Re: [sidr] draft-ietf-sidr-bgpsec-protocol-13's security guarantees

"Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov> Fri, 04 September 2015 17:08 UTC

Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E21C51A8AA4 for <sidr@ietfa.amsl.com>; Fri, 4 Sep 2015 10:08:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id afqu9YJh9L9t for <sidr@ietfa.amsl.com>; Fri, 4 Sep 2015 10:08:41 -0700 (PDT)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0119.outbound.protection.outlook.com [65.55.169.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFC3A1A8A8C for <sidr@ietf.org>; Fri, 4 Sep 2015 10:08:37 -0700 (PDT)
Received: from CY1PR09MB0793.namprd09.prod.outlook.com (10.163.43.143) by BN1PR09MB012.namprd09.prod.outlook.com (10.255.201.148) with Microsoft SMTP Server (TLS) id 15.1.256.11; Fri, 4 Sep 2015 17:08:35 +0000
Received: from CY1PR09MB0793.namprd09.prod.outlook.com ([10.163.43.143]) by CY1PR09MB0793.namprd09.prod.outlook.com ([10.163.43.143]) with mapi id 15.01.0262.011; Fri, 4 Sep 2015 17:08:35 +0000
From: "Sriram, Kotikalapudi" <kotikalapudi.sriram@nist.gov>
To: "sidr wg list (sidr@ietf.org)" <sidr@ietf.org>
Thread-Topic: [sidr] draft-ietf-sidr-bgpsec-protocol-13's security guarantees
Thread-Index: AQHQ5zRVYND+nmLqz0SZcM1xIM4p8g==
Date: Fri, 04 Sep 2015 17:08:34 +0000
Message-ID: <CY1PR09MB0793C5F4A00D677A03A335FE84570@CY1PR09MB0793.namprd09.prod.outlook.com>
References: <SN1PR09MB079938B1A44171328C0B16CA846A0@SN1PR09MB0799.namprd09.prod.outlook.com> <D20B8CAC.45839%dougm@nist.gov> <CY1PR09MB079376AC097FDDB73531814184690@CY1PR09MB0793.namprd09.prod.outlook.com>, <CY1PR09MB07938E511E53195C383DDD6884680@CY1PR09MB0793.namprd09.prod.outlook.com>
In-Reply-To: <CY1PR09MB07938E511E53195C383DDD6884680@CY1PR09MB0793.namprd09.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=kotikalapudi.sriram@nist.gov;
x-originating-ip: [129.6.218.135]
x-microsoft-exchange-diagnostics: 1; BN1PR09MB012; 5:X/HrB2Z/BiQHCdUw/gH4PWSVjTUvH/oyiICMMEKQCS3QyIc132tiujIqT4b1Nw3ckePPjjQHwvT1rlOZHjm0lLTo2YB11bQrn6elyKNWtzwTdqqT6kGtdKK9SR9Iyv2ILxqO8/phPZfHa4XSazcuxw==; 24:woMCLx3UfRpTcbtRLpaIQsv2zFMvYz0M06qWPPOtyC1YpdRpIM238cf5Q+z0yoVk0WuRTF740npoq2wcygD8dzGA4WXJn2EA5OPZIXeA7SY=; 20:KHQgmTNDp3az7q/VW3EjSkLJwSZVb9g42k+oTkLZbrC9Hfk1Muo+wqqwccdzyK7e0w06ODpKEyNNi4F3O8Z74Q==
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN1PR09MB012;
x-microsoft-antispam-prvs: <BN1PR09MB012221F16997ED1C95169CA84570@BN1PR09MB012.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(8121501046)(5005006)(3002001); SRVR:BN1PR09MB012; BCL:0; PCL:0; RULEID:; SRVR:BN1PR09MB012;
x-forefront-prvs: 06891E23FB
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(199003)(189002)(5001860100001)(230783001)(105586002)(74316001)(66066001)(40100003)(2420400006)(68736005)(64706001)(81156007)(97736004)(450100001)(77156002)(106116001)(5002640100001)(19580395003)(102836002)(77096005)(106356001)(62966003)(46102003)(5003600100002)(122556002)(110136002)(50986999)(107886002)(87936001)(99286002)(5007970100001)(76176999)(5001830100001)(33656002)(5004730100002)(54356999)(15975445007)(92566002)(189998001)(10400500002)(86362001)(93886004)(5001960100002)(2900100001)(4001540100001)(2950100001)(101416001)(76576001)(7110500001)(10710500003)(4001430100001); DIR:OUT; SFP:1102; SCL:1; SRVR:BN1PR09MB012; H:CY1PR09MB0793.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Sep 2015 17:08:34.9952 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1PR09MB012
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/tPrzvv4rm6qY-QE8fGp4UagHhAE>
Subject: Re: [sidr] draft-ietf-sidr-bgpsec-protocol-13's security guarantees
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Sep 2015 17:08:43 -0000

Doug and I have discussed the issues raised in this thread in some detail.
We feel that the following considerations (with corresponding changes in the document) 
would help resolve the issue(s) we are dealing with:

1.  As mentioned already, signature should cover more data so that 
the collusion vulnerability that David pointed out can be addressed.

2.  It was a conscious design decision to not require (MUST) validation before
path selection and signing in all cases. Lazy (or deferred) evaluation 
(e.g., the ability to select and sign a path before validation) adds 
performance / robustness options to implementations that address 
real operational concerns (e.g., convergence time on table dumps, bootstrap, etc.) 
that were identified early in the BGPsec design process.

3.  In consideration of the above (#2), the document should instead 
strongly recommend that “if an AS signs an update without verifying first, 
it SHOULD return to the update at its earliest and verify, and forward 
a new signed update, if necessary." Make this a strong BCP recommendation.

4. If this recommendation (#3) is followed, then other collusion/replay effects 
that have been identified on the list will be short lived 
(e.g. Oliver’s:  http://www.ietf.org/mail-archive/web/sidr/current/msg07248.html  ). 
Adverse effects would be short lived, if the duration of deferment of 
verification (if any) is short.

Sriram