Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Michel Py
> Nick Hilliard wrote :
> I would have said the opposite, i.e. that any traffic tagged with this prefix 
> is dropped via e.g. null0
> or martian mechanisms / etc. But it definitely needs to be defined because at 
> the moment it's ambiguous.
> Ambiguity is fine when it's your own network, but not fine when you're 
> defining something with global scope.

Totally agree. Default behavior on vendor "C" router : if the prefix comes with 
NO-EXPORT, there is nothing to do so that it is not announced out of the local 
AS. Prefix not announced to eBGP peers because of well-known community. That's 
what well-known communities are, right ? DEFAULT behavior is coded-in by the 
vendor.

Same as BLACKHOLE : well-known community, router should drop it by default, and 
here is the major concern : DEFAULT behavior. If BLACKHOLE as currently 
proposed is handled the same way NO-EXPORT is, having it enabled by default is 
a danger.

As said in my initial reaction : too broad.


> Job Snijders wrote :
> The word 'source' does not appear in the draft. In my reading of section 3.1 
> it is obvious destination based blackholing,
> but I welcome a suggestion to reword a sentence in the introduction to 
> include the phrase 'destination based blackholing'.

The destination-based was not obvious to me on the first read. Besides, my 
concerns are not what the intent of a draft is, but what people will do with it 
if implemented. A reword will definitely make it more palatable.

As of what people will do with it, what tells you that your intent of 
blackholing the destination will not be perverted as blackholing the source ?
There are commercial services out there already that provide source-based BGP 
blackhole feeds. My personal one happens to be on the wild side, but again 
what's the difference ?


> joel jaeggli wrote:
> It should be an inherent property that what is being blackholed is traffic 
> bound for the prefix that the community is attached to is it not?

Yes, but how do you make that happen ? There are some people out there that 
have implemented uRPF. What you suggest is a standardized codepoint to kill the 
victim in order to protect the infrastructure. I understand that, sometimes 
necessary. However, if you are the prefix under attack, there is much better : 
feed a source-based blackhole to your upstreams, which kills the aggressor 
instead of killing you.

> Source based RTBH requires some explicit coordination between the parties 
> using it.

How so ? if you trust that the party you announce your blackhole to will check 
that it is indeed your prefix, you are being unrealistic. Especially lately 
with the thing known as "PA leasing", people do announce prefixes that are not 
coming from the ASN they are supposed to, and it's not prefix hijacking. I'm 
not saying it's right, because it's basically multi-homing a PA, but it does 
happen and it's not going to get better.


> heasley wrote :
> Why wouldn't you want to propogate BH routes?  If you want to BH the traffic, 
> then let it be dumped closer to the
> source.  You might accidentally make things exciting for yourself, but it 
> seems like desirable behavior to me.

Indeed, and this is a lot more true when the blackhole targets the source. The 
further it is propagated, the better.


> Christopher Morrow wrote :
> I like this game... but, "Why would the document specify that this is 
> either/or src/dest blackholing?"
> maybe I'm expecting consenting adults to still be playing at the end of the 
> day...

Because it would make it less controversial ?

Michel.

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Randy Bush
> The second major area of concern I have about this proposal is the
> transitive nature of the bgp community.  The issue is that the draft
> specifies a mechanism to cause traffic to be dropped on the floor,
> that the signaling mechanism is globally transitive in scope, and the
> specific intent is that prefixes tagged in this way are exported to
> other ASNs. In other words, the draft specifies behaviour that is
> risky by default.

risky?  this is a disasterous vulnerability large enough to handle a
very large truck.

we really do not need a global mecahnism by which an attacker can spoof
a bgp announcement of someone's prefixes and cause traffic to the
specified address space(s) to be discarded on a significant portion of
the internet.

until bgp annoucements can be rigorously authenticated, this is a
disaster waiting to happen.  and it will not wait long.

randy

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Christopher Morrow
On Wed, Jun 29, 2016 at 4:59 PM, joel jaeggli  wrote:

