This message is about a technical question, not a wg process question. I send this message as a typical wg member, with no special wg chairness involved, no special items of wg ceremonial vestments donned, etc.

I came across a couple of special address space cases recently.

There are some special addresses that are reserved by/to IANA. We've discussed a few of the more well known, e.g. the private address space (10/8, etc) and local addresses (127/8, etc).

For the most part, these addressees are not intended to be globally routed, so ROAs for these spaces are not meaningful. In full deployment, the prefix holder (IANA) might omit producing a ROA for such address space. In incremental deployment, that would allow anyone to originate a route to the prefix. For address space that is not supposed to be announced, we've discussed things like producing a ROA to AS 0 (and BOAs) to cause mis-originations to be evaluated as "invalid" rather than "unkown". That works for these not-globally-routed cases as well, with IANA signing the ROA.

But not all reserved address space is private. In particular, there is a IANA reserved space for 6to4 routers, the 192.88.99.0/24 prefix. It is intended to be carried in BGP updates between ASs, if I read RFC3068 correctly.

This space is also a special case in that is supposed to be an anycasted address. Anycasted addresses that have specific individual prefix holders present little problem to the RPKI. The prefix holder creates a ROA for each AS that could originate the prefix. But in the 6to4 address case (if I read correctly), any AS is allowed to use that address space. Would IANA sign ROAs for that space? What ASs would be in the ROA for that address space? Every AS? How would that prevent hijacking?

The security considerations section in RFC3068 is nifty keen, especially the last sentence:

   The generic security risks of 6to4 tunneling and the appropriate
   protections are discussed in [RFC3056].  The anycast technique
   introduces an additional risk, that a rogue router or a rogue AS
   would introduce a bogus route to the 6to4 anycast prefix, and thus
   divert the traffic.  IPv4 network managers have to guarantee the
   integrity of their routing to the 6to4 anycast prefix in much the
   same way that they guarantee the integrity of the generic v4 routing.

[There is another range of addresses that has no defined semantics as yet and so might prove problematic to RPKI protections - the special use range of RFC5736/5735
       192.0.0.0/24 - This block is reserved for IETF protocol
      assignments.

We won't know until someone attempts to register something in this range (currently the registry is empty) whether it will fit nicely with the RPKI model. Cross that bridge when we come to it.]

--Sandy, garden variety wg member

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to