Greetings,

I am reviewing

draft-ietf-opsawg-prefix-lengths-03

I think this proposal is broadly ready for  advancement and I don't there there are huge problems with the document as is other that the method for creating authenticated prefixleg data and then  autheticating that prefixlen data is probably onerous.

A couple of notes accumulated while reading.

      In IPv4, IP addresses can be blocked at
      different prefix levels, such as /24 or /32.

it's more accurate to observe that IPv4 blocklists can leverage variable length subnet masks from (typically) rir assignment or ISP swip whois  all the way down to individual maximally deaggregated ipv4 addresses (/32) .  The purpose associated with the blocklist may dictate shorter prefixes, e.g. if  the blocklist is identifying residential users, hosting providers, dynamic pools, geoip regions then subnetting may track the IPv4 usage.

      In IPv6 on the other
      hand, blocking at e.g. the /64 level could lead to overblocking
      (throwing multiple VMs from different users into the same bucket),
      while blocking at the e.g. /128 level would lead to filling up
      space in the blocklist pretty quickly.  The same applies to
      throttling.  [I-D.ietf-opsec-ipv6-addressing] recently also raised
      this issue.

Other than  the general feasibility problem with /128s   the problem doesn't go away at the /64 level.   BT (AS856)  announces uniformly 2a00:2380::/25 as the prefix containing customer assignment.  deaggregating to the /64 if you believe that is the appriate level  then there are potentially 2^39 entries necessary to render them all.


      *  Rate limiting/CAPTCHAs: A similar issue arises on the Web, where
      "close" prefixes might be thrown together (e.g. in the same /56,
      even though the ISP hands out /64s), which leads to people
      "jointly" running into rate limits and then either being blocked
      from a service or having to solve annoying CAPTCHAs.

I have been exposed to rate limits present at the /48 level also so it's not facile to assume that such behavior would be limited to  prefixes commonly assigned via prefix delegation.

an example prefix list that is publicly available that has most of these properties is the apple privacy relay list.

e.g.
https://developer.apple.com/icloud/prepare-your-network-for-icloud-private-relay/
https://mask-api.icloud.com/egress-ip-ranges.csv

3.2.  End-site prefix length with CGN


I'm not sure that this section should exclude or simply ommits the possibiliy that someone would use  this mechanism in ipv6.

e.g.  using  the  privacy relay example, this is an https/quic proxy service not a nat.

2a04:4e41:700::/40,US,US-MA,BOSTON,

we can plausibly describe the order of magnitude number of users associated with this prefix. moreover one wouldn't specify customer assignments within the range because there are no direct assignments. IPs may be doled out at random or there may be a method for allocating them, which is a good reason to not specify an end site length.


   Unfortunately, the RPSL in
   some repositories is weakly authenticated at best.  An approach where
   RPSL was signed per [RFC7909] would be good, except it would have to
   be deployed by all RPSL registries, and there is a fair number of
   them.

The RADB method of rejecting route objects which would be invalidated by an existing ROA is potentially helpful. I think the proposed autheticator method is plausible e.g. I would expect to provide a somewhat stronger level of auhtetication.

   The consumer of prefixlen data SHOULD fetch and process the data
   themselves.  Importing datasets produced and/or processed by a third-
   party places significant trust in the third-party.


the compilation of blocklists is very much  one of those considerations where someone is going to take this data process it and then pass it to other parties.

the security considerations section should probably suggest routing registry operators not allow the publication of a inetnum for which no roa exists.


On 5/3/25 00:43, Benoit Claise wrote:
Hi Joel,

I hope that everything is great with you.
This draft below, which I believe fall under your expertise, will enter WGLC pretty soon.
Would you have a little bit of time to review it?

Regards, Benoit.


-------- Forwarded Message --------
Subject:        [OPSAWG]I-D Action: draft-ietf-opsawg-prefix-lengths-02.txt
Date:   Wed, 16 Apr 2025 06:56:16 -0700
From:   [email protected]
Reply-To:       [email protected]
To:     [email protected]
CC:     [email protected]



Internet-Draft draft-ietf-opsawg-prefix-lengths-02.txt is now available. It is a work item of the Operations and Management Area Working Group (OPSAWG) WG of
the IETF.

Title: Publishing End-Site Prefix Lengths
Authors: Oliver Gasser
Randy Bush
Massimo Candela
Russ Housley
Name: draft-ietf-opsawg-prefix-lengths-02.txt
Pages: 29
Dates: 2025-04-16

Abstract:

This document specifies how to augment the Routing Policy
Specification Language (RPSL) inetnum: class to refer specifically to
prefixlen comma-separated values (CSV) data files and describes an
optional scheme that uses the Resource Public Key Infrastructure
(RPKI) to authenticate the prefixlen data files.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-prefix-lengths/

There is also an HTMLized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-prefix-lengths-02

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-prefix-lengths-02

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts


_______________________________________________
OPSAWG mailing list -- [email protected]
To unsubscribe send an email to [email protected]
_______________________________________________
OPSAWG mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to