netsec-sig - Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
Subject: Internet2 Network Security SIG
List archive
- From: "Montgomery, Douglas (Fed)" <>
- To: " List:" <>
- Subject: Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes
- Date: Tue, 21 Aug 2018 14:09:37 +0000
- Accept-language: en-US
- Authentication-results: spf=none (sender IP is ) ;
- Ironport-phdr: 9a23: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
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
As one last thought on this issue. While origin validation alone still has
some weaknesses for capable & malicious attackers, it is important to compare
origin validation against doing nothing, not just against itself.
1. No origin validation - no defense against hijacks of same (shortest path
win) or longer length. No defense against mis-originations that are not
malicious (i.e., misconfigurations). No way to authorize origin ASes or DDoS
mitigation providers. Limited ability to filter outside customer cone.
2. With origin validation - defense against mis configurations (the majority
of "hijacks"), defense against same length and sub-prefix attacks without
forged origin, forged origin attacks still possible but have longer path and
more "visibility" to the system. Ability to filter unauthorized originations
outside your customer cone.
The design of RPKI origin validation was highly influenced by a "no crypto on
the router" perceived requirement. Without the ability to digitally sign
elements of the path / NLRI you will always be susceptible to various forms
of path forgery and cut-n-paste attacks.
In short ROV raises the bar ... but it doesn't put it at the ceiling. That
was a purposeful design tradeoff.
dougm
--
DougM at NIST
On 8/20/18, 4:05 PM, "Montgomery, Douglas (Fed)"
<>
wrote:
A new version of the spec I mentioned earlier was just posted.
BGP RPKI-Based Origin Validation Clarifications
https://tools.ietf.org/html/draft-ietf-sidrops-ov-clarify-05
Mainly just cleaning up the wording, but if you have not read it yet,
start with the one above.
dougm
--
DougM at NIST
On 8/20/18, 1:13 PM, "Montgomery, Douglas (Fed)"
<>
wrote:
I should have provided an additional link with for the ASPA work.
The link below deals with the PATH validation aspects.
https://datatracker.ietf.org/doc/draft-azimov-sidrops-aspa-verification/
Also there is another RFC that provides a somewhat more fluid
description of RPKI validation.
https://tools.ietf.org/html/rfc6483
--
DougM at NIST
On 8/20/18, 12:49 PM, "Andrew Gallo"
<
on behalf of
>
wrote:
On 8/20/2018 11:49 AM, Larry Blunk wrote:
> On 08/20/2018 11:07 AM, Andrew Gallo wrote:
>>
>>> I'm really failing to see the big win here. It's not so
much
>>> the use of maxlength that's the
>>> issue, but rather having ROA's allowing announcements of
prefixes which
>>> you do not normally announce (which are more specifics of
prefixes
>>> you normally do announce).
>>> When you use maxlength, the attacker still needs to spoof
origin AS
>>> in the AS_PATH
>>> in order to hijack a prefix. By registering a bunch of
/24's (or
>>> /48's) which
>>> are not normally announced, you still opening yourself up to
hijacks
>>> of those individual
>>> prefixes with the same type of origin AS spoofing. For most
>>> networks, hijacking a few strategic
>>> /24's or /48's will likely be just as deadly as hijacking a
larger
>>> block.
>>>
>>>
>>> -Larry Blunk
>>> Merit
>>>
>>>
>>>
>>
>> Yes, that is true, creating ROAs for all the /24s does create
a large
>> attack surface. BUT, it is still less than creating *all* the
>> prefixes between /16 and /24
>>
>> Creating a ROA that covers a /16 and all /24s is 257 prefixes,
while
>> 16-24 (inclusive) would be 511 total prefixes, some of which
are
>> pretty large.
>>
>> You are correct in that this type of attack would require AS
>> spoofing, which should (hopefully) be harder.
>>
>> I think we're seeing the mismatch between real-time
operational
>> changes to the routing infrastructure (changing BGP
advertisements)
>> and the non-real-time data that is used to validate it.
>>
>> We're also seeing a change in guidance from the standards
bodies- the
>> max length field was useful, but is no longer recommended.
>>
>> Good discussion all around.
>>
>>
>
> Andrew,
> I think you are missing my point. I'm not arguing for
creating
> ROAs for all possible permutations
> of more specifics. I'm pointing out that by registering more
> specific ROAs for prefixes which are
> not normally announced, you are essentially opening yourself up
to the
> exact same attacks which
> are enabled by the use of maxlength (the attacks in both cases
require
> AS_PATH spoofing). What
> you are proposing is not actually a solution to the maxlength
issue.
>
>
> -Larry
>
>
No, I understand your point. I wasn't actually proposing this as
a
solution. Seth had asked how this could be done, so I wrote a
script to
see if it could be done, and in the process found a bug in ARIN's
ROA
request submission portal, as well as a limit to the number of
prefixes
it will accept in a single ROA.
I agree creating ROAs that cover more specifics that aren't
normally
announced is a risk, but it could be a requirement given the
difference
between the real-time nature of having a DDoS provider announce
one of
your subnets, and the non-real-time creation and distribution of
a ROA
to cover it. If you were forced into a position where you didn't
know
which /24 would need to be announced, or when it would need to be
announced, how would you handle it?
Right now, there doesn't seem to be a good option, though Doug
has
shared some work that I wasn't aware of.
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, (continued)
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Brad Fleming, 08/17/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/21/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- RE: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Spurling, Shannon, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Montgomery, Douglas (Fed), 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Jeff Bartig, 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Larry Blunk, 08/20/2018
- Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Andrew Gallo, 08/20/2018
- Re: [External] Re: [Security-WG] Generating an RPKI ROA request with lots of prefixes, Garrett, Seth B, 08/17/2018
Archive powered by MHonArc 2.6.19.