Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)

"Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov> Tue, 28 March 2023 23:23 UTC

Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E56FC151532; Tue, 28 Mar 2023 16:23:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_GOV_DKIM_AU=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nist.gov
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VqibncoOOXlZ; Tue, 28 Mar 2023 16:23:04 -0700 (PDT)
Received: from GCC02-DM3-obe.outbound.protection.outlook.com (mail-dm3gcc02on2071a.outbound.protection.outlook.com [IPv6:2a01:111:f400:7d04::71a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2392CC151B3F; Tue, 28 Mar 2023 16:23:03 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HS9/WT81xb3akp6KKQ7qG7+pOB7wDkovY6HV7PJMVZWvIKrrTT1ED4bRkN99Iemq3eoNDUN/nDO3u8hDZMildTOpnAo4k18qjG52bDr8RLCApJ19vfRGGzMJviW2+XuIMfuIdJeHs/NaeAehj5Ay5w/G37lLeTXJV66CdY3DjNOkLUAxVvJyYK64nuDFZklj1LHaHdbws/zQUflW475TNxTc4yppg+OavXgDkXzGDEcggUh7wFplxogj9b5Mb2myrT/3fm58DH/YKAkkaO0AE3My/ALM6RlzckUXDzL7ahSPWlF33kUsOmA7equN5wqyfGlsnkzjL13DdzIlv4QfQA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3r+wC0E81oXhJSsJuylHrAusYq49pAkFMS+965IHhXA=; b=B3JrikfG9GXDcj2D4uMggpwxJY9bGosmKh+GmkUQ1YSnwhAbem0acpOG6DZy+hnwYBJOMsTAjIDjRPLrqKTN7ELgK4LYfBpX9mfefFrvg40/7i3pmnEFtaRkx/Khc6iK08t/k1ygv7Jm1H/hZrlR7kHnQHr7JtltqwjsBfwvH7ZXBSOa69m1h3DBffITLn1xq5jFL5dpClI9ZHwH5e+XprW9YSrPJK6NWMeHRMsoizqCsIENAJFf4Y1bUeQZjGlySi42SuIZMPeZoSbUtETphOKXtymrh45QrQ9yIrxoaudSEyCE6HJiTB/DY3lkfH9Ys/iwjlv7ZG6I2i/KwXU2pw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nist.gov; dmarc=pass action=none header.from=nist.gov; dkim=pass header.d=nist.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nist.gov; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3r+wC0E81oXhJSsJuylHrAusYq49pAkFMS+965IHhXA=; b=GtPkEaxWlWXQFqm6cksu1cGguszELzbn9Cvr6SEgYyEo/9EfjjzT898rE4ZDpvLaUlugddcQ3RpvFT4i0q6Ezf0gJhSL5VJeb4uPKvry6mzkU0r0XX6Gk+lOs5pL0QTTbrGxJcrtC4Hx+qeS4FtqAcsBFbKDysDPMoS1iht/XltoZyCksmk+X3akUsRQ4suHK9Xq4yEsm4wq47RziGI6uleb49OIdZXIK88MgOl17jmuBns7iE+Bw9kZ4COmK9kphlF86vNAXBfBSWi7/CoNR8muukAt4n86FCleAiA5vL2DtILfvH5u1F3nZqmoe4tLQ8FAGFkxC0LSW4J6SSFI4A==
Received: from SA1PR09MB8142.namprd09.prod.outlook.com (2603:10b6:806:171::8) by SA1PR09MB10524.namprd09.prod.outlook.com (2603:10b6:806:369::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6222.33; Tue, 28 Mar 2023 23:23:00 +0000
Received: from SA1PR09MB8142.namprd09.prod.outlook.com ([fe80::5a71:2eb6:5ff8:eb4f]) by SA1PR09MB8142.namprd09.prod.outlook.com ([fe80::5a71:2eb6:5ff8:eb4f%7]) with mapi id 15.20.6222.033; Tue, 28 Mar 2023 23:23:00 +0000
From: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
To: "ilubashe@akamai.com" <ilubashe@akamai.com>
CC: "sidrops@ietf.org" <sidrops@ietf.org>, "draft-ietf-sidrops-aspa-verification@ietf.org" <draft-ietf-sidrops-aspa-verification@ietf.org>, "draft-ietf-sidrops-aspa-profile@ietf.org" <draft-ietf-sidrops-aspa-profile@ietf.org>
Thread-Topic: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)
