Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Pyxis LX
Hello, Gert.

On Thu, Dec 27, 2018 at 2:28 AM Gert Doering  wrote:

> Hi,
>
> On Wed, Dec 26, 2018 at 09:40:57PM +0800, Pyxis LX wrote:
> > I'm not sure I agree with your opinion about SSH.
> > IMHO if a KEX/MAC/Cipher algorithm that is generally considered insecure
> by
> > the security community, it might not be a good idea to keep using it:)
>
> This very much depends on what your focus is.  Mine is more "operational
> stability" - and if unattended machine-to-machine communication breaks,
> causing operational outage, because one side decides to upgrade their
> SSH implementation and existing algorithms stop working, then I know what
> my answer will be.
>
> Like, when Fortinet upgraded their SSH backend in one of the minor
> releases,
> not even mentioning it in the release notes and all of a sudden SSH-DSA
> keys stopped working.  While the CLI still happily let us enter DSA keys,
> they just did not work anymore, with no hint whatsoever anywhere.  Broke
> quite a bit of our automatization system which was still using DSA keys
> because *other* vendors couldn't be bothered to implement RSA keys in a
> timely fashion...
>
>
I can see your point here. We keep at least 2 sets of NMS modules to deal
with this kind of problem.
Security is a serious concern when doing inband management. Probably more
important
than operational stability as you can almost always find a workaround
manually.
And I have the same feeling that most vendors lacks comprehensive
configuration knobs on SSH
subsystem. This should be enhanced. (HostKey management,
TrustedUserCAKeys...etc for example)

BTW, I'll consider the Fortinet CLI inconsistency as a software bug that
shall be fixed.


> > And please don't get me wrong, TCP-AO is totally fine with rpki-rtr since
> > it provides integrity.
> > Integrity provided by either SSHv2 tunnel or TLS, TCP-AO, ...etc. is
> > mandatory when using external rpki-rtr servers or renting a pseudo leased
> > line from other carriers that you might not have 100% trust.
>
> Sure.


> gert
>
> --
> "If was one thing all people took for granted, was conviction that if you
>  feed honest figures into a computer, honest figures come out. Never
> doubted
>  it myself till I met a computer with a sense of humor."
>  Robert A. Heinlein, The Moon is a Harsh
> Mistress
>
> Gert Doering - Munich, Germany
> g...@greenie.muc.de
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] EX4650 or QFX5120 Use Case

2018-12-26 Thread Aaron Gould
I have (9) qfx5120-48y-8c

{master:0}
root> show system information
Model: qfx5120-48y-8c
Family: junos-qfx
Junos: 18.3R1.11

I plan to deploy them fairly simply at this point

I plan to have (4) in each of my (2) DC's

DC1
(2) QFX5120's for Services vlans/evpns
(2) QFX5120's for SAN/iscsi type vlans/evpns

DC2
(2) QFX5120's for Services vlans/evpns
(2) QFX5120's for SAN/iscsi type vlans/evpns

Lab Spare
(1) QFX5120 for testing

...so that's the (9) QFX5120's...

...so pretty much each QFX5120 I plan to uplink like this...
(1) QFX5120 dual connected 40 gig lacp (80 gig ae) to (2) separate
MPC7E-MRATE linecards in (1) MX960, 
...so there won't be 960 redundancy, but there will be power zone and
linecard redundancy

*** To be clear, I intend on the EVPN logic/config be on the MX960 only, and
not on the QFX5120 at this point
*** I intend on the QFX5120 to be an Ethernet switch with lots of 10/25 gig
interfaces, and dual 40 gig uplinks
*** I don't intend on mpls fordarding nor routing to occur in the QFX5120
*** I don't intend on VC'ing the (2) QFX5120's sitting side by side

...could this change?...perhaps, but this is where I'm at, at this point

The servers and vm's in the DC will dual connect (2) 25 gig to different
QFX5120's

If the MX960 is spine...
If the QFX5120 is leaf...
...I've seen/read/heard that you typically don't interconnect the leafs...
so I don't intend on interconnecting the leafs (QFX5120) together, but
rather bridge via the MX960 BUT, I'm going to test an interconnect
east/west between (2) QFX5120's at a DC to see if I like it or in case we
have a necessity, I'll be ready... also, I'd imaging the active/active
m-home'd CE-to-PE EVPN as predicated on the dual CE (in this case dual qfx)
being interconnected, so I'll give it a whirl...

