#7: nits for roa-validation
--------------------------------+-------------------------------------------
 Reporter:  g...@…               |       Owner:            
     Type:  defect              |      Status:  new       
 Priority:  major               |   Milestone:  milestone1
Component:  roa-validation      |     Version:            
 Severity:  Active WG Document  |    Keywords:            
--------------------------------+-------------------------------------------
 reported by John Scudder:

 Comment:  I think this text, from S 4.1, is not quite right:

  This approach to route object origination validation uses a model of
  "positive security" attestations, where information that cannot be
  validated within the RPKI framework is intended to interpreted by a
  RP as invalid information.

 Unless you interpret "unknown" as being a flavor of "invalid" (which would
 be terribly confusing!) this conflicts with S 2.  It would have been right
 to say something to the effect of "... information that conflicts with
 validation data within the RPKI framework ...".  I think you could make
 this change without loss of generality.

 Comment: I think you've already gotten feedback on the list suggesting
 that S 4.1 needs more clarity regarding the effect of maxLength.  I agree.

 Comment: Given that you discuss BGP at some length, I think you need to
 talk about the case where the origin AS can't be determined, specifically
 where the AS_PATH starts with an AS_SET.  (The same criticism applies to
 draft-pmohapat.)  This is actually a somewhat vexing problem because on
 one hand, "unknown" seems the only reasonable outcome for such a route,
 but on the other, that would seem to provide an easy vector for an
 attacker to always be able to get his route to be ranked as "unknown"
 instead of "invalid".  Then again, as we know origin authentication alone
 is trivially easy to attack so I think this is not too much of a practical
 concern.

 Comment: In S 4.3 I find this to be unclear:

     *  It is a matter of local configuration as to whether ROA
        validation is performed on a per-AS basis rather than a per-BGP
        speaker, and the appropriate mechanisms to support a de-coupled
        framework of validation of ROAs and the loading of outcomes
        into BGP speakers are not considered here.

 In fact I only finally got after hearing George's presentation, that what
 you mean is whether validation is done on the router or in some off-box
 server.  I think the red herring was the "per-AS" language.

 Question: S 4.2 says "... or even if the maxLength element were to be
 omitted from the ROA".  Does the definition of a ROA even allow for that?
 I thought maxLength was a mandatory element (though I admit I haven't
 checked).  Depending on the answer you might remove the clause.

 Nit: I found your use of the term "route object" confusing given earlier
 uses of the term to mean something different (e.g. in the IRR).  How about
 using the term defined in RFC 4271 Section 1.1:

  Route
     A unit of information that pairs a set of destinations with the
     attributes of a path to those destinations.  The set of
     destinations are systems whose IP addresses are contained in one
     IP address prefix carried in the Network Layer Reachability
     Information (NLRI) field of an UPDATE message.  The path is the
     information reported in the path attributes field of the same
     UPDATE message.

 You could refer to this as "BGP Route" to disambiguate it from any other
 meaning of "route".

 If you don't want to do this you might at least note up front that your
 use of "route object" is the same as "route" as defined in 4271 S1.1.

 Nit: S 4.1 "Routes objects that describe..." should be "Route objects that
 describe..."  Or of course, just "Routes that describe" if you choose to
 adopt my suggestion above.

 Regards,

 --John

-- 
Ticket URL: <http://trac.tools.ietf.org/wg/sidr/trac/ticket/7>
sidr <http://tools.ietf.org/sidr/>

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to