Re: [Sidrops] Comments on draft-ietf-sidrops-validating-bgp-speaker

Job Snijders <job@ntt.net> Thu, 15 February 2018 13:44 UTC

Return-Path: <job@instituut.net>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE6C712DA08 for <sidrops@ietfa.amsl.com>; Thu, 15 Feb 2018 05:44:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.919
X-Spam-Level:
X-Spam-Status: No, score=-1.919 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LZwXCjo5oyO5 for <sidrops@ietfa.amsl.com>; Thu, 15 Feb 2018 05:44:23 -0800 (PST)
Received: from mail-wm0-f47.google.com (mail-wm0-f47.google.com [74.125.82.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1315712420B for <sidrops@ietf.org>; Thu, 15 Feb 2018 05:44:22 -0800 (PST)
Received: by mail-wm0-f47.google.com with SMTP id j199so925938wmj.2 for <sidrops@ietf.org>; Thu, 15 Feb 2018 05:44:22 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=96ctgLYQ17bkoA7C1NjQPf8veEDijN0hf6UPoPLBO6I=; b=acN+hKsAYKnEbZDja7zg3Zk3zrklmKdWKU0OaZ58/tbkXGNLJJwdFFxcrPZ4E17fVR euwhMCRfPxiWMd0S70s7mZRctQKliIu03jRr5o6CpSOEJFkxLJx3gYqT1OSBLZRwLbSf HZTjFwT3CHe3kU2R5uzFPDh25ybmQ0JIuygFY5yrBTcaznP+dtda8yyjnGWBfeYvm2yA F0MvYJ96fJQ4VfNB/QFtSV983Gb+nCLLOsHQ5hFaKf8dMo4xtOc97y+2ucyTo9IG6ZG9 liOzRQjmMyj+ztF8/LhXf7XmcevFc55uZcHk2dC2YNf/rphujPDlOm0ADZvIgdr8BZaD YdDw==
X-Gm-Message-State: APf1xPB9e9S31fCZ0C1nim1tUHaIchCOsAB43glYyyhTl1XrhRviOjVF sT7b0srqBrqjujn6DTb3q7rpLQ==
X-Google-Smtp-Source: AH8x2242yL/z5v7/g469XuPJvofumx/DN5/uZnR6jxhJOLhJ2sIaqsqqs0NxprczwQTFKzM44TSWCg==
X-Received: by 10.80.151.106 with SMTP id d39mr3428547edb.79.1518702261235; Thu, 15 Feb 2018 05:44:21 -0800 (PST)
Received: from localhost ([2001:67c:208c:10:2cf2:185e:db44:f1cb]) by smtp.gmail.com with ESMTPSA id l5sm518255eda.82.2018.02.15.05.44.20 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 15 Feb 2018 05:44:20 -0800 (PST)
Date: Thu, 15 Feb 2018 14:44:18 +0100
From: Job Snijders <job@ntt.net>
To: Aris Lambrianidis <aris.lambrianidis@ams-ix.net>
Cc: Jeff Wheeler <jsw@inconcepts.biz>, sidrops@ietf.org
Message-ID: <20180215134418.GC1193@hanna.meerval.net>
References: <CAPWAtbJJ3mWXP-d314CbY7n9LSh4KmNjXBCP93Ag_i=0gcAd8Q@mail.gmail.com> <5A84B6B8.50207@ams-ix.net> <20180215133931.GB1193@hanna.meerval.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20180215133931.GB1193@hanna.meerval.net>
X-Clacks-Overhead: GNU Terry Pratchett
User-Agent: Mutt/1.9.3 (2018-01-21)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/XXd_-YHIrbEBF11T_cMNi_FlIG8>
Subject: Re: [Sidrops] Comments on draft-ietf-sidrops-validating-bgp-speaker
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Feb 2018 13:44:25 -0000

On Thu, Feb 15, 2018 at 02:39:31PM +0100, Job Snijders wrote:
> On Wed, Feb 14, 2018 at 11:22:48PM +0100, Aris Lambrianidis wrote:
> > Let me also point out that in theory, forwarding "invalid" prefixes is
> > bad. However, our own operational experience so far has shown that
> > most ROA invalid prefixes are due to misconfiguration rather than
> > malicious intent.
> 
> A major consideration is that all IXP route servers only offer a
> _partial_ view on the global routing table, nobody ever single-homes
> behind an IXP route server. So, if the IXP route server does _not_
> propagate invalid prefixes to its participants, operationally speaking
> the 'worst' thing that can happen is that alternative paths are used via
> either bilateral peering or other arrangements. If anything, if people
> depend on keeping their traffic on the IX with the help of the RS, there
> is an actual monetary incentive to repair the misconfigured ROAs. If
> anything, IXPs should take a leading role in deploying RPKI Origin
> Validation - this draft proposes the opposite: a watering down that
> justifies propagation of bad announcements.
> 
> By merely tagging the invalid prefixes with a community, the sender of
> those BGP announcements has significantly visiblity into problem, since
> the sender of such announcements won't see the 'invalid community'
> themselves.

Oops, some words were missing from the above paragraph:

    By merely tagging the invalid prefixes with a community, the sender
    of those BGP announcements has significantly less visiblity into the
    problem, since the sender of such announcements won't see the
    'invalid community' themselves.

> I think in context of IXP Route Servers it is very detrimental to the
> Internet community's overall effort to improve routing security if
> invalid malicious announcements are distributed alongside these
> 'misconfigurations', and the propagation of misconfigurations is deemed
> more important than blocking of incorrect announcements.
> 
> Given the prevalence of routing incidents and the critical effects they
> have on business continuity, I'm concerned that time is wasted on
> actively lowering the bar ('rpki-light' aka 'draft-ietf-sidrops-validating-bgp-speaker')
> rather than spending time on setting higher standards.
> 
> ESPECIALLY given the position of route servers in the routing ecosystem.
> If we consider a misconfigured RPKI ROA an 'error', favoring strict
> error handling (dropping) over attempting error recovery is an effective
> technique for ensuring that faults receive attention. 
> 
> Kind regards,
> 
> Job