Re: [anti-abuse-wg] [routing-wg] 2019-03 New Policy Proposal (BGP Hijacking is a RIPE Policy Violation) to be discussed on Anti-Abuse Working Group Mailing List
You can find the full proposal at: https://www.ripe.net/participate/policies/proposals/2019-03
Hey WG, out of curiosity, why neighboring ASNs are not carrying any responsibility for not filtering out a malicious advertisement from a directly-peered neighbor in the proposal? AFAIU most leaks happen because large parties are letting their ACL loose, not because some state-backed player decides to take a pick on someone's else traffic (though both variants exists). The peer who allows any prefix announcement originating from its direct neighbor is no less responsible for the hijack as the origin AS itself. Could you please suggest a possibility to include that kind of relations (determined by third parties, as currently stated for hijacker's AS in the draft) and measures against a transit/upstream in same manner as they are currently defined for a hijacker? Thanks.
Hi Andrey, While it looks, in a first sight, a very good idea, if a neighbor ASN fails to do the filtering (for whatever reason, not necessarily on purpose), should we not just “punish” that one, but also next one and so on ? Regards, Jordi De: anti-abuse-wg <anti-abuse-wg-bounces@ripe.net> en nombre de Andrey Korolyov <andrey@xdel.ru> Fecha: martes, 19 de marzo de 2019, 13:59 Para: <anti-abuse-wg@ripe.net> Asunto: Re: [anti-abuse-wg] [routing-wg] 2019-03 New Policy Proposal (BGP Hijacking is a RIPE Policy Violation) to be discussed on Anti-Abuse Working Group Mailing List You can find the full proposal at: https://www.ripe.net/participate/policies/proposals/2019-03 Hey WG, out of curiosity, why neighboring ASNs are not carrying any responsibility for not filtering out a malicious advertisement from a directly-peered neighbor in the proposal? AFAIU most leaks happen because large parties are letting their ACL loose, not because some state-backed player decides to take a pick on someone's else traffic (though both variants exists). The peer who allows any prefix announcement originating from its direct neighbor is no less responsible for the hijack as the origin AS itself. Could you please suggest a possibility to include that kind of relations (determined by third parties, as currently stated for hijacker's AS in the draft) and measures against a transit/upstream in same manner as they are currently defined for a hijacker? Thanks. ********************************************** IPv4 is over Are you ready for the new Internet ? http://www.theipv6company.com The IPv6 Company This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.
What I'm trying to say is that *direct* peers are responsible for leaks as well (with un/misconfigured prefix list policy). Any other ASN simply have no strict method and no prior knowledge to determine legitimacy of the prefix announce, is should seem obvious. I personally don't believe that introduction of this policy will somehow change behavior of small companies who accidentally causing hijacks from time to time, but for their (larger at most) upstreams/peers the policy violation is something they want to prevent. Another thing is to determine the existence of the purposeful effort - if we assume that such thing as leaks caused by state-backed providers exist, there is a very small chance that the leak would be represented as non-accidental by its nature and so on, so the policy probably should focus on preventing leaks caused by non-transit or smaller operators by enforcing certain rules on those who may be called transit ones, e.g. those whose business is entirely dependent on proper functioning of their infra. On Tue, Mar 19, 2019 at 4:14 PM JORDI PALET MARTINEZ via anti-abuse-wg < anti-abuse-wg@ripe.net> wrote:
Hi Andrey,
While it looks, in a first sight, a very good idea, if a neighbor ASN fails to do the filtering (for whatever reason, not necessarily on purpose), should we not just “punish” that one, but also next one and so on ?
Regards,
Jordi
*De: *anti-abuse-wg <anti-abuse-wg-bounces@ripe.net> en nombre de Andrey Korolyov <andrey@xdel.ru> *Fecha: *martes, 19 de marzo de 2019, 13:59 *Para: *<anti-abuse-wg@ripe.net> *Asunto: *Re: [anti-abuse-wg] [routing-wg] 2019-03 New Policy Proposal (BGP Hijacking is a RIPE Policy Violation) to be discussed on Anti-Abuse Working Group Mailing List
You can find the full proposal at: https://www.ripe.net/participate/policies/proposals/2019-03
Hey WG,
out of curiosity, why neighboring ASNs are not carrying any responsibility for not filtering out a malicious advertisement from a directly-peered neighbor in the proposal? AFAIU most leaks happen because large parties are letting their ACL loose, not because some state-backed player decides to take a pick on someone's else traffic (though both variants exists). The peer who allows any prefix announcement originating from its direct neighbor is no less responsible for the hijack as the origin AS itself.
