Re: [sidr] I-D Action: draft-ietf-sidr-rpki-rtr-23.txt

Danny McPherson <danny@tcb.net> Fri, 13 January 2012 01:20 UTC

Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8280211E8091 for <sidr@ietfa.amsl.com>; Thu, 12 Jan 2012 17:20:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.466
X-Spam-Level:
X-Spam-Status: No, score=-102.466 tagged_above=-999 required=5 tests=[AWL=-0.467, BAYES_00=-2.599, J_CHICKENPOX_66=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4b5NKwmnSTuP for <sidr@ietfa.amsl.com>; Thu, 12 Jan 2012 17:20:36 -0800 (PST)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id 2EBAB11E808C for <sidr@ietf.org>; Thu, 12 Jan 2012 17:20:35 -0800 (PST)
Received: by dog.tcb.net (Postfix, from userid 0) id 37158368199; Thu, 12 Jan 2012 18:20:33 -0700 (MST)
Received: from dul1dmcphers-m1.home (pool-98-118-240-226.clppva.fios.verizon.net [98.118.240.226]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; Thu, 12 Jan 2012 18:20:32 -0700 (MST) (envelope-from danny@tcb.net)
X-Avenger: version=0.7.8; receiver=dog.tcb.net; client-ip=98.118.240.226; client-port=63498; syn-fingerprint=65535:48:1:64:M1460,N,W3,N,N,T,S MacOS 10.4.8; data-bytes=0
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Danny McPherson <danny@tcb.net>
In-Reply-To: <m28vlcka6n.wl%randy@psg.com>
Date: Thu, 12 Jan 2012 20:20:16 -0500
Content-Transfer-Encoding: 7bit
Message-Id: <41DA208B-399F-48A8-8196-49507E86D517@tcb.net>
References: <20120109151153.7946.29762.idtracker@ietfa.amsl.com> <m24nw4syc0.wl%randy@psg.com> <6855CE88-68E6-49BE-94D0-EA19ACE07F69@tcb.net> <p06240803cb32917ccb3c@[172.20.8.192]> <m21ur7nf7k.wl%randy@psg.com> <5A64D71D-F778-450A-9BAC-BCC78C93A021@tcb.net> <m28vlcka6n.wl%randy@psg.com>
To: Randy Bush <randy@psg.com>
X-Mailer: Apple Mail (2.1084)
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] I-D Action: draft-ietf-sidr-rpki-rtr-23.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jan 2012 01:20:36 -0000

On Jan 12, 2012, at 2:11 PM, Randy Bush wrote:
> 
> i think so, but i am a bit worried as about this waterboarding stuff.

I think simple things like asking that rpki-rtr connection-oriented 
transport require protections is reasonable in 2012, particularly
given that the current specification is unsigned prefix,origin 
binding data (i.e., otherwise no object or transport protections).

> i think the norm is to get some experience with v0 (the protocol version
> number in the pdus, a la bgp_4_) before going to v1.  but, as with most
> things, i could be wrong.

This is important.  If you just needed origin,prefix bindings in 
soft-state in the router there are lots of ways you could do that
today without a new protocol (to include with BGP itself).  

If the objective is to use rpki-rtr protocol to onboard actual rpki-rtr
data into the router control plane, e.g., to accommodate 
requirements by BGPSEC, then getting those rpki-derived signed 
blobs in the router is a much higher frequency function and may 
well justify some new onboarding protocol.  

> as i have no idea how to factor a document or how much lead time
> factoring takes, even if i knew when v1 could be out which i don't, i
> would not be able to answer.

Cute...

If you were designing rpki-rtr protocol to load rpki data into routers 
(rtrs) then before standardizing rpki-rtr protocol it would seem to me
we should fully consider at least the initial use case that justifies a 
brand new protocol -- before we 'augment' it with new lego blocks.

If not, then I suggest to the WG that we require a proposal from 
the bgpsec-protocol team for how they intend to accommodate 
their own requirements to onboard this data before we continue 
that work.

> perhaps a focus on engineering, as opposed to mis-guessing and impugning
> others' motives, would be productive.

Which portion am I mis-guessing here, can you be specific? Is the 
BGPSEC design team NOT intending to use rpki-rtr protocol to get
RPKI-derived signed blobs on the router in order to enable BGPSEC?
Your own presentations in operations fora suggestions your thinking 
is rather evolved already in this area.

Attempting to assemble the legos blocks in sidr land and determine 
what the implications might be for operations at the end of the day is 
indeed engineering and architectural in nature, do you disagree?
Should we not be considering and questioning the systemic and 
inter-dependencies these new standards introduce?

> in the current taxonomy, there are three pieces, the rpki, rpki-based
> origin validation, and then path validation.  rpki-rtr as it stands is
> part of origin validation, and the docs for origin validation are going
> through the sausage machine now.  path validation is in early to mid
> design, documents are in high flux or unwritten, and are nowhere near
> ready to be considered sausage.

Perhaps we need to do some architectural work then, and not build 
blocks that are supposed to be pieced together without some amount
of systemic consideration.

Let me give you a simple example..  We're saying RPKI needs 
algorithm agility.  If RPKI was fully deployed, and BGPSEC was 
deployed, and rpki-rtr were used to onboard BGPSEC-required 
signed blobs as specified in the BGPSEC protocol document, 
e.g., S.5 of bgpsec-protocol I-D, then during algorithm rollover 
would the following potentially be required:

1) many  more RPKI objects
2) many more RPKI-derived signed blobs the relying parties (routers) 
    potentially need to onboard via rpki-rtr and store in soft-state
3) more BGPSEC signed data in the routing system
4) more churn in all the elements that rely in RPKI data in subsequent 
    periodic updates, "beacon" functions, etc.
5) BGPSEC speakers as relying parties would need to consider 
    algorithm suites from either new or old algorithms when performing 
    validation from independent certificate hierarchies
6) some other stuff, I suspect.

I think it's all of the above, but I may very well be wrong and I 
don't have this all figured out..  I do know that there are systemic 
implications of many of these things, particularly in concert.

I think consideration of these issues, i.e., the systemic implications 
of a set of assembled lego blocks is within the purview of both the 
iEtf and this WG.   

-danny