Dear Lars (and NANOG), sorry for the late reply. We looked carefully at your feedback, and made few relevant fixes in the paper, e.g., mentioned that we use serial-2 - definitely should have done it , so thanks for pointing it out.
You're most welcome to take a look at the revised (camera-ready) version; we plan to have a `full version' later on so if you'll have any more feedback we'll be happy to consider it and modify that version accordingly. You can download from : https://www.researchgate.net/publication/346777643_ROV_Improved_Deployable_Defense_against_BGP_Hijacking Let me respond to all your comments/questions; Regarding ROV++ v1: Let's modify your example in Figure 2a slightly such > that AS 666 announces 1.2.3/24 also via AS 86. Further, let's say AS 88 > also uses ROV++ v1. Now, let's replay your example from the paper. AS 78 > still sees the same announcements you describe, and you recommend using a > different, previously less-preferred route for 1.2/16. Yet, all routes > available to AS 78 ultimately run into the same hijack behavior (which is > not visible from AS 78's routing table alone). Lars, this is incorrect: in your example AS88 uses ROV++ so it would ignore the hijack from 666 and route correctly to 99. But let me clarify: there are scenarios where ROV++ (all versions) fail to prevent hijack for different reasons, including some which you may consider `disappointing'; we never claimed otherwise (and present the results). Clearly, further improving would be interesting! btw, we are also not claiming our results `prove' anything. This is not something we can prove just by simulations, we know that, and we continue now with pilot deployment. Although, frankly, I'm _quite_ sure, that ROV++v1 helps a lot - esp for edge ASes. > > Regarding ROV++ v2: A simple sub-prefix hijack would still not yield a > "valid" during your ROV. The moment you propagate such a route, you reject > the entire idea of ROV. I understand that you drop the traffic, but your > proposal still feels like a step backward. However, I'm not an expert on > this---I might just be wrong. > We definitely don't reject ROV! it does improve security considerably - although, our results do show there seem to be room to improve. ROV++V2 doesn't just propagate the hijack, it turns it into `backhole announcement'. But, based on our results, we don't recommend to deploy it for announced prefixes; but it does provide significant value for unannounced prefixes - which are often abused, e.g., for DDoS, spam, etc. > > Regarding goals: I think that you only meet your first design goal since > your definition of 'harm' is very restricted. The moment you add more > dimensions, e.g., QoS degradation for previously unaffected traffic, this > goal is no longer met. > Well, we definitely cannot claim that we meet all intuitive interpretations of `do no harm'; maybe our text was a bit misleading here so we tried to make it more clear. > > Regarding your evaluation: Which of CAIDA's serials do you use? Serial-1 > is known to miss a significant fraction of peering links, while Serial-2 > contains potentially non-existing links (as they are inferred using > heuristics). Serial 2 - I think, most works in the area use this. > Since coverage and validity of links varies drastically between serials > (and for serial-2 even between snapshots), it is unclear to which degree > your topology reflects reality. I like that you assumed the basic > Gao-Rexford Model for the best-path decision process. Yet, you ignored that > various networks deploy things like prefix-aggregation, peer-locking, or > more-specifics (referring to /25 .. /30 IPv4 prefixes) filters. We _definitely_ agree that it _should_ be possible to do better simulations/evaluations by taking such aspects in consideration. But : (1) what we did is the same as what was done afaik in all previous works (except it seems our implementation is better optimized), and (2) we _are_ working toward better simulation/evaluation mechanism; in fact we believe we already have a first version working. But we couldn't use this for this evaluation since this is absolutely non-trivial change of evaluation method, and we have quite a lot of work to complete this and evaluate this very well. Clarifying: I refer to evaluating the correctness of our improved evaluation/simulation mechanism... So that's why we didn't use it yet. We are the first to agree current methodology is not the best! > Further, I do not get why you randomly picked ROV-deploying networks. I am > sure people like Job