Re: [Sidrops] New Version Notification for draft-sriram-sidrops-drop-invalid-policy-00.txt

"Montgomery, Douglas (Fed)" <dougm@nist.gov> Wed, 14 March 2018 02:54 UTC

Return-Path: <dougm@nist.gov>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94927124235; Tue, 13 Mar 2018 19:54:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UtdpahkZUqke; Tue, 13 Mar 2018 19:54:16 -0700 (PDT)
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0112.outbound.protection.outlook.com [23.103.201.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C8ECB1205D3; Tue, 13 Mar 2018 19:54:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=jWx7xBe/ak/Lzvu/lgQuUtgzY6nWGT1QdMw/GBj5KMo=; b=cM6+6FZ9QZ/OyDXCbLZLkUxBvMdKnuILVNlbiKE3Qe6PIfxpnkJ4zwxOIBa6QuPGta0oxDj0km+u+eOM0N4t4BpPGgYEAa3Fe/cMDXcGXTnks4u9mtZGzTi3Kr6fx1oWuYDRv6QJbihWHAHigUjMjqg31AF5xAHkZWOwZ6T4+/o=
Received: from DM5PR0901MB2504.namprd09.prod.outlook.com (52.132.128.29) by DM5PR0901MB2501.namprd09.prod.outlook.com (52.132.128.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Wed, 14 Mar 2018 02:54:13 +0000
Received: from DM5PR0901MB2504.namprd09.prod.outlook.com ([fe80::e90a:b560:7cee:b834]) by DM5PR0901MB2504.namprd09.prod.outlook.com ([fe80::e90a:b560:7cee:b834%13]) with mapi id 15.20.0548.021; Wed, 14 Mar 2018 02:54:12 +0000
From: "Montgomery, Douglas (Fed)" <dougm@nist.gov>
To: Stephen Kent <stkent@verizon.net>, "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>, Tim Bruijnzeels <tim@ripe.net>
CC: "sidrops-chairs@ietf.org" <sidrops-chairs@ietf.org>, "sidrops@ietf.org" <sidrops@ietf.org>
Thread-Topic: [Sidrops] New Version Notification for draft-sriram-sidrops-drop-invalid-policy-00.txt
Thread-Index: AQHTtNWhMX8Ii2x000qaqhw9uIvabqPDaEWAgAMAtQCAAP/MAIAAPhaAgABzpAD//7T7AIAHGWcA///p2YA=
Date: Wed, 14 Mar 2018 02:54:12 +0000
Message-ID: <0A9F6A41-B914-4ED9-989B-DE0736525B2A@nist.gov>
References: <152029076512.12908.14537578849320525718.idtracker@ietfa.amsl.com> <BYAPR09MB2773819AB3961189CDA9B4D784D90@BYAPR09MB2773.namprd09.prod.outlook.com> <074D75CB-7D34-4838-BEAA-88AE5E044F6C@ripe.net> <BYAPR09MB27738385E28497E1EC5B32AD84DE0@BYAPR09MB2773.namprd09.prod.outlook.com> <70613650-C8D6-43D9-8643-5694B77BADA9@nist.gov> <5d2afc8e-7f9a-e2bc-fa84-88b943639bd6@verizon.net> <C92B14E7-6F48-4627-8887-776C1321E603@nist.gov> <eb8ed78d-e42f-1ed1-e94f-6821929df9c6@verizon.net>
In-Reply-To: <eb8ed78d-e42f-1ed1-e94f-6821929df9c6@verizon.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.a.0.180210
x-originating-ip: [96.241.62.151]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR0901MB2501; 7:TLE+ZZJ4g/V7Ro8i2NZSYZscKDmEUDMr95dstqSb8xU5PLEyN48x2GD5VJrib+y9qd2+L04whtM8dVRPf0+cQbKssIfnDtNSmLsn76aQUPluAaqrV/hmiUWFnISWJRY6oi+Uf0mZywwc4JoRYlUgfaeityvMUTvaUMnuioyvgYC4EO8e5oeYjkuR72eEhZPVuCH7WVJT4HG1h5kSWKXOLooCj3fWTAbGvobbWm/ezt3ecZ9WmXr1gwmu+u4Pg0Pu
