Re: [sidr] WGLC draft-sidr-rpki-rtr - take 2?

Christopher Morrow <morrowc.lists@gmail.com> Fri, 03 June 2011 16:44 UTC

Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40583E0780; Fri, 3 Jun 2011 09:44:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.599
X-Spam-Level:
X-Spam-Status: No, score=-103.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sVVUW6EYcImK; Fri, 3 Jun 2011 09:44:45 -0700 (PDT)
Received: from mail-pw0-f44.google.com (mail-pw0-f44.google.com [209.85.160.44]) by ietfa.amsl.com (Postfix) with ESMTP id 790E5E0776; Fri, 3 Jun 2011 09:44:45 -0700 (PDT)
Received: by pwi5 with SMTP id 5so1205128pwi.31 for <multiple recipients>; Fri, 03 Jun 2011 09:44:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=kBLH9rk83MXwtQcNRr/gEPjoplEcwFyYudY8jFJGV58=; b=dFlrTQHvKZHLjaPZlangpWdh1usVJZGPd/tSJ3eirsxiFmP/HgjaNVZp/O7NZoAjeW +Tdt3Fq3oA2plVMI/YpZ2erpLsKHNgnJwUWgswnxrb739DCll5T75qY1NrGsTT21WHbs xZSZHOafVrEnSyAtZj5VndR7XmP1Sd4Gmlkkk=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type :content-transfer-encoding; b=bZoZrHBl664scb814mjR2WWORBRIkxBUNZEtanmv5vzi9nqOq6mbt0apSbWPYxEpQw 65gUUWipZORg6wI4pzi5B3e7uuNRhCLPtqy9yZGU+k1UzGx6K3Z/n7+hvmrkbvNy5TUR GPsw0n9vDS2fTej/16vQAU8n0I2fYw9wH/wZY=
MIME-Version: 1.0
Received: by 10.68.0.227 with SMTP id 3mr915758pbh.284.1307119485067; Fri, 03 Jun 2011 09:44:45 -0700 (PDT)
Sender: christopher.morrow@gmail.com
Received: by 10.68.56.133 with HTTP; Fri, 3 Jun 2011 09:44:44 -0700 (PDT)
In-Reply-To: <BANLkTimPnMfE1ii=6uwAckoFY0yUU=w43g@mail.gmail.com>
References: <4DAF44AC.8060408@isi.edu> <E3076C4C-F27C-40A8-A033-2EBB8C39A3D2@cisco.com> <4DAF796C.7010807@isi.edu> <BANLkTi=Oc-fEKOYCRQqM97wPxSSXjrdTRw@mail.gmail.com> <409BDC5C-FE86-444A-BC0D-6DA00E7BF0F3@isi.edu> <BANLkTikLi2p7UipJ!TRSQqVOL6GkLn=j9iA@mail.gmail.com> <F0FABE61-FC1D-45ED-A21D-ED7A1228A997@isi.edu> <01eb01cc0325$6e4fd260$4001a8c0@gateway.2wire.net> <4DB592B3.3090805@isi.edu> <033e01cc05a8$0a82f160$4001a8c0@gateway.2wire.net> <4DB9A456.3060709@isi.edu> <BANLkTikg18FV5H0bOdOfWMzpTcm_B__EVQ@mail.gmail.com> <017b01cc13ff$0cb6da40$4001a8c0@gateway.2wire.net> <BANLkTink82qvhge6rRhqt5+h-2mEkKBMhA@mail.gmail.com> <m21uzwr3tw.wl%randy@psg.com> <BANLkTimPnMfE1ii=6uwAckoFY0yUU=w43g@mail.gmail.com>
Date: Fri, 03 Jun 2011 12:44:44 -0400
X-Google-Sender-Auth: ialyd5VWqmwEsO0Uq81qAyYvIc0
Message-ID: <BANLkTinu8pxxCj4cdJzbS3z5h=8=s+U3Gw@mail.gmail.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
To: sidr@ietf.org, sidr-chairs@ietf.org, Sean Turner <turners@ieca.com>, stephen.farrell@cs.tcd.ie
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: Rob Austein <sra@isc.org>
Subject: Re: [sidr] WGLC draft-sidr-rpki-rtr - take 2?
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jun 2011 16:44:46 -0000

a kind reader thunked me on the noggin'...

On Fri, Jun 3, 2011 at 2:06 AM, Christopher Morrow
<morrowc.lists@gmail.com> wrote:
> Security-AD folks,
> Over here in the SIDR WG we've been batting around a problem related
> to secure authentication of TCP endpoints, essentially how can we
> specify TODAY something to use in implementations of a (we think)
> important protocol when the underlying technology we need isn't
> available (TCP-AO). Some background:
>
> Looking to close the issue of MD5/TCP-AO/SSH/etc out again, The doc:
> <http://tools.ietf.org/wg/sidr/draft-ietf-sidr-rpki-rtr/>
>
> Seems to be stuck on this text:
>
> (From the abstract)
> " This document describes a protocol to deliver validated
>   prefix origin data to routers over ssh."
>
> or a more in depth version of that text at:
> <http://tools.ietf.org/html/draft-ietf-sidr-rpki-rtr-12#section-7>
>
> Essentially there is a need to validate that a cache and a router are
> talking to the right opposite entity. The authors and
> test-implementors enabled this connection over SSH with a fallback
> (for debugging I suppose?) over plain-text TCP originally. For a host
> of reasons SSH is now considered overkill and likely detrimental to
> the cause.
>
> The WG discussed on-list (in this thread):
> <http://www.ietf.org/mail-archive/web/sidr/current/msg02397.html>
>
> and at the in-person meeting in Prague (IETF80) the fact that SSH was
> probably overkill. The two endpoints want simply  to authenticate the
> other endpoint, transport security isn't required here because the
> content in the stream is already encypted. The 2 methods approved
> today for use in IETF protocols are:

'the content in the stream is public data, so privacy isn't warranted
here.' Essentially make sure you talk to the right end point and no
one fiddled bits during transport (which AO and MD5 and AH all do just
fine, modulo the 'md5 is deprecated' discussion, of course)

apologies for the confusion, and... for not ending with:

-Chris
<wg-co-chair-utility-belt==unfastened>
>  o tcp-AO
>  o ipsec AH
>
> one deprecated method is available as well:
>  o tcp-MD5
>
> Of the two approved methods, AO has no implementations on the routers
> (yet), nor server side to speak of, AH is relatively heavy weight and
> isn't always available on routers today. Talking to routing equipment
> implementors (two vendors) there was a feeling that AO will arrive
> shortly while AH is still too complex (for router deployments) and is
> not going to be available in all of the platforms which will require
> this functionality.
>
> On the server side of the equation there is no support for AO, some
> for AH (which is nice actually). In short, we don't have a good
> direction or belief that there is going to be one with respect to AO
> in the near term.
>
> What options are there for this problem? How can we motivate vendors
> with a spec that clearly has problems in implementation (no AO, not
> full reach for AH)? Are there folks who are tracking availability of
> AO? Could we start with something like:
>
> MAY support authentication of nodes with TCP-MD5
> MAY support authentication of nodes with IPSEC-AH
> MUST support authentication of nodes with TCP-AO
>
> Or is mentioning TCP-MD5 verboten? Essentially it seems that the WG
> has gotten wedged and is looking for some guidance from the Security
> Area Directors :)
>
> -chris
>