Thread-Index: AQHZUV6mxB5bPFSj10Ch+S0fYxNY/K77vemAgAuycmCAB0/JAIAA8bzMgAAMfviAAPrBAIAANBel
Date: Tue, 28 Mar 2023 23:23:00 +0000
Message-ID: <SA1PR09MB81427D28EF661F9DAB05FB9B84889@SA1PR09MB8142.namprd09.prod.outlook.com>
References: <SA1PR09MB814241245D01E81BADE3ED0884CF9@SA1PR09MB8142.namprd09.prod.outlook.com> <31FDE1E9-3E87-4011-B65B-C6B3A264303F@vigilsec.com> <SA1PR09MB81427B4A1B126A5D1C1E289C84CF9@SA1PR09MB8142.namprd09.prod.outlook.com> <SA1PR09MB8142E41F2D6B537BCAA758F384CC9@SA1PR09MB8142.namprd09.prod.outlook.com> <CAL9jLaYz3OhcwBBcVMqnUseBR9J1ZyktcJo5YLeefQHMoYJu+A@mail.gmail.com> <CAL9jLaZ7eDc+zbhapS8dTYQKnTfgLd=MOPYw97-qcJ4eP6S6Mg@mail.gmail.com> <CAL9jLaYJ4ODfumG9Yk3-yv=_TaTSUeD++U4sGy7S-0xWcGBQPw@mail.gmail.com> <ZBGqSVL9sSqnAiJc@diehard.n-r-g.com> <SA1PR09MB8142E9F71F250B83062C724884869@SA1PR09MB8142.namprd09.prod.outlook.com> <ZCGcYHJ9PyrjgR+V@diehard.n-r-g.com> <SA1PR09MB8142EA7F33880679E9B509D384889@SA1PR09MB8142.namprd09.prod.outlook.com> <SA1PR09MB81426E1BB66D6DF31860F26984889@SA1PR09MB8142.namprd09.prod.outlook.com> <ed0146b09da346b2b48cb9701240926c@akamai.com>
In-Reply-To: <ed0146b09da346b2b48cb9701240926c@akamai.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nist.gov;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SA1PR09MB8142:EE_|SA1PR09MB10524:EE_
x-ms-office365-filtering-correlation-id: 9859a5d5-800d-486e-eb2f-08db2fe35f42
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: VkSdmxtEotlowTVZB6eY15UghaUz7JUHpe1gfG7r6Cej1EwFouBoiIla3N0CIhP1OT3LCjVu/RGmQyYuuj2x09c5HmpvD3jldhnNoG/kH5zs8FpjIEJ7UBewZ+Z4Au8wbcDkSISyp3J2sUi1vNLOykSuFqKKUA4rpwlRlTL+9BGls8Yk21fYvUx9mMoMZa7rMsJTgb/j0qHk2kxAxAs3ku6tVs8o2Pont1mWksqm/uos8cXm2fx5aZvuBIVjXc86sfhU7xatUG3i4dol/2AGKyPv2HSkpLuigyc5Bo8BKMfz6Wf0oSO7Y3J+0ousHabI9/rSNh4dPsACNdY2yDZdyopRx1DsU2sSvl1MrSCpD6gHFSXeR3Py3VfhKSM8/9VtBVWIZ+KeVkAsxb/705K+E7MLzA54IGsHA9bF+YDfkXVVMNJ+WPz8ix/i6p17B61AoljKZbsbOPV5aphf0TueC5CtG/HKfMG8TGpsyaYrQ1n7lAz9rb3hRzpN23ukyQ/c2BVzk6dWvrbYqgZWr+gqb52YjmM1Iu8IGycUJ5PWgh3/XQ0O/Wm2zJ4uHKLgH3Z3g/hW1P0BPtUuBoi7Zw71jySItqVdmJKbbUV+KRJIBScs9Rcw3k6aBjAu+ZNjro8b
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SA1PR09MB8142.namprd09.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(366004)(451199021)(66574015)(122000001)(55016003)(38070700005)(82960400001)(86362001)(83380400001)(38100700002)(33656002)(54906003)(5660300002)(2906002)(7696005)(498600001)(15650500001)(8936002)(52536014)(66446008)(66476007)(91956017)(66946007)(66556008)(76116006)(64756008)(6916009)(8676002)(9686003)(186003)(6506007)(53546011)(4326008)(71200400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA1PR09MB8142.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9859a5d5-800d-486e-eb2f-08db2fe35f42
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Mar 2023 23:23:00.5180 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR09MB10524
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/aw67pUP85uRvZCDUhU4LWfiKU2k>
Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Mar 2023 23:23:09 -0000

Hi Igor,

Thanks for the analysis.

In your first scenario, it is not a forged-origin hijack. Instead, it is a forged-path-segment attack.

One can say that a forged-path-segment attack is also always detectable (in the upstream direction) provided all ASes in the path segment are ASPA compliant.

In your second scenario, the route is going outside the island and entering back.  So, you asked:

>Does it mean that the BGP advertisement is only forwarded within the "island"?  If so, AS B should be able to identify the AS that leaked the route, no?

Yes, either the whole route (all ASes in it) or at least the three consecutive ASes constituting the route leak must be within the ASPA island. 

I think the attribution is a bit hard. If there is a route leak, the verifying AS knows which AS seems to be the leaking AS. But it cannot distinguish if its provider sent a fabricated path. But the path will be detected to be a route leak either way. 

I will recheck the wording of the properties to be clear.

Sriram


________________________________________
From: Lubashev, Igor <ilubashe=40akamai.com@dmarc.ietf.org>
Sent: Wednesday, March 29, 2023 1:16 AM
To: Sriram, Kotikalapudi (Fed); Claudio Jeker
Cc: sidrops@ietf.org; draft-ietf-sidrops-aspa-verification@ietf.org; draft-ietf-sidrops-aspa-profile@ietf.org
Subject: RE: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)

Sriram, thank you for updating the draft and getting into additional details of what leaks and hijacks can be mitigated during partial ASPA deployment.



I have a few questions about the new Section 8 "mitigation properties".



> 2.  Again let AS A and AS B be any two ASes in the Internet doing

                      ASPA (generation and verification) and no assumption is made

                      about the deployment status of other ASes.  Consider a route

                      received at AS B from its customer or lateral peer that is a

                      forged-origin prefix hijack [RFC9319] involving AS A as the

                      forged-origin.  The ASPA-based path verification at AS B always

                      detects such a forged-origin prefix hijack.



See the diagram below. Suppose AS B receives AS_PATH [C, P, A] from AS C, where A is a forged origin, AS P is A's provider in ASPA, and AS C is B's customer.  AS P did not deploy ASPA.  How would AS B detect this hijack of A by C?



 Z

/ \

B   P

|   |

C   A





> 3.  Consider an ASPA island (i.e., a connected set of ASPA capable

                      ASes).  Let AS A and AS B be any two ASes in the ASPA island.

                      Consider a route propagated from AS A in any direction (i.e., to

                      a neighbor AS with any of the BGP roles described in Section 2)

                      and leaked by an offending AS in the AS path before being

                      received at AS B from any direction.  The ASPA-based path

                      verification at AS B always detects such a route leak though it

                       may not be able to identify the AS that originated the leak.



Does it mean that the BGP advertisement is only forwarded within the "island"?  If so, AS B should be able to identify the AS that leaked the route, no?

But if forwarding is allowed outside of the island, AS B will not always be able to detect a route leaked outside of the island. In the diagram below, AS A originates a route to its Provider AS P (outside of the island), which forwards it to its other customer AS L, which leaks it to its other provider AS C, which is a provider for AS B (in the island). Since there are no ASPA Objects for ASes P, L, and C, AS B cannot tell whether AS L is a common customer or a common provider for ASes P and C.

 P  C

/\ / /

A  L /

\  / <- [C,L,P,A]

  B



Many thanks,



  *   Igor