On 2015-08-11 15:48, Stephen Kent wrote:
> Sean,
> 
>> ...
>> Okay so I want to agree.  But, I’m still trying to grok something
>> you sent in an earlier msg
>> (https://mailarchive.ietf.org/arch/msg/sidr/9vVsAheeeZMj7GI00nyGBDHBqPI)
>> that I think is related when you said:
>>
>>   RPs would not have to calculate/validate the SKI value; they would only
>>   need to check for collisions within an AS.
>
> No, and yes.
> 
> I was chatting with Sandy and noted that a compliant RP does have to 
> check that the SKI is the hash of the public key, as per RFC 6487.
> That RFC says that KI values are computed as SHA-1 hashes of the
> (relevant) public key (section 4.8.2), and that RPs are supposed to 
> confirm this, as per item #3 in Section 7.2:
> 
>           The certificate contains all fields that MUST be present, as
>           defined by this specification, *and contains values for
>           selected fields that are defined as allowable values by this
>           specification.*
> 
> This requirement is more stringent than what 5280 mandates. 5280
> imposes requirements on CAs wrt cert generation, but does not require
> that RPs verify that a CA has adhered to these requirements. This
> one-sided approach has not worked out well in the PKI arena in
> general, which is why the RPKI adopted a more symmetric model, i.e.,
> specify what each CA is supposed to do, and then have every RP verify
> that the CAs are doing what they are supposed to.

Yes, you're absolutely correct.  I hadn't noticed that requirement until
both you and Sean quoted it today.

I did not intend to imply that RPs can or should stop validating the SKI
value if the proposed change was accepted.  Indeed, I think it is a good
idea to require a strong hash algorithm and to require RPs to validate
the value.  What I meant to say is:

    If the proposed change was accepted, the ability to defend against
    the attack would no longer depend on validating the SKI; merely
    identifying and invalidating certs in an AS with colliding SKIs is
    sufficient.

Similarly, when I said the following in
<http://article.gmane.org/gmane.ietf.sidr/7119>:

    The above procedure does not require RPs to compute the SHA-1
    hash, yet it's secure against an attacker who wants to create
    colliding certs to overwhelm routers with computational work.
    This validation procedure would enable CAs to use a simple counter
    or any other algorithm for the SKI value because the RPs wouldn't
    be validating the SKI.  That's OK -- the security of BGPsec would
    not be compromised (I think).

I didn't intend to imply that we should stop validating the SKI or
switch to a weak algorithm, only that if we did so then I believe that
the security of BGPsec would remain intact (assuming we adopted the
proposed change).

With apologies for the confusion,
Richard

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to