Re: [Sidrops] adopt draft-ymbk-sidrops-rpki-has-no-identity please

George Michaelson <ggm@algebras.org> Wed, 24 March 2021 23:16 UTC

Return-Path: <ggm@algebras.org>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BD673A1137 for <sidrops@ietfa.amsl.com>; Wed, 24 Mar 2021 16:16:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=algebras-org.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rWI3vluArtyV for <sidrops@ietfa.amsl.com>; Wed, 24 Mar 2021 16:16:16 -0700 (PDT)
Received: from mail-lj1-x22e.google.com (mail-lj1-x22e.google.com [IPv6:2a00:1450:4864:20::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79F8A3A1138 for <sidrops@ietf.org>; Wed, 24 Mar 2021 16:16:16 -0700 (PDT)
Received: by mail-lj1-x22e.google.com with SMTP id s17so747971ljc.5 for <sidrops@ietf.org>; Wed, 24 Mar 2021 16:16:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=algebras-org.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=jrgvuZiT5wo0vNnH8E7FzAzpuIyDwo0UHAtwVLkEE2Y=; b=NYaabs/9wC1j4Pg2z6Dhqh2iU7u6opS5Po527eloDF1umsL0C6l5MAYC7vjtTAI/VP Qf2ijjhyNzcnrzYxxDbUfprPGwyQMgBi4jKsmy0KQ+KBJNcMvTUYZxZi9RHwcGZX5NnX rMZiGDTRWB8qaAzLZDMhFRXrlUx1avgIKNEnsc/6R9V2sug5PDMMgCO35Z1GD+ZZvtMN mRIbp4jsCSvup9zl9cL+tCHJk2wsdXoptm8s1AipjmqruPpEfUDa+fydJL9P+GJg+hBa AISes5frBHS1tPTiKNulPOyTQ8Gema3gg0rU+Srw8m+c6nF6oWhZHXrz2ncVBnueOVnl D+xA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=jrgvuZiT5wo0vNnH8E7FzAzpuIyDwo0UHAtwVLkEE2Y=; b=ohODa2vcdn9sl6Le4yFfNwf3ZL/j7gNT+9siYV8t0FoQ+4VVlZcjkoajYBFhbYyzNy KIKdz8BsoxSzWl2mxYOdagr+F6AL5gDIMkqTaR9wmmfP00p1nVH1QQbas+K9dOkOA7x+ H+Pv5v9Y/msYAFEMfoNQVr6+3YOdxyYVNI+8Wrl1vmwsQv5dQUc03bUFPIDFmeWRNAG3 471fseFilKOMzwtmN+WqW6jCyEQbnxfFlt8XEmGFyGenVTuNV1rnUCeL/blNtqs7r5p8 zSzzK4eea0WCWi4mIqfZlXEHuEDvlMOlT8QWPpRSC8sAw1DHpERnhorTlir0pipUHWKy fjgg==
X-Gm-Message-State: AOAM530oVqnpY/pThFYjnkFk3G8hT1LUdfqw6hy9dYPmzgrOtfLfPZWU 1LcvowWlkZnE6wtxfKl6ujbH5mn4KWdnvyFNLC9+KA==
X-Google-Smtp-Source: ABdhPJwH3R1YC7ZOwc5XfrNkr5tIwxmL9+sXLslqG9RW+IkLwqNYcpcYBvH1uKPnllF9c1lHtWNtWkkeNdTHz7OIyJo=
X-Received: by 2002:a2e:974d:: with SMTP id f13mr3554370ljj.210.1616627772875; Wed, 24 Mar 2021 16:16:12 -0700 (PDT)
MIME-Version: 1.0
References: <m2ft0sgwfy.wl-randy@psg.com> <alpine.DEB.2.20.2103231615441.21528@uplift.swm.pp.se> <m2pmzpz41r.wl-randy@psg.com> <CAKr6gn2BWm0ZwuqwLc=g7FXgqbt0eqJ3tWJW7BzP=vEn6qCEcA@mail.gmail.com> <m2mtutz3s4.wl-randy@psg.com> <CAKr6gn2YM+5+3BMPUPM0O-C_VP5dprQyOyXkxvAKDhP7tfDbyQ@mail.gmail.com> <m2im5hz2qt.wl-randy@psg.com> <CAKr6gn3m6aBV_PkZQQfnEg2R5M92kfJhvGfAiu-3XW++bdR=1A@mail.gmail.com> <m2ft0lz0h3.wl-randy@psg.com> <alpine.DEB.2.20.2103240715470.21528@uplift.swm.pp.se> <m27dlwzaiz.wl-randy@psg.com>
In-Reply-To: <m27dlwzaiz.wl-randy@psg.com>
From: George Michaelson <ggm@algebras.org>
Date: Thu, 25 Mar 2021 09:16:01 +1000
Message-ID: <CAKr6gn2Vr-n=Nh=4ivukLWmHzM52iUWt2F=05tXcSs+M_vXYwQ@mail.gmail.com>
To: Randy Bush <randy@psg.com>
Cc: Mikael Abrahamsson <swmike@swm.pp.se>, SIDR Operations WG <sidrops@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/ch7kRaSaRJgUIObGfnHH6YcFE3o>
Subject: Re: [Sidrops] adopt draft-ymbk-sidrops-rpki-has-no-identity please
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Mar 2021 23:16:22 -0000

