Re: [Sidrops] [routing-wg] misconceptions about ROV

Tim Bruijnzeels <tim@nlnetlabs.nl> Wed, 23 February 2022 13:43 UTC

Return-Path: <tim@nlnetlabs.nl>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BC243A0D7D for <sidrops@ietfa.amsl.com>; Wed, 23 Feb 2022 05:43:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nlnetlabs.nl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qzo4Uggk_bBL for <sidrops@ietfa.amsl.com>; Wed, 23 Feb 2022 05:43:16 -0800 (PST)
Received: from outbound.soverin.net (outbound.soverin.net [116.202.126.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B5FA3A0D7C for <sidrops@ietf.org>; Wed, 23 Feb 2022 05:43:15 -0800 (PST)
Received: from smtp.soverin.net (unknown [10.10.3.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by outbound.soverin.net (Postfix) with ESMTPS id C1B3B4D8; Wed, 23 Feb 2022 13:43:10 +0000 (UTC)
Received: from smtp.soverin.net (smtp.soverin.net []) by soverin.net
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nlnetlabs.nl; s=soverin; t=1645623789; bh=kyiKeo3OQfm6bZdBea1bzbcvZExGpDI+RQTq/bOixbM=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=bPa/sroPbuVNTFvcXMeywIuAq0rZCUH4DoeSEcv671DAZvdYSghv0xiL1UQ1XtUXv vzblyZgVVDSBp6bFiex0bfpyd1eGMuAoCL0FiMP1YkZe7LHV+SG71AZJCBIyk+KkJT awC5g2+Zb1DN/EXuh4R1AYi7iHsTap7SaGb4fKCcWjpB/4FdWuu8G2iR7bob9JuNV3 iav8keIuXiFLwPz9bBy31M+2H5Q8LipZT7TVN1RhbP80HYYHdBUleDUnYV1MH23eJ5 ES8Gbi/iWL/sjTsJ+LqyfQuQyGdP8+OFQlq0+OrySFwDxjnEGQffle4PF4UudOKnSr 41BzJ4RHHLMhQ==
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.40.0.1.81\))
From: Tim Bruijnzeels <tim@nlnetlabs.nl>
In-Reply-To: <85D947F4-E2A4-4FFE-86AF-2D129C49FB9C@psg.com>
Date: Wed, 23 Feb 2022 14:43:04 +0100
Cc: SIDR Operations WG <sidrops@ietf.org>, Geoff Huston <gih@apnic.net>
Content-Transfer-Encoding: 7bit
Message-Id: <8413F0CA-F50A-42B7-B0DA-19A0A90ABE6F@nlnetlabs.nl>
References: <m2h78roqbp.wl-randy@psg.com> <7FBC2063-2404-4BF9-836E-210629C4BA63@juicybun.cn> <m28ru3ofyq.wl-randy@psg.com> <3C18BA8C-FA34-4D24-96E4-F85644089513@nlnetlabs.nl> <015C9C28-4230-40D8-A9F2-7420B726C00F@juicybun.cn> <DF148DA2-C94D-42BF-A37F-668D9B37860B@nlnetlabs.nl> <YhS/WR3czIP3jNLF@snel> <ABE3FA29-6C9D-492B-A72A-68C20176E76D@nlnetlabs.nl> <949277FD-27AF-40E8-B557-AA58C62BFEA7@apnic.net> <E16290C1-77ED-4CB1-8712-F6163304ED45@nlnetlabs.nl> <m2k0dmmntj.wl-randy@psg.com> <6D314C7A-8CEC-4B9B-8F80-6B1AC48037E2@nlnetlabs.nl> <85D947F4-E2A4-4FFE-86AF-2D129C49FB9C@psg.com>
To: Randy Bush <randy@psg.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/em-xHsVF5brSFp69eHX7ebSKXEE>
Subject: Re: [Sidrops] [routing-wg] misconceptions about ROV
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Feb 2022 13:43:23 -0000


> On 23 Feb 2022, at 13:27, Randy Bush <randy@psg.com> wrote:
> 
>> Am I correct though that if BGPSec *Path* validation were to be
>> applied to unsigned paths they would be considered 'Not Valid'?
> 
> no.  not validatable, if you wish.  not valid is a result of
> validating the signature chain.  as one can not do that with
> a non-bgpsec path, it can be neither valid or not valid.
> 
>> And isn't this what the downgrade issue (for which I cannot
>> find a ref now) is about? Rather than violating signatures, the
>> signatures can just be stripped.
> 
> the downgrade attack is a router accepting a bgpsec path and
> producing a bgp4 path toward the 'victim'.  in a more likely
> operational scenario, the router simply refuses bgpsec from its
> incoming peer, so that peer sends it bgp4 which it then sends on
> to the 'victim'.  though that make a louder signal of the attack.
> 
>> Meaning that even if you would call such a path 'not signed',
>> rather than 'not valid' accepting those paths would mean that
>> 'not valid' can be easily avoided by adversaries.
> 
> yes
> 
>> Hence, I believe, the idea to only accept BGPSec *path* 'Valid'
>> on BGPSec "islands".
> 
> no.  routers on those islands still need to reach non-bgpsec
> destinations and even bgpsec speaking destinations on other
> islands.  this means they must also accept unsigned paths.

Yes, of course.

What I meant here by "accept... on islands" is that the operator
would have to know - somehow - where to enable BGPSec validation.

I believe that the idea was that this would be done on a BGP
session basis. E.g. providers would insist on BGPSec from customers,
or peers between each other etc.

> 
>> Is there a way that these "islands" can be recognised
>> automatically, and cross transit (i.e. include unknown
>> parties)?
> 
> you could tunnel between islands; but that is operationally
> unlikely.  i remember uucp :)
> 
> and you can not take an unsigned path and start signing.  to what
> are you attesting?

That is not what I was trying to suggest.

I wondered if (new) signed statements in the RPKI could be used to
conclude that ASNs have pledged to use BGP Sec when possible. I.e.
such ASNs would sign a path if they are the origin / or if the receive
a signed path.

The receiving router could then conclude that IFF all ASNs in a path
had made these signed statements - BGPSec validation on *that* path
could be performed. It would be an error if signatures were missing
or invalid.

This way operators would not have to enable this manually on a per
session basis, and because it would be based on signed validated
statements they could trust that it would be safe to apply for ASNs who
issued those statements - without the need to know these ASNs first
hand - e.g. across transit.

It would still allow for path spoofing and signature removal by
injecting an ASN that did not sign a statement that they would
do BGPSec. However, the options would become more limited as more
ASNs participate - and ASPA validation would further limit the available
choices.

As for how an ASN could sign such a statement.. one could overload
existing router certificates but I think that is probably a bad
idea - it could very well lead to timing issues when adopting. An
alternative could be to have a new separate signed object for this,
which would allow that BGPSec is tested first, before letting the world
know.

Just an idea.. hoping it might help.

Tim






> 
> randy