<div dir="ltr"><div dir="ltr"><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div></div><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, 11 Oct 2021 at 10:33, Tim Bruijnzeels <<a href="mailto:tim@nlnetlabs.nl">tim@nlnetlabs.nl</a>> wrote:</div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
ASPA is orthogonal to BGPSec. It lets AS holders declare who their upstreams are<br>
(in the context of BGP Path, not business relation). Even if this information is<br>
not yet used in routers in an automated way, a clear text validated output with<br>
this information can already be valuable to operators, e.g. for provisioning.<br>
(This is also how ROAs were oftentimes used in the early days).<br></blockquote><div><br></div><div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">ASPA without BGPsec is barely different to RPSL. Yes, I am squinting very hard to make that conclusion, but essentially if I have to trust RIPE NCC are doing the right thing with their RPKI trust anchor, I might as well just get the results of the policy statements (aut-num records) without all the cryptographical stuff in the way that does not help at all in terms of ease of use.</div></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">With BGPsec, you're certifying that the AS Path seen in the path attributes of a message is valid and hasn't been falsified by your peer. OV verifies that the origin seen is the origin permitted, and is out-of-band. ASPA verifies that the path seen is a valid and authorised path by that origin, out-of-band. Without BGPsec, OV and ASPA provide no cryptographic authentication of messages at all. That's fine today when most hijacks are fat-finger incidents, but not when someone maliciously tries to either steal a prefix or instigate a denial of service to a prefix.</div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">Without BGPsec, we might as well just forget about RPKI entirely and ensure all the RIR IRRdbs provide sufficient validation that only the true operator of a prefix can publish information... And then abandon everything because ~25 years of RPSL has proven that people can't be bothered to keep records up to date because of insufficient value in doing so.</div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
Wrt BGPSec.. I am actually very happy to see that so many people are in favor of<br>
supporting it. I hope that router vendors are watching. To the best of my knowledge<br>
BGPSec has only been implemented in Bird and Quagga. The main value of supporting<br>
BGPSec in the hosted system would not be to test the protocol as such. This has<br>
already been done using Bird and Quagga and the RPKI tool set by Dragon Research<br>
Labs.<br></blockquote><div><br></div><div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">To support BGPsec today on a router with software support, you need to create your own RPKI delegated repo, to establish keys that are regularly rotated, to make sure your signing keys are regularly resigned and valid, to ensure there is sufficient capacity on the server so that not only can you support a thundering herd of relying party software pulling all the updates but that you're protected from some script-kiddy performing a DDoS. Not to mention having to run a public server somewhere, which would mean a lot of hassle from their IT departments etc.</div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">To support BGPsec in the hosted world, you... Upload your signing keys, specifying which ASNs they are valid for.</div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">In the former model, 95%+ of engineers can not be bothered with all the hassle. In the latter model, 95% of engineers bung a couple of keys in the portal from their router.</div><br></div><div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">It's all about the level of effort required for the operator, and with a hosted scenario it's almost no effort at all.</div></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
It would really help to convince my idea of priority on this if at least a couple<br>
of router vendors would indicate that they are willing to listen to operator wishes<br>
here and implement.<br></blockquote><div><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">Router vendors follow customer requests. Customers won't request things that they don't consider important. Customers won't consider BGPsec important unless it's either easy to do. </div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">Literally all that is being suggested here is that router signing keys be made possible to upload into the RPKI dashboard. It is a small amount of effort that allows BGPsec to be trivial to try out. I genuinely don't understand the reason for obstruction here, what am I missing?</div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif">Matthew Walster</div></div></div>