You posed a MITM attack. You instantiated it as a bank account fraud.
I tried to decompose your koan to identify the parties, and I draw the
conclusion that the risk of fraud exists irrespective of the nature of
the signed object, can be trivially instantiated from abuse of things
signed, and demands the receiver and sender be naive respecting MITM
risk, and draw false conclusions from the provable INR part of the
signing.

It is likely a ROA only harms the creator if abused. There is a risk
an RTA or RSC signed statement harms the receiver or some third party.
If the transaction is like BYOip, and the receiver defines the form of
data to be signed and some suitable nonce or hash to be over-signed, I
think its starting to look safer.

I believe we all agree the RPKI does not prove identity. I would say
that use of RTA and RSC, is to bridge signed provable assertions about
INR, to some other space. What that space is, and how it is proved,
lies between the receiver and the sender (of that bridged, signed
assertion). If the assertion is badly drawn up, and the receiver draws
unjustified conclusions, especially from the proofs over the INR into
some other domain, They're SOL.

Ideally defining new signed object types would be easy. I don't think
it is, the initial proposing is fine, its closure to a registry in
process which takes forever. RTA and RSC also help bootstrap ideas
which probably emerge as specific ASN1 defined objects with structure
fit for purpose. There is an argument to be made that the hard test of
what should be in the ASN1 and what it means is the necessary cost to
avoiding risk like the MITM threat.

cheers

-G


On Thu, Mar 25, 2021 at 4:12 AM Randy Bush <randy@psg.com> wrote:
>
> >>    When a document is signed with the private key associated with a
> >>    RPKI certificate, the signer is speaking for the INRs, the IP
> >>    address space and Autonomous System (AS) numbers, in the
> >>    certificate.  This is not an identity; this is an authorization.
> >
> > Agreed.
>
> cool
>
> > Are you opposing the use of RPKI for signing LOAs, because I don't see
> > the document affecting the use of RPKI for RSC for signing LOAs.
>
> all depends on what is being Authorized by by the loA, doesn't it?
>
> i certainly seems reasonable to use an inr for 1.2.3.0/24 to sign loa
> for maria to originate that prefix.
>
> it does not seem reasonable to use an inr for 1.2.3.0/24 to sign loa for
> maria to withdraw funds from bill's bait and sushi's bank account.
>
> > The document says it doesn't prove identity. Correct. We all seem to
> > agree on that.
>
> that is not clear to me.  among other things, ggm's walls of text
> confuse me.  but i am easily confused.
>
> randy