Re: [sidr] Questions about draft-huston-rpki-validation-01

Christopher Morrow <morrowc.lists@gmail.com> Tue, 20 May 2014 21:35 UTC

Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64EDF1A0407 for <sidr@ietfa.amsl.com>; Tue, 20 May 2014 14:35:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rAgI_tQIzziu for <sidr@ietfa.amsl.com>; Tue, 20 May 2014 14:35:26 -0700 (PDT)
Received: from mail-la0-x22c.google.com (mail-la0-x22c.google.com [IPv6:2a00:1450:4010:c03::22c]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26E0E1A03E5 for <sidr@ietf.org>; Tue, 20 May 2014 14:35:25 -0700 (PDT)
Received: by mail-la0-f44.google.com with SMTP id hr17so925481lab.31 for <sidr@ietf.org>; Tue, 20 May 2014 14:35:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type:content-transfer-encoding; bh=s5wuhopY5hhz0rfNVpS0uRHYk2GbCvhGQXTNEepCuT0=; b=ln6+PJRMqRDEi/XaGPGBe7H+CFORhGQNf/hZjcc0iNBsbRo2mDQHYbtuIu2A+eRJAE G4T8tc8VBAvkt5iVxw6alxk9gb8BIKIxRwsDbVGtNNT9ISqfMWfePvp7JTFqcd053pTy bZFWmciBe+ep/s/g+BuEGbaBkTY0Ijk52szMo1YkMcd11Uokc+qMMcDptH1edbpVSOt8 57wd4Kfr+UwEAxaKO4p7Qpef83sRLT7NrwxSqIgoeUiY7C5T1d+SX7BXRbWZs3MSlCkX Li0kAoqi4h4FiKDUlgRbouVO3R/WHnhURVRcJDckG3ZnUqlM+0htVWfnwl6W6FgVQAvK Lc7g==
MIME-Version: 1.0
X-Received: by 10.152.29.168 with SMTP id l8mr34410594lah.35.1400621724046; Tue, 20 May 2014 14:35:24 -0700 (PDT)
Sender: christopher.morrow@gmail.com
Received: by 10.153.5.161 with HTTP; Tue, 20 May 2014 14:35:23 -0700 (PDT)
In-Reply-To: <FF3700A5-A766-49C1-B282-26E10B508929@gmail.com>
References: <aa922cfa32d64b01ad85a472faa9356b@BLUPR09MB053.namprd09.prod.outlook.com> <F69C5324-C865-46FB-9B49-940B47F29ADD@apnic.net> <519729f8a8c549ec98496c22fc6025a6@BLUPR09MB053.namprd09.prod.outlook.com> <452C0EF8-8A6C-4E75-B7B3-DDF4FFD87691@apnic.net> <375b352964154d2eab003662a377c688@BLUPR09MB053.namprd09.prod.outlook.com> <88BC9DDD-0F93-4041-A0DD-527DB61CD7D5@apnic.net> <edb249d3311944af920e850d6c65e8b9@BLUPR09MB053.namprd09.prod.outlook.com> <6F99EFB3-6813-4D40-9AEA-B1A8557F06EA@apnic.net> <a7b10fad36e94680a2851d2c8a2bc692@BLUPR09MB053.namprd09.prod.outlook.com> <FB4FB863-1AE0-41DB-97B1-FB022150D29E@ripe.net> <CAL9jLaY3-dy7vA2=bd3dNGM8cL0jqzSZZgwWtx84H_AxiotXCA@mail.gmail.com> <FF3700A5-A766-49C1-B282-26E10B508929@gmail.com>
Date: Tue, 20 May 2014 17:35:23 -0400
X-Google-Sender-Auth: b38z_EVIMsdjobrZ1J47wv3bgE4
Message-ID: <CAL9jLaauY6kHa+U=TKjW3rDawVAzNhL4ctvBONgey6inFBuT7A@mail.gmail.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
To: Geoff Huston <gih902@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: http://mailarchive.ietf.org/arch/msg/sidr/nDfIsRPDBSJmVzgGCi-g6cSHLt8
Cc: sidr wg list <sidr@ietf.org>, "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>, George Michaelson <ggm@apnic.net>
Subject: Re: [sidr] Questions about draft-huston-rpki-validation-01
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 May 2014 21:35:28 -0000

