1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
1 Copyright  1999, Cisco Systems, Inc. Module10.ppt10/7/1999 8:27 AM BGP — Border Gateway Protocol Routing Protocol used between AS’s Currently Version.
BGP.
CS Summer 2003 CS672: MPLS Architecture, Applications and Fault-Tolerance.
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Header and Payload Formats
CS Summer 2003 Lecture 3. CS Summer 2003 What is a BGP Path Attribute? BGP uses a set of parameters known as path attributes to characterize.
The Border Gateway Protocol (BGP) Sharad Jaiswal.
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
More on BGP Check out the links on politics: ICANN and net neutrality To read for next time Path selection big example Scaling of BGP.
Feb 12, 2008CS573: Network Protocols and Standards1 Border Gateway Protocol (BGP) Network Protocols and Standards Winter
Certificate Path Building draft-ietf-pkix-certpathbuild-01.txt Peter Hesse Matt Cooper Yuriy Dzambasow Susan Joseph Richard Nicholas.
Systems Analysis I Data Flow Diagrams
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
Applicability Statement v1.1 Feedback: DirectTrust May 5, 2015.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
Scaling iBGP. BGP iBGP –Internal BGP –BGP peering between routers in same AS –Goal: get routes from a border router to another border router without losing.
Lecture 4: BGP Presentations Lab information H/W update.
Border Gateway Protocol
MPTCP – MULTIPATH TCP Interim meeting #3 20 th October 2011 audio Yoshifumi Nishida Philip Eardley.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
Xuan Zheng (modified by M. Veeraraghavan) 1 BGP overview BGP operations BGP messages BGP decision algorithm BGP states.
© 2001, Cisco Systems, Inc. A_BGP_Confed BGP Confederations.
BGP4 - Border Gateway Protocol. Autonomous Systems Routers under a single administrative control are grouped into autonomous systems Identified by a 16.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
Draft-ietf-sidr-bgpsec-protocol Matt Lepinski
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
Draft-cordeiro-nsis-hypath-02 Luís Cordeiro
SIP working group IETF#70 Essential corrections Keith Drage.
BGPSEC : A BGP Extension to Support AS-Path Validation Matt Lepinski BBN Technologies.
BGPSEC router key rollover as an alternative to beaconing Roque Gagliano Keyur Patel Brian Weis draft-ietf-sidr-bgpsec-rollover-01.
CSCI-1680 Network Layer: Inter-domain Routing Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, Rodrigo Fonseca John Jannotti.
Chapter 27 IPv6 Protocol.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Covering Prefixes Outbound Route Filter for BGP-4 draft-bonica-l3vpn-orf-covering-prefixes-01 H. Jeng, l. Jalil, R. Bonica, Y. Rekhter, K. Patel, L. Yong.
Design Guidelines Thursday July 26, 2007 Bernard Aboba IETF 69 Chicago, IL.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Understanding BGP Path Attributes.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Draft-ietf-sidr-roa-format draft-ietf-sidr-arch Matt Lepinski BBN Technologies.
SIP Events: Changes and Open Issues IETF 50 / SIP Working Group Adam Roach
NEMO Basic Support update IETF 61. Status IANA assignments done Very close to AUTH48 call Some issues raised recently We need to figure out if we want.
BGP Basics BGP uses TCP (port 179) BGP Established unicast-based connection to each of its BGP- speaking peers. BGP allowing the TCP layer to handle such.
Text BGP Basics. Document Name CONFIDENTIAL Border Gateway Protocol (BGP) Introduction to BGP BGP Neighbor Establishment Process BGP Message Types BGP.
OSPF WG Security Extensions for OSPFv2 when using Manual Keying Manav Bhatia, Alcatel-Lucent Sam Hartman, Huawei Dacheng Zhang, Huawei IETF 80, Prague.
ISA 95 Working Group (Business) Process Centric Exchanges Dennis Brandl A Modest Proposal July 22, 2015.
intra-va-01.txt -01 Draft of: “FIB Suppression with Virtual Aggregation and Default Routes” Paul.
Covering Prefixes Outbound Route Filter for BGP-4 draft-bonica-l3vpn-orf-covering-prefixes-01 H. Jeng, l. Jalil, R. Bonica, Y. Rekhter, K. Patel, L. Yong.
SCVP-28 Tim Polk November 8, Current Status Draft -27 was submitted in June ‘06 –AD requested a revised ID 8/11 –No related discussion on list –Editors.
19 March 2003Page 1 BGP Vulnerabilities Draft March 19, 2003 Sandra Murphy
BGP Validation Russ White Rule11.us.
AS Numbers - Again Geoff Huston APNIC October 2009
Fri 2 Aug 2013SIDR IETF 87 Berlin, German1 BGPSEC Protcol Error Handling IETF 87 Berlin, Germany Wednesday, 31 Jul 2013 Friday, 2 Aug 2013.
Using BGP to Bind MPLS Labels to Address Prefixes draft-rosen-idr-rfc3107bis-00 Eric Rosen (presented by Ross Callon) IETF 95 MPLS WGdraft-rosen-idr-rfc3107bis-001.
BGPSEC Protocol (From -01 to -02 and on to -03) Matt Lepinski.
Goals of soBGP Verify the origin of advertisements
Chapter 6 Delivery & Forwarding of IP Packets
BGPSEC Potential Optimizations for AS-PATH Prepending and Transparent Route Servers. sidr wg / Québec City Doug Montgomery
Geoff Huston APNIC August 2009
Updates to Draft Specification for DTN TCPCLv4
An Update on BGP Support for 4-byte ASN
BGP Route Reflectors and Confederation
BPSec: AD Review Comments and Responses
Presentation transcript:

1 draft-sidr-bgpsec-protocol-05 Open Issues

2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor stuff that I am in the process of fixing This presentation is mostly normative changes, with a couple non-normative things where I would like working group input

3 Part 1: GENERAL STUFF

4 1.1 Nomenclature for “AS Path” We don't have an AS_PATH What do we call the sequence of ASes through which an update passes? Surely there is something better than “The sequence of ASes through which an update passes” However, “AS path” might be confusing?

5 1.2 Mandate for Transport Security Do we want to specify a specific mechanism for transport security (either MUST or SHOULD)? E.g., TCP-AO Does it make since to mandate transport security without specifying a specific mechanism?

6 1.3 FYI: Editor's Notes The -05 version is the last version with Editor's Notes. My plan is that I completely remove them from the -06 version

7 Part 2: CAPABILITY NEGOTIATION

Negotiation Errors Is failure to negotiate the BGPSEC capability is it an error that prompts sending of a NOTIFICATION message? I believe the answer is “No”, but I am not certain RFC 5492 essentially says whether you produce an error and close the session depends on the capability that you fail to negotiate

SAFI of 0 vs Null SAFI Do we need a “SAFI present” flag? That is, does setting the SAFI to zero in the capability advertisement have a different semantics than “SAFI not present”?

Negotiation of 4-Byte AS Do BGPSEC speakers also include the 4-Byte AS number capability? If so, what happens when a speaker does not? Do we close the session?

Both “No send” and “No receive” Is it an error to send announce support for BGPSEC, but be unwilling to either send or receive BGPSEC update messages?

12 Part 3: THE ATTRIBUTE

Name of the attribute Anyone have a problem with BGPSEC_PATH Replacing BGPSEC_PATH_SIGNATURES

Router IDs Draft-ietf-sidr-bgpsec-pki-profiles RECOMMENDS that routers have a subject name that includes a router-id identifying a router (or set of routers) Do we want to add router-id (or perhaps certificate subject name) as an unsigned field right next to SKI in the BGPSEC attribute? If we don't, there are potentially a large number of certs matching a given AS that must be sifted through be the validation code

Additional Info – Is it useful? Additional Info was put into the document as a signed origin-added blob of bits, back when we took out Expire_Time. At the time some members of the working group believed we may in the future want to add an Expire_Time or Signing_Time or something to support “better” protection against Is this blob of bits still useful? If so, is the current specification good enough?

Non-BGPSEC stuff in your AS The attribute is currently “non-transitive” This could be a problem if your route reflectors don't support BGPSEC Related issue: If you have both BGPSEC and non-BGPSEC edge routers, will you have issues with consistency of decisions?

Silly “Length” Question Does the value in the Length field include the octets used to express the Length field? Example: If I have 2 octets of Length field and 7 octets of other stuff, is the value in the Length field 9 or 7?

18 Part 4: SENDER PROCESSING

Originating a BGPSEC Update A router internal to your AS speaks BGPSEC. It originates an update message and sends it to your edge router. Does the update message it sends have an empty AS_PATH or an empty BGPSEC_PATH attribute?

20 Part 5: VALIDATION

Validation State Names Does anyone have a problem with “Valid” and “Invalid”? Do I need to add text explaining why there are two states?

Error Handling Currently the text says “Log that an error occurred and drop the update” Is this the right text? Is there something I should cite? If we chain back to RFC 4271, we get “close the session”, which probably isn't what we want

Deferring Validation Currently: “During exceptional conditions (e.g., the BGPSEC speaker receives an incredibly large number of update messages at once) a BGPSEC speaker MAY defer validation of incoming BGPSEC update messages. The treatment of such BGPSEC update messages, whose validation has been deferred, is a matter of local policy.”

Deferring Validation (continued) Currently: “Implementations that support such deferment of validation MUST perform validation of these messages as soon as possible (i.e., as soon as resources are available to perform validation) and MUST re-run best path selection once the validation status of such update” Is this text reasonable? Do we need additional guidance?

Edge Validation Currently: “BGPSEC validation needs only be performed at eBGP edge. The validation status of a BGP signed/unsigned update MAY be conveyed via iBGP from an ingress edge router to an egress edge router. Local policy in the AS determines the specific means for conveying the validation status through various pre-existing mechanisms (e.g., modifying some attribute). Based entirely on local policy settings, an egress router MAY trust the validation status conveyed by an ingress router or it MAY perform its own validation.”

Use of Validation State Do we want a mandate that you cannot pick non-BGPSEC for best path if you have BGPSEC valid? What about BGPSEC invalid? I believe the answer is “No Mandate” Do we want to say anything at all about SHOULD prefer valid over valid? What about non-BGPSEC vs invalid?

Re-Running Validation Does there need to be text related to Re- Running the validation algorithm? Should implementations re-run validation occasionally because RPKI state may have changed? Should implementations re-run validation EVERY time RPKI state changes? Clearly, if you re-run validation and validity changes then you should re-run best path

draft-ymbk-rpki-rtr-keys Shall I include an informative reference to draft- ymbk-rpki-rtr-keys? Randy assures me that it will soon I believe that this an extension to the rtr protocol to support bgpsec keys