On Mon, Nov 24, 2014 at 3:08 PM, Smith, Donald
<donald.sm...@centurylink.com> wrote:
> Wouldn't GTSM and tcp-ao help with DOS attacks?
>

I think this was focused only on the uplift to bgp that bgpsec is
supposed to be, so the assumption was/is that you'd already be doing
'bgp best practices'.

(authors are free to correct me, as always)
-chris

> I would recommend they be put in in the paragraph below.
>
> 7.3 Mitigation of Denial of Service Attacks
>
> BGPSEC speakers
>    should implement an update validation algorithm that performs
>    expensive checks (e.g., signature verification) after performing less
>    expensive checks (e.g., syntax checks).  The validation algorithm
>    specified in Section 5.2 was chosen so as to perform checks which are
>    likely to be expensive after checks that are likely to be
>    inexpensive.
>
>
>
> https://tools.ietf.org/html/rfc5082
>
>
>
> https://tools.ietf.org/html/rfc5925
>
>
>
> As examples or recommendations for the "less expensive" checks.
>
>
>
> In fact it should be GTSM, tcp-ao THEN bgpsec validation.
>
>
>
>
>
>
>
> (coffee != sleep) & (!coffee == sleep)
>  donald.sm...@centurylink.com
> ________________________________
> From: sidr [sidr-boun...@ietf.org] on behalf of Stephen Kent [k...@bbn.com]
> Sent: Monday, November 24, 2014 12:35 PM
> To: sidr@ietf.org
> Subject: Re: [sidr] New version : draft-ietf-sidr-bgpsec-protocol-10
>
> Wes,
>
> To first order I agree with your concern of this DoS vulnerability,
> but with some minor clarifications.
>
> 1. BGPsec-signed updates are sent only between ASes that agree to
> send and receive (separate choices) this signed data. So, an
> attack of this sort is perpetrated only against an immediate neighbor
> that agrees to accept BGPsec traffic from you. You cannot send
> a BGPsec route to an arbitrary AS that it not configured for you
> as a neighbor.
>
> 2. As you noted, an AS can generate a path only for ASes that it
> holds, and thus, for which it holds private keys. So, a long path
> of the sort you describe is directly traceable to the resources holder,
> creating a "smoking gun" effect, for forensic purposes.
>
> If we can agree on a max path length, based on real world data, and
> RECOMMEND that routers enforce this limit, we can mitigate the
> ability of an AS to Dos it's neighbor (and others). That, combined with
> the ability to identify who added all of the questionable AS entries,
> might provide a deterrent to this behavior.
>
> Still, even with a max path length, there is the potential to add just a
> few,
> unnecessary ASes to every signed route that traverses an evil AS, to add to
> the burden of neighbors and those beyond. Given all the folks who track
> routing updates, this too will probably be noted by a bunch of folks, and
> because of the signatures, there will be no doubt about the source(s). So,
> here too, that may prove to be a deterrent.
>
> I believe someone at the meeting observed that smart implementations will
> try to address this sort of concern by postponing BGPsec crypto processing
> when resources get scarce. While I agree that this represents another attack
> vector, the ability to identify the perpetrators may diminish the attraction
> of this attack strategy.
>
> In any case, this is a good topic to address, perhaps in the BGPsec
> security considerations section, plus a separate document that suggests
> implementation notes.
>
> Steve
>
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> This communication is the property of CenturyLink and may contain
> confidential or privileged information. Unauthorized use of this
> communication is strictly prohibited and may be unlawful. If you have
> received this communication in error, please immediately notify the sender
> by reply e-mail and destroy all copies of the communication and any
> attachments.
>
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
>

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to