Re: [Sidrops] [routing-wg] misconceptions about ROV

Job Snijders <job@fastly.com> Fri, 25 February 2022 13:17 UTC

Return-Path: <job@fastly.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 264C23A0E47 for <sidrops@ietfa.amsl.com>; Fri, 25 Feb 2022 05:17:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.099
X-Spam-Level:
X-Spam-Status: No, score=-1.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_AFFORDABLE=1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fastly.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gqX3DkKvU1QR for <sidrops@ietfa.amsl.com>; Fri, 25 Feb 2022 05:17:48 -0800 (PST)
Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [IPv6:2a00:1450:4864:20::633]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E9153A0DD1 for <sidrops@ietf.org>; Fri, 25 Feb 2022 05:17:48 -0800 (PST)
Received: by mail-ej1-x633.google.com with SMTP id a23so10834592eju.3 for <sidrops@ietf.org>; Fri, 25 Feb 2022 05:17:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastly.com; s=google; h=date:from:to:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=nuhqI+OACWWk0zICKmEzyuX8msOqgrE8DJsbYW9SwG4=; b=v+Hw/fsw1MrUEkXq2O/QHDDq+LglVUQoJdUX/Q39kFsse6Ml4A68z0xumN+UY8Eg8N x5ItsuO27WWRMQCPCSjPu0Tr9Qs3h3ZucQbFqeVrTI9Hi5TaEThcGKO/c7sjT08aXjxY WGOtROGWyhCb3/8WuzVJgtv2Q1l/a+TklRjt4=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=nuhqI+OACWWk0zICKmEzyuX8msOqgrE8DJsbYW9SwG4=; b=6YSAA7WnUeZG1jFN5eLxyvNDe3VKZh/E2Kvw6sMw/dk7dX4SPGP6+CvxeRHcJz7T4I jjM5Et3s6G9nB9v9XTYofWd6scjH7tf6QcCRhNkyz+AB5OTN/nbTtWijhB4kkZeWW+7q Sx1FLDCE/unaX1DODFSVKxQDTheXK4byO1bw1c3mhlYAtCM4Yy2VBUGLdjP+R3TVe8B6 iru9VAc48yogW0DE4cwG0GFIMUqu0I8rh/LYbimxsjSdx4y7sPLd7l6PkrbgRVfkKSAw bFrsv0qS9lcp/cDbuJoTGcCZM+J8fIKPbMgmFsTtJHONUvqR0K+ztqGSHtdIPPBaR+4J kpcw==
X-Gm-Message-State: AOAM530pPYS1j/uKyhRAZZvIsciqmGjmSnquewLWKbBH1P6eWiQJpbOe XEahtajQtjUMZ85MzCuYHBIdiCjYbVpvwC5bx9cDfbVIcVCttRoDGscY8nSlJrMK34Y1fylm0nw TIJzMJW3JJbNEkAxNsk/RCIPo4GnodgCCv8MghRCAOGdaD3VU7ExNJwQ=
X-Google-Smtp-Source: ABdhPJwM9ZCo2zlcs49aVuPTOMJLRSHokwYDgf6qwQZByl2ICJpjuV+D8RhBaU4aXjTkC5x0VNw1Jg==
X-Received: by 2002:a17:906:2486:b0:6cf:ced9:e4cc with SMTP id e6-20020a170906248600b006cfced9e4ccmr6007854ejb.201.1645795065186; Fri, 25 Feb 2022 05:17:45 -0800 (PST)
Received: from snel ([2a10:3781:276:2:16f6:d8ff:fe47:2eb7]) by smtp.gmail.com with ESMTPSA id br20-20020a170906d15400b006cdd982fefesm604367ejb.116.2022.02.25.05.17.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Feb 2022 05:17:43 -0800 (PST)
Date: Fri, 25 Feb 2022 14:17:41 +0100
From: Job Snijders <job@fastly.com>
To: sidrops@ietf.org
Message-ID: <YhjW9UQFPMT/hDNV@snel>
References: <ABE3FA29-6C9D-492B-A72A-68C20176E76D@nlnetlabs.nl> <949277FD-27AF-40E8-B557-AA58C62BFEA7@apnic.net> <E16290C1-77ED-4CB1-8712-F6163304ED45@nlnetlabs.nl> <m2k0dmmntj.wl-randy@psg.com> <6D314C7A-8CEC-4B9B-8F80-6B1AC48037E2@nlnetlabs.nl> <85D947F4-E2A4-4FFE-86AF-2D129C49FB9C@psg.com> <8413F0CA-F50A-42B7-B0DA-19A0A90ABE6F@nlnetlabs.nl> <YhdCYjS+yDVsFgNF@snel> <60B6D863-047D-40A6-80DD-95C05391A0BA@nlnetlabs.nl> <DM8PR09MB6294D4538DAA3C3094F0E661DE3D9@DM8PR09MB6294.namprd09.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <DM8PR09MB6294D4538DAA3C3094F0E661DE3D9@DM8PR09MB6294.namprd09.prod.outlook.com>
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/AS30Q20Gi5aBVgvGMI42aQ9JeJg>
Subject: Re: [Sidrops] [routing-wg] misconceptions about ROV
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Feb 2022 13:17:54 -0000

