Re: [sidr] Keys and algorithms for Updates - feasibility analysis? (was Re: RPKI and private keys)

Brian Dickson <brian.peter.dickson@gmail.com> Fri, 11 May 2012 21:19 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F4EF21F85AF for <sidr@ietfa.amsl.com>; Fri, 11 May 2012 14:19:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.498
X-Spam-Level:
X-Spam-Status: No, score=-3.498 tagged_above=-999 required=5 tests=[AWL=0.100, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2jnKDevuvQez for <sidr@ietfa.amsl.com>; Fri, 11 May 2012 14:19:05 -0700 (PDT)
Received: from mail-wg0-f44.google.com (mail-wg0-f44.google.com [74.125.82.44]) by ietfa.amsl.com (Postfix) with ESMTP id 9EF8221F8566 for <sidr@ietf.org>; Fri, 11 May 2012 14:19:04 -0700 (PDT)
Received: by wgbdr13 with SMTP id dr13so2168237wgb.13 for <sidr@ietf.org>; Fri, 11 May 2012 14:19:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=AkKYDpBncEklqZj1r2EWP6KmvFpC4wIZammPbqIqAYU=; b=Q361/V1a5m7DioEckkIYBo/QjyVQ+MILiJCbGxADT0jXKm4rkpytCgNLhPhgaTt2gy aaEoBFRICKPRDtDASERBKngfS7s0TcjoiNcWAzW9vBTapX++RAngwBKOFQ5XK19FZuui p47FZcXr6P49sxMvaQChw7/96cEsnALAGSyO+361PmOIPmU4Ym4bXvbVwICKcf/CspGY RYJnRzigpcTHqGFV1gBC1Ex0fjGtxLO4w02/eVoAnF2aHYeoBYkf1BbSg0xUfClhsQeX nYClEjOriq7TwFlJBHW9UCHKKvTItUplAMPOaWF4gQS95AwNtETW3khRJJs9mGuXM5qt cEzw==
MIME-Version: 1.0
Received: by 10.180.106.9 with SMTP id gq9mr11239670wib.17.1336771143742; Fri, 11 May 2012 14:19:03 -0700 (PDT)
Received: by 10.223.93.138 with HTTP; Fri, 11 May 2012 14:19:03 -0700 (PDT)
In-Reply-To: <24B20D14B2CD29478C8D5D6E9CBB29F60F709A01@Hermes.columbia.ads.sparta.com>
References: <CAH1iCiruThFzpef5u9NVt+3AokGnuFhq-GrbqEOkkKnVhav4zQ@mail.gmail.com> <CAL9jLab2XT-4NWr8KyHKOiQMTWqE5cTavmEr4Uw+S4zhrA=YLA@mail.gmail.com> <CAH1iCiq3so54pE9XBM5Bp13xaERbmShipmCg=ckEySiDsh5ZPQ@mail.gmail.com> <D7A0423E5E193F40BE6E94126930C4930B990A66A8@MBCLUSTER.xchange.nist.gov> <CAH1iCirMKm1TbtBzWSKy=vHGLdYHvbtnXcwO1G9aG00n3DXmyw@mail.gmail.com> <D7A0423E5E193F40BE6E94126930C4930B990A6710@MBCLUSTER.xchange.nist.gov> <D7A0423E5E193F40BE6E94126930C4930B990A6716@MBCLUSTER.xchange.nist.gov> <CABFLmSTVmEUMYZmXNkbhSac0_jb0o-2nPG2_58Si0SGmF0podA@mail.gmail.com> <D7A0423E5E193F40BE6E94126930C4930B985DEF48@MBCLUSTER.xchange.nist.gov> <24B20D14B2CD29478C8D5D6E9CBB29F60F70871E@Hermes.columbia.ads.sparta.com> <CAH1iCio4_PaLFACs_cDZRV9c3iYhn93XqCrQrR5PD48bpyM3BA@mail.gmail.com> <24B20D14B2CD29478C8D5D6E9CBB29F60F709A01@Hermes.columbia.ads.sparta.com>
Date: Fri, 11 May 2012 17:19:03 -0400
Message-ID: <CAH1iCiqKych-pLhokRK8vk=GbsYQ=ZX+cSj0Tu3FmeaY6dPXnA@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
Content-Type: multipart/alternative; boundary="f46d04451a152b35d104bfc949cb"
Cc: "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>, "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>
Subject: Re: [sidr] Keys and algorithms for Updates - feasibility analysis? (was Re: RPKI and private keys)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 May 2012 21:19:07 -0000

While analysis of a completed system is valuable, it also requires analysis
of the components of the system.

If we want to consider any solution to the requirements, I believe we need
to perform analysis on the performance of the components, as well as of the
system, and validate that it meets the requirements.

So, when do you suggest doing that for the system and components specified
in the -protocol document and in the -requirements document?

If you aren't going to do that, then I suggest that doing analysis and
comparison on components is valid.

What I am looking at is exclusively the following elements:
(1) the signatures for the -protocol document (and _explicitly_ excluding
the validation steps, which will be necessary regardless of solution),
versus
(2) the nonces for my comparative performance suggestion (N bit nonces
constructed using N/32 independently generated PNRG 32-bit values (with
N/32 different seeds)).

Comparative analysis of the validation components and system of the
-protocol, along with suggested OOB methods (plural - once you go OOB you
have as many options as you want, and those aren't limited to ones already
suggested by me) are still going to be needed to do a complete comparison.

However, the results for (1) and (2) are likely to provide motivation for
the related follow-on work.

Your choice of NULL as a way of discrediting alternatives is quite telling.
What about the risks vs performance of CRC-32, or MD4, or ROT13?

Shared-key cyphers are well-known and have superb performance
characteristics with predictable risk. It is suitable for the purpose, IFF
the architecture avoids exposing key data.

You have already said that you presume (in the case of on-router private
key data) that key data would never be exposed.

So, does this mean we can now make similar assumptions about competing
architectures?

Or do you want to supply a legitimate risk analysis of key management
practices, predictable-text risks, entropy sources, etc., for the primary
SIDR proposal(s)?

Brian

P.S. The same argument for the incompletely specified proposals holds - the
SIDR bgpsec system is incompletely specified, so it follows there is no
reason to not allow competing (incompletely specified) proposals, certainly
not on the basis of being incompletely specified, nor on the basis of
quantitative benefits of system components.

On Fri, May 11, 2012 at 4:31 PM, Murphy, Sandra <Sandra.Murphy@sparta.com>wrote:

> Answering a response to a statement made as wg chair
>
> wrt:
>
> Brian Dickson [brian.peter.dickson@gmail.com] said on Friday, May 11,
> 2012 3:44 PM
>
> >On Fri, May 11, 2012 at 2:00 PM, Murphy, Sandra
> ><Sandra.Murphy@sparta.com> wrote:
> >
> >
> >>Before we get too involved in discussing performance and different
> >>methods of measuring performance, I think it is very important to
> >>address the features of what Brian is suggesting;
>
>
> >Would you be so kind as to explain why you believe this is important?
>
> I believe that analyzing performance measures of a system is premature
> before its features are at least well enough established to understand that
> it meets the requirements and does not have systemic architectural
> drawbacks.
>
> To choose an extreme example, for illustrative purposes only, the NULL
> algorithm has really wonderful performance measures, but would not suit the
> purpose.
>
> Furthermore, it is difficult to know what performance to measure if the
> system is not understood to some degree.
>
> --Sandy, answering as wg co-chair
>
>
> From: Brian Dickson [brian.peter.dickson@gmail.com]
>
> Sent: Friday, May 11, 2012 3:44 PM
>
> To: Murphy, Sandra
>
> Cc: Sriram, Kotikalapudi; Ross.Anderson@cl.cam.ac.uk; sidr wg list (
> sidr@ietf.org)
>
> Subject: Re: [sidr] Keys and algorithms for Updates - feasibility
> analysis? (was Re: RPKI and private keys)
>
>
>
>
>
>
>
>
>
> On Fri, May 11, 2012 at 2:00 PM, Murphy, Sandra
> <Sandra.Murphy@sparta.com> wrote:
>
>
> Before we get too involved in discussing performance and different methods
> of measuring performance, I think it is very important to address the
> features of what Brian is suggesting;
>
>
>
>
>
>
>
> Would you be so kind as to explain why you believe this is important? It's
> not like the WG mailing list is overloaded or the participants doing much
> (or even responding very much, it would seem.)
> I was asked about this at the interim meeting, and there were many SIDR
> participants who were not at the meeting (physically or remotely.) My
> follow-up is pretty much required, just to inform the rest of the
> participants.
>
>
>
> We have not had, to the best of my knowledge, any (or much at all if there
> was some) in-SIDR discussion of performance metrics on the proposed
> mechanisms, when implemented in software, or when implemented in hardware.
>
>
>
> It has been proposed that a roadmap timeframe of 5-7 years is acceptable,
> in order that vendors provide hardware-based implementations. No
> justification for this has been offered, beyond "well, it is common sense".
>
>
>
> The requirements doc explicitly calls out hardware-based solutions as
> acceptable, without any cost analysis or cost/benefit analysis, or absolute
> performance metrics for requirements.
>
>
>
> I think the starting point should have been previously, and in the context
> of the current suggestions should be, performance numbers based on actual
> experiments using the protocols in question (and alternatives where
> alternatives have been suggested).
>  In fact, the results from such testing should help inform discussion on
> acceptable performance, and those acceptable levels should be based on
> real-world observations of absolute rates.
>
>
>
>
>
> such as:
>
>
>
> what security services are being supplied?
>
> who is involved in the service - where is the service applied and where
> validated?
>
> what is being protected?
>
> what are the components and the architecture?
>
>
>
> etc.
>
>
>
>
>
> This can be addressed, for the moment, in a "Napoleon Dynamite" fashion.
> - whatever is needed
> - whoever wants to  & what do you mean by "service being validated"?
> - bgp paths vs threats
> - whatever they need to be, and whatever works
>
>
>
> The basic thing here is, I'm asking the question, "Why is the heavy-duty
> crypto needed?".
> When I start using formal logic, I take a bunch of axioms, and rules based
> off those axioms.
> Then, take a hypothetical additional piece of logic (rule or assumption),
> and see what it can be reduced to, in terms of which axioms or rules are
> violated.
>
>
>
> Working backwards, it appears the crypto is needed because all the
> validation is based on information passed in-band.
> Without the crypto, anyone can take part of another update, and forge
> additions to it, or changes to it, trivially. (That's the case with vanilla
> BGP, too.)
>
>
>
> The additional assumption is, assume some OOB validation process, e.g.
> suing an outside-of-BGP communication path of some sort.
>
>
>
> And my question was, if we start the analysis by ignoring the details of
> the OOB system, but merely presume it exists as an adjunct, what are the
> minimum things we can do to tie into that system by adding _something_ to
> BGP updates, and how does that change
>  the performance (and thus cost) of on-router stuff?
>
>
>
> The reason it is fair to ignore the OOB element is, that unlike on-router
> stuff, the possibility of achieving scaling benefits exists, since multiple
> routers could conceivably use a shared OOB black box.
>
>
>
> By definition, on-router stuff can't achieve scaling benefits of this sort.
>
>
>
> And, also by definition, there is no requirement that the OOB component
> look anything like the in-band stuff. The OOB could conceivably be anything
> under the sun, and be implemented by any existing or new technology. It
> could use DNSSEC, it could use IPSEC,
>  it could use LDAP, it could use Kerberos (how, I don't know, but it
> could), it could even use carrier pigeons or SMTP or SNMP or quantum
> encryption.
>
>
>
> And systemically, any number of topologies are possible, since they are
> not fundamentally tied to the topology of the BGP infrastructure itself.
>
>
>
>
>
>
>
> --Sandy, speaking as wg co-chair
>
>
>
>
>
>
>
>
>
>
> When you speak as wg co-chair, I think it is important to be clear on the
> rationale for any attempt to moderate on-topic discussion. No offense
> intended, but not providing rationale looks to WG participants as political.
>
>
>
> Thanks,
> Brian
>
>
>
>
> ________________________________________
>
> From:
> sidr-bounces@ietf.org [sidr-bounces@ietf.org] on behalf of Sriram,
> Kotikalapudi [kotikalapudi.sriram@nist.gov]
>
> Sent: Thursday, May 10, 2012 9:05 AM
>
> To:
> Ross.Anderson@cl.cam.ac.uk
>
> Cc: sidr wg list (sidr@ietf.org)
>
>
> Subject: Re: [sidr] Keys and algorithms for Updates - feasibility
> analysis? (was Re: RPKI and private keys)
>
>
>
> Hi Ross,
>
>
>
> The 10,000/s number is Brian Dickson's and
>
> it is not related to ECDSA (or RSA) signing/verification of BGPSEC updates.
>
>
>
> In my work on performance modeling of BGPSEC, I have used the basic
>
> signing/verification measurement data from the eBACS benchmarking effort:
>
> http://bench.cr.yp.to/results-sign.html
>
> The measurement numbers they report are in the same ballpark as yours for
> RSA signing.
>
> However, the BGPSEC spec draft specifies ECDSA-P256, which is much faster
> than RSA-2048 for signing.
>
> (Side note: ECDSA-P256 was also preferred because it results in a much
> lower size for BGPSEC updates
>
> and hence lower router RIB memory size.
>
> http://www.nist.gov/itl/antd/upload/BGPSEC_RIB_Estimation.pdf  )
>
>
>
> Regarding how the eBACS measurement data were used to model BGPSEC CPU
> performance,
>
> please see:
>
> http://ripe63.ripe.net/presentations/127-111102.ripe-crypto-cost.pdf
>
> (slides 10 and 11 summarize signing/verification speeds for various latest
> Intel and Cavium processors)
>
> or see,
>
> http://www.ietf.org/proceedings/83/slides/slides-83-sidr-7.pdf
>
> (slides 7 and 8).
>
>
>
> The performance modeling and measurement work is still evolving and there
> is still ways to go
>
> w.r.t. prototyping of BGPSEC and measurements with actual signed updates,
> etc.
>
>
>
> Sriram
>
>
>
> ________________________________________
>
> From:
> Ross.Anderson@cl.cam.ac.uk [rossjanderson@googlemail.com]
>
> Sent: Thursday, May 10, 2012 4:35 AM
>
> To: Sriram, Kotikalapudi
>
> Cc: Brian Dickson (brian.peter.dickson@gmail.com) sidr wg list (
> sidr@ietf.org)
>
> Subject: Re: [sidr] Keys and algorithms for Updates - feasibility
> analysis? (was Re: RPKI and private keys)
>
>
>
> Sriram
>
>
>
> You can't get 10,000 signature creations and verifications a second on
>
> a standard Intel core. You can get maybe 100.
>
>
>
> Your colleagues who work on smart grid standards have experience of
>
> this. The IEC working group assumed that all LAN traffic in
>
> electricity substations could be authenticated by digital signatures.
>
> This turned out to not work, and caused a major stall in the smart
>
> grid security program. Some substation LAN traffic has a hard
>
> end-to-end latency bound of 4ms, and that simply can't be achieved on
>
> standard cores using 1024-bit RSA signatures. You need custom
>
> hardware, which brings serious export control headaches as well as
>
> significant costs. We wrote this up in
>
>
>
>  http://www.cl.cam.ac.uk/~sf392/publications/S4-1010.pdf
>
>
>
> Ross
>
>
>
>
> _______________________________________________
>
> sidr mailing list
>
> sidr@ietf.org
>
> https://www.ietf.org/mailman/listinfo/sidr
>
> _______________________________________________
>
> sidr mailing list
>
> sidr@ietf.org
>
> https://www.ietf.org/mailman/listinfo/sidr
>
>
>
>
>
>
>
>
>
>
>