Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)

gengnan <gengnan@huawei.com> Wed, 15 March 2023 03:28 UTC

Return-Path: <gengnan@huawei.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25C5BC1595FD; Tue, 14 Mar 2023 20:28:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.898
X-Spam-Level:
X-Spam-Status: No, score=-6.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MNrzplH7Plb6; Tue, 14 Mar 2023 20:28:13 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0D32C15153D; Tue, 14 Mar 2023 20:28:12 -0700 (PDT)
Received: from lhrpeml500005.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4PbwkX5tKCz6HJV2; Wed, 15 Mar 2023 11:25:08 +0800 (CST)
Received: from dggpemm100008.china.huawei.com (7.185.36.125) by lhrpeml500005.china.huawei.com (7.191.163.240) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.21; Wed, 15 Mar 2023 03:28:09 +0000
Received: from kwepemm600009.china.huawei.com (7.193.23.164) by dggpemm100008.china.huawei.com (7.185.36.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.21; Wed, 15 Mar 2023 11:28:07 +0800
Received: from kwepemm600009.china.huawei.com ([7.193.23.164]) by kwepemm600009.china.huawei.com ([7.193.23.164]) with mapi id 15.01.2507.021; Wed, 15 Mar 2023 11:28:06 +0800
From: gengnan <gengnan@huawei.com>
To: Yangyang Wang <wangyy=40cernet.edu.cn@dmarc.ietf.org>, "'Sriram, Kotikalapudi (Fed)'" <kotikalapudi.sriram=40nist.gov@dmarc.ietf.org>, "sidrops@ietf.org" <sidrops@ietf.org>
CC: 'Claudio Jeker' <cjeker@diehard.n-r-g.com>, "draft-ietf-sidrops-aspa-verification@ietf.org" <draft-ietf-sidrops-aspa-verification@ietf.org>, "draft-ietf-sidrops-aspa-profile@ietf.org" <draft-ietf-sidrops-aspa-profile@ietf.org>
Thread-Topic: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)
Thread-Index: AQHZUjNhutF18MK+tEe4yY9ZkcrfyAIVEPCGAoNvNUUAs8WgdwI69nhorYD6NuCBPfFjoA==
Date: Wed, 15 Mar 2023 03:28:06 +0000
Message-ID: <6ff04cb35ae8484ea91501e061235aff@huawei.com>
References: <SA1PR09MB814243FD29C35FBE4B21153884B49@SA1PR09MB8142.namprd09.prod.outlook.com> <SA1PR09MB8142A8E3804BE539A7A5790E84B49@SA1PR09MB8142.namprd09.prod.outlook.com> <SA1PR09MB814246CCEC40A9A5D157187784B49@SA1PR09MB8142.namprd09.prod.outlook.com> <000201d95233$43b62300$cb226900$@cernet.edu.cn> <SA1PR09MB81420BDF4A4A425A2A80DB8784B59@SA1PR09MB8142.namprd09.prod.outlook.com> <000001d95626$e3bf2080$ab3d6180$@cernet.edu.cn>
In-Reply-To: <000001d95626$e3bf2080$ab3d6180$@cernet.edu.cn>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.112.40.101]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/xi0LEsYkQflCwNGs_rSpoS4dSNM>
Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS 03/22/2023 (Mar 22 2023)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Mar 2023 03:28:14 -0000

Thank Sriram. The draft was given a major update and reads well. I also support advancing the draft.

IMO, although the problem shown in Figure 3 is unlikely to occur, it does possibly occur (inadvertently or intentionally). It would be better if the problem can be fixed. Another problem is how ASPA can work better when the registration data is scarce. I'm just throwing my thoughts out for discussion. I think they do not need to be resolved in this draft even they really matter. 

I am also waiting for more operational feedbacks about ASPA. 

Nit-picking:
1. The title of Figure 1 : Hop Check Function --> Hop-check function
2. "not Provider" --> "Not Provider"; "no Attestation" --> "No Attestation"
3. Sec. 12, "{{AS(5), AS(3) ..." and "{{AS(5), AS(1)...", where "{{" -->"{"


Best,
Nan

> -----Original Message-----
> From: Sidrops <sidrops-bounces@ietf.org> On Behalf Of Yangyang Wang
> Sent: Tuesday, March 14, 2023 11:42 AM
> To: 'Sriram, Kotikalapudi (Fed)'
> <kotikalapudi.sriram=40nist.gov@dmarc.ietf.org>; sidrops@ietf.org
> Cc: 'Claudio Jeker' <cjeker@diehard.n-r-g.com>;
> draft-ietf-sidrops-aspa-verification@ietf.org;
> draft-ietf-sidrops-aspa-profile@ietf.org
> Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification - ENDS
> 03/22/2023 (Mar 22 2023)
> 
> Hi Sriram and Claudio,
> 
> Thank you for your responses. They are make sense for me and I support
> advancing the draft.
> 
> (I repost my reply here:) I understand that the ASPA solution is cautious.
> In the process of incremental deployment of ASPA,  some ASes have not yet
> provided authorization data. In some cases, a path of being route leak may be
> validated as "unknown" (i.e., false negative) due to lack of information.
> But it does not lead to false positives (i.e., valley-free paths are checked as
> "invalid").
> 
> If the provider shortened the length by creating a forged link ( shown in
> Section 12), this cheating can only attract the traffic from customer, and can
> be detected using upstream algorithm at the providers and literal peers of the
> provider. It implies that the affected area of this cheating can be limited if
> many ASes register ASPA.
> 
> The ASPA can cover most routing policy on the Internet. And, I just note that
> the scenario in
> https://datatracker.ietf.org/doc/draft-shen-sidrops-regionalized-as-relation
> ships/ is a problem. A few ASes may have hybrid relationship, which is not
> able to be expressed in ASPA. If two ASes, 1 and 2, have customer-provider
> link at location A and peer-peer link at location B, It seems that SPAS of AS 1
> will include AS 2 (at location 1), but also should not include AS2 (at location 2).
> This might make the operator of AS A confused about how to register ASPA.
> 
> Best regards,
> Yangyang
> 2023-03-14
> 
> 
> > -----Original Message-----
> > From: sidrops-bounces@ietf.org [mailto:sidrops-bounces@ietf.org] On
> > Behalf Of Sriram, Kotikalapudi (Fed)
> > Sent: 2023年3月9日 11:58
> > To: Yangyang Wang <wangyy@cernet.edu.cn>; sidrops@ietf.org
> > Cc: Claudio Jeker <cjeker@diehard.n-r-g.com>; draft-ietf-sidrops-aspa-
> > verification@ietf.org; draft-ietf-sidrops-aspa-profile@ietf.org
> > Subject: Re: [Sidrops] WGLC = draft-ietf-sidrops-aspa-verification -
> > ENDS
> > 03/22/2023 (Mar 22 2023)
> >
> > Hi Yangyang,
> >
> > Thank you for the comments. My responses are inline below marked with
> > [KS:].
> >
> > My responses to #3 and #4 complement Claudio's (
> > https://mailarchive.ietf.org/arch/msg/sidrops/jTlhzDKCKv21WIUd-
> > Kv00Qtsmk8/ ).
> >
> > Sriram
> >
> > -----Original Message-----
> > From: Yangyang Wang <wangyy@cernet.edu.cn>
> >
> > Comments as follows.
> > 1. a few typos.
> > In section 3, "The definition of Provider AS in given in Section 1"
> -->"The
> > definition of Provider AS is given in Section 1"
> > Page 7, "If N = 1, then then the procedure" --> remove the extra "then"
> > Page 10, downstream path verification procedure, step 4 "lowest value
> > of v
> > (2 <= u <= N)" --> " lowest value of u (2 <= u <= N)"
> >
> > [KS:] Thanks. Will fix those.
> >
> > 2. This draft claims that "An AS SHOULD NOT have more than one ASPA".
> > If a Customer AS signs only one ASPA object including all its Provider