> On 6/29/16 1:46 PM, Nick Hilliard wrote:
> > Job Snijders wrote:
> >> Should it be somehow clarified that router vendors are not supposed to
> >> implement mechanisms, which are by default enabled, that discard traffic
> >> for BLACKHOLE'ed prefixes?
> >
> > I would have said the opposite, i.e. that any traffic tagged with this
> > prefix is dropped via e.g. null0 or martian mechanisms / etc.  But it
> > definitely needs to be defined because at the moment it's ambiguous.
> > Ambiguity is fine when it's your own network, but not fine when you're
> > defining something with global scope.
> >
> > Also, as Michael Py mentioned, it's not clear whether this refers to
> > source based blackholing or destination based blackholing.
>
> It should be an inherent property that what is being blackholed is
> traffic bound for the prefix that the community is attached to is it not?
>
> Source based RTBH requires some  explicit coordination between the
> parties using it.
>
>
​ I like this game... but, "Why would the document specify that this is
either/or src/dest blackholing?"

maybe I'm expecting consenting adults to still be playing at the end of the
day...​
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread heasley
Wed, Jun 29, 2016 at 05:22:44PM -0400, Jared Mauch:
> > On Jun 29, 2016, at 5:10 PM, Nick Hilliard  wrote:
> > Job Snijders wrote:
> >> Do you have any more comments or concerns queued up?
> > 
> > I don't think the draft is well specified in terms of its intended
> > semantics.  This is a problem with a standards track document,
> > particularly one with big scary warnings in the security considerations
> > section.  It needs to be tightened up substantially before publication
> > could be considered.
> 
> Looking at section 5 of https://www.rfc-editor.org/rfc/rfc5635.txt

Why wouldn't you want to propogate BH routes?  If you want to BH the
traffic, then let it be dumped closer to the source.  You might
accidentally make things exciting for yourself, but it seems like
desirable behavior to me.

Since BH routes tend to be more specific, most are unlikely to be
propogated very far anyhow.

I think that the security concern lies far more in the lack of origin
validation [with rfc7908 usw.].

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread heasley
Wed, Jun 29, 2016 at 10:54:30PM +0200, Job Snijders:
> On Wed, Jun 29, 2016 at 09:46:15PM +0100, Nick Hilliard wrote:
> > Job Snijders wrote:
> > > Should it be somehow clarified that router vendors are not supposed to
> > > implement mechanisms, which are by default enabled, that discard traffic
> > > for BLACKHOLE'ed prefixes?
> > 
> > I would have said the opposite, i.e. that any traffic tagged with this
> > prefix is dropped via e.g. null0 or martian mechanisms / etc.  But it
> > definitely needs to be defined because at the moment it's ambiguous.
> > Ambiguity is fine when it's your own network, but not fine when you're
> > defining something with global scope.
> 
> Why would you say the opposite? That goes counter to what the vendors
> are shipping today. The suggestion "do not do anything" is compatible
> with what ships today! :)
> 
> We can add a new section "3.4 - Vendor recommendations" and describe
> what it is we'd expect a network device vendor to implement or not to
> implement. 

It may be useful to be able to forward BH traffic off a router for analysis,
so discarding may not be desired.  I'd leave what is done with traffic by
default for configuration by operator.

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Job Snijders
Hi David,

Thank you for your feedback.

On Wed, Jun 29, 2016 at 04:23:23PM -0500, David Farmer wrote:
> > Range   Registration Procedures
> > 0x-0x8000   First Come First Served
> > 0x8001-0x   Standards Action
> 
> And given that the code point that is being defined is 0x029A and
> that falls in the First Come First Served range, technically standards
> action isn't required.  Furthermore, this draft is really dependant on
> RFC3882 and RFC5635, both Informational Status, for a full description
> of the intended functionality.   If this draft is Standards Track,
> some may mistakenly think there is some kind of preference for this
> mechanism for triggering Blackholes, vs. the other mechanisms
> discussed in RFC3882 and RFC5635.  I fully support this defining this
> Well-Known BGP Community, however I believe it should be of equal
> stature as the other mechanisms discussed in
> RFC3882 and RFC5635.
> 
> Therefore, for the above reasons, I think the more appropriate status
> for this draft is Informational.

In light of what you described here, I don't mind changing the intended
status from STD to INFO. Also, I see similarities with NOPEER/RFC3765
which is "Informational" too.

Would anyone object to this change?

Kind regards,

Job

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread David Farmer
On Sun, Jun 26, 2016 at 11:47 PM, joel jaeggli  wrote:

> On 6/26/16 6:38 AM, Nick Hilliard wrote:
> > There has been no discussion on the GROW mailing list about having this
> > document published as Standards Track rather than informational and it's
> > coming as a surprise to see that this was only announced at IESG Last
> > Call a couple of days ago.  At the least, there ought to be some
> > discussion about this before pushing it up into the publication queue.
>
> The looking back at the document that was WGLCed (which is the current
> version) the state was standards track. the individual sumbission draft
> draft-ymbk-grow-blackholing-00 was flagged as such since initial
> submission.  It's status therefore I think is well understood. Whether
> that's appropriate or not is another question.
>
> Afaik well know assignments (and there are precious few really) have
> been generally regarded as standards action thought the ranges is split
> like so.
>
>
> Range   Registration Procedures
> 0x-0x8000   First Come First Served
> 0x8001-0x   Standards Action


And given that the code point that is being defined is 0x029A and that
falls in the First Come First Served range, technically standards action
isn't required.  Furthermore, this draft is really dependant on RFC3882 and
RFC5635, both Informational Status, for a full description of the intended
functionality.   If this draft is Standards Track, some may mistakenly
think there is some kind of preference for this mechanism for triggering
Blackholes, vs. the other mechanisms discussed in RFC3882 and RFC5635.  I
fully support this defining this Well-Known BGP Community, however I
believe it should be of equal stature as the other mechanisms discussed in
RFC3882 and RFC5635.

Therefore, for the above reasons, I think the more appropriate status for
this draft is Informational.

Thanks.

-- 
===
David Farmer   Email:far...@umn.edu
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SEPhone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Jared Mauch

> On Jun 29, 2016, at 5:10 PM, Nick Hilliard  wrote:
> 
> Job Snijders wrote:
>> Do you have any more comments or concerns queued up?
> 
> I don't think the draft is well specified in terms of its intended
> semantics.  This is a problem with a standards track document,
> particularly one with big scary warnings in the security considerations
> section.  It needs to be tightened up substantially before publication
> could be considered.

Looking at section 5 of https://www.rfc-editor.org/rfc/rfc5635.txt

I think provides some guidance of helpful text to improve this section. While
some hardware may not support certain capabilities, limiting a specification
to an exact generation of operator hardware would be shortsighted.

I suspect one could re-use much of the rfc5635 text without much if any
additional commentary.

- Jared

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Nick Hilliard
Job Snijders wrote:
> Do you have any more comments or concerns queued up?

I don't think the draft is well specified in terms of its intended
semantics.  This is a problem with a standards track document,
particularly one with big scary warnings in the security considerations
section.  It needs to be tightened up substantially before publication
could be considered.

Nick

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread joel jaeggli
On 6/29/16 1:46 PM, Nick Hilliard wrote:
> Job Snijders wrote:
>> Should it be somehow clarified that router vendors are not supposed to
>> implement mechanisms, which are by default enabled, that discard traffic
>> for BLACKHOLE'ed prefixes?
> 
> I would have said the opposite, i.e. that any traffic tagged with this
> prefix is dropped via e.g. null0 or martian mechanisms / etc.  But it
> definitely needs to be defined because at the moment it's ambiguous.
> Ambiguity is fine when it's your own network, but not fine when you're
> defining something with global scope.
> 
> Also, as Michael Py mentioned, it's not clear whether this refers to
> source based blackholing or destination based blackholing.

It should be an inherent property that what is being blackholed is
traffic bound for the prefix that the community is attached to is it not?

Source based RTBH requires some  explicit coordination between the
parties using it.

> Nick
> 
> ___
> GROW mailing list
> GROW@ietf.org
> https://www.ietf.org/mailman/listinfo/grow
> 




signature.asc
Description: OpenPGP digital signature
___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Job Snijders
On Wed, Jun 29, 2016 at 09:46:15PM +0100, Nick Hilliard wrote:
> Job Snijders wrote:
> > Should it be somehow clarified that router vendors are not supposed to
> > implement mechanisms, which are by default enabled, that discard traffic
> > for BLACKHOLE'ed prefixes?
> 
> I would have said the opposite, i.e. that any traffic tagged with this
> prefix is dropped via e.g. null0 or martian mechanisms / etc.  But it
> definitely needs to be defined because at the moment it's ambiguous.
> Ambiguity is fine when it's your own network, but not fine when you're
> defining something with global scope.

Why would you say the opposite? That goes counter to what the vendors
are shipping today. The suggestion "do not do anything" is compatible
with what ships today! :)

We can add a new section "3.4 - Vendor recommendations" and describe
what it is we'd expect a network device vendor to implement or not to
implement. 

> Also, as Michael Py mentioned, it's not clear whether this refers to
> source based blackholing or destination based blackholing.

The word 'source' does not appear in the draft. In my reading of section
3.1 it is obvious destination based blackholing, but I welcome a
suggestion to reword a sentence in the introduction to include the
phrase 'destination based blackholing'.

Do you have any more comments or concerns queued up?

Kind regards,

Job

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Nick Hilliard
Job Snijders wrote:
> Should it be somehow clarified that router vendors are not supposed to
> implement mechanisms, which are by default enabled, that discard traffic
> for BLACKHOLE'ed prefixes?

I would have said the opposite, i.e. that any traffic tagged with this
prefix is dropped via e.g. null0 or martian mechanisms / etc.  But it
definitely needs to be defined because at the moment it's ambiguous.
Ambiguity is fine when it's your own network, but not fine when you're
defining something with global scope.

Also, as Michael Py mentioned, it's not clear whether this refers to
source based blackholing or destination based blackholing.

Nick

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Job Snijders
On Wed, Jun 29, 2016 at 01:30:49PM +0100, Nick Hilliard wrote:
> The second major area of concern I have about this proposal is the
> transitive nature of the bgp community.

I thought Section 3.2 provides enough detail on scoping routes tagged
with BLACKHOLE, however with your concern and the following in mind:

This draft intends to unify the wild variety of blackholing communities
which exist in the wild by providing a single Well-known codepoint, see
bottom of [1] for an incomplete list.

I do not think it is feasible to mandate new behaviour (like
automatically adding a NO_EXPORT community) in this draft. It is up to
the network operator to decide when and where to honor a blackhole
community and when not to honor it.

Automatically adding NO_EXPORT (or any of the other scope limiting
Well-known communities) is likely to lead to implementation difficulty
for operators when prefixes with a blackhole community attached need to
be redistributed to some sort of sibling network.

So, with your concern and the above in mind:

Should it be somehow clarified that router vendors are not supposed to
implement mechanisms, which are by default enabled, that discard traffic
for BLACKHOLE'ed prefixes?

Just like the deployment of honoring the NOPEER [rfc3765] community is
100% driven by the operator, out of the box the vendor implementations
do nothing with the community except transit it. 

Kind regards,

Job

[1]: https://www.ietf.org/mail-archive/web/ietf/current/msg98740.html

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow


Re: [GROW] Last Call: (BLACKHOLE BGP Community for Blackholing) to Proposed Standard

2016-06-29 Thread Nick Hilliard
Job Snijders wrote:
> I believe this update addresses the concerns raised in this phase of the
> document.

yes, thanks, it addresses these concerns, and the document is a lot
better as a result.

The second major area of concern I have about this proposal is the
transitive nature of the bgp community.  The issue is that the draft
specifies a mechanism to cause traffic to be dropped on the floor, that
the signaling mechanism is globally transitive in scope, and the
specific intent is that prefixes tagged in this way are exported to
other ASNs. In other words, the draft specifies behaviour that is risky
by default.

Prefix hijacking rates suggest that adding a new compromise vector is
something that should be considered carefully in the context of
standardisation.

The obvious way to work around this would be to specify a non-transitive
community, but that would defeat the purpose of the draft.  Other
options might include a requirement that BLACKHOLE should automatically
be marked as NO-EXPORT when received by a third party ASN. This doesn't
deal with backwards compatibility, though, and given the lifetime of bgp
implementations, there would be a large time window opened where this
may be a problem.

Nick

___
GROW mailing list
GROW@ietf.org
https://www.ietf.org/mailman/listinfo/grow