Danny,

We have been told by several operators that the values stated in Section 4.3 of RFC 4271 are not what is used today. We also have been told that, contrary to the "SHOULD NOT" in Section 5.1.1 of this RFC, it is not uncommon for ASes to change this value, en route. Given these two observations, I don't see how one can argue that protecting this attribute via a PATHSEC mechanism makes sense.

Separately, there is the issue of whether it makes sense to address the security of the ORIGIN attribute in the threats document. The SIDR charter states that the path security goal is "Is the AS-Path represented in the route the same as the path through ?which the NLRI traveled" There are a variety of other attributes that do not directly support this goal, and which are not being addressed as part of the PATHSEC model. The threats document already addresses this issue, in the Residual Vulnerabilities section. I suggest the following updated text for that section, to better explain the criteria for inclusion and exclusion in that document:

PATHSEC is not planned to protect all attributes associated with an AS_PATH,even though some of these attributes may be employed as inputs to routing decisions.Thus attacks that modify (or strip) these other attributes are not prevented/detected by PATHSEC.The SIDR charter calls for protecting only the info needed to verify that a received route traversed the ASes enumerated in the AS_PATH, and that the NLRI in the route is what was advertised.(The AS_PATH data also may have traversed ASes within a confederation that are not represented. However, these ASes are not externally visible, and thus do not influence route selection, so their omission in this context is not a security concern.) Thus, protection of other attributes is outside the scope of the charter, at the time this document was prepared.
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to