netsec-sig - Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
Subject: Internet2 Network Security SIG
List archive
Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
Chronological Thread
- From: "Montgomery, Douglas (Fed)" <>
- To: "" <>
- Subject: Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
- Date: Mon, 20 Aug 2018 15:25:51 +0000
- Accept-language: en-US
- Authentication-results: spf=none (sender IP is ) ;
- Ironport-phdr: 9a23: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
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
Forgot to include the link to the monitor mentioned in the last sentence. https://rov.rpki.net/ -- DougM at NIST From:
Doug Montgomery <> I can assure you the issue of supporting planned and unplanned (emergency) announcements from DDoS mitigation providers was discussed throughout the development
of RPKI. There is a bit of a double edged sword here. Any ROA authorized announcement of a longer prefix than is actually announced under normal operation, creates the
opportunity for a forged origin attack of just prepending the authorized AS to a bogus announcement. While the resulting bogus path will be 1 hop longer than otherwise necessary, the BGP decision process assures it would always win. There are some proposals under development to address this issue – see:
https://datatracker.ietf.org/doc/draft-azimov-sidrops-aspa-profile/, but they are in the early stages. These proposals include registered peering relationships in RPKI objects,
thus making prepending the authorized origin even harder, because you would have to prepend the first “N” hops. The semantics of such approaches allow one to validate that a subset (first N hops) are a feasible path. This is slightly different than actually
signing the update at each hop. Or course long term BGPsec, that signs each hop, would address these authorized origin pre-pending attacks. WRT RPKI propagation times, these are clearly a function of the rate at RIRs update their publication points, validating caches sync vs RIRs, and routers sync against
caches. In theory the worst case is the sum of each of these timers, average is half of that. In practice, there have been some emulation studies of parts of this process:
https://datatracker.ietf.org/meeting/interim-2012-sidr-05/materials/slides-interim-2012-sidr-5-4 The only measurements of how things are actually playing out in the Internet today that I know of is here: Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering:
https://arxiv.org/pdf/1706.04263.pdf Their work sees measured / inferred ROA propagation times of up to 8 hours. Also from that work is a monitor of networks that appear to be filtering based upon RPKI based upon experiments from the project above. dougm -- Doug Montgomery, Manager Internet & Scalable Systems Research @ NIST https://www.nist.gov/itl/antd/internet-scalable-systems-research From:
<> on behalf of Brad Fleming <> Agreed. It seems odd that features like "prefix-length-range" or "prefix-list 1.1.1.1/16 ge 23 le 24" have been around for a long time but didn’t make it into the RPKI standards. Seems like it would this problems
gracefully. As far as maximum length I’m assuming “The Internet” will probably not allow prefixes more specific than /48; much like the social norm around announcing a /24 IPv4 prefix to the DFZ. Either way, the tools not accepting the ROA means I doubt anyone ever thought the use case through (unfortunately). -- 785-856-9805 785-865-7231 785-856-9820
|
- [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/15/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Michael H Lambert, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/21/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- RE: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Spurling, Shannon, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
Archive powered by MHonArc 2.6.19.