Speaking as only a regular ol' member.
btw: I agree with the "this is absolutely not for now" part.
Your idea authorizes one prefix and says "more specifics are OK".
Synopsis: It doesn't buy you much and it makes life much more complicated.
First, saying "more specifics are OK" does not buy you much protection.
Right now, a hijack of the /8 itself and any more specifics will succeed.
That's
2*24 possible hijacks. (Yes, I know the /25-/32 will be rejected many places
with prefix length limits.)
In a time and place where RPKI was being used in origin validation, if the /8
does not have a ROA, then a hijack of the /8 itself and any more specifics
(not covered themselves by ROAs) will be judged UNKNOWN. That's
2*24 hijacks (max) looking UNKNOWN.
In a time and place where RPKI was being used in origin validation, if the /8
does have a "more specifics are OK" ROA, then a hijack of the /8 itself will
be INVALID and any more specifics (not covered themselves by ROAs) will
be judged UNKOWN. That's 1 attack that is INVALID and 2**24-1 attacks
that are UNKNOWN.
That's a 1/(2**24) improvement in your security. Not that much help.
Second, life gets a lot more complicated.
NOTE: I am not suggesting opening a discussion of how this idea might be
improved. I am pointing to the necessary confusion that results when there
are contradicting sorts of semantics ("more specifics ARE OK" vs "more
specifics ARE BAD").
As the /8 ISP starts (or its customers start) to issue ROAs for more specifics,
it/they will want to issue the strong ROAs, the ones that protect against more
specific hijacks as well.
If there is a weak ROA for the /8 and a strong ROA for a /16, how do you
evaluate a route for a /24?
If there is a strong ROA for the /16, and a weak ROA for a /20, how do you
evaluate a route for a /24?
Can you change a weak ROA into a strong ROA? When can you do that?
How will the change affect routing elsewhere? Etc.
This complication of validation states was (imho) part of the dissatisfaction
with the BOA suggestion (BOA is another case of contradicting sematics).
The wg tussled with that for several meetings in a row and eventually gave
up the idea. Been there, done that, burned the t-shirt, etc.
--Sandy, regular ol' member
________________________________________
From: [email protected] [[email protected]] on behalf of Randy Bush
[[email protected]]
Sent: Thursday, February 16, 2012 5:23 PM
To: Jay Borkenhagen
Cc: sidr wg list
Subject: [sidr] a hack for the next generation of rpki-based origin
validation
jay, i sent you this a couple of months back and you said to wait. but
i hear you have raised it again, so here it is, finally leaving my emacs
edit buffer
randy
---
this is absolutely not for now, but for the next generation of the
protocols once we have some experience under our belts. i.e. something
to think about to keep you from being bored.
an ops friend said that they have 10.0.0.0/8 with a lot of bgp customers
below it. it will take a long time to get roas out for those customers.
in the meantime they would like to protect 10.0.0.0/8 and maybe the two
/9s below it.
i am not sure i really support this idea as it defeats the basic
protections against hole punching which we want. and it really just
supports the lazy who are unable to simply run code against their
back-end db to gen the roas. and if they don't have the back-end db,
wuzza wuzza. but here is a hack which i think could do it.
use max-len==0 to denote marking the exact prefix/len as valid, but not
invalidating covered prefixes from other asns. i.e. issuing roas for
10.0.0.0/8-0 42
10.0.0.0/9-0 42
10.128.0.0/9-0 42
would cause the marking of the following as valid
10.0.0.0/8 42
10.0.0.0/9 42
10.128.0.0/9 42
and the following as notfound
10.42.0.0/24 42
10.42.0.0/16 666
10.77.0.0/24 666
but would cause the marking of the following as invalid
10.0.0.0/8 666
10.0.0.0/9 666
10.128.0.0/9 666
the friend realizes that 10.x.0.0/10 could be hole-punched to death. if
he wants to stop that, he should not use max-len==0.
randy
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr