netsec-sig - Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115)
Subject: Internet2 Network Security SIG
List archive
- From: "Montgomery, Douglas (Fed)" <>
- To: "" <>
- Subject: Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115)
- Date: Tue, 23 Apr 2019 23:36:23 +0000
Hmm, not sure I followed all of that.
You are right that RPKI-OV filtering of peers only requires ROA information, as compared to full prefix-filtering of peers which requires full recursive AS-SET expansion + full ROUTE objects. Also RPKI-OV is applicable anywhere, regardless of relationships of neighboring ASes. E.g., you can do RPKI-OV on announcements from a provider, not just your peers.
Not sure I follow David’s comment, if a bad actor is on the BGP path between a valid origin and a network doing RPKI-OV, why would they prepend anything? They are already on the peering path. If it is an alternative path you wish to promote, just suppress the original path/announcement.
Frankly, if a bad actor is actually in the sequence of BGP-speaking ASes, you have a different problem. The only attack that would require malicious manipulation of BGP would be to drop/omit ASes from the path to either hide the bad guy, and/or shorten the path.
Of course any solution to manipulating the BGP path in such a manner will require either declarative data about feasible peering relationships (e.g., RPKI-ASPA, or full AS-SET data) or actually signing the path (e.g., BGPsec).
Maybe I misunderstood the scenario.
dougm -- Doug Montgomery, Manager Internet & Scalable Systems Research @ NIST
From:
<> on behalf of David Farmer <>
On Tue, Apr 23, 2019 at 2:45 PM Steven Wallace <> wrote:
Your direct transit providers usually local preferences the routes they learn from you as a customer. So the peers and customers of your transit providers that you prepend to have the issue you describe. However, your direct transit providers usually won't unless you de-preference your routes with BGP communities going to them.
Also, RPKI doesn't have an AS-Set construct so you still need IRRs, there is work on AS Cones for RPKI, but it will be a while if it even ever gets fully baked.
You can also use ROAs as IRR route/route6 objects and even override IRR route objects if they conflict with a ROA.
Also, origin validation is no help if a bad guy is in the path between you and someone doing origin validation, all they have to do is artificially prepend your valid path, so their bogus path looks better.
Repeat after me "RPKI is only a start" 🤔
Thanks
=============================================== |
- RE: [Security-WG] BCP for Origin validation (RFC7115), (continued)
- RE: [Security-WG] BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), Michael H Lambert, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), Brad Fleming, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), Montgomery, Douglas (Fed), 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), David Farmer, 04/19/2019
- RE: [Security-WG] BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), ssw, 04/19/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), Steven Wallace, 04/23/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), David Farmer, 04/23/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), Montgomery, Douglas (Fed), 04/23/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] [External] RE: BCP for Origin validation (RFC7115), ssw, 04/19/2019
- RE: [Security-WG] BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), David Farmer, 04/19/2019
- Re: [Security-WG] BCP for Origin validation (RFC7115), Montgomery, Douglas (Fed), 04/19/2019
- RE: [Security-WG] BCP for Origin validation (RFC7115), Spurling, Shannon, 04/19/2019
Archive powered by MHonArc 2.6.19.