Re: [sidr] AD Review of sidr-origin-validation-signaling-09
"Alvaro Retana (aretana)" <aretana@cisco.com> Wed, 30 November 2016 16:57 UTC
Return-Path: <aretana@cisco.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB226128AB0 for <sidr@ietfa.amsl.com>; Wed, 30 Nov 2016 08:57:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level:
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.896, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nuu_fDyf9diY for <sidr@ietfa.amsl.com>; Wed, 30 Nov 2016 08:57:20 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9FBF9120725 for <sidr@ietf.org>; Wed, 30 Nov 2016 08:57:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16144; q=dns/txt; s=iport; t=1480525038; x=1481734638; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=E8c/TXKIZB/pwcgo7tTJiXn1gKqNK9aD1ROCp9J2eQo=; b=IHlIm+EYDpmGs8PPHA64hQWYLTE6sKcV1dEyXmjMG8vHqWU/eURzkGN6 OLwUd7xmw4G/5x9UKgpbnO3L1oN7F2AAcToUv7bcbTyySomztZZnhZk24 9aRjoeW/oaR9I9ensYAq+pMn27JeGM4AUqRXmM+fyEWzO5g3c7iXgABOR A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AUAQCcAz9Y/4UNJK1dGQEBAQEBAQEBAQEBBwEBAQEBgnNFAQEBAQEfWIEDB40+pl+FH4IIhiICGoFiPxQBAgEBAQEBAQFiKIRpAQEEI08HEAIBCD8DAgICMBQRAgQBDQUUiFmtB4IpL4sWAQEBAQEBAQEBAQEBAQEBAQEBAQEBHIY+gX0IglaEMy2CbS2CMAWUboVpAZEOkDKNc4QLAR43gRcwAQGFIHKFbyuBA4ENAQEB
X-IronPort-AV: E=Sophos;i="5.31,574,1473120000"; d="scan'208,217";a="354033081"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 30 Nov 2016 16:57:17 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id uAUGvHw2015206 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 30 Nov 2016 16:57:17 GMT
Received: from xch-aln-002.cisco.com (173.36.7.12) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Wed, 30 Nov 2016 10:57:17 -0600
Received: from xch-aln-002.cisco.com ([173.36.7.12]) by XCH-ALN-002.cisco.com ([173.36.7.12]) with mapi id 15.00.1210.000; Wed, 30 Nov 2016 10:57:17 -0600
From: "Alvaro Retana (aretana)" <aretana@cisco.com>
To: "John G. Scudder" <jgs@juniper.net>, Randy Bush <randy@psg.com>
Thread-Topic: [sidr] AD Review of sidr-origin-validation-signaling-09
Thread-Index: AQHSPXjONv4V5/cl2U+lT6vbr4sK26DxOniAgAAKxICAAAGagIAAFHSAgACsHQCAAAgXgIAAA0WAgAAiQ4D//7ZnAA==
Date: Wed, 30 Nov 2016 16:57:16 +0000
Message-ID: <C6DFA103-D063-4572-A673-CA6D07394429@cisco.com>
References: <88A45E79-880B-4F82-9FAA-80C05627A49F@cisco.com> <917E9000-8F1F-4E4F-BDEC-767E3510A71A@juniper.net> <yj9od1hdrah8.wl%morrowc@ops-netman.net> <F173D66B-3A4F-4C96-BFE2-02D83D8EB17B@juniper.net> <yj9oa8chr6to.wl%morrowc@ops-netman.net> <m260n5hywb.wl-randy@psg.com> <1E8CFD67-61BA-4CD3-8A96-CF38D283BD08@juniper.net> <m2twapgig4.wl-randy@psg.com> <22535C38-689F-4508-9A9C-2DD0A2E6BFC0@juniper.net>
In-Reply-To: <22535C38-689F-4508-9A9C-2DD0A2E6BFC0@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.1a.0.160910
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.15.4]
Content-Type: multipart/alternative; boundary="_000_C6DFA103D0634572A673CA6D07394429ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidr/wva0It0WJDk0dCUI9so2uvCECas>
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] AD Review of sidr-origin-validation-signaling-09
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Nov 2016 16:57:22 -0000
Hi! Yes, the text below works for me. And I would assume it works for Tero as well. Thanks!! Alvaro. On 11/30/16, 11:20 AM, "John G. Scudder" <jgs@juniper.net<mailto:jgs@juniper.net>> wrote: On Nov 30, 2016, at 9:18 AM, Randy Bush <randy@psg.com<mailto:randy@psg.com>> wrote: section 4.5 of 4593 is relevant, or all of sec 4 Thanks, used in the text below. i am kinda sad that 7132 is not too good on this I looked there first but it's a *path* security threat model so can't really be blamed for not covering this. Candidate new security section below. I'd appreciate an ack from Alvaro that this addresses his concern before I publish. --John 6. Security Considerations Security considerations such as those described in [RFC4272] continue to apply. Since this document introduces an extended community that will generally be used to affect route selection, the analysis in Section 4.5 ("Falsification") of [RFC4593] is relevant. These issues are neither new, nor unique to the origin validation extended community. The security considerations provided in [RFC6811] apply equally to this application of origin validation. In addition, this document describes a scheme where router A outsources validation to some router B. If this scheme is used, the participating routers should have the appropriate trust relationship -- B should trust A either because they are under the same administrative control or for some other reason (for example, consider [I-D.ietf-sidr-route-server-rpki-light]). The security properties of the propagation path between the two routers should also be considered. See [RFC7454] Section 5.1 for advice regarding protection of the propagation path. (all the refs above are in the "informative" section)
- [sidr] AD Review of sidr-origin-validation-signal… Alvaro Retana (aretana)
- Re: [sidr] AD Review of sidr-origin-validation-si… Randy Bush
- Re: [sidr] AD Review of sidr-origin-validation-si… Alvaro Retana (aretana)
- Re: [sidr] AD Review of sidr-origin-validation-si… John G. Scudder
- Re: [sidr] AD Review of sidr-origin-validation-si… Randy Bush
- Re: [sidr] AD Review of sidr-origin-validation-si… Chris Morrow
- Re: [sidr] AD Review of sidr-origin-validation-si… John G. Scudder
- Re: [sidr] AD Review of sidr-origin-validation-si… Chris Morrow
- Re: [sidr] AD Review of sidr-origin-validation-si… Randy Bush
- Re: [sidr] AD Review of sidr-origin-validation-si… John G. Scudder
- Re: [sidr] AD Review of sidr-origin-validation-si… Randy Bush
- Re: [sidr] AD Review of sidr-origin-validation-si… Chris Morrow
- Re: [sidr] AD Review of sidr-origin-validation-si… Randy Bush
- Re: [sidr] AD Review of sidr-origin-validation-si… John G. Scudder
- Re: [sidr] AD Review of sidr-origin-validation-si… Alvaro Retana (aretana)
- Re: [sidr] AD Review of sidr-origin-validation-si… Randy Bush