netsec-sig - RE: [Security-WG] Generating an RPKI ROA request with lots of prefixes
Subject: Internet2 Network Security SIG
List archive
- From: "Spurling, Shannon" <>
- To: "" <>
- Subject: RE: [Security-WG] Generating an RPKI ROA request with lots of prefixes
- Date: Mon, 20 Aug 2018 16:09:09 +0000
- Accept-language: en-US
- Ironport-phdr: 9a23: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
So, I'm kind of watching this, but want to get a better idea of why. I think
that is Larry's question. Why publish these for prefix lengths you don't
normally plan on advertising? I think the elephant in the policy is wither
non documented prefixes would be a blanket permit or blanket deny.
What is the default behavior for non-defined prefixes?
Common sense would probably get me to the point of, if I have a /16 I would
define my handful of /19's and /18's like normal, and anything outside of
that in that /16 would be a violation of that policy. If I configure some
prefixes in a /16 ARIN assignment, and leave a /19 out of it, I would presume
it (the /19) was not to be advertised from any source ASN until defined...
Not sure if that would be the standard behavior for RPKI implementation. Is
there a place where they define how the ROA's should be used? I may have
missed it when glossing over the documentation.
Thanks
Shannon Spurling
-----Original Message-----
From:
<>
On Behalf Of Larry Blunk
Sent: Monday, August 20, 2018 10:49 AM
To:
Subject: Re: [Security-WG] Generating an RPKI ROA request with lots of
prefixes
On 08/20/2018 11:07 AM, Andrew Gallo wrote:
>
>> I'm really failing to see the big win here. It's not so much the
>> use of maxlength that's the issue, but rather having ROA's allowing
>> announcements of prefixes which you do not normally announce (which
>> are more specifics of prefixes you normally do announce).
>> When you use maxlength, the attacker still needs to spoof origin AS
>> in the AS_PATH in order to hijack a prefix. By registering a bunch
>> of /24's (or
>> /48's) which
>> are not normally announced, you still opening yourself up to hijacks
>> of those individual prefixes with the same type of origin AS
>> spoofing. For most networks, hijacking a few strategic /24's or
>> /48's will likely be just as deadly as hijacking a larger block.
>>
>>
>> -Larry Blunk
>> Merit
>>
>>
>>
>
> Yes, that is true, creating ROAs for all the /24s does create a large
> attack surface. BUT, it is still less than creating *all* the
> prefixes between /16 and /24
>
> Creating a ROA that covers a /16 and all /24s is 257 prefixes, while
> 16-24 (inclusive) would be 511 total prefixes, some of which are
> pretty large.
>
> You are correct in that this type of attack would require AS spoofing,
> which should (hopefully) be harder.
>
> I think we're seeing the mismatch between real-time operational
> changes to the routing infrastructure (changing BGP advertisements)
> and the non-real-time data that is used to validate it.
>
> We're also seeing a change in guidance from the standards bodies- the
> max length field was useful, but is no longer recommended.
>
> Good discussion all around.
>
>
Andrew,
I think you are missing my point. I'm not arguing for creating ROAs for
all possible permutations of more specifics. I'm pointing out that by
registering more specific ROAs for prefixes which are not normally announced,
you are essentially opening yourself up to the exact same attacks which are
enabled by the use of maxlength (the attacks in both cases require AS_PATH
spoofing). What you are proposing is not actually a solution to the
maxlength issue.
-Larry
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, (continued)
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Michael H Lambert, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- RE: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Spurling, Shannon, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Jeff Bartig, 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
Archive powered by MHonArc 2.6.19.