Re: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-bgpsec-protocol-21: (with DISCUSS and COMMENT)

"Montgomery, Douglas (Fed)" <dougm@nist.gov> Wed, 04 January 2017 21:39 UTC

Return-Path: <dougm@nist.gov>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4872D1296B4; Wed, 4 Jan 2017 13:39:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SuizhbHq0JF4; Wed, 4 Jan 2017 13:39:07 -0800 (PST)
Received: from gcc01-CY1-obe.outbound.protection.outlook.com (mail-cy1gcc01on0110.outbound.protection.outlook.com [23.103.200.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 891D91296DD; Wed, 4 Jan 2017 13:39:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=fc1Mg2WHnS+pOKq9aI+Tm7U8CE/MfewNfe0fuwjiknA=; b=LmVyzKxl8ui0wOCBiHOx/Q8BCTyt35rx46CmZ0wFEsNWHL2+4VcjnqupcxWkwsrT+a3yjAm8XkpGmKPBK+4etucNuYZC453fF43nVUmp+16UO7Lq5l/cEhyF72RmJpQolc7I2qW/eyYYsHjqno32QeZ3bWDI6K23pAsf4EmC3xs=
Received: from BN6PR09MB1426.namprd09.prod.outlook.com (10.173.202.14) by BN6PR09MB1428.namprd09.prod.outlook.com (10.173.202.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.817.10; Wed, 4 Jan 2017 21:39:05 +0000
Received: from BN6PR09MB1426.namprd09.prod.outlook.com ([10.173.202.14]) by BN6PR09MB1426.namprd09.prod.outlook.com ([10.173.202.14]) with mapi id 15.01.0829.003; Wed, 4 Jan 2017 21:39:04 +0000
From: "Montgomery, Douglas (Fed)" <dougm@nist.gov>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Russ Housley <housley@vigilsec.com>
Thread-Topic: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-bgpsec-protocol-21: (with DISCUSS and COMMENT)
Thread-Index: AQHSZpHm+sFsRlTcAUq59z5oqx6cVKEosxWAgAACfgD//7O6AIAAYT0A//+6YAA=
Importance: low
X-Priority: 5
Date: Wed, 04 Jan 2017 21:39:04 +0000
Message-ID: <D492D3B6.6F4BE%dougm@nist.gov>
References: <148353798879.13011.5291414579598073386.idtracker@ietfa.amsl.com> <B659D894-672F-4059-A001-5C4D1D602470@vigilsec.com> <3ae7d707-3229-2508-7aeb-2cd617aa97fd@cs.tcd.ie> <D492BBD6.6F422%dougm@nist.gov> <f306df7c-06a0-0662-93f4-5cb984a8eb0e@cs.tcd.ie>
In-Reply-To: <f306df7c-06a0-0662-93f4-5cb984a8eb0e@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.1.161129
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dougm@nist.gov;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [129.6.140.29]
