Thanks for the input, Paul. We've addressed the HTTPS MUST - FTP MUST NOT issue in revision -11.

Cheers,

Oliver

On 12/4/25 11:34 AM, Paul Wouters via Datatracker wrote:
Paul Wouters has entered the following ballot position for
draft-ietf-opsawg-prefix-lengths-10: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-prefix-lengths/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

[ Sorry, I updated my COMMENTS to a DISCUSS, see below ]



         To minimize the load on RIRs' WHOIS [RFC3912] services, the
         RIR's FTP [RFC0959] services SHOULD be used for large-scale
         access to gather

I can't really ignore the fact that unsigned data is urged to be transfered
in the clear possibly (likely?) without authentication. Why can this data
not be made available over HTTPS ? (I understand RDAP might address this)

Update: I was told that all RIRs now support an HTTPS frontend for their ftp 
sides, eg:

https://ftp.arin.net/
https://ftp.ripe.net/
https://ftp.lacnic.net/
https://ftp.afrinic.net/
https://ftp.apnic.net/

In which case I think the RFC should say that FTP MUST NOT be used, but HTTPS 
MUST be used.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I support Deb/Sean's DISCUSS on the ASN.1 module.
         [...] the authenticator is invalid.

What does this mean? Should all the data be thrown away? Should it be processed
as unauthenticated? If so, what would that mean in practise ?

Similarly for:

         All of the above steps MUST be successful to consider the
         prefixlen file signature as valid.

What if it is not valid?

         The prefixlen files MUST be published via and fetched using HTTPS 
[RFC9110].

Does this contradict this earlier statement?

         This document provides a guideline for how interested parties
         should fetch and read prefixlen files. To minimize the load on
         RIRs' WHOIS [RFC3912] services, the RIR's FTP [RFC0959] services
         SHOULD be used for large-scale access to gather inetnum: instances
         with prefixlen references.

Either this contradicts, or if the FTP fetch is to fetch data points
that point to where to fetch prefixlen files, then an attacker can
still fetch the prefixlen files over HTTPS, filter the signature(s),
modify what it wants, then serve this over their own HTTPS server by
updating the FTP fetch stream as MITM to point to its own HTTPS server?

Update: I think this should also note to use the HTTPS frontends of the FTP 
services.

So I am not sure I can agree with the following text in the Security 
Considerations
section:

         As mentioned in Section 6, some RPSL repositories have weak, if
         any, authentication. This allows spoofing of inetnum: objects
         pointing to malicious prefixlen files. Section 6 suggests an
         unfortunately complex method for stronger authentication based
         on the RPKI.

I think Section 6 still has an FTP fetch in its process that can be manipulated
to bypass the stronger authentication?

Update: this would be resolved if HTTPS is required.




_______________________________________________
OPSAWG mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to