Re: [Sidrops] [routing-wg] misconceptions about ROV
Tim Bruijnzeels <tim@nlnetlabs.nl> Wed, 23 February 2022 13:43 UTC
Return-Path: <tim@nlnetlabs.nl>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 6BC243A0D7D
for <sidrops@ietfa.amsl.com>; Wed, 23 Feb 2022 05:43:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001,
UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001]
autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=nlnetlabs.nl
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id Qzo4Uggk_bBL for <sidrops@ietfa.amsl.com>;
Wed, 23 Feb 2022 05:43:16 -0800 (PST)
Received: from outbound.soverin.net (outbound.soverin.net [116.202.126.228])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 6B5FA3A0D7C
for <sidrops@ietf.org>; Wed, 23 Feb 2022 05:43:15 -0800 (PST)
Received: from smtp.soverin.net (unknown [10.10.3.11])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
(No client certificate requested)
by outbound.soverin.net (Postfix) with ESMTPS id C1B3B4D8;
Wed, 23 Feb 2022 13:43:10 +0000 (UTC)
Received: from smtp.soverin.net (smtp.soverin.net []) by soverin.net
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nlnetlabs.nl;
s=soverin; t=1645623789;
bh=kyiKeo3OQfm6bZdBea1bzbcvZExGpDI+RQTq/bOixbM=;
h=Subject:From:In-Reply-To:Date:Cc:References:To:From;
b=bPa/sroPbuVNTFvcXMeywIuAq0rZCUH4DoeSEcv671DAZvdYSghv0xiL1UQ1XtUXv
vzblyZgVVDSBp6bFiex0bfpyd1eGMuAoCL0FiMP1YkZe7LHV+SG71AZJCBIyk+KkJT
awC5g2+Zb1DN/EXuh4R1AYi7iHsTap7SaGb4fKCcWjpB/4FdWuu8G2iR7bob9JuNV3
iav8keIuXiFLwPz9bBy31M+2H5Q8LipZT7TVN1RhbP80HYYHdBUleDUnYV1MH23eJ5
ES8Gbi/iWL/sjTsJ+LqyfQuQyGdP8+OFQlq0+OrySFwDxjnEGQffle4PF4UudOKnSr
41BzJ4RHHLMhQ==
Content-Type: text/plain;
charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.40.0.1.81\))
From: Tim Bruijnzeels <tim@nlnetlabs.nl>
In-Reply-To: <85D947F4-E2A4-4FFE-86AF-2D129C49FB9C@psg.com>
Date: Wed, 23 Feb 2022 14:43:04 +0100
Cc: SIDR Operations WG <sidrops@ietf.org>,
Geoff Huston <gih@apnic.net>
Content-Transfer-Encoding: 7bit
Message-Id: <8413F0CA-F50A-42B7-B0DA-19A0A90ABE6F@nlnetlabs.nl>
References: <m2h78roqbp.wl-randy@psg.com>
<7FBC2063-2404-4BF9-836E-210629C4BA63@juicybun.cn>
<m28ru3ofyq.wl-randy@psg.com>
<3C18BA8C-FA34-4D24-96E4-F85644089513@nlnetlabs.nl>
<015C9C28-4230-40D8-A9F2-7420B726C00F@juicybun.cn>
<DF148DA2-C94D-42BF-A37F-668D9B37860B@nlnetlabs.nl> <YhS/WR3czIP3jNLF@snel>
<ABE3FA29-6C9D-492B-A72A-68C20176E76D@nlnetlabs.nl>
<949277FD-27AF-40E8-B557-AA58C62BFEA7@apnic.net>
<E16290C1-77ED-4CB1-8712-F6163304ED45@nlnetlabs.nl>
<m2k0dmmntj.wl-randy@psg.com>
<6D314C7A-8CEC-4B9B-8F80-6B1AC48037E2@nlnetlabs.nl>
<85D947F4-E2A4-4FFE-86AF-2D129C49FB9C@psg.com>
To: Randy Bush <randy@psg.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/em-xHsVF5brSFp69eHX7ebSKXEE>
Subject: Re: [Sidrops] [routing-wg] misconceptions about ROV
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>,
<mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>,
<mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Feb 2022 13:43:23 -0000
> On 23 Feb 2022, at 13:27, Randy Bush <randy@psg.com> wrote: > >> Am I correct though that if BGPSec *Path* validation were to be >> applied to unsigned paths they would be considered 'Not Valid'? > > no. not validatable, if you wish. not valid is a result of > validating the signature chain. as one can not do that with > a non-bgpsec path, it can be neither valid or not valid. > >> And isn't this what the downgrade issue (for which I cannot >> find a ref now) is about? Rather than violating signatures, the >> signatures can just be stripped. > > the downgrade attack is a router accepting a bgpsec path and > producing a bgp4 path