Snijders or Cecilia Testart could have provided you an > up-to-date list of ASes that currently deploy ROV. It is not clear to me > why it is useful to look at scenarios in which those networks potentially > no longer deploy ROV. > Excellent point, this may indeed be a more interesting/realistic measurement. I must admit - just didn't think of it. Stupid... Cecilia sent us a list and although it's just by email, we'll use it to do additional evaluation, Real Soon Now :) best, Amir -- Amir Herzberg Comcast professor of Security Innovations, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cryptography' textbook and lectures: https://sites.google.com/site/amirherzberg/applied-crypto-textbook <https://sites.google.com/site/amirherzberg/applied-crypto-textbook> On Wed, Dec 9, 2020 at 1:42 PM Lars Prehn <lpr...@mpi-inf.mpg.de> wrote: > Hi Amir, > > Neither providing an abstract nor the high-level takeaways of your work is > a rather blunt way to promote your paper. I have a bunch of comments and > questions, but I'm only a student so take them with a grain of salt. > > Regarding ROV++ v1: Let's modify your example in Figure 2a slightly such > that AS 666 announces 1.2.3/24 also via AS 86. Further, let's say AS 88 > also uses ROV++ v1. Now, let's replay your example from the paper. AS 78 > still sees the same announcements you describe, and you recommend using a > different, previously less-preferred route for 1.2/16. Yet, all routes > available to AS 78 ultimately run into the same hijack behavior (which is > not visible from AS 78's routing table alone). In a nutshell, your > recommendation did not affect the outcome for 1.2.3/24---the traffic still > goes towards the hijacker---but you effectively moved all the remaining > traffic inside 1.2/16 from an optimal route to a sub-optimal one. Your > approach not only may have no effects on the fate of the attacked traffic, > but it may also mess with previously unaffected traffic. > > Regarding ROV++ v2: A simple sub-prefix hijack would still not yield a > "valid" during your ROV. The moment you propagate such a route, you reject > the entire idea of ROV. I understand that you drop the traffic, but your > proposal still feels like a step backward. However, I'm not an expert on > this---I might just be wrong. > > Regarding goals: I think that you only meet your first design goal since > your definition of 'harm' is very restricted. The moment you add more > dimensions, e.g., QoS degradation for previously unaffected traffic, this > goal is no longer met. > > Regarding your evaluation: Which of CAIDA's serials do you use? Serial-1 > is known to miss a significant fraction of peering links, while Serial-2 > contains potentially non-existing links (as they are inferred using > heuristics). Since coverage and validity of links varies drastically > between serials (and for serial-2 even between snapshots), it is unclear to > which degree your topology reflects reality. I like that you assumed the > basic Gao-Rexford Model for the best-path decision process. Yet, you > ignored that various networks deploy things like prefix-aggregation, > peer-locking, or more-specifics (referring to /25 .. /30 IPv4 prefixes) > filters. Further, I do not get why you randomly picked ROV-deploying > networks. I am sure people like Job Snijders or Cecilia Testart could have > provided you an up-to-date list of ASes that currently deploy ROV. It is > not clear to me why it is useful to look at scenarios in which those > networks potentially no longer deploy ROV. > > Those are at least my thoughts. I hope they initiate some discussion. > Best regards, > Lars > On 09.12.20 09:04, Amir Herzberg wrote: > > Hi, the paper: > ROV++: Improved Deployable Defense against BGP Hijacking > will be presented in the NDSS'21 conference. > > The paper is available in: > > https://www.researchgate.net/publication/346777643_ROV_Improved_Deployable_Defense_against_BGP_Hijacking > > Feedback, by discussion here or by direct email to me, is welcome, thanks. > > btw, I keep most publications there (researchgate), incl. the drafts of > `foundations of cybersecurity' ; the 1st part (mostly applied crypto) is in > pretty advanced stage, feedback is also very welcome. URL in sig. > -- > Amir Herzberg > > Comcast professor of Security Innovations, University of Connecticut > > Homepage: https://sites.google.com/site/amirherzberg/home > > Foundations of Cyber-Security (part I: applied crypto, part II: > network-security): > https://www.researchgate.net/project/Foundations-of-Cyber-Security > > >