Re: [Sidrops] WG ADOPTION - draft-madi-sidrops-rush - ENDS 10/12/2020 (Oct 12th)

Di Ma <madi@rpstir.net> Wed, 28 October 2020 06:33 UTC

Return-Path: <madi@rpstir.net>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 214923A0FD4; Tue, 27 Oct 2020 23:33:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FOy8b86Xx_Wy; Tue, 27 Oct 2020 23:33:21 -0700 (PDT)
Received: from out20-111.mail.aliyun.com (out20-111.mail.aliyun.com [115.124.20.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 757C93A0FCE; Tue, 27 Oct 2020 23:33:15 -0700 (PDT)
X-Alimail-AntiSpam: AC=CONTINUE; BC=0.06485461|-1; CH=green; DM=|CONTINUE|false|; DS=CONTINUE|ham_system_inform|0.108991-0.127076-0.763933; FP=0|0|0|0|0|-1|-1|-1; HT=ay29a033018047212; MF=madi@rpstir.net; NM=1; PH=DS; RN=9; RT=9; SR=0; TI=SMTPD_---.IpQuYpL_1603866786;
Received: from 172.20.10.2(mailfrom:madi@rpstir.net fp:SMTPD_---.IpQuYpL_1603866786) by smtp.aliyun-inc.com(10.147.42.198); Wed, 28 Oct 2020 14:33:08 +0800
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
From: Di Ma <madi@rpstir.net>
In-Reply-To: <20201023134459.GE32039@bench.sobornost.net>
Date: Wed, 28 Oct 2020 14:32:48 +0800
Cc: Chris Morrow <morrowc@ops-netman.net>, "sidrops-ads@ietf.org" <sidrops-ads@ietf.org>, Guyunan <guyunan@huawei.com>, SIDR Operations WG <sidrops@ietf.org>, Christopher Morrow <christopher.morrow@gmail.com>, SIDROps Chairs <sidrops-chairs@ietf.org>, Melchior Aelmans <melchior@aelmans.eu>, Stephen Kent <stkent=40verizon.net@dmarc.ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <132DD2FB-C6D7-4F41-B532-3786C129CDA6@rpstir.net>
References: <CAL9jLaZAC9soiJKy856dWexjAmh5=brBnnUOrUjeSHLR_CKJTQ@mail.gmail.com> <8B99CEB3-7CBC-4D12-89BB-8AEE65DE63DA@verizon.net> <20201022161740.GT58295@bench.sobornost.net> <CCA4C0DF-00E3-4ED2-81A6-BC7AFE1BC532@rpstir.net> <20201023134459.GE32039@bench.sobornost.net>
To: Job Snijders <job@ntt.net>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/-ybwAnzexKBAusiM449QTzDKPO0>
Subject: Re: [Sidrops] WG ADOPTION - draft-madi-sidrops-rush - ENDS 10/12/2020 (Oct 12th)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Oct 2020 06:33:23 -0000

Job,

Sorry for my late response.


> 2020年10月23日 21:44,Job Snijders <job@ntt.net> 写道:
> 
> Hi Di,
> 
> On Fri, Oct 23, 2020 at 09:18:21PM +0800, Di Ma wrote:
>>> 2020年10月23日 00:17,Job Snijders <job@ntt.net> 写道:
>>> I am hesitant to support adoption as I feel this opens yet another
>>> not-at-all-validated channel into pandora's box. I don't think this
>>> draft in its current form is ready for adoption.
>>> 
>>> If this work is to proceed, I'd like RUSH to *strictly* limit itself to
>>> transportation of VRPs within a *single* trust domain. If you are not
>>> willing to give the operator of the RUSH endpoint absolute unrestricted
>>> 'enable' access on your BGP routers, they are outside your trust domain
>>> and one should not talk RUSH with them.
>> 
>> You have got the essence of RUSH: TRUST.
> 
> RUSH seems the opposite of TRUST. All validation steps from which we can
> derive a degree of trust have been removed?

The trust in the RPKI roots in the public key that an RP uses to validate a X.509 certificate or a signed object. 

