Re: [Sidrops] Call for SIDROPS WG Agenda Items

Tim Bruijnzeels <tim@nlnetlabs.nl> Wed, 11 July 2018 07:58 UTC

Return-Path: <tim@nlnetlabs.nl>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45682130E09 for <sidrops@ietfa.amsl.com>; Wed, 11 Jul 2018 00:58:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level:
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bZivrjX6I7gT for <sidrops@ietfa.amsl.com>; Wed, 11 Jul 2018 00:58:49 -0700 (PDT)
Received: from dicht.nlnetlabs.nl (open.nlnetlabs.nl [185.49.140.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3B4A130E02 for <sidrops@ietf.org>; Wed, 11 Jul 2018 00:58:48 -0700 (PDT)
Received: from [IPv6:2a04:b900::1:d5d8:cd39:4ad6:993a] (unknown [IPv6:2a04:b900:0:1:d5d8:cd39:4ad6:993a]) by dicht.nlnetlabs.nl (Postfix) with ESMTPS id D21CD89C1; Wed, 11 Jul 2018 09:58:45 +0200 (CEST)
Authentication-Results: dicht.nlnetlabs.nl; dmarc=none header.from=nlnetlabs.nl
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.4 \(3445.8.2\))
From: Tim Bruijnzeels <tim@nlnetlabs.nl>
In-Reply-To: <SN6PR0901MB23660F996F53FB206785AF5F845B0@SN6PR0901MB2366.namprd09.prod.outlook.com>
Date: Wed, 11 Jul 2018 09:58:45 +0200
Cc: Alexander Azimov <aa@qrator.net>, Keyur Patel <keyur@arrcus.com>, "sidrops@ietf.org" <sidrops@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <55018984-81F3-48CA-B238-3BB8BC557596@nlnetlabs.nl>
References: <SN6PR0901MB23660F996F53FB206785AF5F845B0@SN6PR0901MB2366.namprd09.prod.outlook.com>
To: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
X-Mailer: Apple Mail (2.3445.8.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/y_yHMPWxF-HCQR6oKQZETse1bZM>
Subject: Re: [Sidrops] Call for SIDROPS WG Agenda Items
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jul 2018 07:58:51 -0000

Sriram,

I have nothing against BGPSec deployment personally, on the contrary.. I am well aware of the island theorem, but I just observe that years after standardisation deployment is not happening. And I fear that it’s largely because today such islands are hard to build, expensive, and lack of support in hardware routers makes the mission all the more difficult. And unless your neighbours also deploy there is no reward. This is a hard sell.

I am also well aware that with ASPA or similar approaches the path can still be forged, especially under partial deployment - albeit that it’s harder.

I see the two techniques as orthogonal. BGPSec is what you would need to be certain that the path is not forged, but it says nothing about whether these paths are according to policy. A technique like ASPA provides verifiable and light-weight (which is good!) policy, but no absolute certainty of path correctness.

So, I believe that ASPA has a valid place of its own. It will make things better than today. Moreover it will be cheap to deploy. RPKI validators can do the crypto and routers already have a lot (all?) of the config hooks in place to use this information.

It does not exclude future BGPSec deployment. To quote the little green guy: Hard to see the future is. But I suspect that the chances of BGPSec deployment will actually increase if RPKI has an ASPA like feature. It allows for step by step improvements: origin (ROAs), policy (ASPA) and then finally when there is significant uptake of the first two, it will be easier to do the extra step and build bgpsec islands.

Tim

> On 10 Jul 2018, at 20:25, Sriram, Kotikalapudi (Fed) <kotikalapudi.sriram@nist.gov> wrote:
> 
> Tim,
> 
>> IMHO one of the big issues with BGPSec deployment is that 
>> it's all or nothing, so there really is no incentive to deploy until everybody else has done so.
> 
> IMO, these are two different goals: (1) All AS hops must be valid for the update to be valid, 
> and (2) the benefit of BGPsec for early adopters with incremental deployment.
> BGPsec is successful on meeting both goals.
> 
> SIDR path validation always had the requirement that the AS path in the
> announced update MUST be provably valid; not merely feasible
> (see 4.2 in RFC 7353). 
> 
> SIDR WG ruled out partial path validation because that would
> keep the door open for cut-and-paste or forged path attacks.
> 
> Without BGPsec, the following can happen.
> Even with checking all AS hops in the update against a database
> that provides a white list of peering relationships 
> (e.g., proposed ASPA, CAIDA peering data),
> an update with forged path is still possible. For example, consider a prefix that is
> multihomed and has two RAOs with ASNs of two different providers,
> and the prefix is only announced through one provider.
> An MITM attack is possible that exploits the other ROA and the white list
> to forge a route consisting of only valid AS hops (end-to-end).
> 
> Regarding, (2) the benefit of BGPsec for early adopters and incremental deployment,
> please see Section 6.3.2, RFC 8374 ( https://tools.ietf.org/html/rfc8374#page-26 ):
> 
> 6.3.2.  Discussion
> 
>   The partial-deployment approach to incremental deployment will result
>   in "BGPsec islands".  Updates that originate within a BGPsec island
>   will generally propagate with signed AS paths to the edges of that
>   island.  As BGPsec adoption grows, the BGPsec islands will expand
>   outward (subsuming non-BGPsec portions of the Internet) and/or pairs
>   of islands may join to form larger BGPsec islands.
> 
> The ASes within each BGPsec island are backward compatible with
> traditional BGP ASes that are outside the islands (see Section 4.4 of RFC 8205).  
> 
> Sriram
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
>