Could you please suggest a possibility to include that kind of relations (determined by third parties, as currently stated for hijacker's AS in the draft) and measures against a transit/upstream in same manner as they are currently defined for a hijacker?
Thanks.
********************************************** IPv4 is over Are you ready for the new Internet ? http://www.theipv6company.com The IPv6 Company
This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.
What I'm trying to say is that *direct* peers are responsible for leaks as well (with un/misconfigured prefix list policy). Any other ASN simply have no strict method and no prior knowledge to determine legitimacy of the prefix announce, is should seem Just trying to act as the evil advocate, to know others opinions. obvious. I personally don't believe that introduction of this policy will somehow change behavior of small companies who accidentally causing hijacks from time to time, but for their (larger at most) upstreams/peers the policy violation is something they want to prevent. Again, in our LACNIC proposal we have considered that incidental issues will also be communicated to those that created the problem, so we can improve the situation as time passes. Another thing is to determine the existence of the purposeful effort - if we assume that such thing as leaks caused by state-backed providers exist, there is a very small chance that the leak would be represented as non-accidental by its nature and so on, so the policy probably should focus on preventing leaks caused by non-transit or smaller operators by enforcing certain rules on those who may be called transit ones, e.g. those whose business is entirely dependent on proper functioning of their infra. Clearly this is the difficulty that will have the experts, correctly classifying the incidents, and may be this means that first time for some incidents (accidental or not) could not be declared as “on purpose”. On Tue, Mar 19, 2019 at 4:14 PM JORDI PALET MARTINEZ via anti-abuse-wg <anti-abuse-wg@ripe.net> wrote: Hi Andrey, While it looks, in a first sight, a very good idea, if a neighbor ASN fails to do the filtering (for whatever reason, not necessarily on purpose), should we not just “punish” that one, but also next one and so on ? Regards, Jordi De: anti-abuse-wg <anti-abuse-wg-bounces@ripe.net> en nombre de Andrey Korolyov <andrey@xdel.ru> Fecha: martes, 19 de marzo de 2019, 13:59 Para: <anti-abuse-wg@ripe.net> Asunto: Re: [anti-abuse-wg] [routing-wg] 2019-03 New Policy Proposal (BGP Hijacking is a RIPE Policy Violation) to be discussed on Anti-Abuse Working Group Mailing List You can find the full proposal at: https://www.ripe.net/participate/policies/proposals/2019-03 Hey WG, out of curiosity, why neighboring ASNs are not carrying any responsibility for not filtering out a malicious advertisement from a directly-peered neighbor in the proposal? AFAIU most leaks happen because large parties are letting their ACL loose, not because some state-backed player decides to take a pick on someone's else traffic (though both variants exists). The peer who allows any prefix announcement originating from its direct neighbor is no less responsible for the hijack as the origin AS itself. Could you please suggest a possibility to include that kind of relations (determined by third parties, as currently stated for hijacker's AS in the draft) and measures against a transit/upstream in same manner as they are currently defined for a hijacker? Thanks. ********************************************** IPv4 is over Are you ready for the new Internet ? http://www.theipv6company.com The IPv6 Company This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it. ********************************************** IPv4 is over Are you ready for the new Internet ? http://www.theipv6company.com The IPv6 Company This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.
Hi, On Tue, Mar 19, 2019 at 02:14:05PM +0100, JORDI PALET MARTINEZ via anti-abuse-wg wrote:
While it looks, in a first sight, a very good idea, if a neighbor ASN fails to do the filtering (for whatever reason, not necessarily on purpose), should we not just ???punish??? that one, but also next one and so on ?
Sounds like a good plan. (And, while at it, also sanction people that do TOFU quoting on mailing lists) Gert Doering -- NetMaster -- have you enabled IPv6 on something today...? SpaceNet AG Vorstand: Sebastian v. Bomhard, Michael Emmer Joseph-Dollinger-Bogen 14 Aufsichtsratsvors.: A. Grundner-Culemann D-80807 Muenchen HRB: 136055 (AG Muenchen) Tel: +49 (0)89/32356-444 USt-IdNr.: DE813185279
participants (3)
-
Andrey Korolyov
-
Gert Doering
-
JORDI PALET MARTINEZ