On 2014-05-12 15:42, George, Wes wrote:
I see a thread dated 2013 Nov in GROW, in which substantive discussion and
comments were provided after -03 was published, in which the authors
mainly just expressed why they were frustrated with SIDR and the IETF in general for in their minds, ignoring this problem because it was hard,
rather than addressing the concerns raised within the WG. -04 is a
keepalive to reset the expiration date with no substantive updates. Why
are we now talking about WGLC?

Because we'd like this memorialized in an Informational RFC, that's the purpose, methinks.

Chris, you were one of the ones who said that your comments hadn’t been
addressed yet.

(https://mailarchive.ietf.org/arch/msg/grow/0ho_RU3e15TCvp4p8ScCeObk42Y)

Eric owns comments follow-up, I'll defer to him on responding to that bit....

Substantive comments:
This document provides one example of a route leak causing a problem that BGPSec does not protect against, but still does not do much to provide
guidance on how such a leak would be systematically identified,

Nor does it have to in any programmatic way, IMO. It's easy for an entry level routing person to understand what the problem is here, hell, they have to deal with them every day. It doesn't have to expand to every possible reason or define detection mechanisms. We hope folks that read such things will be as clever as the SIDR folks and solve this solution :-)

However, if you can be more specific about examples not covered or send text then we'd be happy to incorporate it.

It does
note that there are data supporting the assertion that this is a real
problem, and imply that perhaps additional analysis of that data would reveal more information. I don’t think that anyone would dispute that this
is a valid attack. However:
"This document is meant to provide input into routing protocol design
choices being
considered within the IETF, and to foster discussion of the practical implications of "policy" and "intent" in operational routing system
        security."

This document provides no actionable guidance beyond articulating the
basics of the attack, certainly no meaningful discussion of policy vs
intent other than to note that discerning intent is difficult, and as such
the draft is absolutely not ready for publication if the above is its
goal.

We didn't say we'd proclaim all is accomplished, we said we'd like to foster discussions of policy v. intent. This very discussion makes me think it works, and given that even you don't think anyone would dispute that this is a valid attack, I claim success and request publication -- although perhaps we should update with more recent leak references and we can certainly encourage more folks to do research, with a stable reference, which was precisely the intent.

We’re not hiding behind SIDR’s carefully crafted requirements and
charter here, so let’s actually have the discussion about policy and
intent and see if we can come to some consensus on how to use that info to define a route leak such that we can first systematically find, and then
protect against it.

I'm glad you agree it was carefully crafted. This draft is only meant to document the issue above, which you seem to agree that no one would dispute. It doesn't need to be the kitchen sink for attack vectors.

I absolutely want to see a solution to this problem,
but one example/existence proof isn’t enough to get us moving in that
direction.

I don't think that's a surprise Wes. We should document what some believe the problems are before we begin designing solutions, else we'll end up with more complicated solutions that don't address what me operators believe to be the key issues.


-danny

_______________________________________________
GROW mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/grow

Reply via email to