Hi Doug, others,

On Thu, Feb 24, 2022 at 11:53:25PM +0000, Montgomery, Douglas C. (Fed) wrote:
> We seem to create many security mechanisms (e.g., BGPsec, ROAs, MUD
> profiles, etc) that don’t have a safe means for individual users to
> globally test/pilot them before going into production mode.

I think the cake should be sliced up differently: the concept of "pilot
testing" shouldn't be in the protocol specs, but in the approach to
deployment.

In my experience operators are happy to request additional ASNs &
arrange separate IPv4/IPv6 space for pilot studies. Both AS and IPv6
INRs are extremely affordable, a fraction of the overall cost of
studying a new Internet technology. At least, this was my experience
with IPv6 a decade+ ago, and with RPKI ROV in recent years. I fully
expect that early adoptors of BGPsec are able to construct appropriate
pilot setups too. From that perspective I don't see the need to add new
object profiles to facilitate BGPsec, because doing so would set the
clock back.

> That increases the risk/barrier to entry to those who wish to enable
> the technologies.

At some point the conceptual "are you sure?" confirmation dialogue boxes
have to transform into something that is real. Cryptographic
attestations only have meaning when Relying Parties actually honor the
attestations: indeed, RPs have to exhibit willpower to discard invalid
objects or routes, otherwise the attestations become worthless (or
worse! read on below).

I think one of the unforeseen and accidental obstacles towards global
deployment of RPKI ROV was the following awkward dynamic:

(1) the propaganda machine was thundering on all cylinders to promote
    ROA creation
(2) many folks misconfigured their ROAs, resulting in the *crazy
    situation* that in its peak there were between 5,000 ~ 6,000
    invalids BGP routes in the DFZ [0]
(3) many folks didn't notice their ROA misconfigurations, because nobody
    was performing ROV invalid==reject. Also, there was no incentive to
    fix broken ROAs, because nobody was validating.
(4) people became afraid to enable ROV on ingress EBGP, because there
    were so many invalids "I can't just reject 5K routes!".

It is not hard to imagine how steps 1 -> 2 -> 3 -> 4 in an alternative
universe could've resulted in complete disaster and dismissal of RPKI
ROV.

It took significant community effort to overcome the above downward
spiral: people had to be taught what CA Intent is, that 'harsh'
rejection of invalid information is exactly what makes the security
mechanism work, and that the 5K invalids did not pose a risk to business
[1] [2].

As for the misconfigured ROA creators: many learned the surprisingly
positive consequences of making bad decisions. Sometimes operators have
to touch the hot stove. :-)

How the above observations potentially apply to BGPsec isn't certain
yet, but all of us definitely have to consider what we can learn from
the ROV experience when we collectively plan and labor the next phase of
routing security.

Kind regards,

Job

[0]: https://www.denog.de/media/DENOG11/day1_1_rpki-one-year-later_yPfR6rl.pdf
[1]: https://mailman.nanog.org/pipermail/nanog/2019-February/099522.html
[2]: https://storage.googleapis.com/site-media-prod/meetings/NANOG84/2488/20220214_Madory_Measuring_Rpki_Rov_v1.pdf