Hi all,

Éric, thanks for adding me to the discussion.

Sandra, your comments are very welcome. Please find some responses inline.

Regards,

Jordi


El 26/03/18 a les 10:53, Eric Vyncke (evyncke) ha escrit:
Adding Jordi to the recipients as he is not a Opsec mailing member AFAIK

-éric


On 21/03/18 17:47, "OPSEC on behalf of Sandra Murphy"<[email protected] on 
behalf of [email protected]>  wrote:

     These questions were too long to ask the jabber scribe to relay.  At the 
scribe’s request, I summarized for the meeting, and promised a fuller version.  
(Lucky you.)  And then question time was scraped.  Oh, well.
So here’s the full version. Questions, then comments Questions about some parts of the draft: 6.1.2. Multi-signature transactions the holder of the block of
        addresses must trust the owners of the keys participating in the
        multi-signature transaction.
Since participants can generate their own keys, does this allow for sybil attacks - generating new “owners of the keys” in order to make a multi-signature succeed?
Not exactly, only some keys are tied to the multi-signature transaction. If you generate a new key, it is not linked to it so you cannot affect its state. This section needs rewriting, I will update it shortly.
6.1.3. Revocation transaction accepting the revocation
        transaction automatically when issued by the accepted authority
Does this re-introduce a centralized authority into the system?
I agree, this is exactly the tradeoff mentioned in sec. 6.1. An alternative approach could be this one:

1. The registry issues a revocation transaction
2. The holder of the prefix re-signs its prefix to prove it still holds
   its private key, and keeps the ownership of the prefix.
3. If the prefix holder does not issue the aforementioned transaction
   in 24h, the registry recovers the prefix.

Comments on certain statements made in the draft, and the relationship to IP address allocation and use: “Cannot be assigned to two entities at the same time.” The use of IP addresses shows shared authority over address space - more than one entity has authority over IP address space. I’m not sure how that works in blockchain. Example: If an ISP holding a /16 sub-delegates a /20 to a customer, it does not give up the ability to announce the /16. Example: RIPE tells its members that they are responsible for their entire allocation, no matter if they have sub-delegated some of it to a customer. And they carefully instruct their members how to use the authorization features of the RIPE database to ensure that they retain control over resources they have sub delegated. And they have recently changed the authorization structure to make it possible to delete objects for resources that were sub-delegated out of resources they hold. (Note: I’m not a part of the RIPE NCC. RIPE NCC people present should speak up.)
Thanks for the comment. I am not an expert in the mechanics of IP address allocations. However, since blockchains allow for complex management logic, this specificities can be integrated into them, typically in the code that validates new transactions.
“AS domains holding large blocks of IP addresses” There are many organizations that hold IP addresses but do not hold AS numbers. There are many organization that hold IP addresses and AS numbers, but have some other ISP originate announcements for them. So an IP address to AS number mapping or vice versa is not possible or a fit to the way IP addresses are used.
The base unit in this blockchain are IP prefixes, so it's not a problem if you don't hold an AS number. In short, if you have more addresses you add more blocks. Again, I will clarify this in the draft.
“These parties have a reduced incentive in tampering the blockchain because they would suffer the consequences: an insecure Internet.” I don’t see that this agrees with experience. The Internet impact is sometimes deliberate (those who have deliberately impacted the routing of someone else’s prefix), sometimes a mistake (yesterday’s mis-origination of a Univ of Iowa’s prefix), and sometimes self-serving (spammers' mis-origination of prefixes for their own gain)
I see your point. Here we are making two assumptions. First, that a majority of the players are honest (typically consensus algorithms tolerate up to 1/3 of malicious players). Second, at present we are recording in the blockchain only the binding of IP prefix and AS no., but not BGP announcements, so we are not providing full BGP security. Does this make sense?

Thanks again for the comments!

Jordi
—Sandy _______________________________________________
     OPSEC mailing list
     [email protected]
     https://www.ietf.org/mailman/listinfo/opsec

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to