Re: [sidr] DDoS mitigation example (was: RE: comments on the repository analysis I-D)

2013-03-20 Thread Danny McPherson
On Mar 20, 2013, at 7:23 PM, "Sriram, Kotikalapudi" wrote: > The DDoS mitigation example was discussed before. > It appeared there was a reasonable solution. > Please see this post: > http://www.ietf.org/mail-archive/web/sidr/current/msg05605.html Might work for Joel, not me... -danny __

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Arturo Servin
On 20/03/2013 20:00, Borchert, Oliver wrote: >> On 20/03/2013 17:41, Russ White wrote: >>> What we probably need need is something that flags that a Certificate or a ROA has disappeared in the last X time. Then as operator we could take the action to decide if this was an attack

[sidr] DDoS mitigation example (was: RE: comments on the repository analysis I-D)

2013-03-20 Thread Sriram, Kotikalapudi
The DDoS mitigation example was discussed before. It appeared there was a reasonable solution. Please see this post: http://www.ietf.org/mail-archive/web/sidr/current/msg05605.html Sriram > >From: sidr-boun...@ietf.org [mailto:sidr-boun...@ietf.org] On Behalf Of >Danny McPherson >Sent: Wednesday

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Borchert, Oliver
> On 20/03/2013 17:41, Russ White wrote: > > > >>What we probably need need is something that flags that a > >> Certificate or a ROA has disappeared in the last X time. Then as > >> operator we could take the action to decide if this was an attack or a > >> valid > revocation. > > > > That is

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Arturo Servin
On 20/03/2013 17:41, Russ White wrote: > >> What we probably need need is something that flags that a Certificate >> or a ROA has disappeared in the last X time. Then as operator we could >> take the action to decide if this was an attack or a valid revocation. > > That is probably a good

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread John Curran
On Mar 20, 2013, at 2:26 PM, Russ White wrote: >> I never argued with addressing the risks that might be posed; I was pointing >> out that the risk does not equate (on its own) with a reachability event, as >> alluded to by the paper. > > That all depends on the policy undertaken by each speci

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Montgomery, Douglas
On 3/20/13 4:41 PM, "Russ White" wrote: > >> What we probably need need is something that flags that a Certificate >> or a ROA has disappeared in the last X time. Then as operator we could >> take the action to decide if this was an attack or a valid revocation. > >That is probably a good i

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Russ White
> What we probably need need is something that flags that a Certificate > or a ROA has disappeared in the last X time. Then as operator we could > take the action to decide if this was an attack or a valid revocation. That is probably a good idea... But since the ROAs are time based themsel

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Murphy, Sandra
Speaking as regular ol' member >That all depends on the policy undertaken by each specific provider, >doesn't it? How can you tell the difference between a route with no ROA >because the registry has decertified, and a route with no ROA simply >because one hasn't ever been created? To an ISP who

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Arturo Servin
That could be attacked as well. Then we will have something to tell that an entry exists for the table that tells that roas exists. :) What we probably need need is something that flags that a Certificate or a ROA has disappeared in the last X time. Then as operator we could take

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Russ White
>> 1. Removing the ROAs is a problem in terms of increased risk, which is a >> problem which needs to be addressed. > > I never argued with addressing the risks that might be posed; I was pointing > out that the risk does not equate (on its own) with a reachability event, as > alluded to by the

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Russ White
>> It seems, to me, that if the RPKI can't be used to actually validate who >> owns what route with certainty, we're going to a lot of trouble for >> nothing... Or maybe folks are trying to have their cake and eat it to. >> "We'll provide solid security which you can ignore if you like, no >> prob

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread John Curran
On Mar 20, 2013, at 1:51 PM, Russ White wrote: > How often do you think an attacker would bother with taking out a ROA > without taking out the route as well? Invert the question... Of the thousands of entities that could today inject (hostile) routes and do a hijack today, how many of them wil

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Murphy, Sandra
Speaking as a regular ol' member >It seems, to me, that if the RPKI can't be used to actually validate who >owns what route with certainty, we're going to a lot of trouble for >nothing... Or maybe folks are trying to have their cake and eat it to. >"We'll provide solid security which you can ignor

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Russ White
> Loss of a ROA (e.g. due to an attack on the RPKI system) does not > cause a _reachability event_ if folks are using best practices for > route precedence; that's what was implied in the paper and is wrong. > Successful attacks against the RPKI system do have an impact, but it > is simply th

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread John Curran
On Mar 20, 2013, at 1:10 PM, Russ White wrote: > In response to a paper that says removing ROAs is a form of DoS, or that > there are potential problems in the space of the relationship between > the registry and the address owner, then we've moved from "unknown," to > "contested." The response g

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Russ White
> There is a difference. > Invalid: someone is certified to own it and someone ELSE is originating. > Unknown: No one is certified owner. Yes, I know that --but when someone says this: > I agree with John's observations. We need to stop making the > statement "no roa == no route", because it's s

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Jakob Heitz
On , Russ White <> wrote: >> I agree with John's observations. We need to stop making the >> statement "no roa == no route", because it's simply not true. > > There's something I probably don't understand here... > > 1. SIDR's ROA/RPKI infrastructure is designed to provide security for > route o

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Roque Gagliano (rogaglia)
inline. On Mar 20, 2013, at 4:21 PM, Danny McPherson wrote: > On 2013-03-20 09:00, Roque Gagliano (rogaglia) wrote: > >> I do not believe the work has been peer-reviewed and I detected a >> couple of bizarre statements (such as deleting an object = revocation >> or the idea of "overwriting" a R

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Russ White
> I agree with John's observations. We need to stop making the statement > "no roa == no route", because it's simply not true. There's something I probably don't understand here... 1. SIDR's ROA/RPKI infrastructure is designed to provide security for route origination. 2. Security for route ori

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Danny McPherson
On 2013-03-20 09:15, Richard Barnes wrote: One other thing to note is that manipulation is indistinguishable from legitimate revocation, at a technical level.  So the only solution here is at the human layer, for RPKI relying party software to have operator overrides.  Randy stated this better

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Danny McPherson
On 2013-03-20 09:00, Roque Gagliano (rogaglia) wrote: I do not believe the work has been peer-reviewed and I detected a couple of bizarre statements (such as deleting an object = revocation or the idea of "overwriting" a ROA to replace an existing one). Much of the work presented here is not "

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Richard Barnes
Hey Danny, I read the paper. Maybe it's that I'm missing the voice-over for the slides, but I don't really see anything new here. Every new security mechanism creates a new DOS possibility. If you screw up your HTTPS cert or your CA revokes it, your website goes down. This happens because only

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Roque Gagliano (rogaglia)
Danny, Thanks for the link. I read the doc. I do not believe the work has been peer-reviewed and I detected a couple of bizarre statements (such as deleting an object = revocation or the idea of "overwriting" a ROA to replace an existing one). What I believe it adds to our work are a number of

Re: [sidr] comments on the repository analysis I-D

2013-03-20 Thread Danny McPherson
On Mar 20, 2013, at 9:44 AM, Stephen Kent > You cite DDoS mitigation as an example, whereas it seems to be more the > example. Bah.. How many examples do you need? > Also, it's not clear > that asserting a new origin AS for a target of such an attack is the only way > to deal with the pr

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Carlos M. Martinez
I agree with John's observations. We need to stop making the statement "no roa == no route", because it's simply not true. So far in my reading of the full paper, many of the 'vulnerabilities' they mention (quotes intended, I'm not sure the word is properly applied given the context) appear to (

Re: [sidr] comments on the repository analysis I-D

2013-03-20 Thread Stephen Kent
Danny, On 2013-03-18 10:47, Stephen Kent wrote: There are at least two issue here: how quickly a new/changed ROA is published after it is created/modified, and how quickly one should expect all RPs to have acquired this info. The RPKI propagation model for ROAs was based on the observation tha

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread John Curran
On Mar 20, 2013, at 7:21 AM, Danny McPherson wrote: >> Danny - Is there really a "tight coupling" if providers are >> following the recommend BGP origin validation best practices? > > I said BGPSEC... Got it - the presentation suggests that RPKI poses risks to network reachability due to att

[sidr] Fwd: Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Danny McPherson
>> Danny - Is there really a "tight coupling" if providers are >> following the recommend BGP origin validation best practices? > > I said BGPSEC... However, my statement does apply to origin validation as well, in some envisaged deployment models... -danny __

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Danny McPherson
> Danny - Is there really a "tight coupling" if providers are > following the recommend BGP origin validation best practices? I said BGPSEC... -danny ___ sidr mailing list sidr@ietf.org https://www.ietf.org/mailman/listinfo/sidr

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Arturo Servin
And THE organization can also take down bgp-peers, shutdown interfaces, etc. At the end, it is its space, they can revoke certs. Cheers, as On 3/20/13 9:50 AM, Danny McPherson wrote: > > Interesting presentation here: > > http://www.cs.bu.edu/~goldbe/papers/Cooper_RPKI_BFOC.pd

Re: [sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread John Curran
On Mar 20, 2013, at 6:50 AM, Danny McPherson wrote: > Interesting presentation here: > > http://www.cs.bu.edu/~goldbe/papers/Cooper_RPKI_BFOC.pdf > > "The RPKI (Resource Public Key Infrastructure) is a new infrastructure to > secure Internet routing > It’s been in deployment since ~2011 But, i

[sidr] Princeton University:: Impacting IP Address Reachability via RPKI Manipulations

2013-03-20 Thread Danny McPherson
Interesting presentation here: http://www.cs.bu.edu/~goldbe/papers/Cooper_RPKI_BFOC.pdf "The RPKI (Resource Public Key Infrastructure) is a new infrastructure to secure Internet routing It’s been in deployment since ~2011 But, it also creates new risks (misconfigurations and takedowns) that

Re: [sidr] comments on the repository analysis I-D

2013-03-20 Thread Danny McPherson
On 2013-03-18 10:47, Stephen Kent wrote: There are at least two issue here: how quickly a new/changed ROA is published after it is created/modified, and how quickly one should expect all RPs to have acquired this info. The RPKI propagation model for ROAs was based on the observation that, typ