Re: [Sidrops] WG ADOPTION - draft-madi-sidrops-rush - ENDS 10/12/2020 (Oct 12th)

Job Snijders <job@ntt.net> Fri, 23 October 2020 13:45 UTC

Return-Path: <job@ntt.net>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E3C73A0AD5; Fri, 23 Oct 2020 06:45:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GJLBMhc6cocE; Fri, 23 Oct 2020 06:45:04 -0700 (PDT)
Received: from mail4.dllstx09.us.to.gin.ntt.net (mail4.dllstx09.us.to.gin.ntt.net [IPv6:2001:418:3ff:5::192:26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4902F3A0CC4; Fri, 23 Oct 2020 06:45:04 -0700 (PDT)
Received: from bench.sobornost.net (mieli.sobornost.net [45.138.228.4]) by mail4.dllstx09.us.to.gin.ntt.net (Postfix) with ESMTPSA id CBEE4EE012F; Fri, 23 Oct 2020 13:45:01 +0000 (UTC)
Received: from localhost (bench.sobornost.net [local]) by bench.sobornost.net (OpenSMTPD) with ESMTPA id 0c7f0e2c; Fri, 23 Oct 2020 13:45:00 +0000 (UTC)
Date: Fri, 23 Oct 2020 13:44:59 +0000
From: Job Snijders <job@ntt.net>
To: Di Ma <madi@rpstir.net>
Cc: Chris Morrow <morrowc@ops-netman.net>, "sidrops-ads@ietf.org" <sidrops-ads@ietf.org>, Guyunan <guyunan@huawei.com>, SIDR Operations WG <sidrops@ietf.org>, Christopher Morrow <christopher.morrow@gmail.com>, SIDROps Chairs <sidrops-chairs@ietf.org>, Melchior Aelmans <melchior@aelmans.eu>, Stephen Kent <stkent=40verizon.net@dmarc.ietf.org>
Message-ID: <20201023134459.GE32039@bench.sobornost.net>
References: <CAL9jLaZAC9soiJKy856dWexjAmh5=brBnnUOrUjeSHLR_CKJTQ@mail.gmail.com> <8B99CEB3-7CBC-4D12-89BB-8AEE65DE63DA@verizon.net> <20201022161740.GT58295@bench.sobornost.net> <CCA4C0DF-00E3-4ED2-81A6-BC7AFE1BC532@rpstir.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CCA4C0DF-00E3-4ED2-81A6-BC7AFE1BC532@rpstir.net>
X-Clacks-Overhead: GNU Terry Pratchett
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/XCcDcNjS1Y1albtEQ81pZbm7JgM>
Subject: Re: [Sidrops] WG ADOPTION - draft-madi-sidrops-rush - ENDS 10/12/2020 (Oct 12th)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Oct 2020 13:45:08 -0000

Hi Di,

On Fri, Oct 23, 2020 at 09:18:21PM +0800, Di Ma wrote:
> > 2020年10月23日 00:17,Job Snijders <job@ntt.net> 写道:
> > I am hesitant to support adoption as I feel this opens yet another
> > not-at-all-validated channel into pandora's box. I don't think this
> > draft in its current form is ready for adoption.
> > 
> > If this work is to proceed, I'd like RUSH to *strictly* limit itself to
> > transportation of VRPs within a *single* trust domain. If you are not
> > willing to give the operator of the RUSH endpoint absolute unrestricted
> > 'enable' access on your BGP routers, they are outside your trust domain
> > and one should not talk RUSH with them.
> 
> You have got the essence of RUSH: TRUST.

RUSH seems the opposite of TRUST. All validation steps from which we can
derive a degree of trust have been removed?

> But, trust is not necessarily limited into the *single* trust domain.
> If I am allowed to exaggerate, RUSH even can used between two tier 1
> ISPs as long as one trusts the other. 

Interesting point, indeed we could iterate over all permutations of
possibilities, but what you mention is simply not how things are done in
practise between tier 1s (or other networks). I fail to see how the
exaggregation supports the Internet-Draft.

> I think we authors have articulated the essential usecase.

Please see below.

> > The offending paragraph is this one:
> > 
> >    "o AS0 SLURM File Delivery The Regional Internet Registries (RIRs)
> >    need to publish assertions with origin AS0 ([RFC6491]) for all the
> >    unallocated and unassigned address space (IPv4 and IPv6) for which
> >    it is the current administrator.  RUSH is able to deliver those
> >    assertions to RPKI relying parties if so called AS0 SLURM file are
> >    generated by the RIR."
> > 
> > Here is an *explicit* example of the detrimental effects of so-called
> > RIR 'AS 0' policies https://www.ripe.net/ripe/mail/archives/routing-wg/2020-June/004131.html
> > Do we really want to create big red buttons that can be pressed to nuke
> > *countries* off the global Internet Routing system? Surely that is not
> > our intention. I'm a pacifist, I do believe that if we don't develop
> > machine guns, machine guns can't be used against other human beings.
> 
> AS0 is only a potential usecase and it is a policy issue whether the
> community decide to use RUSH to implement AS0. 
> 
> But we just want to offer the tool. 

Yes, you want to offer a tool, but as I mentioned the existence of some
tools is not without consequences to the global routing system. When a
big red dangerous button is created, at some point someone somewhere
will want to push it.

I'll note for full transparency to this group that one of the co-authors
of the RUSH Internet-Draft is also the co-author of a "RIR AS0" policy,
which was rejected by the RIR community in which it was submitted.

>From my perspective the many discussions all over the globe (which so
far have taken place in APNIC, AFRINIC, RIPE, and LACNIC), is now just
spilling over to SIDROPS. Just like in all those RIR policy forums, it
should come as no surprise it will meet some resistance in this forum
too. As one of the use cases explicitly references 'AS 0' policies, it
no longer can be positioned as a neutral tool but has become part of a
wider (contentious) discussion.

> As I mentioned,  trust is not necessarily limited into a *single*
> trust domain.

Interesting, I am not sure I understand your definition of trust
domains. I am not even sure what my definition is, but I will point out
that the RIRs generally are *not* considered something to blindly trust.
The channel from RIR to Network Operator for RPKI related data is -
right now - one that strictly flows through a X.509 verifyable chain,
and RUSH is a novel way which sidesteps an existing more secure
mechanism. Why water that channel down?

> > However... there *might* be some work to be done in this area (forgive
> > me for linking to non-IETF resources, this is not to promote or NIH)
> > https://github.com/job/draft-sidrops-rpki-vrp-lorri HTMLized version
> > here
> > https://htmlpreview.github.io/?https://raw.githubusercontent.com/job/draft-sidrops-rpki-vrp-lorri/master/draft-spaghetti-sidrops-rpki-vrp-lorri-00.html
> > 
> > As it currently stands all RPKI validators are able to emit the VRPs in
> > a JSON format. This JSON format has become the defacto standard because
> > each validator blindly copied the other validators. However, the
> > 'commonly used JSON format for VRPs' is not optimal from a data
> > structure perspective, and it is not standardized (unlike SLURM). There
> > is no schema, and thus no validation.
> 
> I go with a standard RFC8416 (SLURM).  Why bother to find an
> unstandardized tool? I am confused.

The OpenBSD rpki-client, NLNet Labs Routinator, RIPE NCC RPKI Validator,
Cloudflare OctoRPKI, NIC.MX FORT, and possibly other validators are all
capable of emitting a specific (quite similar) JSON format.

This (non-standardized) format that is *widely* deployed & used by
operators, and has been for many years. I've uploaded an example JSON
file here: http://sobornost.net/~job/example-rpki-client-json-output.txt
Many network operators use this JSON format -today-.

So on the one hand we have RUSH (SLURM over HTTP), on the other hand we
have a JSON format that is widely used but not standardized. I brought
up the topic of the not-standardized-json because it appears to cover a
similar solution space to what RUSH addresses, and perhaps this working
group has thoughts or ideas on whether this is work suitable for the
working group.

It is also fair to consider my reference to this non-standard JSON as
'thread hijacking', but to me it seems somewhat related.

Kind regards,

Job