The trust in RUSH basically is the key bound to the cache server to do authentication which by the way is out of band of the RPKI.  Or the trust can also be the shared-key pre-configured between cache server and cache client of a RUSH connection in question.


> 
>> But, trust is not necessarily limited into the *single* trust domain.
>> If I am allowed to exaggerate, RUSH even can used between two tier 1
>> ISPs as long as one trusts the other. 
> 
> Interesting point, indeed we could iterate over all permutations of
> possibilities, but what you mention is simply not how things are done in
> practise between tier 1s (or other networks). I fail to see how the
> exaggregation supports the Internet-Draft.
> 

An exaggerated example might not implemented in practice but helps make the statement more straightforward.


>> I think we authors have articulated the essential usecase.
> 
> Please see below.
> 
>>> The offending paragraph is this one:
>>> 
>>>   "o AS0 SLURM File Delivery The Regional Internet Registries (RIRs)
>>>   need to publish assertions with origin AS0 ([RFC6491]) for all the
>>>   unallocated and unassigned address space (IPv4 and IPv6) for which
>>>   it is the current administrator.  RUSH is able to deliver those
>>>   assertions to RPKI relying parties if so called AS0 SLURM file are
>>>   generated by the RIR."
>>> 
>>> Here is an *explicit* example of the detrimental effects of so-called
>>> RIR 'AS 0' policies https://www.ripe.net/ripe/mail/archives/routing-wg/2020-June/004131.html
>>> Do we really want to create big red buttons that can be pressed to nuke
>>> *countries* off the global Internet Routing system? Surely that is not
>>> our intention. I'm a pacifist, I do believe that if we don't develop
>>> machine guns, machine guns can't be used against other human beings.
>> 
>> AS0 is only a potential usecase and it is a policy issue whether the
>> community decide to use RUSH to implement AS0. 
>> 
>> But we just want to offer the tool. 
> 
> Yes, you want to offer a tool, but as I mentioned the existence of some
> tools is not without consequences to the global routing system. When a
> big red dangerous button is created, at some point someone somewhere
> will want to push it.
> 
> I'll note for full transparency to this group that one of the co-authors
> of the RUSH Internet-Draft is also the co-author of a "RIR AS0" policy,
> which was rejected by the RIR community in which it was submitted.
> 
> From my perspective the many discussions all over the globe (which so
> far have taken place in APNIC, AFRINIC, RIPE, and LACNIC), is now just
> spilling over to SIDROPS. Just like in all those RIR policy forums, it
> should come as no surprise it will meet some resistance in this forum
> too. As one of the use cases explicitly references 'AS 0' policies, it
> no longer can be positioned as a neutral tool but has become part of a
> wider (contentious) discussion.

I did note the discussions in RIPE Routing WG where AS0-slurm proposal did not reach consensus.

But I have not got the similar observation in APNIC, LACNIC, ARIN and AfriNIC community. I would like to hear from them.

Anyway, AS0-slurm is just one of the usecases.  Should it not be proper to be a RUSH usecase, RUSH should not be denied on the whole.

> 
>> As I mentioned,  trust is not necessarily limited into a *single*
>> trust domain.
> 
> Interesting, I am not sure I understand your definition of trust
> domains. I am not even sure what my definition is, but I will point out
> that the RIRs generally are *not* considered something to blindly trust.
> The channel from RIR to Network Operator for RPKI related data is -
> right now - one that strictly flows through a X.509 verifyable chain,
> and RUSH is a novel way which sidesteps an existing more secure
> mechanism. Why water that channel down?

I think the first two usecases described in the draft are easy to be implemented in a commonsense trust domain.


o Cache Distribution
   RUSH can be used to distribute a RPKI validated cache within a single
   ASN or network, for example a confederation composed of a number of
   ASes.  A small site or enterprise network MAY also use RUSH by
   synchronizing with a third-party RPKI cache provider over external
   networks.

   o Local Control over Networks
   Network operators MAY want to inject SLURM Assertions/Filters via an
   API offered by RPKI validator/cache.  RUSH is therefore able to carry
   out such local control signals inside an administrative bailiwick in
   a secure manner.


Di