Tim,

Sorry to have not replied sooner.



Hi all,

I promised to take this to list.

So, as presented today, the volume of updates of MFTs and CRLs in the RIPE NCC 
repository vs updates of ROAs is about 1000:1. This is a bad signal -to-noise 
ratio that causes waste of cycles and bandwidth.

= Why this noisy? MITM..
We get this, because we use a 'next update time' of 24 hours, but we actually 
republish every 8 hours to make sure that we can fix issues before things go 
stale. In my understanding we need this because of man-in-the-middle attacks 
involving replay or withhold. And rsync is vulnerable to this (clear text, and 
no authentication of server). If an RP is being fed old data, they would notice 
that something is wrong within 24 hours. A longer period seems scary.. If this 
understanding is wrong I would love to be educated.
I think an 8-hour cycle is very much overkill, despite the good intentions that motivated it.

An RP should detect when a manifest is stale, since the manifest carries a next publication date. It's a local matter as to how stale a Manifest can be before an RP sounds an alarm. The actions an RP MAY take in the face of a stale Manifest are also largely a local matter, as per RFC 6486. So, I don't think an 8-hour re-pub rate is warranted given these local policy aspects of Manifest processing.

Similarly, daily CRL publication strikes me as overkill as well. Yes, it's nice to be able to say that IF there were a need to revoke a cert, everyone could know about that in 24 hours. BUT, revocations in many PKIs are fairly rare, and in the RPKI they seem very infrequent as well, right?

I'd suggest a default next update frequency for both CRLs and Manifests of 1 week. This should be shortened if a resource is about to be transferred, or there is a planned key rollover, etc. If we adopt 1 week as the default, then pushing out
new versions every 3-4 days would be reasonable, IMHO.

These changes would reduce churn by a factor of 10 or so.
= Solved by https?
But assuming this does make sense, I wondered whether RRDP with httpS offers a 
way out of this. With RRDP a CA signs a certificate with an https URL like: 
https//my.repository.example.org/notification.xml. We can trust this because 
it's on a signed certificate. Now, if we can also exclude mitm, because we can 
trust the httpS certificate, this would allow for a much longer period 'next 
update time'. And in the meantime the RP would still learn about updates before 
this, because the notification.xml is checked regularly and would include any 
changes ahead of this.
I'm not sure I understand the analysis above. In the current scheme, the next update times for CRLs and Manifests are signed objects too. yes, an RP could learn about an earlier update IF there is no attack that prevents timely dissemination of the notification file. But, what prevents an attacker from delaying such notifications?

I'll have to think about your TA questions some more before replying.

Steve

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to