Re: [Sidrops] [routing-wg] misconceptions about ROV
Job Snijders <job@fastly.com> Fri, 25 February 2022 13:17 UTC
Return-Path: <job@fastly.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 264C23A0E47
for <sidrops@ietfa.amsl.com>; Fri, 25 Feb 2022 05:17:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.099
X-Spam-Level:
X-Spam-Status: No, score=-1.099 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_AFFORDABLE=1,
SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
header.d=fastly.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id gqX3DkKvU1QR for <sidrops@ietfa.amsl.com>;
Fri, 25 Feb 2022 05:17:48 -0800 (PST)
Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com
[IPv6:2a00:1450:4864:20::633])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 6E9153A0DD1
for <sidrops@ietf.org>; Fri, 25 Feb 2022 05:17:48 -0800 (PST)
Received: by mail-ej1-x633.google.com with SMTP id a23so10834592eju.3
for <sidrops@ietf.org>; Fri, 25 Feb 2022 05:17:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastly.com; s=google;
h=date:from:to:subject:message-id:references:mime-version
:content-disposition:content-transfer-encoding:in-reply-to;
bh=nuhqI+OACWWk0zICKmEzyuX8msOqgrE8DJsbYW9SwG4=;
b=v+Hw/fsw1MrUEkXq2O/QHDDq+LglVUQoJdUX/Q39kFsse6Ml4A68z0xumN+UY8Eg8N
x5ItsuO27WWRMQCPCSjPu0Tr9Qs3h3ZucQbFqeVrTI9Hi5TaEThcGKO/c7sjT08aXjxY
WGOtROGWyhCb3/8WuzVJgtv2Q1l/a+TklRjt4=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:date:from:to:subject:message-id:references
:mime-version:content-disposition:content-transfer-encoding
:in-reply-to;
bh=nuhqI+OACWWk0zICKmEzyuX8msOqgrE8DJsbYW9SwG4=;
b=6YSAA7WnUeZG1jFN5eLxyvNDe3VKZh/E2Kvw6sMw/dk7dX4SPGP6+CvxeRHcJz7T4I
jjM5Et3s6G9nB9v9XTYofWd6scjH7tf6QcCRhNkyz+AB5OTN/nbTtWijhB4kkZeWW+7q
Sx1FLDCE/unaX1DODFSVKxQDTheXK4byO1bw1c3mhlYAtCM4Yy2VBUGLdjP+R3TVe8B6
iru9VAc48yogW0DE4cwG0GFIMUqu0I8rh/LYbimxsjSdx4y7sPLd7l6PkrbgRVfkKSAw
bFrsv0qS9lcp/cDbuJoTGcCZM+J8fIKPbMgmFsTtJHONUvqR0K+ztqGSHtdIPPBaR+4J
kpcw==
X-Gm-Message-State: AOAM530pPYS1j/uKyhRAZZvIsciqmGjmSnquewLWKbBH1P6eWiQJpbOe
XEahtajQtjUMZ85MzCuYHBIdiCjYbVpvwC5bx9cDfbVIcVCttRoDGscY8nSlJrMK34Y1fylm0nw
TIJzMJW3JJbNEkAxNsk/RCIPo4GnodgCCv8MghRCAOGdaD3VU7ExNJwQ=
X-Google-Smtp-Source: ABdhPJwM9ZCo2zlcs49aVuPTOMJLRSHokwYDgf6qwQZByl2ICJpjuV+D8RhBaU4aXjTkC5x0VNw1Jg==
X-Received: by 2002:a17:906:2486:b0:6cf:ced9:e4cc with SMTP id
e6-20020a170906248600b006cfced9e4ccmr6007854ejb.201.1645795065186;
Fri, 25 Feb 2022 05:17:45 -0800 (PST)
Received: from snel ([2a10:3781:276:2:16f6:d8ff:fe47:2eb7])
by smtp.gmail.com with ESMTPSA id
br20-20020a170906d15400b006cdd982fefesm604367ejb.116.2022.02.25.05.17.42
(version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
Fri, 25 Feb 2022 05:17:43 -0800 (PST)
Date: Fri, 25 Feb 2022 14:17:41 +0100
From: Job Snijders <job@fastly.com>
To: sidrops@ietf.org
Message-ID: <YhjW9UQFPMT/hDNV@snel>
References: <ABE3FA29-6C9D-492B-A72A-68C20176E76D@nlnetlabs.nl>
<949277FD-27AF-40E8-B557-AA58C62BFEA7@apnic.net>
<E16290C1-77ED-4CB1-8712-F6163304ED45@nlnetlabs.nl>
<m2k0dmmntj.wl-randy@psg.com>
<6D314C7A-8CEC-4B9B-8F80-6B1AC48037E2@nlnetlabs.nl>
<85D947F4-E2A4-4FFE-86AF-2D129C49FB9C@psg.com>
<8413F0CA-F50A-42B7-B0DA-19A0A90ABE6F@nlnetlabs.nl>
<YhdCYjS+yDVsFgNF@snel>
<60B6D863-047D-40A6-80DD-95C05391A0BA@nlnetlabs.nl>
<DM8PR09MB6294D4538DAA3C3094F0E661DE3D9@DM8PR09MB6294.namprd09.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <DM8PR09MB6294D4538DAA3C3094F0E661DE3D9@DM8PR09MB6294.namprd09.prod.outlook.com>
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/AS30Q20Gi5aBVgvGMI42aQ9JeJg>
Subject: Re: [Sidrops] [routing-wg] misconceptions about ROV
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>,
<mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>,
<mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Feb 2022 13:17:54 -0000
Hi Doug, others,
On Thu, Feb 24, 2022 at 11:53:25PM +0000, Montgomery, Douglas C. (Fed) wrote:
> We seem to create many security mechanisms (e.g., BGPsec, ROAs, MUD
> profiles, etc) that don’t have a safe means for individual users to
> globally test/pilot them before going into production mode.
