Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)

Yangyang Wang <wangyy@cernet.edu.cn> Tue, 14 March 2023 03:43 UTC

Return-Path: <wangyy@cernet.edu.cn>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36F45C13AE23; Mon, 13 Mar 2023 20:43:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.886
X-Spam-Level:
X-Spam-Status: No, score=-6.886 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X_Oxu2ZhrUQM; Mon, 13 Mar 2023 20:43:50 -0700 (PDT)
Received: from azure-sdnproxy.icoremail.net (azure-sdnproxy.icoremail.net [52.175.55.52]) by ietfa.amsl.com (Postfix) with ESMTP id 01C20C13AE22; Mon, 13 Mar 2023 20:43:46 -0700 (PDT)
Received: from LAPTOPL2PP3VPI (unknown [58.206.199.57]) by web3 (Coremail) with SMTP id ygQGZQCH7kHz7A9k0ZekDQ--.27728S2; Tue, 14 Mar 2023 11:41:39 +0800 (CST)
From: Yangyang Wang <wangyy@cernet.edu.cn>
To: "'Sriram, Kotikalapudi (Fed)'" <kotikalapudi.sriram=40nist.gov@dmarc.ietf.org>, sidrops@ietf.org
Cc: 'Claudio Jeker' <cjeker@diehard.n-r-g.com>, draft-ietf-sidrops-aspa-verification@ietf.org, draft-ietf-sidrops-aspa-profile@ietf.org
References: <SA1PR09MB814243FD29C35FBE4B21153884B49@SA1PR09MB8142.namprd09.prod.outlook.com> <SA1PR09MB8142A8E3804BE539A7A5790E84B49@SA1PR09MB8142.namprd09.prod.outlook.com> <SA1PR09MB814246CCEC40A9A5D157187784B49@SA1PR09MB8142.namprd09.prod.outlook.com> <000201d95233$43b62300$cb226900$@cernet.edu.cn> <SA1PR09MB81420BDF4A4A425A2A80DB8784B59@SA1PR09MB8142.namprd09.prod.outlook.com>
In-Reply-To: <SA1PR09MB81420BDF4A4A425A2A80DB8784B59@SA1PR09MB8142.namprd09.prod.outlook.com>
Date: Tue, 14 Mar 2023 11:41:41 +0800
Message-ID: <000001d95626$e3bf2080$ab3d6180$@cernet.edu.cn>
MIME-Version: 1.0
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQJ3ecZgNIUADZW04+Uzz2iXbGGmxwIVEPCGAoNvNUUAs8WgdwI69nhorYD6NuA=
Content-Language: zh-cn
X-CM-TRANSID: ygQGZQCH7kHz7A9k0ZekDQ--.27728S2
X-Coremail-Antispam: 1UD129KBjvJXoW3JF47Jw15CrykKw13AFyftFb_yoW7KryUpF WIqrnak39rGryIy3ZrAw18WFyUu3yFq3y3JFy5t34kZa98KFy2gF4xKr1rJFy7Xrs5ZFy2 vr109398JF4UuaDanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUkFb7Iv0xC_Kw4lb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I2 0VC2zVCF04k26cxKx2IYs7xG6rWj6s0DM7CIcVAFz4kK6r1j6r18M28lY4IEw2IIxxk0rw A2F7IY1VAKz4vEj48ve4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Jr0_JF4l84ACjcxK6xII jxv20xvEc7CjxVAFwI0_Jr0_Gr1l84ACjcxK6I8E87Iv67AKxVWxJVW8Jr1l84ACjcxK6I 8E87Iv6xkF7I0E14v26r4UJVWxJr1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqx4xG64xv F2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jr0_Jr4lYx0Ex4A2jsIE14v26r1j6r 4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwIxGrwCY02Avz4vE14v_Gr4l42xK 82IYc2Ij64vIr41l4I8I3I0E4IkC6x0Yz7v_Jr0_Gr1lx2IqxVAqx4xG67AKxVWUJVWUGw C20s026x8GjcxK67AKxVWUGVWUWwC2zVAF1VAY17CE14v26r126r1DMIIYrxkI7VAKI48J MIIF0xvE2Ix0cI8IcVAFwI0_Jr0_JF4lIxAIcVC0I7IYx2IY6xkF7I0E14v26r1j6r4UMI IF0xvE42xK8VAvwI8IcIk0rVWUJVWUCwCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E 87Iv6xkF7I0E14v26r1j6r4UYxBIdaVFxhVjvjDU0xZFpf9x07bwdb8UUUUU=
X-CM-SenderInfo: 5zdqw5n16fv2xqhwhvlgxou0/
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/6GZifvexxmMn5U4vEaIabXAMacQ>
Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Mar 2023 03:43:56 -0000

Hi Sriram and Claudio,

Thank you for your responses. They are make sense for me and I support
advancing the draft.

(I repost my reply here:) I understand that the ASPA solution is cautious.
In the process of incremental deployment of ASPA,  some ASes have not yet
provided authorization data. In some cases, a path of being route leak may
be validated as "unknown" (i.e., false negative) due to lack of information.
But it does not lead to false positives (i.e., valley-free paths are checked
as "invalid").

If the provider shortened the length by creating a forged link ( shown in
Section 12), this cheating can only attract the traffic from customer, and
can be detected using upstream algorithm at the providers and literal peers
of the provider. It implies that the affected area of this cheating can be
limited if many ASes register ASPA.