x-microsoft-exchange-diagnostics: 1; BN6PR09MB1428; 7:jvs5tpYAmJ9g34gV2Aa8JPCLnq0kvbdngsChqxXELsTve+BqVvPNHSdpv8XLg1MKBjHxmen2VHZacp2mDBbVR2ExpOlO8/z4XCvPzaHnUqZfVAvOov+2TGslKstJ1c8j0OVh09IpfdVvrxSvaSbhdSRPNwt9RLW011Oe89P4ZnJE7emqEKpnA9ViH77xtMybhSZ2h+oe/wt/dSOMwvlyEQ9mhWOWgdfTv1gNjO9DtYKHktYBiUqr2KXrGo1Oo0jEDuT98296qyvIVac2Hbh/VX2de4GVO1jo02xKy4RQPy0crPnSvrKx0Zw3tXF+9Jz+hJ3PXU4CNka6oDWJGZXGPYFOFSeqGoWxpE2lZDfzpwKrruKkTJ4fSVQipBL+my+oTNx3c6n9a3WIGDHmkGh7t4A7LIefDHkJ/x0zwKDn2+h8n9QfaXNQDNiUZKWORf+KP0l507yJVegXCJRf/3h7Ag==
x-forefront-antispam-report: SFV:SKI; SCL:-1SFV:NSPM; SFS:(10019020)(6009001)(7916002)(39840400002)(39860400002)(39850400002)(39410400002)(39450400003)(189002)(54094003)(377454003)(199003)(24454002)(102836003)(4001350100001)(99286003)(93886004)(106116001)(68736007)(6116002)(38730400001)(2906002)(3846002)(97736004)(229853002)(5001770100001)(105586002)(36756003)(66066001)(8676002)(106356001)(81166006)(8936002)(83506001)(305945005)(101416001)(189998001)(2900100001)(6512006)(2950100002)(54906002)(6436002)(230783001)(25786008)(6506006)(77096006)(92566002)(7736002)(6486002)(81156014)(3660700001)(54356999)(122556002)(81686999)(76176999)(5660300001)(86362001)(50986999)(4326007)(3280700002)(6306002); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR09MB1428; H:BN6PR09MB1426.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
x-ms-office365-filtering-correlation-id: f0ef876d-fbe7-4713-e21c-08d434ea1b17
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:BN6PR09MB1428;
x-microsoft-antispam-prvs: <BN6PR09MB14282C48C9BAB0010B20D453DE610@BN6PR09MB1428.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(32856632585715);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6055026)(6041248)(20161123560025)(20161123555025)(20161123562025)(20161123564025)(6072148); SRVR:BN6PR09MB1428; BCL:0; PCL:0; RULEID:; SRVR:BN6PR09MB1428;
x-forefront-prvs: 0177904E6B
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <CAA240AEF2DE0E4397FD26B23F6D3F50@namprd09.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jan 2017 21:39:04.5492 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR09MB1428
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidr/kt_Jig2RybRaOxJRcE4o0vvdIkk>
Cc: IESG <iesg@ietf.org>, IETF SIDR <sidr@ietf.org>
Subject: Re: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-bgpsec-protocol-21: (with DISCUSS and COMMENT)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jan 2017 21:39:10 -0000

