Re: [sidr] draft-ymbk-rpki-grandparenting-00.txt

Terry Manderson <terry.manderson@icann.org> Tue, 12 June 2012 00:28 UTC

Return-Path: <terry.manderson@icann.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4473821F8550 for <sidr@ietfa.amsl.com>; Mon, 11 Jun 2012 17:28:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hrokn+NkepDS for <sidr@ietfa.amsl.com>; Mon, 11 Jun 2012 17:28:25 -0700 (PDT)
Received: from EXPFE100-1.exc.icann.org (expfe100-1.exc.icann.org [64.78.22.236]) by ietfa.amsl.com (Postfix) with ESMTP id 90D6421F849A for <sidr@ietf.org>; Mon, 11 Jun 2012 17:28:25 -0700 (PDT)
Received: from EXVPMBX100-1.exc.icann.org ([64.78.22.232]) by EXPFE100-1.exc.icann.org ([64.78.22.236]) with mapi; Mon, 11 Jun 2012 17:28:25 -0700
From: Terry Manderson <terry.manderson@icann.org>
To: "Roque Gagliano (rogaglia)" <rogaglia@cisco.com>
Date: Mon, 11 Jun 2012 17:28:20 -0700
Thread-Topic: [sidr] draft-ymbk-rpki-grandparenting-00.txt
Thread-Index: AQHNRXgOmeMHLOI6skGjzaABNoC0K5b12Zn4
Message-ID: <CBFCCA44.269A9%terry.manderson@icann.org>
In-Reply-To: <2F3884FD-D52F-4C3C-8920-292DDFA11C65@cisco.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="B_3422341700_36292392"
MIME-Version: 1.0
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] draft-ymbk-rpki-grandparenting-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jun 2012 00:28:26 -0000

Hi Roque,


On 8/06/12 11:10 PM, "Roque Gagliano (rogaglia)" <rogaglia@cisco.com> wrote:

> 
> This is more a question for Randy.
> 
> IMHO, his text says both:
> "A may certify G's resources, or issue one or more EE certificates and ROAs
> for G's resources. Which is done is a local matter between A and G."

Fair enough, although I'm not so sure that it makes sense to

> 
>> BTW, My understanding of that paragraph was about situations where you have
>> trust anchors that overlap.
> 
> Your english is definitely better than mine, but I do not find any reference
> to trust anchors. I think it applies generally to any registry database.
> 

My understanding comes from probably a bad memory of the early discussions
relating to such 'uniqness' issues.

>> 
>>> My understanding of Randy's proposal is that both C and G will have for a
>>> period of time the "right of use" for the 10.42.2.0/23 address space.
>> 
>> The idealistic stance might be that the RPKI and associated drafts should
>> not recommend a situation of ambiguity. Being able to have two different
>> ROAs (with different ASNs) for the same prefix issued by EE certs from
>> different res certs (thus different private keys) seems like it is making
>> life tough for the relying party.
> 
> How would a RP check this? (think particularly on bottom-up fetch +
> validation)

As far as I can tell, without experimentation, is that any match would work.

So if both AS 'C' and AS 'G' originate the 10.42.2.0/23 route and both ROAs
may exist, then you have a MOAS event.


> What the RFC 6487 security section is basically saying is that you should be
> at least as good as your registration back-end.
> 

I think you are trying say "we know that G has the resource, but are going
to pretend they don't so we can cut a ROA for G, so that their routing works
but we can be lazy on changing certs to C."

That might not be a bad thing, if there was some way to inhibit C from
creating a ROA, that might mess with G. The idea that securing routing is
based on 'a legitimate holder' [rfc6480] being able to authorize one or more
ASes of its choosing appears to be relaxed in this text. Is that a slippery
slope?


>> 
>> Is it?
>> 
>> So step wise since G is moving ISPs from C to A (and they originate the
>> route on G's behalf):
>> 
>> 1) "C" has the 10.42.0.0/16, presumably ROA issued for 10.42.2.0/23, AS-'C'
>> (10.42.2.0/23 AS-"C" route VALID)
>> 1.5) Worst case of "A" is slow between revoking/reissuing C's cert (all
>> routes UNKNOWN, but still routable)
> 
> Here you break. UNKNOWN/NOT FOUND may have a different policy (loc. pref.
> ,etc.).

OK. lets just say "UNKNOWN". I feel more comfortable in knowing that a RP
can make decision based on unambiguous information. Be that implemented in
local policy application (local pref etc) or otherwise.


> 
> I have not written RP software, but I believe it will be harmless as it would
> validate.  I do not believe iit breaks the CP document as the only reference
> to "unique holder" that I found was in the abstract section.

Indeed. I always considered the holder to be very singular in nature.

> 
> All in all, I think it is good that Randy raised this issue. I wonder if we
> need another document or add it to the "Use Case" document as it has not yet
> been ship to the IESG.

Good question.

T.