netsec-sig - Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
Subject: Internet2 Network Security SIG
List archive
- From: "Montgomery, Douglas (Fed)" <>
- To: " List:" <>
- Subject: Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
- Date: Mon, 20 Aug 2018 17:13:15 +0000
- Accept-language: en-US
- Authentication-results: spf=none (sender IP is ) ;
- Ironport-phdr: 9a23:40OKcBxZszwybpbXCy+O+j09IxM/srCxBDY+r6Qd0uoTKvad9pjvdHbS+e9qxAeQG9mDtLQc06L/iOPJYSQ4+5GPsXQPItRndiQuroEopTEmG9OPEkbhLfTnPGQQFcVGU0J5rTngaRAGUMnxaEfPrXKs8DUcBgvwNRZvJuTyB4Xek9m72/q99pHPYQhEniaxba9vJxiqsAvdsdUbj5F/Iagr0BvJpXVIe+VSxWx2IF+Yggjx6MSt8pN96ipco/0u+dJOXqX8ZKQ4UKdXDC86PGAv5c3krgfMQA2S7XYBSGoWkx5IAw/Y7BHmW5r6ryX3uvZh1CScIMb5Q6o0WTC/5Kl1ThHmhjoMOzog/G3KlsB8iaRWqw+jqRNi2Y7ZeIGbOuRjcKPBc90URmRBUcRfWCxAHoyyYIQAAvEdPelDqonxu0cCoAG8CASqGejhyiVIhnjz3aAi3egvFgbG3Ao8H9IBt3TUqcv6NL0SUOyt0aLGwzLDb+5Z2Tf58ofIaQ0qrfWMU71ubMXdzEcjHB7Cg1qNrozlIjyV1uEWvmid7upgTv6vh3QoqwF2vDii38EhgZTHiIISz1DL7yR5wIAtKN25VkF7fdCkHIFXtyGAOIt7RN4pTWJwuCsi1LEJo4K3cDUPxZg62hLTdvmKc4aH7x7/SOqcJDl4i295dL6jghu/9EqtxvP8W8WszlpHrzdJnsXJu3wTyxDe78mKRuVj8ku/3DuDyg/e5v1BLE03iaXUNpwsz7sxm5cdv0TOHSr7l17rgKKSeEgp/+yl5uX5bbjovpOcOZF7hwLiPqkrn8GyDvg3PwkPUmWe+Omx16Pv8lf8TbpWlPI7k6fZvZXHKcgGoqO2HwlY2Zs55RmlFTepytEYkGEHLF1bfBKHiJDkNVDQLf3mEfuznk2gnSlpyPzbJ7HhBY7CIWbZnLfmYLZ991VTyA0uzdBZ+p1YEKkBIOj0Wk/tqtPXEgM5Mw2zw+bhEtl90Z4eWX6LAq+eN6PSskWE6f4oI+mJfIMVuTD9JOY55/P2k3M2g0MRcbSs0JcKdXy0A/FrI0uWbHbwntsMFGkKsRciQOD2jVCPVDxea2iyUq4k4zE0EoOmDYPNRoC3h7yB2T+2EYBRZmBbBVCMFGzld4OFW/cXdCKeOMBhkjsaVbS5UY8uyQmutBPmy7pgNufU4TMXuo7+1Nhv5u3TiREz+SV6DsSSyGyNS2B0nngURz8twqxzu019ylGf0admmfxYE8Jc5+9XXgsgK5HT0vF6WJjOXVeLZdqCVUynXsTjHj4ZT9QtzsUIblonXdiuk1jn3jG2UfVdw6eGD4Eu877Nmmf+D8d713vc0qQ91R8rTtYZZkO8gasqvS3UAZLGlECUjbfuPYgbwSHJ/XzLjUSDsAASGFp8VrjKWFgZZ1DK69v++BWRHPeVFb07P14Zmoa5IaxQZ4is1A0cHqXqJcjebmStmmy5GRePwPaWYZH3f3kGgXiPE1AKxgYU+3vOdRMzACusuSr/NHRvDhquK1jp7fE4rXq6SkEuyATfY0p82L+d/B8OmbqTTO1Alr8=
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
I should have provided an additional link with for the ASPA work. The link
below deals with the PATH validation aspects.
https://datatracker.ietf.org/doc/draft-azimov-sidrops-aspa-verification/
Also there is another RFC that provides a somewhat more fluid description of
RPKI validation.
https://tools.ietf.org/html/rfc6483
--
DougM at NIST
On 8/20/18, 12:49 PM, "Andrew Gallo"
<
on behalf of
>
wrote:
On 8/20/2018 11:49 AM, Larry Blunk wrote:
> On 08/20/2018 11:07 AM, Andrew Gallo wrote:
>>
>>> I'm really failing to see the big win here. It's not so much
>>> the use of maxlength that's the
>>> issue, but rather having ROA's allowing announcements of prefixes
which
>>> you do not normally announce (which are more specifics of prefixes
>>> you normally do announce).
>>> When you use maxlength, the attacker still needs to spoof origin AS
>>> in the AS_PATH
>>> in order to hijack a prefix. By registering a bunch of /24's (or
>>> /48's) which
>>> are not normally announced, you still opening yourself up to hijacks
>>> of those individual
>>> prefixes with the same type of origin AS spoofing. For most
>>> networks, hijacking a few strategic
>>> /24's or /48's will likely be just as deadly as hijacking a larger
>>> block.
>>>
>>>
>>> -Larry Blunk
>>> Merit
>>>
>>>
>>>
>>
>> Yes, that is true, creating ROAs for all the /24s does create a large
>> attack surface. BUT, it is still less than creating *all* the
>> prefixes between /16 and /24
>>
>> Creating a ROA that covers a /16 and all /24s is 257 prefixes, while
>> 16-24 (inclusive) would be 511 total prefixes, some of which are
>> pretty large.
>>
>> You are correct in that this type of attack would require AS
>> spoofing, which should (hopefully) be harder.
>>
>> I think we're seeing the mismatch between real-time operational
>> changes to the routing infrastructure (changing BGP advertisements)
>> and the non-real-time data that is used to validate it.
>>
>> We're also seeing a change in guidance from the standards bodies- the
>> max length field was useful, but is no longer recommended.
>>
>> Good discussion all around.
>>
>>
>
> Andrew,
> I think you are missing my point. I'm not arguing for creating
> ROAs for all possible permutations
> of more specifics. I'm pointing out that by registering more
> specific ROAs for prefixes which are
> not normally announced, you are essentially opening yourself up to the
> exact same attacks which
> are enabled by the use of maxlength (the attacks in both cases require
> AS_PATH spoofing). What
> you are proposing is not actually a solution to the maxlength issue.
>
>
> -Larry
>
>
No, I understand your point. I wasn't actually proposing this as a
solution. Seth had asked how this could be done, so I wrote a script to
see if it could be done, and in the process found a bug in ARIN's ROA
request submission portal, as well as a limit to the number of prefixes
it will accept in a single ROA.
I agree creating ROAs that cover more specifics that aren't normally
announced is a risk, but it could be a requirement given the difference
between the real-time nature of having a DDoS provider announce one of
your subnets, and the non-real-time creation and distribution of a ROA
to cover it. If you were forced into a position where you didn't know
which /24 would need to be announced, or when it would need to be
announced, how would you handle it?
Right now, there doesn't seem to be a good option, though Doug has
shared some work that I wasn't aware of.
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, (continued)
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Michael H Lambert, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/21/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- RE: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Spurling, Shannon, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Jeff Bartig, 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
Archive powered by MHonArc 2.6.19.