netsec-sig - Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115)
Subject: Internet2 Network Security SIG
List archive
- From:
- To:
- Subject: Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115)
- Date: Fri, 19 Apr 2019 14:24:39 -0400
I’m going to agree with Shannon and re-phrase Doug’s comments:
On Apr 19, 2019, at 2:14 PM, Spurling, Shannon <> wrote:This message was sent from a non-IU address. Please exercise caution when clicking links or opening attachments from external sources.I take it as the opposite. That the origin announcement can be faked, like in the hijacking attack. Even with a valid source ROA, If you can make your AS path shorter for some of the Internet, it doesn’t matter what the owners ASN is. You can fool some of the internet all of the time.I guess that’s where the IRR data and filters help out. Personally, it seems a lot more palatable than cryptographically signing everything and trying to produce some “Chain of Trust” to try to authenticate every little piece. That’s a lot of things to break. How often and what is my mechanism to roll my keys? Who keeps the keys and how secure are they?Shannon SpurlingFrom: <> On Behalf Of David Farmer
Sent: Friday, April 19, 2019 11:46 AM
To:
Subject: Re: [Security-WG] BCP for Origin validation (RFC7115)I completely agree about the Path issues, but that is the next paragraph from the one I quoted. To me, the paragraph I quoted isn't about Path issues at all, it about the fact that it is possible for a prefix owner to lie about the origin of a prefix. I'm not sure what's to be gained by doing so maliciously, but it is certainly a vector from mistakes.ThanksOn Fri, Apr 19, 2019 at 11:31 AM "Montgomery, Douglas (Fed)" <> wrote:It is well known that current RPKI-based BGP-OV is subject to forged origin attacks, where the attacker adds an origin AS to the path that is listed in a ROA.
If your ROAs are tight, it still prevents sub-prefix hijacks, it does make the path 1 hop longer, and it might trigger other AS-PATH filters in neighboring networks.
Certainly RPKI-OV would address many of the hijacks / mis originations we have seen to date. What remains to be seen is of those that were actually intentional/malicious, how effective forged origin prepending attacks would be.
There are two approaches to closing the remaining vulnerabilities in PATH manipulations.
Full AS-PATH signing/validation (crypto on router) -
https://datatracker.ietf.org/doc/rfc8205/
or, if that is a bridge too far ... near term approach.
RPKI-based data to filter in-feasible paths -
https://datatracker.ietf.org/doc/draft-azimov-sidrops-aspa-verification/
https://datatracker.ietf.org/doc/draft-azimov-sidrops-aspa-profile/
dougm
--
Doug Montgomery, Manager Internet & Scalable Systems Research @ NIST
On 4/19/19, 12:05 PM, "Brad Fleming" < on behalf of> wrote:
I’m assuming it means “there’s not way to cryptographically sign the actual BGP update on the router and it’s easy to pretend to be any ASN; thus a malicious actor can still defeat RPKI-based OV. meaning OV will generally only protect against configuration mistakes.”
Which somewhat goes with the spirit of the following paragraph:
Origin validation does not address the problem of AS_PATH validation.
Therefore, paths are open to manipulation, either malicious or
accidental.
So I think maybe Randy was just pointing out the two major, known limitations of OV; malicious actors can still hijack in at least some cases, and this doesn’t do anything for path-level validation.
--
Brad Fleming
Assistant Director for Technology
Kansas Research and Education Network
> On Apr 19, 2019, at 10:49 AM, David Farmer <> wrote:
>
> The Security Considerations of RFC7115 has the following statement in it;
>
> As the BGP origin AS of an update is not signed, origin validation is
> open to malicious spoofing. Therefore, RPKI-based origin validation
> is expected to deal only with inadvertent mis-advertisement.
>
> I think what this is saying is that the owner of a prefix could maliciously say the prefix is originated by an ASN incorrectly. However, I don't believe the converse is true, an ASN cannot maliciously say the prefix is originated by it.
>
> Or put another way ROAs say which ASNs originate the prefix, and they are signed by the owner of the prefix, but there is no way for an ASN to say which prefixes it originates, that is then signed by the owner of the ASN.
>
> Do I have that right?
>
> Thanks.
>
>
>
> --
> ===============================================
> David Farmer
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota
> 2218 University Ave SE Phone: 612-626-0815
> Minneapolis, MN 55414-3029 Cell: 612-812-9952
> ===============================================--===============================================
David Farmer
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota
2218 University Ave SE Phone: 612-626-0815
Minneapolis, MN 55414-3029 Cell: 612-812-9952
===============================================
Attachment:
smime.p7s
Description: S/MIME cryptographic signature
- [Security-WG] BCP for Origin validation (RFC7115), David Farmer, 04/19/2019
- RE: [Security-WG] BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), Michael H Lambert, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), Brad Fleming, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), Montgomery, Douglas (Fed), 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), David Farmer, 04/19/2019
- RE: [Security-WG] BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), ssw, 04/19/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), Steven Wallace, 04/23/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), David Farmer, 04/23/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), Montgomery, Douglas (Fed), 04/23/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), ssw, 04/19/2019
- RE: [Security-WG] BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), David Farmer, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), Montgomery, Douglas (Fed), 04/19/2019
- RE: [Security-WG] BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- <Possible follow-up(s)>
- Re: [Security-WG] BCP for Origin validation (RFC7115), John Kristoff, 04/20/2019
Archive powered by MHonArc 2.6.19.