Re: [sidr] BGPSEC Threat Model ID

Shane Amante <shane@castlepoint.net> Thu, 03 November 2011 17:38 UTC

Return-Path: <shane@castlepoint.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C7681F0CAD for <sidr@ietfa.amsl.com>; Thu, 3 Nov 2011 10:38:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WTpyCqZmi0-i for <sidr@ietfa.amsl.com>; Thu, 3 Nov 2011 10:38:16 -0700 (PDT)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id B8ADB1F0C7C for <sidr@ietf.org>; Thu, 3 Nov 2011 10:38:16 -0700 (PDT)
Received: by dog.tcb.net (Postfix, from userid 0) id 67561268063; Thu, 3 Nov 2011 11:38:16 -0600 (MDT)
Received: from host2.tcb.net (64.78.235.218 [64.78.235.218]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; for sidr@ietf.org; Thu, 03 Nov 2011 11:38:16 -0600 (MDT) (envelope-from shane@castlepoint.net)
X-Avenger: version=0.7.8; receiver=dog.tcb.net; client-ip=64.78.235.218; client-port=58731; data-bytes=0
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Apple Message framework v1251.1)
From: Shane Amante <shane@castlepoint.net>
In-Reply-To: <DCC302FAA9FE5F4BBA4DCAD46569377914517EF1AB@PRVPEXVS03.corp.twcable.com>
Date: Thu, 03 Nov 2011 11:38:15 -0600
Content-Transfer-Encoding: quoted-printable
Message-Id: <C0075260-AB62-4572-8DE9-A7C3B4F823A6@castlepoint.net>
References: <E96517DD-BAC7-4DD8-B345-562F71788C6A@tcb.net> <p06240807cad42f85eb7d@[193.0.26.186]> <32744.216.168.239.87.1320175657.squirrel@webmail.tcb.net> <p06240801cad6ab773279@[193.0.26.186]> <D9A38669-883D-4090-9F95-BC5C63220950@tcb.net> <p06240801cad800485596@[193.0.26.186]> <EEBF68E0-FAD9-4AF3-B81B-78760D200D9B@tcb.net> <p06240808cad85ff73d61@[193.0.26.186]> <080F8FFF-D2C7-4414-B53A-233F88D2009F@vpnc.org> <DCC302FAA9FE5F4BBA4DCAD46569377914517EF1AB@PRVPEXVS03.corp.twcable.com>
To: sidr wg list <sidr@ietf.org>
X-Mailer: Apple Mail (2.1251.1)
Subject: Re: [sidr] BGPSEC Threat Model ID
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Nov 2011 17:38:17 -0000

On Nov 3, 2011, at 11:33 AM, George, Wes wrote:
>> From: sidr-bounces@ietf.org [mailto:sidr-bounces@ietf.org] On Behalf Of
>> Paul Hoffman
> 
>> the charter limits the topics that are meant to be
>> fully covered by the protocols.
>> 
>> Personally, I would prefer to see the threat model document say in the
>> introduction "the following topics are considered to be BGP security
>> threats but are not dealt with in this document:" followed by a list
> 
> [WEG]
> +1, or even have the document deal with them at least briefly, but be clear that the current scope (or other limitations) makes it difficult to solve them.

Another +1.


> Not to put words in Danny's mouth, but I think that there are two general concerns being raised about this document and the -reqs document.
> The first, which is far easier to deal with, is that a document(s) that should be relatively solution-agnostic is being tailored to preselect/justify an existing (though still nascent) solution based on the current charter scope. It should be a full discussion of the problem space that leads to selection and prioritization of the important problems to solve, acceptable risks, etc. This then serves as a method to (design and) evaluate a solution, whether there's only one, or whether there are multiples.
> I too find it a bit strange that we're doing things in the reverse order (or in parallel), as usually these sorts of docs are written because the solution doesn't exist yet, and this helps to clearly articulate the problem space, rather than retroactively defining it.

+1


> Am I missing something regarding the intent of these documents?
> 
> The second is more a question of charter, and scope for the solution, which is definitely limited by charter. However, having a more comprehensive document on threats and design requirements may indeed drive a review of the scope and charter, either because it brings to light additional considerations, or because those who actually need to implement the solution on their networks have provided feedback that leads to a different conclusion.
> I'm not recommending that we analyze the problem forever, because a partial solution that is deployable may indeed be better than a theoretical one that solves more problems, but never materializes (or at the very least takes longer). But there is a balance point between those, and I'm not totally certain we're at that equilibrium yet, regardless of the current charter. There have now been multiple folks expressing concerns over the costs (be they operational, capital, expense, etc) to implement vs the benefit based on what risks are mitigated by the solution vs which are not and the exposure that represents to one's chosen line of business, so there's some value in having an eyes-wide-open discussion about it.

+1

-shane


> Thanks
> Wes George
> 
> 
> This E-mail and any of its attachments may contain Time Warner Cable proprietary information, which is privileged, confidential, or subject to copyright belonging to Time Warner Cable. This E-mail is intended solely for the use of the individual or entity to which it is addressed. If you are not the intended recipient of this E-mail, you are hereby notified that any dissemination, distribution, copying, or action taken in relation to the contents of and attachments to this E-mail is strictly prohibited and may be unlawful. If you have received this E-mail in error, please notify the sender immediately and permanently delete the original and any copy of this E-mail and any printout.
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr