Re: [sidr] the need for speed

2012-12-19 Thread Sriram, Kotikalapudi
On Dec 18, 2012, at 3:03 PM, Sriram, Kotikalapudi kotikalapudi.sri...@nist.gov wrote: Adding to Oliver's suggestion, it will be even more effective if, in the origin only case, the mitigator announces a slightly more specific (e.g., two /17s for a /16) if the maxlength of the victim's

Re: [sidr] the need for speed

2012-12-19 Thread Russ White
The proposed solution would work fine in practice as well. Whichever prefix (or more specific of it) that the mitigator and the victim decide to propagate (via the mitigator) for DDoS mitigation today in BGP, the same prefix can also be propagated with BGPSEC (and more securely). How

Re: [sidr] the need for speed

2012-12-19 Thread Sriram, Kotikalapudi
Whichever prefix (or more specific of it) that the mitigator and the victim decide to propagate (via the mitigator) for DDoS mitigation today in BGP, the same prefix can also be propagated with BGPSEC (and more securely). I thought we were just talking about _Origin_ Validation, not

Re: [sidr] Poll: WG acceptance of draft-ymbk-rpki-grandparenting-02

2012-12-19 Thread George, Wes
1) Is the problem described/solved by draft-ymbk-rpki-grandparenting-02 actually a problem that the WG needs to address? (Answer: yes or no. Additional information is welcomed, but I don't want people to repeat the whole discussion.) [WEG] yes, but I tend to agree that it's not a technical

Re: [sidr] the need for speed

2012-12-19 Thread Tim Bruijnzeels
Hi Danny, WG, People have mentioned that if the security was somehow part of the updates themselves, then you could have security at the speed of updates. I don't see how this could work, it would have to be a completely different set of standards from what's currently being worked on. Most

Re: [sidr] the need for speed

2012-12-19 Thread Shane Amante
Sriram, On Dec 19, 2012, at 8:25 AM, Sriram, Kotikalapudi kotikalapudi.sri...@nist.gov wrote: Whichever prefix (or more specific of it) that the mitigator and the victim decide to propagate (via the mitigator) for DDoS mitigation today in BGP, the same prefix can also be propagated with

Re: [sidr] the need for speed

2012-12-19 Thread Pradosh Mohapatra (pmohapat)
[1] I'd also note there are legitimate cases where customers may be unable to serve traffic for their content/service/application, (think: unexpected, but legitimate flash crowds/traffic combined with under-provisioned tail circuit capacity). In that case, it may be far easier for the customer to

Re: [sidr] the need for speed

2012-12-19 Thread Christopher Morrow
On Wed, Dec 19, 2012 at 12:33 PM, Pradosh Mohapatra (pmohapat) pmoha...@cisco.com wrote: In these use cases, what breaks if we allow two ROAs to co-exist in the system (one authorizing the customer AS and one authorizing the proxy AS the system already permits multiple ROA's for the same

Re: [sidr] the need for speed

2012-12-19 Thread Randy Bush
[ apologies for having the attention span of a chihuahua, but i am being eaten by airplanes and relatives ] i was trying to make only two points o there is a useful poster child for the need for O(minutes) rpki (or perhaps just roa) propagation. as folk have repeatedly said, we need

Re: [sidr] the need for speed

2012-12-19 Thread Carlos M. Martinez
On 12/19/12 3:33 PM, Pradosh Mohapatra (pmohapat) wrote: [1] I'd also note there are legitimate cases where customers may be ... In these use cases, what breaks if we allow two ROAs to co-exist in the system (one authorizing the customer AS and one authorizing the proxy AS to originate

Re: [sidr] the need for speed

2012-12-19 Thread Richard Barnes
In these use cases, what breaks if we allow two ROAs to co-exist in the system (one authorizing the customer AS and one authorizing the proxy AS to originate the prefix) _much before_ the attack (or storm) takes place? After all, this is a valid business relationship. Choose your pill wisely.

Re: [sidr] the need for speed

2012-12-19 Thread Pradosh Mohapatra (pmohapat)
In these use cases, what breaks if we allow two ROAs to co-exist in the system (one authorizing the customer AS and one authorizing the proxy AS to originate the prefix) _much before_ the attack (or storm) takes place? After all, this is a valid business relationship. Choose your pill wisely.

Re: [sidr] the need for speed

2012-12-19 Thread Pradosh Mohapatra (pmohapat)
In these use cases, what breaks if we allow two ROAs to co-exist in the system (one authorizing the customer AS and one authorizing the proxy AS the system already permits multiple ROA's for the same prefix, right? Yes (e.g. multihoming) and hence the question of why we can't use that

Re: [sidr] the need for speed

2012-12-19 Thread Christopher Morrow
On Wed, Dec 19, 2012 at 1:54 PM, Pradosh Mohapatra (pmohapat) pmoha...@cisco.com wrote: No, thanks for clarifying. For DDoS mitigation at least, I thought there would be a prior business relationship. I am not familiar with on-the-fly relationship building process. for that case, and shane's

Re: [sidr] the need for speed

2012-12-19 Thread Sriram, Kotikalapudi
There are still a few problems with your proposal: 1) Spoofing the Origin ASN means you will always have a longer AS_PATH length (Spoofed Origin ASN + Proxy AS) vs. just originating the IP prefix from the Proxy AS. Yes, you can _try_ to workaround that using some of the 'tricks' I outlined

Re: [sidr] the need for speed

2012-12-19 Thread Borchert, Oliver
In these use cases, what breaks if we allow two ROAs to co-exist in the system (one authorizing the customer AS and one authorizing the proxy AS to originate the prefix) _much before_ the attack (or storm) takes place? After all, this is a valid business relationship. Choose your pill wisely.

Re: [sidr] the need for speed

2012-12-19 Thread Shane Amante
On Dec 19, 2012, at 2:12 PM, Sriram, Kotikalapudi kotikalapudi.sri...@nist.gov wrote: [--snip--] FWIW, I disagree with your assertions, but am cutting to the chase, because I think you're still failing to understand why/when it's not possible to spoof the Victim's AS. 2) I'm sure you