soBGP deployment

Edward Lewis Ed.Lewis at neustar.biz
Mon May 23 16:18:08 UTC 2005


At 11:27 -0400 5/23/05, Larry J. Blunk wrote:

>    I suspect this was due to the fact that template submissions
>were not fully automated at the time and required human
>review (disclaimer: I worked for the MichNet side of Merit
>back then and was not intimately familiar with PRDB
>operations).

It could have been the tools.  (I can't argue, I wasn't there.)

Here's another thought.  Much like the comparison of SSH and DNSSEC 
in this reply of mine from last March:
     http://www.merit.edu/mail.archives/nanog/2005-03/msg00694.html

I.e., the "mythical core" needs work.  This time it's the address 
organizations and routing elements.

Yet another thought.  Skimming through this thread, and only being 
slightly aware of sBGP and soBGP in past years, some concepts remind 
me of work under DARPA's Active Nets research done in the late 90's. 
(http://www.darpa.mil/ato/programs/activenetworks/actnet.htm)

Some things I learned then:

1) Keep the security ancillary data nearby.  You might need it when 
the source of the data is unreachable (perhaps because of an incident 
like a flood).

2) Appending signatures is dicey.  It has to be all public key and 
there's never a guarantee that the latest signer hasn't stripped out 
previous entries.  (That could make a longer path seem shorter in 
order to redirect traffic.)

IMHO - the inherent problem is that a router is trying to work inside 
the plane of activity (meaning it can only talk to it's nearest 
neighbors), but it takes the view point of something with ubiquitous 
knowledge to know if every thing is cool.  How can you do this 
without a trusted third party involved somewhere, in a way that is 
not obtrusive (whether at registration time or at run time)?

Dijkstra's shortest path algorithms (an example IGP) work "in the 
plane" because it manages to mimic the ubiquitous view.  You aren't 
afraid that someone is "not playing my the rules."  When you are 
working with security (algorithms), you don't have that safety belt.

And a final thought...

Security ought to not make the system being protected brittle.  Like 
the example of routing changes being held up until the paperwork went 
through - maybe an improvement in tools will enable this.  But think 
of the long term impact - who will be paying to keep the tools and 
system up to date?

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                +1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.



More information about the NANOG mailing list