> ASes, it
> > needs to resign and update it when any one of the provider ASes changes.
> > It may affect the validation.
> >
> > [KS:] The AS operator would follow the principle of make before break.
> > Create a new ASPA first and then delete the old one. It is not a MUST NOT.
> So,
> > two ASPAs may exist for a short period. The ASPA profile draft authors
> (cc'ed
> > here) may include an operational guidance statement about this in that
> draft.
> >
> > 3. In the algorithm for downstream paths, it says that if 1 <= N <=2,
> > then
> the
> > AS_PATH is trivially Valid.
> > If N=2, assuming AS_PATH is (AS2, AS1), the path verification is just
> > hop- check hop(AS(1), AS(2)) and may be one of "Provider", "Not
> > Provider" and "no Attestation".
> > If it is "Provider", the AS_PATH is Valid.
> > If it is "Not Provider" or "no Attestation", I feel that the AS_PATH
> > is
> actually
> > unclear, which may be Valid, or forged link as the (AS(5), AS(2))
> > shown in Section 12.
> >
> > [KS:] The path is (AS2, AS1) and received by a validating AS (say AS3)
> that is
> > downstream (i.e., AS2 is a provider to AS3). Without even looking at
> > the
> ASPA,
> > this path is trivially Valid because no matter whether AS1 to AS2 is
> > C2P,
> P2C,
> > or p2p (lateral peers), there is no valley in the path and hence there
> > is
> no
> > route leak.
> >
> > [KS:] For the case of a forged-origin attack (with provider doing
> > mischief
> on a
> > customer) that you mention, I feel the draft discusses that security
> concern
> > adequately in Section 12. The strength of the ASPA method is in
> > detecting route leaks and a majority of (but not all) path
> > manipulation attacks. It cannot catch all path manipulations -- BGPsec would
> be needed for that.
> >
> > 4. It seems that the algorithms for path verification are not complete
> > to
> cover
> > all possible cases.
> >
> > For example, shown in the figure below:
> >
> > Receiving & validating AS 5 --  AS(4)
> > 				 \
> > 				   \
> >                                                           AS(3)
> AS(1)
> >
> \        /
> > 			 	      \     /
> >
> AS(2)
> > ASPAs: {AS(2), [AS(3), AS(1)]}
> >
> > AS5 is the Receiving & Validating AS. And, only AS(2) register an ASPA
> object
> > in RPKI.
> > It assumes that AS5 receives an AS_PATH [AS(4), AS(3), AS(2), AS(1)],
> > and there is a route leak from AS(3) to AS(1) by the customer AS(2)
> > hop(AS(1),
> > AS(2)) = "no attestation"
> > hop(AS(2), AS(3)) = "Provider"
> > hop(AS(3), AS(4)) = "no attestation"
> > According to the step 4 and 5 of the algorithm for upstream paths in
> section
> > 6.1,  there is not an i for which hop(AS(i-1), AS(i)) = "not Provider".
> This path
> > is invalid, but will be verified as "Unknown".
> >
> > Maybe I'm missing something or make a mistake.
> >
> > [KS:] To add what Claudio has said... please keep in mind that AS(1)
> > has
> no
> > ASPA and that means that a sibling relationship between AS1 and AS2 is
> still
> > possible. See the definition of sibling in Section 2 and the
> > corresponding ASPA registration requirement in Section 4. So, if AS1
> > and AS2 are
> siblings,
> > then the path would be Valid. If they are not siblings, the path would
> > be Invalid. So, given that AS1 does not have an ASPA, the algorithm
> > correctly gives "Unknown" result.
> >
> > Sriram
> >
> >
> > _______________________________________________
> > Sidrops mailing list
> > Sidrops@ietf.org
> > https://www.ietf.org/mailman/listinfo/sidrops
> 
> _______________________________________________
> Sidrops mailing list
> Sidrops@ietf.org
> https://www.ietf.org/mailman/listinfo/sidrops