Re: [sidr] AD Review of sidr-origin-validation-signaling-09

"Alvaro Retana (aretana)" <aretana@cisco.com> Wed, 30 November 2016 16:57 UTC

Return-Path: <aretana@cisco.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB226128AB0 for <sidr@ietfa.amsl.com>; Wed, 30 Nov 2016 08:57:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level:
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.896, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nuu_fDyf9diY for <sidr@ietfa.amsl.com>; Wed, 30 Nov 2016 08:57:20 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9FBF9120725 for <sidr@ietf.org>; Wed, 30 Nov 2016 08:57:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16144; q=dns/txt; s=iport; t=1480525038; x=1481734638; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=E8c/TXKIZB/pwcgo7tTJiXn1gKqNK9aD1ROCp9J2eQo=; b=IHlIm+EYDpmGs8PPHA64hQWYLTE6sKcV1dEyXmjMG8vHqWU/eURzkGN6 OLwUd7xmw4G/5x9UKgpbnO3L1oN7F2AAcToUv7bcbTyySomztZZnhZk24 9aRjoeW/oaR9I9ensYAq+pMn27JeGM4AUqRXmM+fyEWzO5g3c7iXgABOR A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AUAQCcAz9Y/4UNJK1dGQEBAQEBAQEBAQEBBwEBAQEBgnNFAQEBAQEfWIEDB40+pl+FH4IIhiICGoFiPxQBAgEBAQEBAQFiKIRpAQEEI08HEAIBCD8DAgICMBQRAgQBDQUUiFmtB4IpL4sWAQEBAQEBAQEBAQEBAQEBAQEBAQEBHIY+gX0IglaEMy2CbS2CMAWUboVpAZEOkDKNc4QLAR43gRcwAQGFIHKFbyuBA4ENAQEB
X-IronPort-AV: E=Sophos;i="5.31,574,1473120000"; d="scan'208,217";a="354033081"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 30 Nov 2016 16:57:17 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id uAUGvHw2015206 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 30 Nov 2016 16:57:17 GMT
Received: from xch-aln-002.cisco.com (173.36.7.12) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Wed, 30 Nov 2016 10:57:17 -0600
Received: from xch-aln-002.cisco.com ([173.36.7.12]) by XCH-ALN-002.cisco.com ([173.36.7.12]) with mapi id 15.00.1210.000; Wed, 30 Nov 2016 10:57:17 -0600
From: "Alvaro Retana (aretana)" <aretana@cisco.com>
To: "John G. Scudder" <jgs@juniper.net>, Randy Bush <randy@psg.com>
Thread-Topic: [sidr] AD Review of sidr-origin-validation-signaling-09
Thread-Index: AQHSPXjONv4V5/cl2U+lT6vbr4sK26DxOniAgAAKxICAAAGagIAAFHSAgACsHQCAAAgXgIAAA0WAgAAiQ4D//7ZnAA==
Date: Wed, 30 Nov 2016 16:57:16 +0000
Message-ID: <C6DFA103-D063-4572-A673-CA6D07394429@cisco.com>
References: <88A45E79-880B-4F82-9FAA-80C05627A49F@cisco.com> <917E9000-8F1F-4E4F-BDEC-767E3510A71A@juniper.net> <yj9od1hdrah8.wl%morrowc@ops-netman.net> <F173D66B-3A4F-4C96-BFE2-02D83D8EB17B@juniper.net> <yj9oa8chr6to.wl%morrowc@ops-netman.net> <m260n5hywb.wl-randy@psg.com> <1E8CFD67-61BA-4CD3-8A96-CF38D283BD08@juniper.net> <m2twapgig4.wl-randy@psg.com> <22535C38-689F-4508-9A9C-2DD0A2E6BFC0@juniper.net>
In-Reply-To: <22535C38-689F-4508-9A9C-2DD0A2E6BFC0@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.1a.0.160910
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.15.4]
Content-Type: multipart/alternative; boundary="_000_C6DFA103D0634572A673CA6D07394429ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidr/wva0It0WJDk0dCUI9so2uvCECas>
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] AD Review of sidr-origin-validation-signaling-09
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Nov 2016 16:57:22 -0000

Hi!

Yes, the text below works for me.  And I would assume it works for Tero as well.

Thanks!!

Alvaro.

On 11/30/16, 11:20 AM, "John G. Scudder" <jgs@juniper.net<mailto:jgs@juniper.net>> wrote:

On Nov 30, 2016, at 9:18 AM, Randy Bush <randy@psg.com<mailto:randy@psg.com>> wrote:
section 4.5 of 4593 is relevant, or all of sec 4

Thanks, used in the text below.

i am kinda sad that 7132 is not too good on this

I looked there first but it's a *path* security threat model so can't really be blamed for not covering this.

Candidate new security section below. I'd appreciate an ack from Alvaro that this addresses his concern before I publish.

--John

6.  Security Considerations

   Security considerations such as those described in [RFC4272] continue
   to apply.  Since this document introduces an extended community that
   will generally be used to affect route selection, the analysis in
   Section 4.5 ("Falsification") of [RFC4593] is relevant.  These issues
   are neither new, nor unique to the origin validation extended
   community.

   The security considerations provided in [RFC6811] apply equally to
   this application of origin validation.  In addition, this document
   describes a scheme where router A outsources validation to some
   router B.  If this scheme is used, the participating routers should
   have the appropriate trust relationship -- B should trust A either
   because they are under the same administrative control or for some
   other reason (for example, consider
   [I-D.ietf-sidr-route-server-rpki-light]).  The security properties of
   the propagation path between the two routers should also be
   considered.  See [RFC7454] Section 5.1 for advice regarding
   protection of the propagation path.

(all the refs above are in the "informative" section)