On Tue, May 20, 2014 at 8:10 AM, Geoff Huston <gih902@gmail.com> wrote:
>
> On 20 May 2014, at 4:38 am, Christopher Morrow <morrowc.lists@gmail.com> wrote:

>> It's unclear to me what would happen if you split this into a
>> prefix/asn per cert and just carried more certs in your purse. Why
>> would I not just add more certs to my purse? is there a particular
>> reason to conglomerate these under the minimal number of certs? are we
>> trying to minimize space in my purse? if so the purse is large, and
>> the certs very small... I could 10x or 100x the number of certs here
>> and be ok still.
>
> For AS numbers thats an interesting approach, if you carry a single ASN per cert then yes, there would be a whole lot more certs around (-ve), but any discrepancy in AS registry records between parent and child would be limited to just those ASns where there are such discrepancies (+ve)
>

ok, in tim's/your(someone's) original note:
--------------------- snip ------------------------
Certificate 1: {10.0.0.0/12, AS64501, AS64505, AS64509}  (TA certificate)
Certificate 2: {10.0.0.0/22, AS64501, AS64505, AS64511}
Certificate 3: {10.0.0.0/20, AS64501, AS64509}

Currently we reject certificate 2 and everything under it..
--------------------- end snip ------------------------

it looks to me like making this 8 ROA instead of 3 would make sense.
The 'isp'/resource-owner (I think - AS64501) would be able to announce
the /12, /22 and /20. The customer/other prefix-users:
   64505 - /12 and /22
   64509 - /12 and /20
   64511 - /22

which seems to catch the intent of the 3 certs at least. This way if
you were to break out a new /X from the /12 for AS65534  no one is
broken and no shuffling has to happen (yet).

If the RIR would break the /12 up into 2x /13, for instance, and
transfer the top/higher /13 off to RIR#2, only the /12 needs to change
and you could do make-before-break over some period of time acceptable
to the 3+ parties involved.

Additionally, if the RIR has an oopsy on the /12 the other prefixes by
the users are ok... hopefully.

It's not clear to me that 'oopsy' will happen on only a single prefix
either? if it can happen to 1, it can happen to 20000. (maybe that's a
chat for another day in the thread though).

> However I'm unsure how you could or would apply this principle to IPv4 addresses. And I'm even more unclear about IPv6.
>

to /32's? or something else? I suppose TODAY we only really care about
'minimum size prefix (max length) which is globally accepted'. We also
should have data on how quickly the RPKI system converges across it's
whole (perhaps to some level of 'converge') given number of objects in
the global system. (this metric discussion came up several times over
the last M meetings... sriram and tim have some data, but it's not
clear how applicable any of the study work has been)

> However, in principle, the validation algorithm proposed in this draft performs a validation function which is semantically equivalent to breaking down each certificate into a collection of certificates, each describing one element of the original number set, but this approach does not require one to define the minimal unit of addresses in IPv6, nor try to generate an enumeration of individual /128s (or even /64s!) in IPv6, which I guess is a Good Thing.

sure, but I don't know that we need to go to host-level data do we?
you can't get a host-route routed in the internet today, at least not
beyond your local ISP (save leaks/mistakes), and I think the ROA
format allows you to specify:
  128.2.0.0/16-32 AS5050

right? so in v6:
  2001:4860::/32-128 AS15169

Any case of splitting a prefix (2001:4860::/32  becomes 2001:4860::/33
&& 2001:4860:8000::/33) for the purposes of transfer/change-in-Origin
is going to require /make before break. I don't think that's changed
by the validation algorithm is it?

I do think that being explicit with the roa content and not cute by
chunking as much as possible into the bag is a good thing. It seems,
to me, like it makes the decision process for each ROA less complex,
and thus any further actions on that ROA (splits, joins, deletion,
etc) simpler.

-chris