Fat fingers:

Our intent is NOT to "stop" the attack with the claim (not efficient at all), 
but to allow to be reviewed in order to avoid it, in the future, if possible 
from the same actors.

Regards,
Jordi
 
 

El 23/3/19 13:44, "anti-abuse-wg en nombre de JORDI PALET MARTINEZ via 
anti-abuse-wg" <anti-abuse-wg-boun...@ripe.net en nombre de 
anti-abuse-wg@ripe.net> escribió:

    Hi Töma,
    
    
    El 23/3/19 13:25, "anti-abuse-wg en nombre de Töma Gavrichenkov" 
<anti-abuse-wg-boun...@ripe.net en nombre de xima...@gmail.com> escribió:
    
        Hi all,
        
        > A new RIPE Policy proposal, 2019-03, "BGP Hijacking is
        > a RIPE Policy Violation", is now available for discussion.
        
        Sorry if the issues I'm raising were already addressed somewhere
        around the thread. As of now, I believe it's the size of an average
        fiction book, and I don't quite have enough time to read that.
        
        I also apologize now in advance for abstaining from the discussion at
        some point in future, because in quite the same fashion I won't be
        able to read unnecessarily (and sometimes I believe deliberately) long
        responses. Whoever is planning to win a consensus through exhaustion
        is going to win that anyway.
        
        With that in mind,
        
        
        1. As of now, the draft looks like a nice example of "document
        designed by a committee".
        
        It's too strict where there's no real need to be strict, and at the
        same time too weak where you don't expect it to be weak. E.g. 4 weeks
        to report + 4 weeks to investigate + 2 weeks for an appeal give us
        solid 10 weeks for an attack to stay there, which is, to put it
        gently, a substantial amount of time.
        
    
    Our intent is to "stop" the attack with the claim (not efficient at all), 
but to allow to be reviewed in order to avoid it, in the future, if possible 
from the same actors.
    
    The timing that we described is "maximum", may be need to add that word in 
every part of the text that talks about timing. I think this provides 
sufficient time to cover even complex cases.
    
    Now, if the community believe that 4 weeks is too much to investigate even 
a more complex case and 2 weeks too much for the hijacker response, I'm happy 
to drop both by half, if Carlos agree as well.
    
        
        2. OTOH the ultimate result (membership cancellation) may be seen as a
        very heavy punishment.
    
    I mention this before in a couple of emails and I'm more and more convinced 
that a warning is needed, at least, in doubtful cases, before reporting for a 
membership cancellation.
        
        In fact in theory this policy could make things worse.
        Most of the ISPs are very slow in applying security updates to their
        equipment, including border routers. (Also, vendors themselves are not
        quite keeping up as well) Now, say, I'm an ISP who really wants to
        push my competitor out of business. With this policy here's a sequence
        of steps that will win you the market:
        - hire a script kiddie who will break into that company's Mikrotik;
        - announce roughly half of IPv4 address space through that breach just
        for it to be surely on the news;
        - relax and enjoy watching your competition disappearing in no later
        than 2,5 months.
        
        While I would, in my perfect dream, personally support the idea of
        cancelling an LIR membership for not updating one's devices at least
        on a weekly basis, I don't really think this is what the authors of
        the draft were going to propose, and I know quite a few people, Randy
        Bush for starters, whom the authors, to put it mildly, won't probably
        be able to convince.
        
        The example by Warren also deserves attention, and I personally don't
        really anticipate that "won't be too hard to figure out", because
        frankly we're in fact yet to see the hijacking attempts where an
        attacker would be deliberately trying hard to hide their identity.
        
        
        3. If I were to design that process, I'd put it in a different way, 
e.g.:
        - 2 business days to find experts. Really, four weeks for that?! Yes,
        we know that NCC isn't the most dynamic organization out there, but
        with a pre-populated pool of experts at the current rate of hijacking
        incidents reported to public that shouldn't really be an issue.
    
    In the actual text there is no time to find the experts. The 4 first weeks 
are to select the experts (from a pool already known), and provide the report.
    
        - 3 business days to investigate and prepare a preliminary report.
        Another 5 business days to continue investigation if necessary, with
        another report at the end. Maybe a third iteration if necessary.
        Immediate membership suspension at the end if the experts decide it's
        necessary to do so now.
    
    So, it is in total up the here what I just said, about 2 weeks instead of 4.
    
        - A grace period of 8 weeks for the suspected hijacker to collect
        further evidence and provide additional arguments to justify their
        position.
    
    I think that's too much. He will get a notice once the case is being 
reported, so he got already the same time as the experts to collect whatever 
information, and then either 1 or 2 additional weeks after the expert's report.
    
        - An appeal phase of another 8 weeks with ultimate decision and, where
        necessary, membership termination in the end.
    
    We have now in total 6 weeks here (2 weeks to file an appeal, 4 more weeks 
for the next group or experts to reply)
        
        All the numbers above are rough estimations, they are only there to
        showcase the idea:
        - the reaction to *mitigate* should be immediate;
        - the reaction to *penalize* should allow for a large enterprise — or
        a large ISP! — to keep up.
    
    If once the report is filed the suspected hijacker get a notification, he 
has the chance (if the hijack is still "live") to mitigate it.
        
        --
        Töma
        
        
    
    
    
    **********************************************
    IPv4 is over
    Are you ready for the new Internet ?
    http://www.theipv6company.com
    The IPv6 Company
    
    This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the exclusive use of the 
individual(s) named above and further non-explicilty authorized disclosure, 
copying, distribution or use of the contents of this information, even if 
partially, including attached files, is strictly prohibited and will be 
considered a criminal offense. If you are not the intended recipient be aware 
that any disclosure, copying, distribution or use of the contents of this 
information, even if partially, including attached files, is strictly 
prohibited, will be considered a criminal offense, so you must reply to the 
original sender to inform about this communication and delete it.
    
    
    
    
    
    



**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the exclusive use of the 
individual(s) named above and further non-explicilty authorized disclosure, 
copying, distribution or use of the contents of this information, even if 
partially, including attached files, is strictly prohibited and will be 
considered a criminal offense. If you are not the intended recipient be aware 
that any disclosure, copying, distribution or use of the contents of this 
information, even if partially, including attached files, is strictly 
prohibited, will be considered a criminal offense, so you must reply to the 
original sender to inform about this communication and delete it.





Reply via email to