Re: WhatsApp's New Policy Has...

2021-01-09 Thread Rich Kulawiec
On Fri, Jan 08, 2021 at 01:31:56PM -0600, Dave Phelps wrote:
> Keybase was purchased by Zoom (
> https://www.cnbc.com/2020/05/07/zoom-buys-keybase-in-first-deal-as-part-of-plan-to-fix-security.html).
> >From what I've gathered, Zoom is too tight with, owned by, or run by China,
> so I believe there was a similar mass exodus from Keybase for lack of trust.

I've been maintaining a page of relevant links concerning Zoom since
late winter 2020.  It's here:

Zoom
http://www.firemountain.net/zoom.html

I need to add a link there concerning the complaint filed in the EDNY,
USA v. Xinjiang Jin (JIN).  As pointed out by File411, there are repeated
references in that complaint to "under 1 minute", as in:

Employee-1 explained that "The current requirement" -- apparently
referring to Company-1's internal restrictions -- "is that domestic
engineers cannot access the data of us clusters" -- indicating
that PRC-based software engineers were not permitted to access user
data stored on U.S.-based servers.  JIN responded "Net Security's
requirement is that [the employer] must have the authority to
directly handle it, and it must be handled within one minute.
For example, including U.S. users, if the issue of June 4th is
being discussed in a meeting, it must be handled within one minute
of [the meeting being reported], otherwise will be [rate] as
security non-compliant."

("June 4th" refers to Tiananmen Square - June 4, 1989.)

It's unclear yet exactly what this means/implies, but my working assumption
for the moment is that everything passing through Zoom is being made
available in real or close-to-real time to the PRC.

Also in the complaint:

JIN wrote in an electronic messages to other individuals who are
Company-1 employees stating that, even if other U.S. social media
and search companies had no business in the PRC, they still terminated
accounts and posted at the request of the "CN zf".  Based on open
source information and my training and experience, the "CN" in "CN zf"
refers to "China" (the PRC) and "zf" is shorthand for zhengfu,
a Chinese word for government.

---rsk



Re: ROV++: Improved Deployable Defense against BGP Hijacking

2021-01-09 Thread Amir Herzberg
Dear Lars (and NANOG), sorry for the late reply. We looked carefully at
your feedback, and made few relevant fixes in the paper, e.g.,
mentioned that we use serial-2 - definitely should have done it ,  so
thanks for pointing it out.

You're most welcome to take a look at the revised (camera-ready) version;
we plan to have a `full version' later on so if you'll have any more
feedback we'll be happy to consider it and modify that version accordingly.
You can download from :
https://www.researchgate.net/publication/346777643_ROV_Improved_Deployable_Defense_against_BGP_Hijacking

Let me respond to all your comments/questions;

Regarding ROV++ v1: Let's modify your example in Figure 2a slightly such
> that AS 666 announces 1.2.3/24 also via AS 86. Further, let's say AS 88
> also uses ROV++ v1. Now, let's replay your example from the paper. AS 78
> still sees the same announcements you describe, and you recommend using a
> different, previously less-preferred route for 1.2/16. Yet, all routes
> available to AS 78 ultimately run into the same hijack behavior (which is
> not visible from AS 78's routing table alone).


Lars, this is incorrect: in your example AS88 uses ROV++ so it would ignore
the hijack from 666 and route correctly to 99. But let me clarify: there
are scenarios where ROV++ (all versions) fail to prevent hijack for
different reasons, including some which you may consider `disappointing';
we never claimed otherwise (and present the results). Clearly, further
improving would be interesting!

btw, we are also not claiming our results `prove' anything. This is not
something we can prove just by simulations, we know that, and we continue
now with pilot deployment. Although, frankly, I'm _quite_ sure, that
ROV++v1 helps a lot - esp for edge ASes.

>
> Regarding ROV++ v2: A simple sub-prefix hijack would still not yield a
> "valid" during your ROV. The moment you propagate such a route, you reject
> the entire idea of ROV. I understand that you drop the traffic, but your
> proposal still feels like a step backward. However, I'm not an expert on
> this---I might just be wrong.
>

We definitely don't reject ROV! it does improve security considerably -
although, our results do show there seem to be room to improve.

ROV++V2 doesn't just propagate the hijack, it turns it into `backhole
announcement'. But, based on our results, we don't recommend to deploy it
for announced prefixes; but it does provide significant value for
unannounced prefixes - which are often abused, e.g., for DDoS, spam, etc.

>
> Regarding goals: I think that you only meet your first design goal since
> your definition of 'harm' is very restricted. The moment you add more
> dimensions, e.g., QoS degradation for previously unaffected traffic, this
> goal is no longer met.
>

Well, we definitely cannot claim that we meet all intuitive interpretations
of `do no harm'; maybe our text was a bit misleading here so we tried to
make it more clear.

>
> Regarding your evaluation: Which of CAIDA's serials do you use? Serial-1
> is known to miss a significant fraction of peering links, while Serial-2
> contains potentially non-existing links (as they are inferred using
> heuristics).


Serial 2 - I think, most works in the area use this.


> Since coverage and validity of links varies drastically between serials
> (and for serial-2 even between snapshots), it is unclear to which degree
> your topology reflects reality. I like that you assumed the basic
> Gao-Rexford Model for the best-path decision process. Yet, you ignored that
> various networks deploy things like prefix-aggregation, peer-locking, or
> more-specifics (referring to /25 .. /30 IPv4 prefixes) filters.


We _definitely_ agree that it _should_ be possible to do better
simulations/evaluations by taking such aspects in consideration. But : (1)
what we did is the same as what was done afaik in all previous works
(except it seems our implementation is better optimized), and (2) we _are_
working toward better simulation/evaluation mechanism; in fact we believe
we already have a first version working. But we couldn't use this for this
evaluation since this is absolutely non-trivial change of evaluation
method, and we have quite a lot of work to complete this and evaluate this
very well. Clarifying: I refer to evaluating the correctness of our
improved evaluation/simulation mechanism... So that's why we didn't use it
yet. We are the first to agree current methodology is not the best!


> Further, I do not get why you randomly picked ROV-deploying networks. I am
> sure people like Job Snijders or Cecilia Testart could have provided you an
> up-to-date list of ASes that currently deploy ROV.  It is not clear to me
> why it is useful to look at scenarios in which those networks potentially
> no longer deploy ROV.
>

Excellent point, this may indeed be a more interesting/realistic
measurement.  I must admit - just didn't think of it. Stupid... Cecilia
sent us a list and although it's just by