x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR;
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10019020)(346002)(396003)(39860400002)(39380400002)(376002)(366004)(50084003)(199004)(189003)(110136005)(478600001)(54896002)(6436002)(6306002)(6512007)(6486002)(82746002)(76176011)(93886005)(2906002)(10710500007)(6246003)(53936002)(2900100001)(26005)(105586002)(229853002)(6116002)(3846002)(14454004)(97736004)(106356001)(102836004)(54906003)(5250100002)(2950100002)(58126008)(3660700001)(86362001)(99286004)(8656006)(316002)(53546011)(8936002)(7736002)(68736007)(7110500001)(33656002)(25786009)(6506007)(2420400007)(15650500001)(83716003)(3280700002)(8676002)(66066001)(81166006)(81156014)(5660300001)(4326008)(36756003)(59450400001)(186003); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR0901MB2501; H:DM5PR0901MB2504.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 8419d500-cc4a-4ac8-e742-08d58956de0d
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM5PR0901MB2501;
x-ms-traffictypediagnostic: DM5PR0901MB2501:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dougm@nist.gov;
x-microsoft-antispam-prvs: <DM5PR0901MB250154032846B028FD67CECCDED10@DM5PR0901MB2501.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(65766998875637)(88262167912993)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3231221)(944501244)(52105095)(10201501046)(3002001)(6055026)(6041310)(20161123560045)(20161123564045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(6072148)(201708071742011); SRVR:DM5PR0901MB2501; BCL:0; PCL:0; RULEID:; SRVR:DM5PR0901MB2501;
x-forefront-prvs: 0611A21987
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
x-microsoft-antispam-message-info: Spz8+GsQklTUF/dV/FCvVhMF2VjJ5Q3K48mf40W1cOt6oUsOMY8mOJ6wXIbOqgdzGUNXjjttTFAwsMaLikd79tYGRRyZVnWdL9/Xk/wPY4Gr3Yib6CDtQU5Pc+yUIypMBOuANs8dotsidGgBuS9gRUdBo+9380cSMjyZPPzXHXFpjx9laUzSX/K3HbnCRsKH+DvrAPiVBJl2YvbWEcsgEt7JgVvHz5+4e9y4aOmQlG3899EJA8KFzQCLNyEurHVPCCUK8dDVS66QnKynduNwx1dPpzZZXce3WBUv95ohEfuBG6zSXr3GAofUb1piAlRg5/H69qMnpldEeJMGSC1Fww==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_0A9F6A41B9144ED9989BDE0736525B2Anistgov_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-Network-Message-Id: 8419d500-cc4a-4ac8-e742-08d58956de0d
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2018 02:54:12.7398 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR0901MB2501
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/N6wLZR9IByfcY1oYuamq5MK4ibI>
Subject: Re: [Sidrops] New Version Notification for draft-sriram-sidrops-drop-invalid-policy-00.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Mar 2018 02:54:20 -0000