The RPKI validating caches *are* the relaying parties for BGPsec, they are
(a) designed to be run on a separate box than the router itself and (b)
their behavior WRT exchanges with RPKI repositories is independent of BGP
message processing by any of the routers that they serve.

Maybe the first few sections of https://tools.ietf.org/html/rfc6810 would
make that point better than my mumblings.

e.g., For various research / measurement reasons we run 3 different
validating caches that don’t serve a single BGP router.   Their exchanges
with the repositories are no different than if they served a DFZ BGP
router.

Dougm



— 
Doug Montgomery, Mgr Internet & Scalable Systems Research at  NIST/ITL/ANTD





On 1/4/17, 3:48 PM, "Stephen Farrell" <stephen.farrell@cs.tcd.ie> wrote:

>
>Hiya,
>
>On 04/01/17 20:00, Montgomery, Douglas (Fed) wrote:
>> Stephen,
>> 
>> If I understand your question, I don’t think one can infer anything
>>about
>> the BGP feeds or route selection processes of an AS based upon the
>>traffic
>> a validating cache sends to RPKI repositories.
>
>Is that the same traffic a BGPsec relying party sends?
>
>I can imagine that it might or might not be, but don't
>recall the BGPsec spec saying.
>
>If, in fact, it isn't possible to infer which ASes are
>likely to be used from the traffic emitted by an RP
>for PKI purposes, then yes, this discuss point goes
>away. (I think:-)
>
>Cheers,
>S.
>
>> 
>> The design of RPKI validating caches (and all implementations that I
>>know
>> of) prefetch and validate RPKI objects independent of BGP traffic
>> processing.   That is, they are background processing the entire RPKI,
>>and
>> are not event driven by BGP traffic.  As a matter of fact, the RPKI
>> validating cache’s are typically on systems that have no reason to
>> implement BGP at all.
>> 
>> Also the RPKI-to-Rtr protocol between the cache and router is batch
>>driven
>> (roughly) by the validation process, not BGP event driven.
>> 
>> I.e., the RPKI traffic to a validating cache in an AS with no BGP feeds
>> and one with full BGP feeds is the same, and both independent of BGP
>>event
>> processing.
>> 
>> If that was not the supposition of your question … please ignore.
>> dougm
>> 
>> 
>> 
>> 
>> — 
>> Doug Montgomery, Mgr Internet & Scalable Systems Research at
>>NIST/ITL/ANTD
>> 
>> 
>> 
>> 
>> 
>> On 1/4/17, 2:33 PM, "sidr on behalf of Stephen Farrell"
>> <sidr-bounces@ietf.org on behalf of stephen.farrell@cs.tcd.ie> wrote:
>> 
>>>
>>>
>>> On 04/01/17 19:24, Russ Housley wrote:
>>>>
>>>>> 
>>>>>----------------------------------------------------------------------
>>>>>
>>>>>
>>> DISCUSS:
>>>>> 
>>>>>----------------------------------------------------------------------
>>>>>
>>>>>
>>>>>
>>> I have a couple of fairly straightforward things I'd
>>>>> like to briefly discuss...
>>>>>
>>>>> [snip]
>>>>>
>>>>> (3) section 8: Is there a potential exposure here in that a relying
>>>>> party who emits e.g.  certificate status checks or cert retrieval
>>>>> queries for an RPKI cert they've not previously seen is exposing
>>>>> something about the set of paths its traffic is likely to follow.
>>>>> (This is similar to why we have OCSP stapling in the web.) IIRC the
>>>>> RPKI specs may cover this but I suspect it'd be worth noting here
>>>>> as well even if so as this represents exposing something about BGP
>>>>> announcement content to off-path parties which I think is new for
>>>>> BGP. Is that a new thing for BGP? (I think the new aspect to the
>>>>> attack is that a bad actor who has already compromised some AS
>>>>> could more easily spot that traffic from the relying party's AS is
>>>>> likely to transit the compromised AS.)
>>>>
>>>> I am not sure what you mean by a "compromised AS,” but it may not
>>>> matters …
>>>
>>> More or less if traffic to/from ASxxxx is visible to an
>>> attacker and/or can be modified by an attacker. That could
>>> be due to collusion between the AS and an attacker for
>>> example, or because an attacker has compromised some routers
>>> within a transit AS.
>>>
>>>>
>>>> If a link goes down,
>>>
>>> I'm not sure this is only if a link goes down. I'd guess the same
>>> risk would exist when any BGPsec path is first seen at a relying
>>> party and where that RP doesn't have all the necessary RPKI stuff
>>> cached before signature validation.
>>>
>>> . and that causes an alternative path to be
>>>> selected, that forces the validation a new path which might involve a
>>>> previously unvalidated AS.  If an OCSP responder or repository that
>>>> provides RPKI objects is contacted as part of that validation, then
>>>> some external entities can detect that something is changing.  That
>>>> is, stuff not normally validated because it is associated with a
>>>> unselected path gets fetched.
>>>
>>> Right. Sorry to not be clearer on what might become visible to
>>> the network outside the RP's AS - I'm afraid I just don't have all
>>> the RPKI details in my head;-)
>>>
>>>>
>>>> That said, the NOC could fetch a snapshot of the RPKI, then the
>>>> exposure of the switch to a new path can be limited to that AS.  This
>>>> assumes that the snapshot uses CRLs, which seems like a very
>>>> reasonable choice in the RPKI.
>>>
>>> Right, I think all that'd be needed for this would be to ack that
>>> there's this (normally fairly minor) new risk and that you can
>>> avoid it if you pre-fetch enough stuff. (As a separate question,
>>> I wonder if the amount of stuff involved in the RPKI is such that
>>> it'd be fairly easy to pre-fetch it all frequently enough to
>>> nearly never hit this problem.)
>>>
>>> Cheers,
>>> S.
>>>
>>>>
>>>> Russ
>>>>
>>>
>> 
>