At 9:52 AM +0100 12/3/08, Robert Kisteleki wrote:
Hi,

Robert,

Thanks for the clarification., but I still have some serious concerns that I think need to be addressed as we progress this as a WG item.

I looked at your document and I see that section 5 is a "Minimum set of Signed Attributes." To try to prevent the problem I cited, it really needs a definitive list of the objects and attributes that MAY be signed, with a prohibition on signing any other objects/attributes. This is the opposite of what your text says, as it allows the signer to include whatever other attributes the signer wishes.

The name of an AS is NOT something that can be validated using the RPKI, and this needs to made clear to folks using this mechanism. The same is true for net name, org, country and status. The simplest thing to do would be to exclude these as signed attributes. I am not very familiar with the attributes you listed for the four object types, but I suspect that a more of them will fall into this category.

The intention here is that the owner of the resources can make verifiable statements. They can claim, by constructing and signing RPSL objects, that certain facts are true regarding the use of the resource; in other words, this mechanism allows the holder of the resources to bind their resources and other info together. So it's really intentional that other attributes such as org name, AS name, import/export attributes, contact info, ... can be covered by the signature, even though these are not number resources.

The problem is that the RPKI cert(s) used to verify such signed assertions do not attest to the accuracy of the other attributes. This means that we are allowing (really encouraging) relying parties to accept as accurate the data verified using RPKI certs, and that is dangerous. It creates potential liabilities for the CAs in the RPKI. For example, if an ISP asserts in a signed object that it's name is Foo Corp, when in reality its name is Bar Co., this could create a liability for the registry that issued the CA cert to Bar Co. We have tried to avoid this sort of liability by restricting the subject names in resource certs to be non-meaningful, and this proposal reintroduces this liability.

If we state that the only attributes that can be signed are the ones that carry number resources, and which can also be found in the covering certificate (ie. your "maximum set" approach, if I understand correctly), then there is no practical gain for the signature. The only only meaning for such an object in my interpretation would be "The resource holder has spoken. They said they have an object." without any verifiable claims about the actual content of the object.

I think you are underestimating what could be done, but maybe I don't know enough about RPSL. Let me give an example:

If an ISP signs an object that asserts that it announces routes for several prefixes, then this assertion could be verified using a combination of the ROAs that attest to the origin AS info for each prefix, plus the transitive verification of similar records signed by other ISPs. That would provide the sort of static connectivity verification that soBGP proposed. This is an example of a set of assertions that could be verified using data to which the RPKI attests.


Based on this, I believe that the current "minimum set" specification is the right approach.

I have to disagree. I think the proposal suffers from many of the same security problems that arise if one uses (non-resource) certs for authentication of RPSL data today, i.e., what you enable is an authenticated entity to make arbitrary assertions about arbitrary data.

Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to