My EVE-NG lab has this pretty much already built out... examples of vMX and
vQFX are shown below... I think the newest vQFX junos is 18.1 so it's as
close as I could get to 18.3 which shipped on my qfx's

{master:0}
root@sabn-qfx-01> show system information
Model: vqfx-1
Family: junos-qfx
Junos: 18.1R1.9
Hostname: sabn-qfx-01

root@sabn-960> show system information
Model: vmx
Family: junos
Junos: 18.2R1.9
Hostname: sabn-960

I will have more to share as I deploy/test/turn-up after the new year...

- Aaron


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Chris Morrow
On Wed, 26 Dec 2018 14:11:19 -0500,
sth...@nethelp.no wrote:
> 
> Now if Juniper could implement TCP-AO and then donate the implementation
> to FreeBSD? :-)

This was sort of my point, yes.
Thanks, as always for your cogent point(s).

-chris
(without something to break the ao logjam we'll just keep on having
this argument, maybe we can isntead paste-bin this thread and just
refer all other callers there? :) )
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] EX4650 or QFX5120 Use Case

2018-12-26 Thread Giuliano C. Medalha
Hello,

Does anyone uses EX4650 or QFX5120 (new products) with JUNOS 18.3 or 18.4 ?

Any update for share about the product itself, features (MPLS, EVPN ... ), 
junos code, scaling, etc ?

What kind of use cases are you using this new products ?

Is it possible to share any experience ?

Thanks a lot,

Giuliano


WZTECH is registered trademark of WZTECH NETWORKS.
Copyright © 2018 WZTECH NETWORKS. All Rights Reserved.

IMPORTANTE:
As informações deste e-mail e o conteúdo dos eventuais documentos anexos são 
confidenciais e para conhecimento exclusivo do destinatário. Se o leitor desta 
mensagem não for o seu destinatário, fica desde já notificado de que não poderá 
divulgar, distribuir ou, sob qualquer forma, dar conhecimento a terceiros das 
informações e do conteúdo dos documentos anexos. Neste caso, favor comunicar 
imediatamente o remetente, respondendo este e-mail ou telefonando ao mesmo, e 
em seguida apague-o.

CONFIDENTIALITY NOTICE:
The information transmitted in this email message and any attachments are 
solely for the intended recipient and may contain confidential or privileged 
information. If you are not the intended recipient, any review, transmission, 
dissemination or other use of this information is prohibited. If you have 
received this communication in error, please notify the sender immediately and 
delete the material from any computer, including any copies.

WZTECH is registered trademark of WZTECH NETWORKS.
Copyright © 2018 WZTECH NETWORKS. All Rights Reserved.

IMPORTANTE:
As informações deste e-mail e o conteúdo dos eventuais documentos anexos são 
confidenciais e para conhecimento exclusivo do destinatário. Se o leitor desta 
mensagem não for o seu destinatário, fica desde já notificado de que não poderá 
divulgar, distribuir ou, sob qualquer forma, dar conhecimento a terceiros das 
informações e do conteúdo dos documentos anexos. Neste caso, favor comunicar 
imediatamente o remetente, respondendo este e-mail ou telefonando ao mesmo, e 
em seguida apague-o.

CONFIDENTIALITY NOTICE:
The information transmitted in this email message and any attachments are 
solely for the intended recipient and may contain confidential or privileged 
information. If you are not the intended recipient, any review, transmission, 
dissemination or other use of this information is prohibited. If you have 
received this communication in error, please notify the sender immediately and 
delete the material from any computer, including any copies.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Chris Morrow
On Wed, 26 Dec 2018 13:36:49 -0500,
Bjørn Mork  wrote:
> 
> Chris Morrow  writes:
> > On Sun, 23 Dec 2018 16:15:24 -0500,
> > Melchior Aelmans  wrote:
> >> 
> >> Hi Pyxis,
> >> 
> >> On Sat, Dec 22, 2018 at 8:58 AM Pyxis LX  wrote:
> >> 
> >> > Does JUNOS support any secure transports mentioned in RFC6810 for 
> >> > rpki-rtr
> >> > protocol? (SSHv2/IPsec or TLS for rpki-rtr-tls?)
> >> >
> >> 
> >> We are discussing internally what secure transport method to support. I'm
> >> happy to hear your ideas.
> >
> > 'tcp-ao' - yes... srsly.
> 
> Huh? Why? No support on any server OS, AFAIK.  Yes, there were patches
> for FreeBSD and Linux a few years ago, but I don't think they went
> anywhere? This will severely limit the usability.

