> How long is too long for a replay attack to go unnoticed? I'd bet that
> a lot of the folks worried about this would answer in minutes, while
> those concerned primarily with the hardware in their routers would
> answer in hours...

from the bgpsec-ops docco

   As beaconing places a load on the entire global routing system,
   careful thought MUST be given to any need to beacon frequently.  This
   would be based on a conservative estimation of the vulnerability to a
   replay attack.

   Beacon timing and signature validity periods SHOULD be as follows:

   The Exemplary Citizen:  Prefix originators who are not overly
      concerned about replay attacks might announce with a signature
      validity of multiple weeks and beacon one third of the validity
      period.

   Normal Prefix:  Most prefixes SHOULD announce with a signature
      validity of a week and beacon every three days.

   Critical Prefix:  Of course, we all think what we do is critical.
      But prefixes of top level DNS servers, and RPKI publication points
      are actually critical to large swaths of the Internet and are
      therefore tempting targets for replay attacks.  It is suggested
      that the beaconing of these prefixes SHOULD be two to four hours,
      with a signature validity of six to twelve hours.

      Note that this may incur route flap damping (RFD) with current
      default but deprecated RFD parameters, see [I-D.ymbk-rfd-usable].

randy
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to