>I doubt this is a widespread issue but at the same time this is a possible 
>attack vector and security concern.

Yes, I think the attack type you allude to would be rare.  It is an attack by a 
rogue OLD BGP speaker (i.e., one that is not upgraded to RFC6793) in the path.  
The rouge speaker removes AS_SET from the AS_PATH, but it leaves unperturbed 
the AS4_PATH attribute (with AS_SET in it).  

>We did implement choice B and are therefore in favour of this method.

However, for such security concern as described above, wouldn't it be better to 
just not trust the UPDATE and use choice A (treat-as-withdraw)?  Choice A also 
seems consistent with deprecation of AS_SET and AS_CONFED_SET.  Let us see what 
others have to say about it.

Sriram  
=====================

-----Original Message-----
From: Claudio Jeker <cje...@diehard.n-r-g.com> 
Sent: Thursday, August 22, 2024 4:36 AM
To: Sriram, Kotikalapudi (Fed) <kotikalapudi.sriram=40nist....@dmarc.ietf.org>
Cc: Ketan Talaulikar <ketant.i...@gmail.com>; i...@ietf.org; sidr...@ietf.org; 
grow@ietf.org
Subject: [Sidrops] Re: WG LC for draft-ietf-idr-deprecate-as-set-confed-set-14 
(7/8 to 7/ - call continues from 7/8 to 7/26/2024 - 2nd extensions to 8/6

On Thu, Aug 22, 2024 at 03:46:11AM +0000, Sriram, Kotikalapudi (Fed) wrote:
> [Jeff, Ketan, Sue, Keyur, all ... please share if you have some 
> thoughts about this]
> 
> Hi Claudio,
> 
> >If a router sends you an AS_PATH without AS_SET and an AS4_PATH with AS_SET 
> >....
> 
> You raise a good question.  Section 3.1 observations are based on the 
> premise that if RFC6793 is implemented correctly by the sender and 
> preceding ASes in the AS path, then the above will not happen. But you 
> think it could happen due to an intentional attack by the sender or a 
> preceding AS.

If systems implement RFC6793 then why are they running without 4-byte ASN in 
the first place?
Systems that only support 2-byte ASN do not follow RFC6793 since they don't 
support it. So you can not assume they will do anything regarding
RFC6793 correctly. I doubt this is a widespread issue but at the same time this 
is a possible attack vector and security concern. It is a loop hole which 
should be closed.
 
> All:
> 
> OK, let us see if we can address this.  
> 
> Which of the following methods for modifying the recommendations at the top 
> of Section 3 would be preferable (click to see Sec. 3: 
> https://datatracker.ietf.org/doc/html/draft-ietf-idr-deprecate-as-set-confed-set-15#name-recommendations
>  ?
> 
> Method A:  Modify the second bullet in Sec. 3 as follows:
> 
> * Upon reception of BGP UPDATE messages containing AS_SETs or AS_CONFED_SETs 
> in the AS_PATH or AS4_PATH, MUST use the "treat-as-withdraw" error handling 
> behavior as per [RFC7606].
> 
> Methos B.  The second bullet in Sec. 3 remains as is but add a third bullet 
> as follows:
> 
> (unchanged second bullet)
> * Upon reception of BGP UPDATE messages containing AS_SETs or AS_CONFED_SETs 
> in the AS_PATH, MUST use the "treat-as-withdraw" error handling behavior as 
> per [RFC7606].
> 
> (new third bullet)
> * Upon reception of BGP UPDATE messages not containing AS_SETs or 
> AS_CONFED_SETs in the AS_PATH but containing AS_SETs in the AS4_PATH, MUST 
> use the "attribute discard" approach for the (malformed) AS4_PATH as per 
> [RFC7606].
> 
> Note (with Choice B): The handling of UPDATES with AS_CONFED_SETs in the 
> AS4_PATH is as specified in [RFC6793].

We did implement choice B and are therefor in favour of this method.
 
> Thanks for you anticipated inputs.
> 
> Sriram   
> 

_______________________________________________
GROW mailing list -- grow@ietf.org
To unsubscribe send an email to grow-le...@ietf.org

Reply via email to