Paul Wouters <paul.wouters=40aiven...@dmarc.ietf.org> wrote:
    > I am a bit confused why the source address needs to be cryptographically
    > verified to make SAV based decisions. What would be the scenarios of
    > inter AS communication where the packet is maliciously modified between
    > the two ASes but in such a way that RPKI wouldn't already reject the
    > packet with a bad src/dst ?

I'm also confused by this proposal.
But, imagine if you will, that the RPKI is unable to transitively address all
of the transit points.   There are a lot of corner cases that the SAV WG(s)
have been unable to come to consensus about.  I think that a lot of them work
out to that many solutions only work if all operators conform to specific
network topology patterns.

But, if the originating AS is able to sign the packet in such a way that a
receiving AS is able to verify the traffic came from the originating AS.
This would definitely be a win, right?

How would this be possible to do, .... well.
There are ways that I can imagine it might be made to work, but it seems very
difficult to do at speed, in practice.
One thought is that I wonder if there is some value if one could only verify
some small percentage of packets... with some consequence if the check fails
such that we probablistically catch violators and put them into some ACL.

    > I am not convinced a modified IPsec AH is the best choice. A new
    > protocol as this would be, would take quite some time to be widely
    > supported. With IPsec, there are already two failures in this space,
    > BEET (BTNS) and wrapped ESP (wESP). I know that the Linux IPsec

wasn't it BEEP?
BEEP is not really related to BTNS.
BEEP mode is really related to HIP, but, yes, BTNS could benefit from it.
wESP is, I agree, a total failure.

    > Additionally, AH works poorly over NAT. Would there be a chance that
    > the two AS'es have to communicate via a NAT?

Probably not.  BGP4 just doesn't do NAT44.
but, if it were a problem... IPv6 would still benefit.
If ASs can benefit from DDoS protection by agressively switching to IPv6,
then that might be a win-win.

--
Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-



Attachment: signature.asc
Description: PGP signature

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to