Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)

Claudio Jeker <cjeker@diehard.n-r-g.com> Fri, 31 March 2023 09:59 UTC

Return-Path: <cjeker@diehard.n-r-g.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F7E2C15152D for <sidrops@ietfa.amsl.com>; Fri, 31 Mar 2023 02:59:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.192
X-Spam-Level:
X-Spam-Status: No, score=-4.192 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Je7RyvMDhQIG for <sidrops@ietfa.amsl.com>; Fri, 31 Mar 2023 02:59:45 -0700 (PDT)
Received: from diehard.n-r-g.com (diehard.n-r-g.com [62.48.3.9]) (using TLSv1.3 with cipher TLS_CHACHA20_POLY1305_SHA256 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA512) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07D3FC14CF1A for <sidrops@ietf.org>; Fri, 31 Mar 2023 02:59:44 -0700 (PDT)
Received: (qmail 85100 invoked by uid 1000); 31 Mar 2023 09:53:00 -0000
Date: Fri, 31 Mar 2023 11:53:00 +0200
From: Claudio Jeker <cjeker@diehard.n-r-g.com>
To: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram=40nist.gov@dmarc.ietf.org>
Cc: "ilubashe@akamai.com" <ilubashe@akamai.com>, "tim@nlnetlabs.nl" <tim@nlnetlabs.nl>, Amir Herzberg <amir.herzberg@gmail.com>, 'gengnan' <gengnan@huawei.com>, Martin Hoffmann <martin@nlnetlabs.nl>, Amreesh Phokeer <amreesh.phokeer@gmail.com>, Aftab Siddiqui <Siddiqui@isoc.org>, Yangyang Wang <wangyy@cernet.edu.cn>, "sidrops@ietf.org" <sidrops@ietf.org>, "sidrops-chairs@ietf.org" <sidrops-chairs@ietf.org>, "draft-ietf-sidrops-aspa-verification@ietf.org" <draft-ietf-sidrops-aspa-verification@ietf.org>, "draft-ietf-sidrops-aspa-profile@ietf.org" <draft-ietf-sidrops-aspa-profile@ietf.org>
Message-ID: <ZCatfCuHCwwHgSOq@diehard.n-r-g.com>
References: <31FDE1E9-3E87-4011-B65B-C6B3A264303F@vigilsec.com> <SA1PR09MB81427B4A1B126A5D1C1E289C84CF9@SA1PR09MB8142.namprd09.prod.outlook.com> <SA1PR09MB8142E41F2D6B537BCAA758F384CC9@SA1PR09MB8142.namprd09.prod.outlook.com> <CAL9jLaYz3OhcwBBcVMqnUseBR9J1ZyktcJo5YLeefQHMoYJu+A@mail.gmail.com> <CAL9jLaZ7eDc+zbhapS8dTYQKnTfgLd=MOPYw97-qcJ4eP6S6Mg@mail.gmail.com> <CAL9jLaYJ4ODfumG9Yk3-yv=_TaTSUeD++U4sGy7S-0xWcGBQPw@mail.gmail.com> <ZBGqSVL9sSqnAiJc@diehard.n-r-g.com> <SA1PR09MB8142E9F71F250B83062C724884869@SA1PR09MB8142.namprd09.prod.outlook.com> <ZCGcYHJ9PyrjgR+V@diehard.n-r-g.com> <SA1PR09MB8142EA7F33880679E9B509D384889@SA1PR09MB8142.namprd09.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <SA1PR09MB8142EA7F33880679E9B509D384889@SA1PR09MB8142.namprd09.prod.outlook.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/vMM2qP-5sAXPfCT4ZZpjKAxujJM>
X-Mailman-Approved-At: Fri, 31 Mar 2023 13:37:10 -0700
Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Mar 2023 09:59:49 -0000

On Tue, Mar 28, 2023 at 04:41:57AM +0000, Sriram, Kotikalapudi (Fed) wrote:
> All: I just uploaded a revised draft version -13. All comments received in this thread have been carefully considered and changes incorporated as necessary.
> Version-13 Draft: https://datatracker.ietf.org/doc/draft-ietf-sidrops-aspa-verification/ 
> Diff: https://author-tools.ietf.org/iddiff?url1=draft-ietf-sidrops-aspa-verification-12&url2=draft-ietf-sidrops-aspa-verification-13&difftype=--html 
> 
> Hi Claudio: I went with many of your suggestions below and earlier. It
> is easy enough to assume a single VAP-SPAS table even in the description
> in this doc. You should like what I did in the revised Sections 3, 4,
> and 5. 
> 
> Igor: I addressed your discomfort with the earlier rosier description of
> the merits of ASPA verification in Section 8. I now systematically
> describe the key properties (mitigation capabilities) in Sec. 8 and the
> limitations are stated in Section 12. Hopefully, you'll find it accurate
> and more insightful.
> 
> Tim, Job, Martin, and others: Your comments/discussions relating to
> Sections 3 and 4 carefully considered and folded in.
> 
> Amir, Nan:  The changes promised are included.
> 
> Amreesh, Aftab, Yangyang: Please review the diff. You should find your
> comments addressed as well.
> 
> Please let me know if missed anything important. 
> 
> Thanks to all who have kindly devoted time to reading and giving feedback. 
 
Hi Sriram,

I had a look at draft-ietf-sidrops-aspa-verification-13 changes.

First of all I think large parts of Section 3 and 4 should also be added
to the aspa-profile specification. An RP / RTR implementer may only glance
at draft-ietf-sidrops-aspa-verification-13 and miss these bits.

I think Section 4 is quite good. It ensures that a CAS always includes
something for both AFI. I wonder if instead of talking about fixing
ASPA(s) the text could be altered to work on the VAP-SPAS. So it is clear
that this fixup should happen in the BGP instance when compiling the
VAP-SPAS tables. I suggest that since the ASPA SHALL NOT not be rejected
and since VAP-SPAS need to build the union of all all ASPA objects it is
the right place to ensure this.

In my opionion the introduction of "Provider+" in Section 5 is not
helpful. Also the whole additoin about possible roles is just confusing
and not helpful. The Hop-Check Function is role independent it only looks
at the SPAS set. So talking about roles is unnecessary there. If people
put wrong things in their ASPA object they do get what they want.
If people think that "Provider" is an overloaded term then maybe some
other alternative could be used:
   "Provider+" -> InSPAS or match
   "Not Provider+" -> notInSPAS or missmatch
   "No Attestation" -> keep term, noCAS or notFound

At least extend the RS to non-transparent RS in:
   A provider AS ID included in the SPAS can correspond to a Provider, RS, or
   Sibling.  An RS is effectively a Provider to its RS-client.

Since the AS IDs of transparent RSs are not supposed to be in SPAS.

I have no big opionion about Section 8 and 12 changes. My big conclusion
from those sections is mainly that CAS should minimize the SPAS they
announce (and a reason why I insist that non-transparent RS are not put
into SPAS).

-- 
:wq Claudio