The ASPA can cover most routing policy on the Internet. And, I just note
that the scenario in
https://datatracker.ietf.org/doc/draft-shen-sidrops-regionalized-as-relation
ships/ is a problem. A few ASes may have hybrid relationship, which is not
able to be expressed in ASPA. If two ASes, 1 and 2, have customer-provider
link at location A and peer-peer link at location B, It seems that SPAS of
AS 1 will include AS 2 (at location 1), but also should not include AS2 (at
location 2).  This might make the operator of AS A confused about how to
register ASPA.

Best regards,
Yangyang
2023-03-14


> -----Original Message-----
> From: sidrops-bounces@ietf.org [mailto:sidrops-bounces@ietf.org] On
> Behalf Of Sriram, Kotikalapudi (Fed)
> Sent: 2023年3月9日 11:58
> To: Yangyang Wang <wangyy@cernet.edu.cn>; sidrops@ietf.org
> Cc: Claudio Jeker <cjeker@diehard.n-r-g.com>; draft-ietf-sidrops-aspa-
> verification@ietf.org; draft-ietf-sidrops-aspa-profile@ietf.org
> Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS
> 03/22/2023 (Mar 22 2023)
> 
> Hi Yangyang,
> 
> Thank you for the comments. My responses are inline below marked with
> [KS:].
> 
> My responses to #3 and #4 complement Claudio's
> ( https://mailarchive.ietf.org/arch/msg/sidrops/jTlhzDKCKv21WIUd-
> Kv00Qtsmk8/ ).
> 
> Sriram
> 
> -----Original Message-----
> From: Yangyang Wang <wangyy@cernet.edu.cn>
> 
> Comments as follows.
> 1. a few typos.
> In section 3, "The definition of Provider AS in given in Section 1"
-->"The
> definition of Provider AS is given in Section 1"
> Page 7, "If N = 1, then then the procedure" --> remove the extra "then"
> Page 10, downstream path verification procedure, step 4 "lowest value of v
> (2 <= u <= N)" --> " lowest value of u (2 <= u <= N)"
> 
> [KS:] Thanks. Will fix those.
> 
> 2. This draft claims that "An AS SHOULD NOT have more than one ASPA".
> If a Customer AS signs only one ASPA object including all its Provider
ASes, it
> needs to resign and update it when any one of the provider ASes changes.
> It may affect the validation.
> 
> [KS:] The AS operator would follow the principle of make before break.
> Create a new ASPA first and then delete the old one. It is not a MUST NOT.
So,
> two ASPAs may exist for a short period. The ASPA profile draft authors
(cc'ed
> here) may include an operational guidance statement about this in that
draft.
> 
> 3. In the algorithm for downstream paths, it says that if 1 <= N <=2, then
the
> AS_PATH is trivially Valid.
> If N=2, assuming AS_PATH is (AS2, AS1), the path verification is just hop-
> check hop(AS(1), AS(2)) and may be one of "Provider", "Not Provider" and
> "no Attestation".
> If it is "Provider", the AS_PATH is Valid.
> If it is "Not Provider" or "no Attestation", I feel that the AS_PATH is
actually
> unclear, which may be Valid, or forged link as the (AS(5), AS(2)) shown in
> Section 12.
> 
> [KS:] The path is (AS2, AS1) and received by a validating AS (say AS3)
that is
> downstream (i.e., AS2 is a provider to AS3). Without even looking at the
ASPA,
> this path is trivially Valid because no matter whether AS1 to AS2 is C2P,
P2C,
> or p2p (lateral peers), there is no valley in the path and hence there is
no
> route leak.
> 
> [KS:] For the case of a forged-origin attack (with provider doing mischief
on a
> customer) that you mention, I feel the draft discusses that security
concern
> adequately in Section 12. The strength of the ASPA method is in detecting
> route leaks and a majority of (but not all) path manipulation attacks. It
> cannot catch all path manipulations -- BGPsec would be needed for that.
> 
> 4. It seems that the algorithms for path verification are not complete to
cover
> all possible cases.
> 
> For example, shown in the figure below:
> 
> Receiving & validating AS 5 --  AS(4)
> 				 \
> 				   \
>                                                           AS(3)     AS(1)
>                                                               \        /
> 			 	      \     /
>                                                                 AS(2)
> ASPAs: {AS(2), [AS(3), AS(1)]}
> 
> AS5 is the Receiving & Validating AS. And, only AS(2) register an ASPA
object
> in RPKI.
> It assumes that AS5 receives an AS_PATH [AS(4), AS(3), AS(2), AS(1)], and
> there is a route leak from AS(3) to AS(1) by the customer AS(2) hop(AS(1),
> AS(2)) = "no attestation"
> hop(AS(2), AS(3)) = "Provider"
> hop(AS(3), AS(4)) = "no attestation"
> According to the step 4 and 5 of the algorithm for upstream paths in
section
> 6.1,  there is not an i for which hop(AS(i-1), AS(i)) = "not Provider".
This path
> is invalid, but will be verified as "Unknown".
> 
> Maybe I'm missing something or make a mistake.
> 
> [KS:] To add what Claudio has said... please keep in mind that AS(1) has
no
> ASPA and that means that a sibling relationship between AS1 and AS2 is
still
> possible. See the definition of sibling in Section 2 and the corresponding
> ASPA registration requirement in Section 4. So, if AS1 and AS2 are
siblings,
> then the path would be Valid. If they are not siblings, the path would be
> Invalid. So, given that AS1 does not have an ASPA, the algorithm correctly
> gives "Unknown" result.
> 
> Sriram
> 
> 
> _______________________________________________
> Sidrops mailing list
> Sidrops@ietf.org
> https://www.ietf.org/mailman/listinfo/sidrops