C' being CA_2C plus 3779 addition of
A.B.C.D/N)

I think the above steps can be reduced to one move, where the original INR
is removed from CA_1A and added to CA_2A, as long as all the descendants of
CA_2A already had the INR included (but not validating since the
parent-most CA didn't yet have the INR in the 3779 extension).

-----

However, if there *is* a need for the old parents to cover the INR, then
the semantics are missing explicit hole-punching.

Hole-punching is needed to disambiguate overlapping certs, so as to assure
RPs the uniqueness of INRs.

A "hole" is the positively-asserted proven non-existence of permitted
matching INRs, and need to be "glued" to matching (covering) INRs wherever
INRs are delegated.

Let me know if I need to go into more detail on "hole" semantics.

(Holes are less common today than they were 15 years ago, but they are
still critical to any kind of resource validation methodology, to avoid the
entire hijacking issue.)

Brian


>
>  Exclusivity enforced at the CA level still allows for multiple ROAs (and
>> thus multiple announcing AS).
>>
> Since this is not just a ROA question, I am ignoring the parts of your
> message that focus on ROAs, or on
> BGP details that seem to be the result of this (confused) focus.
>
> Steve
>