toward the 'victim'. in a more likely > operational scenario, the router simply refuses bgpsec from its > incoming peer, so that peer sends it bgp4 which it then sends on > to the 'victim'. though that make a louder signal of the attack. > >> Meaning that even if you would call such a path 'not signed', >> rather than 'not valid' accepting those paths would mean that >> 'not valid' can be easily avoided by adversaries. > > yes > >> Hence, I believe, the idea to only accept BGPSec *path* 'Valid' >> on BGPSec "islands". > > no. routers on those islands still need to reach non-bgpsec > destinations and even bgpsec speaking destinations on other > islands. this means they must also accept unsigned paths. Yes, of course. What I meant here by "accept... on islands" is that the operator would have to know - somehow - where to enable BGPSec validation. I believe that the idea was that this would be done on a BGP session basis. E.g. providers would insist on BGPSec from customers, or peers between each other etc. > >> Is there a way that these "islands" can be recognised >> automatically, and cross transit (i.e. include unknown >> parties)? > > you could tunnel between islands; but that is operationally > unlikely. i remember uucp :) > > and you can not take an unsigned path and start signing. to what > are you attesting? That is not what I was trying to suggest. I wondered if (new) signed statements in the RPKI could be used to conclude that ASNs have pledged to use BGP Sec when possible. I.e. such ASNs would sign a path if they are the origin / or if the receive a signed path. The receiving router could then conclude that IFF all ASNs in a path had made these signed statements - BGPSec validation on *that* path could be performed. It would be an error if signatures were missing or invalid. This way operators would not have to enable this manually on a per session basis, and because it would be based on signed validated statements they could trust that it would be safe to apply for ASNs who issued those statements - without the need to know these ASNs first hand - e.g. across transit. It would still allow for path spoofing and signature removal by injecting an ASN that did not sign a statement that they would do BGPSec. However, the options would become more limited as more ASNs participate - and ASPA validation would further limit the available choices. As for how an ASN could sign such a statement.. one could overload existing router certificates but I think that is probably a bad idea - it could very well lead to timing issues when adopting. An alternative could be to have a new separate signed object for this, which would allow that BGPSec is tested first, before letting the world know. Just an idea.. hoping it might help. Tim > > randy
- [Sidrops] Fwd: [routing-wg] misconceptions about … Randy Bush
- Re: [Sidrops] [routing-wg] misconceptions about R… Di Ma
- Re: [Sidrops] [routing-wg] misconceptions about R… Randy Bush
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Di Ma
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Geoff Huston
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Randy Bush
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Randy Bush
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Jeroen Massar
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Jeroen Massar
- Re: [Sidrops] [routing-wg] misconceptions about R… Tim Bruijnzeels
- Re: [Sidrops] [routing-wg] misconceptions about R… Jeroen Massar
- Re: [Sidrops] [routing-wg] misconceptions about R… Montgomery, Douglas C. (Fed)
- Re: [Sidrops] [routing-wg] misconceptions about R… Job Snijders