there's no support elsewhere because no one that cares (you, me, network 
people) can get vendors to deploy AO.
There's no support in network devices because there's no support in linux/etc 
...

this is a pretty horrid place to be :( so, if folk want to put AO into
junos for this, we can get it for the other vendors and for other
parts of each vendor's problem-space... and along the way we'll get it
for linux/*bsd (I expect).

> Let's have ssh, and optionally tls. We need something we can run on a
> server today.  Not 8 year old foilware.

ssh isn't in the right form on pretty much any vendor's device, so
said the vendor implementers many times during rpki-rtr
development/process. (hannes gredler, jeff haas, several cisco folks
as well).

tls brings with it cert issues.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Jared Mauch


> On Dec 26, 2018, at 2:11 PM, sth...@nethelp.no wrote:
> 
 We are discussing internally what secure transport method to support. I'm
 happy to hear your ideas.
>>> 
>>> 'tcp-ao' - yes... srsly.
>> 
>> Huh? Why? No support on any server OS, AFAIK.  Yes, there were patches
>> for FreeBSD and Linux a few years ago, but I don't think they went
>> anywhere? This will severely limit the usability.
>> 
>> Let's have ssh, and optionally tls. We need something we can run on a
>> server today.  Not 8 year old foilware.
> 
> Now if Juniper could implement TCP-AO and then donate the implementation
> to FreeBSD? :-)

A few of us could do the TCP-AO work in Linux/*BSD but I know which kernel team 
will reject it as “not implemented by core team” based on my experience.

- Jared
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Jared Mauch


> On Dec 26, 2018, at 1:36 PM, Bjørn Mork  wrote:
> 
> Chris Morrow  writes:
>> On Sun, 23 Dec 2018 16:15:24 -0500,
>> Melchior Aelmans  wrote:
>>> 
>>> Hi Pyxis,
>>> 
>>> On Sat, Dec 22, 2018 at 8:58 AM Pyxis LX  wrote:
>>> 
 Does JUNOS support any secure transports mentioned in RFC6810 for rpki-rtr
 protocol? (SSHv2/IPsec or TLS for rpki-rtr-tls?)
 
>>> 
>>> We are discussing internally what secure transport method to support. I'm
>>> happy to hear your ideas.
>> 
>> 'tcp-ao' - yes... srsly.
> 
> Huh? Why? No support on any server OS, AFAIK.  Yes, there were patches
> for FreeBSD and Linux a few years ago, but I don't think they went
> anywhere? This will severely limit the usability.
> 
> Let's have ssh, and optionally tls. We need something we can run on a
> server today.  Not 8 year old foilware.

*Insert anti-FreeBSD snark about how problematic it is, as it burned me in 
production once too many times .. yes a RC is there to tell you when you broke 
the network driver built into the motherboard and yes you should fix it before 
posting -RELEASE but we don’t care about the end-users so .. yeah I hate it*

TCP-AO, regardless of the OS is going to be much easier to use compared to ssh 
or TLS. 

SSH and TLS come with extra complexity as I mentioned before.  TCP-AO please. 

It would be nice to see many packages updated.. OpenSSH could use an update 
from 7.2 and the NTP daemon as well from 4.2.0-a to something much newer as 
well.

If you’ve not been following the IETF activities btw, md5 does cause some head 
scratching when a protocol gets a security review.  It’s amusing to watch when 
you say “I need something more stable than TLS provides the capability for”, or 
“I care about integrity not confidentiality” and the crypto zealots heads 
explode.. 

- Jared
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread sthaug
>>> We are discussing internally what secure transport method to support. I'm
>>> happy to hear your ideas.
>>
>> 'tcp-ao' - yes... srsly.
> 
> Huh? Why? No support on any server OS, AFAIK.  Yes, there were patches
> for FreeBSD and Linux a few years ago, but I don't think they went
> anywhere? This will severely limit the usability.
> 
> Let's have ssh, and optionally tls. We need something we can run on a
> server today.  Not 8 year old foilware.

Now if Juniper could implement TCP-AO and then donate the implementation
to FreeBSD? :-)

Steinar Haug, Nethelp consulting, sth...@nethelp.no
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Nitzan Tzelniker
If we are talking about SSH in Junos
I am waiting for TrustedUserCAKeys support as describe in
https://code.fb.com/security/scalable-and-secure-access-with-ssh/

Nitzan

On Wed, Dec 26, 2018 at 8:39 PM Bjørn Mork  wrote:

> Chris Morrow  writes:
> > On Sun, 23 Dec 2018 16:15:24 -0500,
> > Melchior Aelmans  wrote:
> >>
> >> Hi Pyxis,
> >>
> >> On Sat, Dec 22, 2018 at 8:58 AM Pyxis LX  wrote:
> >>
> >> > Does JUNOS support any secure transports mentioned in RFC6810 for
> rpki-rtr
> >> > protocol? (SSHv2/IPsec or TLS for rpki-rtr-tls?)
> >> >
> >>
> >> We are discussing internally what secure transport method to support.
> I'm
> >> happy to hear your ideas.
> >
> > 'tcp-ao' - yes... srsly.
>
> Huh? Why? No support on any server OS, AFAIK.  Yes, there were patches
> for FreeBSD and Linux a few years ago, but I don't think they went
> anywhere? This will severely limit the usability.
>
> Let's have ssh, and optionally tls. We need something we can run on a
> server today.  Not 8 year old foilware.
>
>
>
> Bjørn
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Bjørn Mork
Chris Morrow  writes:
> On Sun, 23 Dec 2018 16:15:24 -0500,
> Melchior Aelmans  wrote:
>> 
>> Hi Pyxis,
>> 
>> On Sat, Dec 22, 2018 at 8:58 AM Pyxis LX  wrote:
>> 
>> > Does JUNOS support any secure transports mentioned in RFC6810 for rpki-rtr
>> > protocol? (SSHv2/IPsec or TLS for rpki-rtr-tls?)
>> >
>> 
>> We are discussing internally what secure transport method to support. I'm
>> happy to hear your ideas.
>
> 'tcp-ao' - yes... srsly.

Huh? Why? No support on any server OS, AFAIK.  Yes, there were patches
for FreeBSD and Linux a few years ago, but I don't think they went
anywhere? This will severely limit the usability.

Let's have ssh, and optionally tls. We need something we can run on a
server today.  Not 8 year old foilware.



Bjørn
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Gert Doering
Hi,

On Wed, Dec 26, 2018 at 09:40:57PM +0800, Pyxis LX wrote:
> I'm not sure I agree with your opinion about SSH.
> IMHO if a KEX/MAC/Cipher algorithm that is generally considered insecure by
> the security community, it might not be a good idea to keep using it:)

This very much depends on what your focus is.  Mine is more "operational
stability" - and if unattended machine-to-machine communication breaks,
causing operational outage, because one side decides to upgrade their
SSH implementation and existing algorithms stop working, then I know what
my answer will be.

Like, when Fortinet upgraded their SSH backend in one of the minor releases,
not even mentioning it in the release notes and all of a sudden SSH-DSA
keys stopped working.  While the CLI still happily let us enter DSA keys,
they just did not work anymore, with no hint whatsoever anywhere.  Broke
quite a bit of our automatization system which was still using DSA keys
because *other* vendors couldn't be bothered to implement RSA keys in a
timely fashion...


> And please don't get me wrong, TCP-AO is totally fine with rpki-rtr since
> it provides integrity.
> Integrity provided by either SSHv2 tunnel or TLS, TCP-AO, ...etc. is
> mandatory when using external rpki-rtr servers or renting a pseudo leased
> line from other carriers that you might not have 100% trust.

Sure.

gert

-- 
"If was one thing all people took for granted, was conviction that if you 
 feed honest figures into a computer, honest figures come out. Never doubted 
 it myself till I met a computer with a sense of humor."
 Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany g...@greenie.muc.de


signature.asc
Description: PGP signature
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Chris Morrow
On Mon, 24 Dec 2018 02:38:35 -0500,
Melchior Aelmans  wrote:
> 
> Hi Chris,
> 
> > Op 24 dec. 2018 om 05:11 heeft Chris Morrow  het 
> > volgende geschreven:
> > 
> > On Sun, 23 Dec 2018 16:15:24 -0500,
> > Melchior Aelmans  wrote:
> >> 
> >> Hi Pyxis,
> >> 
> >>> On Sat, Dec 22, 2018 at 8:58 AM Pyxis LX  wrote:
> >>> 
> >>> Does JUNOS support any secure transports mentioned in RFC6810 for rpki-rtr
> >>> protocol? (SSHv2/IPsec or TLS for rpki-rtr-tls?)
> >>> 
> >> 
> >> We are discussing internally what secure transport method to support. I'm
> >> happy to hear your ideas.
> > 
> > 'tcp-ao' - yes... srsly.
> 
> Im in favor but why do you think AO is the way to go? It seems SSH
> and TLS have gained more support? Let me know your ideas.

jared/gert covered most of this, but:

I think things like TLS bring along with them certificate management
issues.  Some folk have infrastructure to deal with this, some do not.

SSH is not, often, in the right form for devices to use as a library
versus as 'spin up an ssh connection and tunnel over that' mode.

there's the config management parts jared/gert pointed out as well.

and finally... md5 is dead #sosayssecuritypeople so.. let's do
something to move along AO? I'm not a huge AO fan, but it's 'the only
thing left' in the 'make tcp secure again' space.

thanks!
-chris
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Jared Mauch


> On Dec 26, 2018, at 8:48 AM, Melchior Aelmans  wrote:
> 
> Personally I would say we need TCP-AO, not only for securing RTR but also to 
> replace MD5 in several protocols

Yes, this would be a positive step.  It will also take ~5-7 years for those on 
md5 to rotate to something else, but as I can’t configure it now on either 
Cisco/Juniper it’s a barrier to get to code that supports it, then a partner 
who can as well.

- Jared
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Jared Mauch


> On Dec 25, 2018, at 5:22 AM, Job Snijders  wrote:
> 
> On Tue, Dec 25, 2018 at 09:08:32AM +0100, Gert Doering wrote:
>> On Tue, Dec 25, 2018 at 02:46:57PM +0800, Pyxis LX wrote:
>>> I think SSHv2 or IPSec with good CLI integration would be nice.
>>> (ex: CLI to manage SSHv2 private keys, OSPFv3-like IPSec
>>> integration...etc.) TLS might be good but as Jared said, certificate
>>> revocation might not be that manageable.  However it's better than
>>> plain TCP anyway.
>> 
>> Careful what you wish for.  Adding heaps of crypto that all of a
>> sudden decides "oh, this certificate is expired" or "bah, this
>> algorithm is so insecure, we do not support this key exchange / mac /
>> cipher anymore!" adds quite a bit of brittleness...
>> 
>> So TCP-MD5 is actually nice because it has none of all that fanciness.
> 
> Already today Junos ships with an OpenSSH client (and server). I'm not
> too worried 'heaps of crypto' will be added if the SSH path is picked.
> 

The problem is with key management systems.  I’ve yet to see a router vendor do 
this well.  If we had to go the SSL route, I would need to rotate keys, certs 
and integrate into the corporate CA properly.  SSH transport is great until you 
have to update known_hosts on a thousand devices based on the nearest validator.

- Jared

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Melchior Aelmans
Personally I would say we need TCP-AO, not only for securing RTR but also
to replace MD5 in several protocols

On Wed, Dec 26, 2018 at 2:43 PM Pyxis LX  wrote:

> Hi, Gert.
>
> I'm not sure I agree with your opinion about SSH.
> IMHO if a KEX/MAC/Cipher algorithm that is generally considered insecure by
> the security community, it might not be a good idea to keep using it:)
>
> And please don't get me wrong, TCP-AO is totally fine with rpki-rtr since
> it provides integrity.
> Integrity provided by either SSHv2 tunnel or TLS, TCP-AO, ...etc. is
> mandatory when using external rpki-rtr servers or renting a pseudo leased
> line from other carriers that you might not have 100% trust.
>
> Regards,
>
> Pyxis.
>
>
> On Tue, Dec 25, 2018 at 4:08 PM Gert Doering  wrote:
>
> > Hi,
> >
> > On Tue, Dec 25, 2018 at 02:46:57PM +0800, Pyxis LX wrote:
> > > I think SSHv2 or IPSec with good CLI integration would be nice.
> > > (ex: CLI to manage SSHv2 private keys, OSPFv3-like IPSec
> > integration...etc.)
> > > TLS might be good but as Jared said, certificate revocation might not
> be
> > > that manageable.
> > > However it's better than plain TCP anyway.
> >
> > Careful what you wish for.  Adding heaps of crypto that all of a sudden
> > decides "oh, this certificate is expired" or "bah, this algorithm is so
> > insecure, we do not support this key exchange / mac / cipher anymore!"
> > adds quite a bit of brittleness...
> >
> > So TCP-MD5 is actually nice because it has none of all that fanciness.
> >
> > > After all, it's kind of ironic that we send the cryptographically
> > verified
> > > results without integrity.
> >
> > If someone can interfere with TCP packets *inside your network* without
> > you noticing, RPKI-RTR is likely the least of your worries.
> >
> > (Using an externally hosted RPKI validator might change these arguments
> > quite a bit)
> >
> > gert
> >
> > --
> > "If was one thing all people took for granted, was conviction that if you
> >  feed honest figures into a computer, honest figures come out. Never
> > doubted
> >  it myself till I met a computer with a sense of humor."
> >  Robert A. Heinlein, The Moon is a Harsh
> > Mistress
> >
> > Gert Doering - Munich, Germany
> > g...@greenie.muc.de
> >
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] About Secure Transport for RPKI on JUNOS

2018-12-26 Thread Pyxis LX
Hi, Gert.

I'm not sure I agree with your opinion about SSH.
IMHO if a KEX/MAC/Cipher algorithm that is generally considered insecure by
the security community, it might not be a good idea to keep using it:)

And please don't get me wrong, TCP-AO is totally fine with rpki-rtr since
it provides integrity.
Integrity provided by either SSHv2 tunnel or TLS, TCP-AO, ...etc. is
mandatory when using external rpki-rtr servers or renting a pseudo leased
line from other carriers that you might not have 100% trust.

Regards,

Pyxis.


On Tue, Dec 25, 2018 at 4:08 PM Gert Doering  wrote:

> Hi,
>
> On Tue, Dec 25, 2018 at 02:46:57PM +0800, Pyxis LX wrote:
> > I think SSHv2 or IPSec with good CLI integration would be nice.
> > (ex: CLI to manage SSHv2 private keys, OSPFv3-like IPSec
> integration...etc.)
> > TLS might be good but as Jared said, certificate revocation might not be
> > that manageable.
> > However it's better than plain TCP anyway.
>
> Careful what you wish for.  Adding heaps of crypto that all of a sudden
> decides "oh, this certificate is expired" or "bah, this algorithm is so
> insecure, we do not support this key exchange / mac / cipher anymore!"
> adds quite a bit of brittleness...
>
> So TCP-MD5 is actually nice because it has none of all that fanciness.
>
> > After all, it's kind of ironic that we send the cryptographically
> verified
> > results without integrity.
>
> If someone can interfere with TCP packets *inside your network* without
> you noticing, RPKI-RTR is likely the least of your worries.
>
> (Using an externally hosted RPKI validator might change these arguments
> quite a bit)
>
> gert
>
> --
> "If was one thing all people took for granted, was conviction that if you
>  feed honest figures into a computer, honest figures come out. Never
> doubted
>  it myself till I met a computer with a sense of humor."
>  Robert A. Heinlein, The Moon is a Harsh
> Mistress
>
> Gert Doering - Munich, Germany
> g...@greenie.muc.de
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp