From: Michael Tremer <michael.tremer@ipfire.org>
To: location@lists.ipfire.org
Subject: Re: Thoughts on importing IP feeds from Amazon, second attempt
Date: Thu, 10 Jun 2021 10:25:43 +0100 [thread overview]
Message-ID: <0E10270D-5A52-4F90-A24B-2C6F70EC6948@ipfire.org> (raw)
In-Reply-To: <72d8bef9-32a6-ab82-4f8a-86aee5111a1c@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 3998 bytes --]
Hello,
> On 5 Jun 2021, at 13:40, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>
> Hello Michael,
>
> thanks for your reply.
>
>>>>> (b) Introduce something like "location-importer update-3rd-party-feeds", which is a blanket function for
>>>>> updating all the 3rd party feeds we will have at some day, as Amazon for sure won't be the only one.
>>>>
>>>> Does this need a third command? Why can this not be part of “update-whois”?
>>>
>>> Because we do not necessarily have the BGP data available at this step. If we want to build in AS-based
>>> safeguards, we will have to parse 3rd party feeds after running "location-importer update-announcements".
>>
>> I would say that this is a difficult dependency. We should have the “owner” of that subnet somewhere in the WHOIS data which is deterministic while the BGP isn’t.
>>
>> There are “route” objects which should allow you to do what you want to do.
>
> Unfortunately, we do not have these data for ARIN and LACNIC space - at least not in a manner we can properly
> use in an automated way. For the rest of the RIRs, I agree.
I hate that we have to have a lot of duplicate code to deal with two RIRs.
>>
>>>>
>>>>> (c) In case of Amazon, download their feed, parse it and put the results in a temporary table.
>>>>> (d) Process a list of Autonomous Systems owned or controlled by Amazon.
>>>>
>>>> Where is this list coming from?
>>>
>>> Something similar to "countries.txt", I guess. It would definitely be something we will have to maintain
>>> on our own. A simple .txt file per 3rd party source, containing one ASN per line, would do it in my point
>>> of view.
>>
>> Hmm, okay.
>>
>>>>
>>>>> (d) Delete every IP network from this temporary table which is not announced by one of the Autonomous
>>>>> Systems. That way, we limit potential damage by a broken or manipulated Amazon IP feed to their ASNs.
>>>>
>>>> This is your second step (d).
>>>
>>> ?
>>
>> You mis-numbered them. Never mind.
>>
>>>
>>>>
>>>> When you say you are comparing this, what is the authority for this? The BGP feed? Whois?
>>>
>>> The BGP feed. We cannot rely on RIR data for this job, as they do not reflect reality and we don't have them
>>> for ARIN- and LACNIC-maintained space.
>>
>> Well, interesting. I would have said the opposite.
>
> Normative power of the factual (a bit phony, I guess): If something is announced via BGP, traffic to it will
> be routed towards the announced ASN - things like RPKI not taken into account here -, no matter what a RIR database
> contains for this network.
>
> I don't like saying that, but I guess this is what we have.
RPKI uses the RIR database. So we would just enforce RPKI for the entire database. I guess it is pretty much the same.
>
>>
>>>>> (e) Anything left in the temporary table is safe to go, and will be merged into the overrides table.
>>>>>
>>>>> Sounds a bit complicated than my first patch looked like, but is more versatile and robust. :-)
>>>>
>>>> I kind of liked the first patch. It was simple and it worked.
>>>
>>> Indeed. But it allowed Amazon to inject arbitrary data. This is bad enough for RIRs already, I do not want
>>> to extend the list of entities being able to do this to some profit-oriented companies...
>>
>> I consider that a different problem. Not necessarily less important, but probably we should not try to fix all problems in only one patch.
>
> All right, I agree. Given the state of discussion, I propose to work and submit a two-part patchset: The first
> one adds a source column to the network_overrides, so we can debug things better on our systems at least, while
> the second one imports Amazon AWS feed in the same way as I did initially.
>
> We would then care about additional safeguards later... *fingers crossed* :-]
>
> Would you agree on that?
Okay. Merged.
>
> Thanks, and best regards,
> Peter Müller
prev parent reply other threads:[~2021-06-10 9:25 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <0105552B-5866-44B9-BFEF-4470E92C8BCD@ipfire.org>
2021-06-02 21:12 ` Peter Müller
2021-06-03 10:12 ` Michael Tremer
2021-06-05 12:40 ` Peter Müller
2021-06-10 9:25 ` Michael Tremer [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=0E10270D-5A52-4F90-A24B-2C6F70EC6948@ipfire.org \
--to=michael.tremer@ipfire.org \
--cc=location@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox