Wes,

Sorry. I was on vacation when your message was sent, and I did not see it when I processed all of the messages upon return, two weeks later. I did locate it in the archive today, after seeing your message. I'll treat your comments as IETF last call comments since, as you note,
they were posted long after WGLC.

Your comments were:

   Maybe I'm hypersensitive to such in light of recent accusations of
   national actors subverting supposedly secure infrastructure to
   behave badly, but I find it odd that this threats document doesn't
   discuss the interaction between a national actor and the machinery
   provided by draft-ietf-sidr-ltamgmt. i.e. a national actor imposes
   upon SPs that operate inside their borders to use their own Local
   (and compromised) Trust Anchor to subvert the protections provided
   by RPKI. While this is primarily a concern for origin validation, I
   view it as distinct from the existing discussion of attacks on a CA
   covered in 4.5, and there is no equivalent Origin Validation threats
   document. It may be that the right path is to augment the discussion
   of this issue in the LTA management draft, and simply reference it
   from this draft, but I don't think that this is discussed suitably
   in the security considerations of either draft.

The increased sensitivity to nation-level threats is understandable.The threats doc lists nations as a category of adversary in Section 3; we have not ignored them. (Can you name any other IETF threat analysis that has done so?) The doc does not discuss attacks by nations against LTAM. The RPKI, as specified in RFCs 6480-91, is addressed for completeness, and because the SIDR charter mandates use of the RPKI. LTAM is still an I-D; it is not part of the RPKI standards. As such, I don't consider it to be in scope for this doc.

More to the point, as lead author of the LTAM doc, I anticipate reducing its scope in a way that may remove the concern you raised. However, our new I-D, "Suspenders" may raise similar concerns. I think it appropriate to discuss them if and when the WG elects to adopt that doc
as a work item.

   Section 4.2 is missing any discussion regarding manipulation of
   other route attributes that may be used to affect a BGP route's
   selection, such as MED, Local Pref. It's covered in section 5, but
   since this occurred to me whilst reading section 4.2, perhaps some
   mention in 4.2 would be useful, I don't know.

As you noted, Section 5 discusses other attributes that are not considered in this doc, and explains why. Unless Stewart directs us to add a forward pointer in 4.2, I don't plan to do so.

   That said, I also think that the discussion of this topic at the end
   of session 5 is inadequate for a document in IETF LC. The SIDR WG
   made a conscious decision to secure *only* the AS_Path attribute,
   and leave other attributes insecure, but there is no summary of the
   underlying rationale supporting this choice. Pointing to a WG
   charter as the sole explanation, and noting that this document
   should be changed if the charter is updated is unacceptable, as it
   provides no context to a reader that was not privy to the discussion
   leading to that charter/scope decision.

No one (other than you) suggested that we include a discussion of the history of the charter/scope discussion here. I do not recall seeing such a discussion in any other threat analysis doc. I don't
plan to add such a discussion here.

   It also makes reference to something fairly ephemeral (a WG and
   charter) in a permanent document. Fine for a draft in WG discussion
   to have that sort of placeholder, but not anymore.

The latest version (-07) of the threats document added a paraphrase of the relevant charter text to address the concern about referencing a charter, an issue raised by David Black in his GENART review.

   There is a brief (and IMO incomplete) discussion of this matter to
   be found in section 2.3 of draft-sriram-bgpsec-design-choices that
   could be referenced, but since that document's future is unclear,
   some standalone discussion within this document might be more
   appropriate. At a minimum, a threats document should discuss why
   these threats are not considered high enough risk to justify the
   added complexity of securing them using the RPKI.

A threat analysis, in principle, identifies adversaries, their motivations for carrying out classes of attacks, and their capabilities to do so. It need not establish requirements for acceptable designs, or propose countermeasures to address classes of attacks. In this doc we went beyond those essential threat analysis elements, because there was no RPKI threat doc (and because the charter calls for use of the RPKI as a basis for BGPSEC). A requirements doc is a place where one defines what needs to be done by a solution, to address the threats previously described.

Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to