Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)

Yangyang Wang <wangyy@cernet.edu.cn> Sat, 01 April 2023 07:07 UTC

Return-Path: <wangyy@cernet.edu.cn>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B09A2C14CF1F for <sidrops@ietfa.amsl.com>; Sat, 1 Apr 2023 00:07:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.596
X-Spam-Level:
X-Spam-Status: No, score=-2.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ih0ngAEtft_2 for <sidrops@ietfa.amsl.com>; Sat, 1 Apr 2023 00:07:35 -0700 (PDT)
Received: from azure-sdnproxy.icoremail.net (azure-sdnproxy.icoremail.net [20.232.28.96]) by ietfa.amsl.com (Postfix) with ESMTP id 59BE7C14F749 for <sidrops@ietf.org>; Sat, 1 Apr 2023 00:07:33 -0700 (PDT)
Received: from LAPTOPL2PP3VPI (unknown [123.112.65.188]) by web4 (Coremail) with SMTP id ywQGZQC3vWfW1ydkHYUBEQ--.25782S2; Sat, 01 Apr 2023 15:05:58 +0800 (CST)
From: Yangyang Wang <wangyy@cernet.edu.cn>
To: "'Lubashev, Igor'" <ilubashe=40akamai.com@dmarc.ietf.org>, 'SIDR Operations WG' <sidrops@ietf.org>, "'Sriram, Kotikalapudi (Fed)'" <kotikalapudi.sriram@nist.gov>
References: <3d9e252c02a342f09c93269779d91328@akamai.com>
In-Reply-To: <3d9e252c02a342f09c93269779d91328@akamai.com>
Date: Sat, 01 Apr 2023 15:05:59 +0800
Message-ID: <007901d96468$69e768d0$3db63a70$@cernet.edu.cn>
MIME-Version: 1.0
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQI/+lYOptSDS/OiOUAPd2BkEmiE+64+f++w
Content-Language: zh-cn
X-CM-TRANSID: ywQGZQC3vWfW1ydkHYUBEQ--.25782S2
X-Coremail-Antispam: 1UD129KBjvJXoWxAF47Zr4UXw45Jw15XFWDArb_yoWrtFWUpF yFqrsakw1kJr4ft3srA3W0qa45ur4rJrW3AF9xJr18ArZ8Gry2qr4kK3WYqasrJrsxZa4j vry09398Crs8AFJanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUyab7Iv0xC_KF4lb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I2 0VC2zVCF04k26cxKx2IYs7xG6rWj6s0DM7CIcVAFz4kK6r1j6r18M28lY4IEw2IIxxk0rw A2F7IY1VAKz4vEj48ve4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Jr0_JF4l84ACjcxK6xII jxv20xvEc7CjxVAFwI0_Jr0_Gr1l84ACjcxK6I8E87Iv67AKxVWxJVW8Jr1l84ACjcxK6I 8E87Iv6xkF7I0E14v26r4UJVWxJr1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqx4xG64xv F2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jr0_Jr4lYx0Ex4A2jsIE14v26r1j6r 4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwIxGrwCF04k20xvY0x0EwIxGrwCF x2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E7480Y4vE14 v26r106r1rMI8E67AF67kF1VAFwI0_Jrv_JF1lIxkGc2Ij64vIr41lIxAIcVC0I7IYx2IY 67AKxVWUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Jr0_Gr1lIxAIcVCF04k26cxKx2 IYs7xG6r1j6r1xMIIF0xvEx4A2jsIE14v26r1j6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI0_ Jr0_GrUvcSsGvfC2KfnxnUUI43ZEXa7IU8P5r7UUUUU==
X-CM-SenderInfo: 5zdqw5n16fv2xqhwhvlgxou0/
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/epkm1QMAVA_ER-d3z4I5oTq4wjw>
Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Apr 2023 07:07:39 -0000

Hi, 

> The alternative attack is possible if the hijacker's own provider does not
> register with ASPA (and does not perform ASV).  The hijacker can set
> AS_PATH to (ASX, AS1), where AS1 is one of the ASNs in ROA for P. That
> announcement will reliably hijack traffic from other customer of the
> hijacker's provider, since it would effectively simulate ASX as a provider
for
> ASX's own provider and as a lateral peer of AS1.

Yes, this AS_PATH will be checked as "Unknown" at other customers of the
hijacker's provider, although AS1 registers its ASPA. 
But, if the hijacker's provider (which does not register with ASPA) does
perform ASV, it can check AS_PATH (ASX, AS1)  as "Invalid" and detect this
hijacking.  This implies that an ASPATH attack may be detectable or
undetectable at different vantage points before all ASes register ASPA. So,
it is better to recommend the provider ASes at higher tiers to perform
ASPATH validation with ASPAs, which can prevent the further propagation of
forged-origin prefix hijacks before they become undetectable.

Best, 
Yangyang


> -----Original Message-----
> From: sidrops-bounces@ietf.org [mailto:sidrops-bounces@ietf.org] On
> Behalf Of Lubashev, Igor
> Sent: 2023年3月25日 8:08
> To: SIDR Operations WG <sidrops@ietf.org>; Sriram, Kotikalapudi (Fed)
> <kotikalapudi.sriram@nist.gov>
> Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS
> 03/22/2023 (Mar 22 2023)
> 
> Hi all,
> 
> I have two comments after reading the draft.
> 
> Comment 1.
> 
> ASPA Profile draft (3. ASPA eContent) says: "all Provider ASes MUST be
> registered in a single ASPA object".
> ASPA Verification draft (4. ASPA Registration Recommendations) says: "An
AS
> SHOULD NOT have more than one ASPA".
> 
> Since the two drafts are both in the WGLC, it is best if they adopt the
same
> recommendation and choose a MUST or SHOULD here.  My view is that a
> SHOULD is more appropriate, since the Verification draft already specifies
> taking the union of ASPA registrations, so multiple registrations could
work,
> albeit in a more fragile way (hence a SHOULD). But agreeing on
> SHOULD/MUST seems more important than which one is picked.
> 
> 
> Comment 2.
> 
> I think the document would benefit from more discussion of security
benefits
> during partial ASPA deployment (which is expected to be the case for many
> years to come).
> Sections 8 and 12's optimism about being able to detect malicious hijacks
> from customers is premature during partial ASPA deployment.
> 
> Let's says Hijacker AS X (your customer) wants to hijack prefix P.  If
there is no
> ROA for P, hijacker can just originate P from X.
> Otherwise, the hijacker will perform a breadth-first search in ASPA to
identify
> the shortest valid AP_PATH suffix that ends with a provider AS that did
not
> register an ASPA and use that suffix for the hijack.
> 
> Detailed procedure:
> Step 1. Let APS(n) be a AP_PATH Set (contain AS_PATHs of length n).
> Step 2. For each AS (ASi) authorized to originate P in ROA, inset
single-AS
> AS_PATH (ASi) into APS(1) Step 3. Initialize LastAPS = 1 Step 4. For each
> AS_PATH ("APi") in APS(LastAPS):
> Step 4.1.     Let "ASi" be left-most AS is in APi.
> Step 4.2.     If ASi does NOT have an ASPA registration, announce P with
> AS_PATH constructed by appending X to APi. Done.
> Step 4.3.     For each AS ("ASj") listed as a provider for ASi in ASPA,
construct
> AS_PATH by appending ASj to APi and insert it into APS(LastAPS+1)
> Step 5. Increment LastAPS by 1 and go to step 4.
> 
> If the hijacker is able to find a sufficiently short AS_PATH suffix that
ends with
> a provider AS without an ASPA registration, the hijack is likely to
succeed.
> 
> This attack allows anyone to hijack prefixes belong to ASes whose
providers
> (transitively) did not register with ASPA.  This attack makes it important
for
> providers who wish to make it more difficult to hijack their customers'
> prefixes to register with ASPA (and to request their own providers to do
the
> same).  This is a great incentive for ASPA adoption, since the pressure
would
> be coming from the customers.
> 
> 
> The alternative attack is possible if the hijacker's own provider does not
> register with ASPA (and does not perform ASV).  The hijacker can set
> AS_PATH to (ASX, AS1), where AS1 is one of the ASNs in ROA for P. That
> announcement will reliably hijack traffic from other customer of the
> hijacker's provider, since it would effectively simulate ASX as a provider
for
> ASX's own provider and as a lateral peer of AS1.
> 
> Best,
> 
> - Igor
> 
> _______________________________________________
> Sidrops mailing list
> Sidrops@ietf.org
> https://www.ietf.org/mailman/listinfo/sidrops