Steve,

Sorry, yes I agree that 7607 updates 4271 to make it clear that AS0 should not appear in a PATH.   So implementations that comply with both 7607 and 4271 should handle AS0 in BGP as expected.

But that was not my point.  My point was what “the meaning” of a ROA with AS0 is.  As far as I can tell one could encounter an AS0 for an address block with:


  1.  Valid (non AS0) ROAs above it (less specific block)
  2.  Valid (non AS0) ROAs below it (more specific block)
  3.  Valid (non AS0) ROAs with the same prefix as in the AS0 ROA.

So, for example, in case #2 above the use case might be to prevent squatting on unannounced address space by creating an AS0 ROA for an entire allocation, then creating non-AS0 ROAs for the specific sub-prefixes that are routed.  So clearly intent of the AS0 ROA in this case is not “you should never see these addresses announced in routing”.  One would have to examine the full collection of covering ROAs to understand the intended use case.

As far as I know there are no special cases in the X.509 validation of RPKI objects associated with AS0, nor are there special cases in the BGP prefix validation algorithm associated with AS0. I am not sure if hosted RPKI services special case AS0 in any way in their ROA creation logic.

So, what we have is an AS value that we have updated 4271 to make clear should never appear in an AS_PATH.   We leverage that fact to note that we can now create ROAs with AS0 that can result in an “INVALID” result in origin validation as long as there are no other covering & matching ROAs that would result in a “VALID”.

Thus the net effect of a covering AS0 ROA can’t be determined in isolation.  One has to consider the overall usage scenario to understand the ramifications.

I found that RFC6483 explained this nicely, noting that it is “by convention” that AS0 can result in INVALID in some usage scenarios and noting some of the scenarios where this is not the case.

I will say that I have seen a few comments in this thread where I think some folks have lost track of the fact that:


(a)    A covering AS0 ROA alone does not guarantee an INVALID result, and,

(b)    An INVALID result does not guarantee that the update with be ignored in the decision process. That will always be subject to local policy.

Comments along the lines of “… an AS0 implies must drop …” would be a change to both of these facts, and would require updates to existing base specs to make it so.

It should also be noted that the DISR idea was not proposing any changes to normative behavior of RPKI or Origin Validation.  Instead it was proposed as a form of local policy mechanism aimed at reducing operator’s concerns about potential network unreachability triggered by RPKI errors or omissions.  I do think if DISR-like ideas have merit, then the idea of special casing AS0 in the local policy might have value, but we need to work through the three cases above to be clear what that special case logic might be.

While I am rambling, I should also say that I agree with Jay and points that Tim made some time ago that one wants to be careful with the tradeoffs of lessening the potential impact of errors in the data, as it is typically only the tension caused by a negative impact that inspires people to update and correct the data in the first place.

dougm
--
DougM at NIST

From: Stephen Kent <stkent@verizon.net>
Date: Tuesday, March 13, 2018 at 8:13 PM
To: Doug Montgomery <dougm@nist.gov>, "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>, Tim Bruijnzeels <tim@ripe.net>
Cc: "sidrops-chairs@ietf.org" <sidrops-chairs@ietf.org>, "sidrops@ietf.org" <sidrops@ietf.org>
Subject: Re: [Sidrops] New Version Notification for draft-sriram-sidrops-drop-invalid-policy-00.txt

Doug,

I'm puzzled by your interpretation of RFC 7607. Specifically, Section 2 of 7607 says:


2. Behavior





   A BGP speaker MUST NOT originate or propagate a route with an AS

   number of zero in the AS_PATH, AS4_PATH, AGGREGATOR, or

   AS4_AGGREGATOR attributes.



   An UPDATE message that contains the AS number of zero in the AS_PATH

   or AGGREGATOR attribute MUST be considered as malformed and be

   handled by the procedures specified in [RFC7606].



   An UPDATE message that contains the AS number of zero in the AS4_PATH

   or AS4_AGGREGATOR attribute MUST be considered as malformed and be

   handled by the procedures specified in [RFC6793].



   If a BGP speaker receives zero as the peer AS in an OPEN message, it

   MUST abort the connection and send a NOTIFICATION with Error Code

   "OPEN Message Error" and subcode "Bad Peer AS" (see Section 6 of

   [RFC4271]).  A router MUST NOT initiate a connection claiming to be

   AS 0.



This seems pretty definitive, and normative, not just a "usage convention" for AS 0,

as you suggest.



Steve

Thanks Steve,



You are right that the RFCs below should be referenced also.  Having reviewed them again, nothing I said previously seems to have changed.   AS 0 is at best a suggested usage convention.



The thing I like about the 6483 text is that it makes explicit that ROAs can and will be created beneath an AS 0 ROA (one usage scenario is forcing your customers to issue ROAs before announcing their routes) and that all of this is "by convention".   So while not normative, I though 6483 painted the best picture of the issues we were discussing.



dougm