Re: [sidr] BGPSEC Threat Model ID

Russ White <russw@riw.us> Wed, 02 November 2011 16:32 UTC

Return-Path: <russw@riw.us>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D5BD21F9E30 for <sidr@ietfa.amsl.com>; Wed, 2 Nov 2011 09:32:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.949
X-Spam-Level:
X-Spam-Status: No, score=-1.949 tagged_above=-999 required=5 tests=[AWL=0.650, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LN-CBDY5Zd+v for <sidr@ietfa.amsl.com>; Wed, 2 Nov 2011 09:32:52 -0700 (PDT)
Received: from ecbiz91.inmotionhosting.com (ecbiz91.inmotionhosting.com [173.205.124.250]) by ietfa.amsl.com (Postfix) with ESMTP id 7030521F9E2D for <sidr@ietf.org>; Wed, 2 Nov 2011 09:32:52 -0700 (PDT)
Received: from rtp-isp-nat1.cisco.com ([64.102.254.33]:51423 helo=rtp-russwh-8913.cisco.com) by ecbiz91.inmotionhosting.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <russw@riw.us>) id 1RLdkA-0006cC-PR for sidr@ietf.org; Wed, 02 Nov 2011 12:32:51 -0400
Message-ID: <4EB170AD.1030302@riw.us>
Date: Wed, 02 Nov 2011 12:32:45 -0400
From: Russ White <russw@riw.us>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: sidr@ietf.org
References: <E96517DD-BAC7-4DD8-B345-562F71788C6A@tcb.net> <p06240807cad42f85eb7d@193.0.26.186> <32744.216.168.239.87.1320175657.squirrel@webmail.tcb.net> <p06240801cad6ab773279@193.0.26.186> <CAH1iCir-UoT+BMOD53oxQ9fdMiGirvaTL0eZDS3A5wVEDuw2LA@mail.gmail.com>
In-Reply-To: <CAH1iCir-UoT+BMOD53oxQ9fdMiGirvaTL0eZDS3A5wVEDuw2LA@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ecbiz91.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - riw.us
Subject: Re: [sidr] BGPSEC Threat Model ID
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Nov 2011 16:32:53 -0000

> (4b) It follows that there is no reason not to trust all Transitive
> values set by Originator, and Signed by the Originator

It does not follow. Policy is per AS, not per route or destination.

> (4c) It also follows that Non-Transitive values could be set by one's
> Neighbor AS, signed by that AS, and have those values Secured.

Can you define "secure" here?

> (5) If any BGP path attribute used in Path Selection is not signed,
> then BGPSEC has failed to meet its charter requirements.

Then MED and Local Pref must also be signed, along with a number of
communities, and even the next hop.

>> How does BGP indicate (i.e., where are the bits that say) that the Update
>> sent to E is not to be propagated to another ISP?  I've been told that the
>> NO_EXPORT community does not have the right semantics, and that network
>> operators do not pay attention to this anyway.
>>
>> And it's most certainly a threat and one that some consider
>> out of scope at that?
>>
>> I presume that you mean in scope, right?
> 
> I believe what Danny was saying is, "some consider this out of scope",
> where "some" means at a minimum the authors of the Threat document,
> and that since it is a threat, it really should be *in* scope.

Maybe there's a reason for this particular capability not existing
within BGP. Perhaps it is because it's always been recognized that
transmitting reachability is routing, but failing to transmit
reachability that exists because you don't want someone else to use it,
or --even more-- asking someone you send reachability information to not
to forward that reachability information --is a matter of policy.

The failure to define and separate policy from routing has caused a
great deal of confusion within the BGP security space over the years.

Russ