Re: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-bgpsec-protocol-21: (with DISCUSS and COMMENT)
Stephen Farrell <stephen.farrell@cs.tcd.ie> Thu, 05 January 2017 14:27 UTC
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B213C12956C; Thu, 5 Jan 2017 06:27:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.401
X-Spam-Level:
X-Spam-Status: No, score=-7.401 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-3.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JJOrVF2dW3EM; Thu, 5 Jan 2017 06:27:05 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A918129568; Thu, 5 Jan 2017 06:27:04 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 945BBBE55; Thu, 5 Jan 2017 14:27:02 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZQxSZLLboTA4; Thu, 5 Jan 2017 14:27:01 +0000 (GMT)
Received: from [10.87.48.210] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 4096EBDF9; Thu, 5 Jan 2017 14:27:00 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1483626420; bh=+hkSROEZbJUN7cR4NDymPzjAz7fbh/4HjPdin4TAk2M=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=H6vTaVZCFd7sN6W34TAMkvhHG+F8xlR5PKSOjkYHcAnT/8C6kQBhIrKKc92htnYVC Es0vvCVK269+Nm9lnxgCYUoBmfyx+YIIvInLeHP5rtnVi3oxeYlNc/nuySTDCfUqL1 9cPx2ZQUCvsCZRSPWgVoWmYkYQKYaXV+HFvgBQ0s=
To: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>, The IESG <iesg@ietf.org>
References: <148353798879.13011.5291414579598073386.idtracker@ietfa.amsl.com> <DM2PR09MB0446A3E1696278FBD040707F84600@DM2PR09MB0446.namprd09.prod.outlook.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <304ad58d-fa44-45e3-6fb1-4e7b189007cd@cs.tcd.ie>
Date: Thu, 05 Jan 2017 14:26:59 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1
MIME-Version: 1.0
In-Reply-To: <DM2PR09MB0446A3E1696278FBD040707F84600@DM2PR09MB0446.namprd09.prod.outlook.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms010702050903010705030903"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidr/tAYHVAVmk9hOzpOWZexpdPR8gsA>
Cc: "draft-ietf-sidr-bgpsec-protocol@ietf.org" <draft-ietf-sidr-bgpsec-protocol@ietf.org>, "sidr-chairs@ietf.org" <sidr-chairs@ietf.org>, "m.waehlisch@fu-berlin.de" <m.waehlisch@fu-berlin.de>, "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-bgpsec-protocol-21: (with DISCUSS and COMMENT)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jan 2017 14:27:08 -0000
Hiya, On 05/01/17 14:10, Sriram, Kotikalapudi (Fed) wrote: > Stephen, > > Thank you for the detailed review and comments. > Please see my responses marked with [Sriram] inline below. > > [Sriram] Your DISCUSS points (1) and (3) were already > discussed /being discussed in separate threads. Yep, thanks. I need to check back to see how close we are to resolving those, but I had thought the ball wasn't in my court at the moment:-) I'm sure we'll sort 'em soon though. > >> (2) Figure 8: It seems to me to be an error to omit the > signer's ASN from the signed data and only have that > included in the signer's certificate. Why is that intimate > level of binding to the RPKI desirable? There may well be > reasons but I'm not seeing 'em, and I am recalling that it > took a chunk of effort to make CMS less dependent on > X.509 for similar reasons (meaning identifying signers > exclusively via cert issuer and serial in that case). I > would expect that there could be demand to have some level > of independence between BGPsec and RPKI for at least > internal uses such as those noted in the spec already. > > [Sriram] Signer's ASN is indeed included in the signed data. > In Figure 8, "Secure_Path Segment : N" corresponds > to the signing AS (current AS) and that is where the > signer's ASN is included along with its pCount and Flags. Hmm. That's the target ASN of the previous signer though. I thought there were cases where they could differ? But if not, then you probably need to state that as a rule for checking signatures, is that there already? (Happy to check later, but don't have time right now.) One other thing below... > >> ---------------------------------------------------------------------- >> COMMENT: >> ---------------------------------------------------------------------- > >> - Figures 2 and 5 present the fields in different orders. > That seems like a bad idea. > > [Sriram] Good catch. Already fixed in my editor copy of version-22. > >> - 3.2: The reference to the pki profile doc is not precise > enough, the string "key identifier" does not occur in that > draft - it's in RFC6487, 4.8.2. > > [Sriram] Again, a good catch. Already fixed in my editor copy of version-22. > >> - 4.1, last para: is the distinction between an "internal > peer" and "iBGP peer" sufficiently clear to routing folk? > For me they sound similar but I assume it's ok. > > [Sriram] I think it is well understood. But when I push version-22 out, > I’ll consider if I should simply just use "iBGP peer" consistently > and avoid using "internal peer". > >> - 5.2, I think you need to say something to the effect > that every Secure_Path MUST have a signature with an > algorithm that is supported. As I read the text, the > algorithm as stated here could be read to not require > that. E.g. the para before the bullets on p25 could be > read to mean "drop all stuff involving unsupported algs > and then continue to process the rest of the stuff." > > [Sriram] Seems like a bit of a pathological case. > Could happen only if the sender behavior was incorrect. Yes, but 5.2 is verifier behaviour and out not assume a correct signer, so I do thing the alg presented here needs to cover such things. > Sender is not required to know which algorithms a peer supports > but sender's expected behavior is this: MUST include a Signature_Block > for the "current" algorithm (which every BGPsec speaker > MUST support through the transition period), Where does it say that the current/next thing applies to the entire world of BGPsec? I didn't read it that way as it happens, but rather that the current/next could involve different algorithms at different nodes at the same time. So e.g. I read it to be allowed that a migration from rsa/sha256 then to ecdsa then to eddsa could occur with some non-updated nodes still signing with rsa/sha256 whilst some shiny new nodes are doing ecdsa and eddsa and others are in between. I do agree that a global current/next pair of algs is nicer, if that is what's wanted. But I don't recall the text saying that. (Again happy to check later, but no time right now;-) Cheers, S. > and if the sender supports the "next" algorithm, > then it MUST include a Signature_Block for the "next" algorithm also. > So the peer BGPsec receiver (who MUST support > at least the "current" algorithm) is not expected to be starved > of a Signature_Block it can work with. > >> - section 7: WRT non-deterministic signature algorithms, I > think it'd be useful to note here that all such algorithms > require good random number generation on the signer's > system and that failing in that respect can expose the > signer's private key. IMO deterministic signature schemes > are better for this reason but the need for a good RNG is > I think a real operational issue worthy of note. > > [Sriram] I will include wording to cover this in Section 7 in version-22. > > Sriram >
- [sidr] Stephen Farrell's Discuss on draft-ietf-si… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Sean Turner
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Russ Housley
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Mehmet Adalier (Antara Teknik)
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Montgomery, Douglas (Fed)
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Montgomery, Douglas (Fed)
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Sriram, Kotikalapudi (Fed)
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Sriram, Kotikalapudi (Fed)
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Sriram, Kotikalapudi (Fed)
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Randy Bush