I think the cake should be sliced up differently: the concept of "pilot
testing" shouldn't be in the protocol specs, but in the approach to
deployment.
In my experience operators are happy to request additional ASNs &
arrange separate IPv4/IPv6 space for pilot studies. Both AS and IPv6
INRs are extremely affordable, a fraction of the overall cost of
studying a new Internet technology. At least, this was my experience
with IPv6 a decade+ ago, and with RPKI ROV in recent years. I fully
expect that early adoptors of BGPsec are able to construct appropriate
pilot setups too. From that perspective I don't see the need to add new
object profiles to facilitate BGPsec, because doing so would set the
clock back.
> That increases the risk/barrier to entry to those who wish to enable
> the technologies.
At some point the conceptual "are you sure?" confirmation dialogue boxes
have to transform into something that is real. Cryptographic
attestations only have meaning when Relying Parties actually honor the
attestations: indeed, RPs have to exhibit willpower to discard invalid
objects or routes, otherwise the attestations become worthless (or
worse! read on below).
I think one of the unforeseen and accidental obstacles towards global
deployment of RPKI ROV was the following awkward dynamic:
(1) the propaganda machine was thundering on all cylinders to promote
ROA creation
(2) many folks misconfigured their ROAs, resulting in the *crazy
situation* that in its peak there were between 5,000 ~ 6,000
invalids BGP routes in the DFZ [0]
(3) many folks didn't notice their ROA misconfigurations, because nobody
was performing ROV invalid==reject. Also, there was no incentive to
fix broken ROAs, because nobody was validating.
(4) people became afraid to enable ROV on ingress EBGP, because there
were so many invalids "I can't just reject 5K routes!".
It is not hard to imagine how steps 1 -> 2 -> 3 -> 4 in an alternative
universe could've resulted in complete disaster and dismissal of RPKI
ROV.
It took significant community effort to overcome the above downward
spiral: people had to be taught what CA Intent is, that 'harsh'
rejection of invalid information is exactly what makes the security
mechanism work, and that the 5K invalids did not pose a risk to business
[1] [2].
As for the misconfigured ROA creators: many learned the surprisingly
positive consequences of making bad decisions. Sometimes operators have
to touch the hot stove. :-)
How the above observations potentially apply to BGPsec isn't certain
yet, but all of us definitely have to consider what we can learn from
the ROV experience when we collectively plan and labor the next phase of
routing security.
Kind regards,
Job
[0]: https://www.denog.de/media/DENOG11/day1_1_rpki-one-year-later_yPfR6rl.pdf
[1]: https://mailman.nanog.org/pipermail/nanog/2019-February/099522.html
[2]: https://storage.googleapis.com/site-media-prod/meetings/NANOG84/2488/20220214_Madory_Measuring_Rpki_Rov_v1.pdf
- [Sidrops] Fwd: [routing-wg] misconceptions about … Randy Bush
- Re: [Sidrops] [routing-wg] misconceptions about R… Di Ma
- Re: [Sidrops] [routing-wg] misconceptions about R… Randy Bush
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Di Ma
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Geoff Huston
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Randy Bush
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Randy Bush
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Jeroen Massar
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Jeroen Massar
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Jeroen Massar
- Re: [Sidrops] [routing-wg] misconceptions about R… Montgomery, Douglas C. (Fed)
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders