Re: soBGP deployment

2005-05-28 Thread Tony Li
Todd, >>- Forged AS paths and AS path segments > > > ditto, provided that you have long enough AS path segments in your > list of valid prefixes. if you have a long enough memory of routes > and a fast enough system, it's trivial to produce weighted lists of > the likelihood of a given prefix

Re: soBGP deployment

2005-05-27 Thread Todd Underwood
tony, all, On Thu, May 26, 2005 at 11:12:09PM -0700, Tony Li wrote: > You're not going to like this. on the contrary, i don't find it surprising or unpleasant. :-) > The simplest way to stop the hijacking is going to end up looking a LOT > like one of the s*BGP proposals. Here's why: > > Th

Re: soBGP deployment

2005-05-26 Thread william(at)elan.net
On Thu, 26 May 2005, Tony Li wrote: You're not going to like this. The simplest way to stop the hijacking is going to end up looking a LOT like one of the s*BGP proposals. Here's why: The threat model includes: - Forged origin ASs - Unauthorized advertisements from authenticatable sources

Re: soBGP deployment

2005-05-26 Thread Tony Li
Daniel, Todd, > The most significant problem is hijacking of IP address space for various > purposes. That's it. Solve that in the SIMPLEST way possible, lets implement > it (because everyone sees the problem) than we can either iteratively > improve the solution or start working on the next s

Re: soBGP deployment

2005-05-26 Thread Randy Bush
> The thing we should keep in mind is that the problem set is really very > limited. and if we just stick our heads in the sand, it will stay so? have we learned nothing about internet threat models in the last decade? there are very smart and nasty people out there, and there is a very high pay

Re: soBGP deployment

2005-05-26 Thread Daniel Golding
The thing we should keep in mind is that the problem set is really very limited. Although I acknowledge Tony's cockpit door analogy, we live in the world of today. The most significant problem is hijacking of IP address space for various purposes. That's it. Solve that in the SIMPLEST way possib

Re: soBGP deployment

2005-05-26 Thread Bill Woodcock
On Thu, 26 May 2005, Todd Underwood wrote: > the scalability problem, as i understand it (not at all an expert > here) is that routers won't currently handle such a list with regexps > very well. apparently, ciscos will not allow filtering advertisements > on a combination o

Re: soBGP deployment

2005-05-26 Thread Bill Woodcock
On Thu, 26 May 2005, Todd Underwood wrote: > the list of all prefixes seen in the global table combined with all > origination patterns seen for the past 6 months or so is realively > easy to produce. This is something that we, or RIPE/RIS, or RouteViews, could produce and cr

Re: soBGP deployment

2005-05-26 Thread Todd Underwood
steve, tony, all, just catching up. trying to ignore the TOS fest but the soBGP thread actually is interesting. On Wed, May 25, 2005 at 03:51:25PM -0700, Tony Li wrote: > > And yet, in the nine or so years I've been working on network > > infrastructure stuff, spoofed BGP announcements have ne

Re: soBGP deployment

2005-05-26 Thread william(at)elan.net
On Thu, 26 May 2005, Jeroen Massar wrote: In short, you mean setting up, eg a Quagga box behind the existing core infra that one has, feeding it a full feed, which matches the current best paths one has in it's RIB and verifying the paths. This is somewhat similar how the detection of GRH (*1

Re: soBGP deployment

2005-05-26 Thread Todd Underwood
tony, all, On Wed, May 25, 2005 at 04:24:07PM -0700, Tony Li wrote: > Fundamentally, there is a serious scalability issue with doing > everything at configuration generation time. Since one cannot predict > with certainty what AS paths will be seen for which prefix, one would > have to authenti

Re: soBGP deployment

2005-05-26 Thread Jeroen Massar
On Wed, 2005-05-25 at 16:24 -0700, Tony Li wrote: > For example, an operator can begin by enabling authentication on a BGP > speaker that is wholly outside of the traffic path. Instability of this > one speaker would have no effect on production traffic. Authentication > alarms generated by this

Re: soBGP deployment

2005-05-25 Thread Steve Gibbard
On Wed, 25 May 2005, Tony Li wrote: I know all the issues up there are real, since I've occasionally heard about them happening. I understand the devastating consequences of somebody finding a sufficiently well connected unfiltered BGP session and using it to announce some important prefixes.

Re: soBGP deployment

2005-05-25 Thread Tony Li
Daniel, Well, I wish I could have been part of the discussions that you had, as what you report is at variance with what I've heard. Fundamentally, there is a serious scalability issue with doing everything at configuration generation time. Since one cannot predict with certainty what AS path

Re: soBGP deployment

2005-05-25 Thread Tony Li
Steve, > I know all the issues up there are real, since I've occasionally heard > about them happening. I understand the devastating consequences of > somebody finding a sufficiently well connected unfiltered BGP session > and using it to announce some important prefixes. I fully agree that i

Re: soBGP deployment

2005-05-25 Thread Steve Gibbard
On Mon, 23 May 2005, Tony Li wrote: Which is EXACTLY why we need to remember that we are NOT trying to come up with the perfect solution. We have operational issues *TODAY* that we are trying to address. - We have people (admittedly accidentally) advertising prefixes that they do not own and

Re: soBGP deployment

2005-05-25 Thread Daniel Karrenberg
On 23.05 22:13, Tony Li wrote: > ... We, > as responsible operators/architects/vendors/coders need to pick a > solution and field it. It may well be an interim solution, but we MUST > act, and soon. We are already seeing the stress patterns, without > reinforcement it is only a matter of time be

Re: soBGP deployment

2005-05-24 Thread Tony Li
Randy, > wrong. as deployment will be expensive and long, we will have one chance to > deploy. so need a serious solution set for what we have to consider to be a > very serious attack model. plan for attacks against the routing system as > smart, well-researched, constant, ... as the best we

Re: soBGP deployment

2005-05-24 Thread Randy Bush
>>> the certificates are carried ... in soBGP in a new BGP message. >> btw, am i supposed to be cheered by yet another overloading of bgp? > Since S-BGP overloads signatures into the current packet formats, destroys > packing, and destroys peer groups, I'm not certain that you can make the > cla

Re: soBGP deployment

2005-05-24 Thread Randy Bush
> Which is EXACTLY why we need to remember that we are NOT trying to come > up with the perfect solution. We have operational issues *TODAY* that > we are trying to address. wrong. as deployment will be expensive and long, we will have one chance to deploy. so need a serious solution set for w

Re: soBGP deployment

2005-05-24 Thread Randy Bush
>>> the certificates are carried ... in soBGP in a new BGP message. >> btw, am i supposed to be cheered by yet another overloading of >> bgp? > Well gee Randy, I think you would have been happy. Here we are > carrying related data in the same place. related, but not congruent. so it is just ano

Re: soBGP deployment

2005-05-24 Thread Russ White
- soBGP allows the receiver to determine that the AS Path describes a plausible traversal across the network, but cannot validate that the update itself traversed this path. further, the latter, because it relies on a separate data set for path validity, has serious and very kinky temporal

Re: soBGP deployment

2005-05-24 Thread Russ White
the certificates are carried ... in soBGP in a new BGP message. btw, am i supposed to be cheered by yet another overloading of bgp? Since S-BGP overloads signatures into the current packet formats, destroys packing, and destroys peer groups, I'm not certain that you can make the claim tha

Re: soBGP deployment

2005-05-24 Thread Michael . Dillon
> >Why create reliance on more databases? The RIRs are iffy. We rely on DNS > >right now. Why not keep relying on it? This solution doesn't solve all of > >our problems, but it does help, its easy, and people will implement it. > > Who populates the DNS (well, the .arpa domain)? The RIRs do.

Re: soBGP deployment

2005-05-24 Thread Alexei Roudnev
eimer" <[EMAIL PROTECTED]> To: "Steven M. Bellovin" <[EMAIL PROTECTED]> Cc: "Pekka Savola" <[EMAIL PROTECTED]>; "Randy Bush" <[EMAIL PROTECTED]>; "vijay gill" <[EMAIL PROTECTED]>; Sent: Tuesday, May 24, 2005 1:44 AM Subject:

Re: soBGP deployment

2005-05-24 Thread Florian Weimer
* Steven M. Bellovin: > Fundamentally, the answer to this question is this: how accurate do you > think the routing registries are? I don't think it's important how accurate they are *now*, but how accurate they will be when some "secure" BGP version makes them (or, more precisely, the route re

Re: soBGP deployment

2005-05-24 Thread Alexei Roudnev
[EMAIL PROTECTED]> Cc: "Geoff Huston" <[EMAIL PROTECTED]>; "Daniel Golding" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Monday, May 23, 2005 10:25 PM Subject: Re: soBGP deployment > > > > -- You must not rely on

Re: soBGP deployment

2005-05-23 Thread Tony Li
> -- You must not rely on routing to secure routing. I would like to point out that this goal is unnecesary. First, we need to understand that for ANY solution to be deployable, it must be incrementally deployable. We do not get an Internet-wide flag day for BGP. The Internet must continue t

Re: soBGP deployment

2005-05-23 Thread Tony Li
> i receive a bgp announcement from a new peer, but the announcement > was originated two weeks ago (shockers! a stable route); was the > asserted path to my new peer valid when the announcement was > originated two weeks ago? once your mind starts down such paranoid > paths, the void opens befo

Re: soBGP deployment

2005-05-23 Thread Tony Li
>>the certificates are carried ... in soBGP in a new BGP message. > > > btw, am i supposed to be cheered by yet another overloading of > bgp? Well gee Randy, I think you would have been happy. Here we are carrying related data in the same place. And, in the long run, the authentication inf

Re: soBGP deployment

2005-05-23 Thread bmanning
On Mon, May 23, 2005 at 11:06:23PM -0400, Randy Bush wrote: > >> I suspect the right thing to do is to ask why soBGP and sBGP > >> have failed? > > Or maybe, jut maybe, because we've never had the tools to deploy > > it. > > actually, we had a small workshop with sbgp tools at the last > eugene n

Re: soBGP deployment

2005-05-23 Thread Randy Bush
>> I suspect the right thing to do is to ask why soBGP and sBGP >> have failed? > Or maybe, jut maybe, because we've never had the tools to deploy > it. actually, we had a small workshop with sbgp tools at the last eugene nanog. perhaps it's time for another? bill, can you host at he next nanog

Re: soBGP deployment

2005-05-23 Thread Suresh Ramasubramanian
On 5/24/05, Brad Knowles <[EMAIL PROTECTED]> wrote: > If you're talking about users, then all you have to do is > implement SPF at a few large sites like AOL, where they don't support > forwarding and therefore they don't care if they break forwarding, > where they want to force everyone t

Re: soBGP deployment

2005-05-23 Thread Randy Bush
> the certificates are carried ... in soBGP in a new BGP message. btw, am i supposed to be cheered by yet another overloading of bgp? randy

Re: soBGP deployment

2005-05-23 Thread Randy Bush
>> o with sbgp, the assertion of the validity of asn A announcing >> prefix P to asn B is congruent with the bgp signaling itself, >> A merely signs the assertion in the bgp announcement. > >> o with sobgp, the assertion is in an external database with >> issues such as > > This i

Re: soBGP deployment

2005-05-23 Thread Russ White
You do need "trusted third party" to act as PKI root signer. We're lucky because unlike other places, we do have hierarchy with ip addresses and ASNs and NIR is the "root" organization. Don't confuse cryptography with security. You need one trusted third party to arrange for the cryptography

Re: soBGP deployment

2005-05-23 Thread Brad Knowles
At 3:24 PM -0400 2005-05-23, Daniel Golding wrote: A bizarre assertion was made that only a "few" are implementing SPF, which is demonstrably untrue. It depends on whether you're talking about "few" relative to the number of mail systems in the world, or "few" relative to the number of u

Re: soBGP deployment

2005-05-23 Thread Russ White
The essential difference as far as I can see today between soBGP and sBGP in this space is that, as a 2 liner: - sBGP allows the receiver to validate that the update indeed traversed the path described in the AS Path Update as part of the local acceptance of the update. - soBGP allows t

Re: soBGP deployment

2005-05-23 Thread Russ White
1) Keep the security ancillary data nearby. You might need it when the source of the data is unreachable (perhaps because of an incident like a flood). That is why in my view soBGP is something that can only be deployed as an after-filter (i.e. ones full BGP mesh is in for decisions about

Re: soBGP deployment

2005-05-23 Thread Russ White
o with sbgp, the assertion of the validity of asn A announcing prefix P to asn B is congruent with the bgp signaling itself, A merely signs the assertion in the bgp announcement. o with sobgp, the assertion is in an external database with issues such as - data correctness & compl

Re: soBGP deployment

2005-05-23 Thread Russ White
It seems to me that a more workable solution in today's Internet, is to decouple the definition of the information exchanged by network operators from the protocol used to exchange the information. It should be possible to design a system in such a way that a network operator can choose whet

Re: soBGP deployment

2005-05-23 Thread Jay R. Ashworth
On Mon, May 23, 2005 at 02:00:12PM -0400, Daniel Golding wrote: > One of the Internetworking community's biggest problems is a fixation on the > perfect solution. Its natural - we're engineers, after all. We want an > elegant 100% solution to our ills. This often leads to something that never > ge

Re: soBGP deployment

2005-05-23 Thread Valdis . Kletnieks
On Mon, 23 May 2005 15:24:20 EDT, Daniel Golding said: > A bizarre assertion was made that only a "few" are implementing SPF, which > is demonstrably untrue. Its getting implemented because its easy, not "It's easy to deploy an incomplete solution". Why does my Spidey-sense scream that this is a

Re: soBGP deployment

2005-05-23 Thread Daniel Golding
One correction: I shouldn't have said: "The RIRs are iffy". It should have been "The IRRs are iffy". A world of difference. I understand the limitations. However, no one is rushing to implement most of the things that folks in this thread are obsessing over: DNSSec, IPV6, sBGP, soBGP. A bizarr

Re: soBGP deployment

2005-05-23 Thread Geoff Huston
At 04:00 AM 24/05/2005, Daniel Golding wrote: I suspect the right thing to do is to ask why soBGP and sBGP have failed? And yes, they've failed. Just like DNSSec, we aren't seeing even limited adoption. Why? Too complex, too many moving parts, too much reliance on iffy third parties and requi

Re: soBGP deployment

2005-05-23 Thread Edward Lewis
At 14:00 -0400 5/23/05, Daniel Golding wrote: My reply is mostly tongue-in-cheek. I think it's always healthy to explore alternatives. Why not do something simple? The in-addr.arpa reverse delegation tree is pretty accurate. We use it for lots of different things. Why not just give IP addre

Re: soBGP deployment

2005-05-23 Thread bmanning
On Mon, May 23, 2005 at 08:15:15PM +0200, Jeroen Massar wrote: > On Mon, 2005-05-23 at 14:00 -0400, Daniel Golding wrote: > > > > I suspect the right thing to do is to ask why soBGP and sBGP have failed? > > > > And yes, they've failed. Just like DNSSec, we aren't seeing even limited > > adoptio

Re: soBGP deployment

2005-05-23 Thread Jeroen Massar
On Mon, 2005-05-23 at 14:00 -0400, Daniel Golding wrote: > > I suspect the right thing to do is to ask why soBGP and sBGP have failed? > > And yes, they've failed. Just like DNSSec, we aren't seeing even limited > adoption. Why? Too complex, too many moving parts, too much reliance on iffy > thir

Re: soBGP deployment

2005-05-23 Thread Daniel Golding
I suspect the right thing to do is to ask why soBGP and sBGP have failed? And yes, they've failed. Just like DNSSec, we aren't seeing even limited adoption. Why? Too complex, too many moving parts, too much reliance on iffy third parties and requires mass adoption. I suggest that the community

Re: soBGP deployment

2005-05-23 Thread Edward Lewis
At 10:37 -0700 5/23/05, william(at)elan.net wrote: You do need "trusted third party" to act as PKI root signer. We're lucky because unlike other places, we do have hierarchy with ip addresses and ASNs and NIR is the "root" organization. Don't confuse cryptography with security. You need one

Re: soBGP deployment

2005-05-23 Thread bmanning
for the old-timers this is not quite sBGP or soBGP, but does have many of the desirable traits for the new kids on the block, if ISPs want to do this, its something they can do themselves, w/o centralized coordination, on an incremental basis. http://www.isoc.org/inet98/proceedings/6h/

Re: soBGP deployment

2005-05-23 Thread william(at)elan.net
On Mon, 23 May 2005, Edward Lewis wrote: 1) Keep the security ancillary data nearby. You might need it when the source of the data is unreachable (perhaps because of an incident like a flood). That is why in my view soBGP is something that can only be deployed as an after-filter (i.e. one

Re: soBGP deployment

2005-05-23 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Iljitsch van Beijn um writes: > >On 23-mei-2005, at 17:39, Randy Bush wrote: > >> o with sbgp, the assertion of the validity of asn A announcing >> prefix P to asn B is congruent with the bgp signaling itself, >> A merely signs the assertion in the bgp ann

Re: soBGP deployment

2005-05-23 Thread Michael . Dillon
> Security ought to not make the system being protected brittle. Like > the example of routing changes being held up until the paperwork went > through - maybe an improvement in tools will enable this. It should be possible for a network operator to make their own policy decisions on this. Som

Re: soBGP deployment

2005-05-23 Thread Edward Lewis
At 11:27 -0400 5/23/05, Larry J. Blunk wrote: I suspect this was due to the fact that template submissions were not fully automated at the time and required human review (disclaimer: I worked for the MichNet side of Merit back then and was not intimately familiar with PRDB operations). It

Re: soBGP deployment

2005-05-23 Thread Michael . Dillon
> but this just underscores the difference here > its the old simplicity vs complexity game yet again Why should the IETF be making the tradeoff decision here rather than the operators? It seems to me that a more workable solution in today's Internet, is to decouple the definition of the infor

Re: soBGP deployment

2005-05-23 Thread Iljitsch van Beijnum
On 23-mei-2005, at 17:39, Randy Bush wrote: o with sbgp, the assertion of the validity of asn A announcing prefix P to asn B is congruent with the bgp signaling itself, A merely signs the assertion in the bgp announcement. o with sobgp, the assertion is in an external database wi

Re: soBGP deployment

2005-05-23 Thread Randy Bush
my weak memory, it was due to a number of factors, some in the database update workflow, some in the uneven usage workflow, e.g. ans updating once, or was it twice, a week. but this just underscores the difference here o with sbgp, the assertion of the validity of asn A announcing prefix

Re: soBGP deployment

2005-05-23 Thread Larry J. Blunk
On Mon, 2005-05-23 at 10:11 -0400, Randy Bush wrote: > > If you look back to the NSFNet days (prior to a decade ago) and > > the PRDB (Policy Routing Database), you might very well draw a > > different conclusion. > > indeed, one of utter disaster. it would take days or weeks > before one could

Re: soBGP deployment

2005-05-23 Thread Randy Bush
> If you look back to the NSFNet days (prior to a decade ago) and > the PRDB (Policy Routing Database), you might very well draw a > different conclusion. indeed, one of utter disaster. it would take days or weeks before one could route a prefix. randy

Re: soBGP deployment

2005-05-23 Thread Larry J. Blunk
On Sat, 2005-05-21 at 16:03 -0400, Steven M. Bellovin wrote: > Look at it this way: do you think that (a) most > sites will publish their policies in the registry, and (b) they'll > remember to update them? As Randy has noted, we have a decade of > experience suggesting that neither is true.

Re: soBGP deployment

2005-05-23 Thread william(at)elan.net
On Sat, 21 May 2005, Pekka Savola wrote: There's nothing to say the functional equivalent of certificate could also not be passed in an option or some other means as well when needed. My assumption would be that being able to use public databases would be a protocol optimization. I think

Re: soBGP deployment

2005-05-22 Thread Iljitsch van Beijnum
On 21-mei-2005, at 20:25, Randy Bush wrote: If you are an operator, would you deploy soBGP or something like it? If not, why not. [skip to the bottom for my reaction to Randy's post] I think it would be a very good idea to start experimenting with this as soon as there are decent impleme

Re: soBGP deployment

2005-05-21 Thread Russ White
Note that the original soBGP didn't require any updates when the peering relationships changed; based on a quick look, a later extension has probably changed this. one of the 29 hacks to sobgp to try to fix this and that (kinda like w's social security program). this one was to address the

Re: soBGP deployment

2005-05-21 Thread Russ White
With SBGP, each node signs the BGP statements it's about to send out. The accuracy of the security statement is thus linked to the transmission process. With SO-BGP, the security against in-path attacks (or cut-and-paste attacks; see below) relies on a secure version of the routing registry

Re: soBGP deployment

2005-05-21 Thread Randy Bush
> Yet, what is the (SBGP) alternative? that the assertion of as-path is produced by the very bgp sessions themselves. simple and congruent, relying on no other data, and can vary in real-time. > I don't think we have much success distributing this kind of > certificates in similar scenario eit

Re: soBGP deployment

2005-05-21 Thread Jeroen Massar
On Sat, 2005-05-21 at 16:03 -0400, Steven M. Bellovin wrote: > Let me add a word about cut-and-paste attacks. A signed origin > statement asserts that some AS owns some prefix. That statement will > be readily available. A nefarious site could cut that statement from > some actual BGP sess

Re: soBGP deployment

2005-05-21 Thread Pekka Savola
On Sat, 21 May 2005, Steven M. Bellovin wrote: With SBGP, each node signs the BGP statements it's about to send out. The accuracy of the security statement is thus linked to the transmission process. With SO-BGP, the security against in-path attacks (or cut-and-paste attacks; see below) relies

Re: soBGP deployment

2005-05-21 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Pekka Savola writes: > >On Sat, 21 May 2005, Randy Bush wrote: >> something like it, for sure. but i vastly prefer the s-bgp >> approach as it maps closely to bgp operational reality, and does >> not rely on a published policy database, which we have seen fail >> f

Re: soBGP deployment

2005-05-21 Thread Pekka Savola
On Sat, 21 May 2005, Randy Bush wrote: something like it, for sure. but i vastly prefer the s-bgp approach as it maps closely to bgp operational reality, and does not rely on a published policy database, which we have seen fail for over a decade, etc. So, can someone point out the important o

Re: soBGP deployment

2005-05-21 Thread Randy Bush
> If you are an operator, would you deploy soBGP or something like it? If > not, why not. as smb has said for years, routing and dns are the two largest vulnerabilities. something like it, for sure. but i vastly prefer the s-bgp approach as it maps closely to bgp operational reality, and doe

Re: soBGP deployment

2005-05-21 Thread Andrew Dul
At 02:31 PM 5/20/2005 -0400, Christopher Woodfield wrote: > >As far as answering the "First Goal" of the article, I really don't >see much here that isn't handled today by route registries, except >for the TLS certificate stuff. Not sure how much security that adds, >practically; how often d

Re: soBGP deployment

2005-05-20 Thread Christopher L. Morrow
On Fri, 20 May 2005, Christopher Woodfield wrote: > implemented realistically at the single-peer level the paper > mentions. Just don't ask me to run it on a GRP-B. I think it'd be running on even your customer's 2500... and your 7500 and your 7200. :) hurray! :)

Re: soBGP deployment

2005-05-20 Thread Christopher Woodfield
As far as answering the "First Goal" of the article, I really don't see much here that isn't handled today by route registries, except for the TLS certificate stuff. Not sure how much security that adds, practically; how often do people see their route objects jacked by hax0rs? For the "Se