Skip to Content.
Sympa Menu

netsec-sig - Re: [Security-WG] I2 - Anti-Spoofing/uRPF discussion summary from Technology Exchange

Subject: Internet2 Network Security SIG

List archive

Re: [Security-WG] I2 - Anti-Spoofing/uRPF discussion summary from Technology Exchange


Chronological Thread 
  • From: David Farmer <>
  • To: Karl Newell <>
  • Cc: Michael H Lambert <>, "" <>, "" <>
  • Subject: Re: [Security-WG] I2 - Anti-Spoofing/uRPF discussion summary from Technology Exchange
  • Date: Mon, 6 Nov 2017 11:25:27 -0600
  • Ironport-phdr: 9a23:c0KllBNbY/Q/1IN+g1sl6mtUPXoX/o7sNwtQ0KIMzox0Lfr7rarrMEGX3/hxlliBBdydsKMUzbKO+4nbGkU4qa6bt34DdJEeHzQksu4x2zIaPcieFEfgJ+TrZSFpVO5LVVti4m3peRMNQJW2aFLduGC94iAPERvjKwV1Ov71GonPhMiryuy+4ZPebgFLiTanfb9+MAi9oBnMuMURnYZsMLs6xAHTontPdeRWxGdoKkyWkh3h+Mq+/4Nt/jpJtf45+MFOTav1f6IjTbxFFzsmKHw65NfqtRbYUwSC4GYXX3gMnRpJBwjF6wz6Xov0vyDnuOdxxDWWMMvrRr0vRz+s87lkRwPpiCcfNj427mfXitBrjKlGpB6tvgFzz5LIbI2QMvd1Y6HTcs4ARWdZXMlRWSxPDI2/YYUSEeQOIf1VoJPhq1YUtxayGRWgCeHpxzRVhnH2x6o60+E5HA/IxgMgAdMOv2nJp9v1LqgSS+W1w7fSzT7eaP5W1y3y6JLNch8/u/GBRq9wcc/XyUU1CQzKk0iQpJXjMjiI1eoNq3CW4/duWO+gkWIqqA58riKyysooi4TFnJwZxkzH+Clh3oo5Odm1RFR4bNOkCpdcqTyWOotsTs4jR2xlvjsxxKcctp6hZicKzYwqxx7BZPyDdIiF+hfjVPqLLjthnHJoe6izhxGz8Ui80OH8S8y00FBQoiVbj9bMq2gB1x3V6seZVvtw5lqt1DiA2gzJ6exJLlo4mbffJpMg2LI8iIYfvEfbEi/zgkr2jauWdks++uiv7uTqervmqYWGN49xlA7+KL8jmtG6AeQ+KAQBQXWU+fmk2L354UL5WKlKjuExkqTBq5DVO9gUprOjAw9UzoYi6w+zDjmp0NkDmXkHLUlFeA6cj4T3IV3OIfb4DeuhjFS2ljdk2ezGMqP7DprTM3fDjeSpQbEoyEdGzEIVwM9S45YcXrIHLe3+XkvZtdrEAwU/PhDuhevrFYMu+JkZXDejC7GYPOv8uEWN6/hnd+eFfooYoh7gLv5j6vLz2yxq0WQBdLWkiMNEIEuzGe5rdgDAOSLh

I agree BCP38/uRPF is probably best focused on connectors. However, I'm not sure the goal is to get all connecters to do BCP38/uRPF, at least yet. I believe the current goal is to better understand the need, the efficacy, and issues of deploying BCP38/uRPF in our community.  Blindly deploying BCP38/uRPF doesn't answer those questions. 

As for RPKI;

In our community RPKI is just as much a campus issue, as most campuses are the BGP route origin. Exclusively focusing on connectors for RPKI won't work. Connectors could be the focus for RPKI route validation, but without ROAs from campuses, RPKI route validation won't have much effect as there won't me much to validate.  This is a classic chicken or the egg problem.  we need to incrementally make progress on both sides.  Without regionals validating there isn't a good reason for campuses to create ROA. And, without ROAs from campuses there isn't a good reason for regionals to validate.  

Thanks.

On Mon, Nov 6, 2017 at 10:41 AM, Karl Newell <> wrote:
Good points David and Michael.  They remind me of part of the discussion we had during the WG meeting at TechEx.  While most agreed with efforts on this front, they also felt that the connectors are the best place for implementation.  So how do we foster that?  What can Internet2 do to help?  Getting back to Grover’s suggestion to turn on uRPF and log, we can use that data to inform the community.  There was also discussion of something like the I2 Innovation Platform but for security; connectors that commit agree to BCP38/uRPF, RPKI, and there was mention of a third item but I don’t recall what it was.  Would people support this effort and sign on?

Karl

--
Karl Newell
Cyberinfrastructure Security Engineer
Internet2
520-344-0459

On 11/6/17, 9:17 AM, " on behalf of Michael H Lambert" < on behalf of > wrote:

    > On 6 Nov 2017, at 10:54, David Farmer <> wrote:
    >
    > So a question, how do we communicate this going forward as we interact with more and more people? I'm worried some will just see this as an effort to apply a traffic security policy on the Internet2 backbone.

    I think the primary targets/victims/beneficiaries of this process should be the connectors.  To me, it makes much more sense for them to be filtering their members on ingress, especially since BCP38 does tend to crop up in various NSF solicitations.  If Internet2 does the filtering, it can hide these downstream issues.  It is appropriate for Internet2 to identify "offending" traffic, but once it has been identified, the connector should be encouraged/cajoled/shamed to fix the problem.

    International peers are another matter.  One would hope that they would have similar policies.

    Michael






--
===============================================
David Farmer              
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota  
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================



Archive powered by MHonArc 2.6.19.

Top of Page