Internet DRAFT - draft-cheng-idr-redirection-risks-ps
draft-cheng-idr-redirection-risks-ps
grow W. Cheng, Ed.
Internet-Draft China Mobile
Intended status: Standards Track D. Li
Expires: 9 January 2024 Tsinghua University
C. Zheng
China Mobile
M. Huang
Huawei
F. Gao
Zhongguancun Laboratory
M. Liu
Huawei
8 July 2023
Problem statement of Inter-domain Traffic Redirection Risks
draft-cheng-idr-redirection-risks-ps-03
Abstract
BGP Update includes the destination prefix and AS_PATH that records
the AS number through which it passes. The traffic routing to the
destination prefix should be forwarded along the AS sequence in
AS_PATH. However, due to traffic redirection, route aggregation and
etc., the AS path of forwarding and the AS_PATH of BGP Update often
do not match. The inconsistency leads to security risks such as
black holes, loops in inter-domain forwarding, and the possibility of
forwarding through malicious AS that source/upstream AS does not want
to pass through.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 9 January 2024.
Cheng, et al. Expires 9 January 2024 [Page 1]
Internet-Draft Inter-domain Traffic Redirection risks July 2023
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Risks Description . . . . . . . . . . . . . . . . . . . . . . 3
3. Valuable Scenarios and Potential Solutions . . . . . . . . . 5
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
5. Security Considerations . . . . . . . . . . . . . . . . . . . 6
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6
7. Normative References . . . . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction
An significant reason of inter-domain routing and forwarding
inconsistency is inter-domain traffic redirection, where the AS
redirects traffic to a new next-hop AS that is not in AS_PATH that
source/upstream AS selects. Therefore, the draft uses inter-domain
traffic redirection as an example to clarify the risk of this
inconsistency.
There are many network traffic redirection technologies[RFC1102],
such as Policy Based Routing[RFC1104] and BGP Flow Specification
Rules[RFC8955] etc. These technologies are widely used in carrier
networks.
For example, BGP Flow Specification provides various filtering
conditions and processing actions to implement traffic
control[RFC9117]. This function is used not only to protect the
device against denial-of-service (DoS) and distributed DoS (DDoS)
attacks, but also used for network traffic optimization.
Cheng, et al. Expires 9 January 2024 [Page 2]
Internet-Draft Inter-domain Traffic Redirection risks July 2023
As reliability and effectiveness of traffic redirection are
artificially guaranteed, there are risks, such as traffic detour,
traffic exposure, traffic black hole, traffic loop, as well as
inconsistent traffic paths between the control plane and data plane.
Currently, operators have applied the redirection technologies, such
as BGP Flowspec, on a large scale. How to deal with these risks
needs further discussion.
2. Risks Description
The operation and maintenance of redirection in the long run is a big
challenge. Typo, limitation of out-of-band tool capabilities for
configuration verification, network adjustment or failure may cause
potential problems without system awareness.
The following figure shows the risks of traffic redirection.
Take the topology in Figure 1 as an example, In this application
scenario, one campus network inter-connects to two providers Network.
AS 65003 and AS 65500, AS 65105 and AS 65500 form a provider-customer
adjacency relationship. Assume that the user needs to transmit data
to the server. According to the routing information on the control
plane, the traffic is transmitted through the path [User -- AS65001
-- AS65003 -- AS65104 -- AS65106 -- Server].
Cheng, et al. Expires 9 January 2024 [Page 3]
Internet-Draft Inter-domain Traffic Redirection risks July 2023
+---------------------+ +--------------------+
| ISP1 | | ISP2 |
+----+ | ,-. | | ,-. |
|user| | / \ | | / \ |
| |-----| AS | | | | AS | |
+----+ | |65001\ | | |65106| | +------+
| \ / \ ,-. | | ,-. .\ / -----|server|
| '-' \ / \ | | / \ ' '-' | | |
| | '| AS | | | | AS |-` | +------+
| ,-. .|65003|-----------|65104| ,-. |
| / \ ' \ / | | \ / `. / \ |
| | AS -` '\' | | '-' '| AS | |
| |65002| \ | | |65105| |
| \ / , | | \ / |
| '-' \ | | '-' |
+------------------\--+ +------------/-------+
\ Provider /
\ /
\ Customer /
+------+--------+---+
| '.-, |
| / \ |
| | AS | |
| |65500 | |
| \ / |
| `--` |
| ISP3(Campus) |
+-------------------+
Figure 1: Example of the risks of traffic redirection
Risk 1: Violation of the valley-free principle[RFC7908] leads to
traffic detour and exposure.
Assume ISP1 configures wrong traffic redirection rule, as a result,
AS 65003 redirects traffic from AS 65104 to AS 65500. In this case,
valley-free principle is violated as AS 65003 and AS 65500 form a
provider-customer adjacency relationship. Traffic passes through the
AS 65500 and exposes itself to the campus network.
Risk 2: The traffic is redirected to a network node that has no
route, which leads to a traffic black hole
After traffic is redirected from AS 65003 to the AS 65500, the AS
65500 may not have a route to the destination server. In this case,
the traffic is discarded, resulting in a traffic black hole.
Cheng, et al. Expires 9 January 2024 [Page 4]
Internet-Draft Inter-domain Traffic Redirection risks July 2023
Assume traffic is redirected from AS65003 to AS65500, and AS65500
learns the route to server from AS65105. After the traffic is
redirected to the AS65500, it is forwarded to the server according to
the route. If the link between AS 65500 and AS 65105 fails, as a
result, the route is lost. The traffic is redirected to AS 65500
anyway, which also causes a traffic black hole.
Risk 3: One or more traffic redirections on the traffic transmission
path may cause a traffic loop.
Assume that traffic is redirected from AS 65104 to AS 65105. In AS
65105, the traffic is transmitted to AS 65500, or the traffic is
redirected to AS 65500. In this case, if the traffic on AS 65500 is
transmitted to AS 65003, then traffic loop occurs.
Assume traffic is redirected from AS 65003 to AS 65500, and AS 65500
learns the route to server from AS 65105. After receiving the
redirected traffic, the AS65500 forwards the traffic to the server
according to the route. If the link between AS6500 and AS65105
fails, AS 65500 learns that the next hop of the route to the server
is AS65003 through routing protocols. If the traffic is still
redirected to AS 65500 at this time, AS 65500 will send packets back
to AS65003, then traffic loop occurs.
Risk 4: inconsistent paths on the control plane and data plane may
cause O&M risks.
The traffic owner expects traffic to be transmitted along the AS path
carried in the route, but the actual transmission path is different
from the AS path.
If the network O&M control system does not obtain traffic redirection
information on the network, unpredictable risks may occur during
traffic optimization, for example, network congestion.
For the risks mentioned above, it is not sufficient to rely on manual
operation or automated management. Traffic redirection increases
management difficulties and effectiveness requirements. It is
necessary to explore technical solutions, such as redirection
configuration verification, protocol extension, or path
visualization, to reduce risks mentioned above.
3. Valuable Scenarios and Potential Solutions
Solution 1: AS path validation
Cheng, et al. Expires 9 January 2024 [Page 5]
Internet-Draft Inter-domain Traffic Redirection risks July 2023
The root cause of the above risks is that BGP cannot perceive the
AS_path generated by the inter-domain traffic redirection. The
security of the AS_path only relies on human decision, which
inevitably increases the risk of violating valley-free principle.
There is the same problem in BGP flowspec, which only considers the
verification of the source of the flow specification.
The potential solution is to add a redirection path perception
capability to BGP, and verify the validity of the redirection path
before actually configuring the redirection. If the redirection
could lead to the above risks, alert the configurator explicitly.
Solution 2: Considerate routing
Traffic redirection may generate unexpected inter-domain traffic
models, causing some SLAs (service level agreement) to be
unguaranteed.
A potential solution is to extend BGP to allow redirection rules and
the redirection AS_PATH to be advertised to other peers for routing
decision.
Solution 3: Network visualization
Inter-domain redirection also hinders network visualization, making
it impossible to determine the forwarding path of packets solely
based on routing protocols.
A potential solution is to extend the BMP protocol to allow
redirection rules and redirected forwarding paths to be sent to the
BMP server, improving administrators' ability to visualize and plan
their own traffic.
4. IANA Considerations
This document makes no request of IANA.
5. Security Considerations
TBD
6. Acknowledgements
The authors would like to thank Hao Li.
7. Normative References
Cheng, et al. Expires 9 January 2024 [Page 6]
Internet-Draft Inter-domain Traffic Redirection risks July 2023
[RFC1102] Clark, D., "Policy routing in Internet protocols",
RFC 1102, DOI 10.17487/RFC1102, May 1989,
<https://www.rfc-editor.org/info/rfc1102>.
[RFC1104] Braun, H., "Models of policy based routing", RFC 1104,
DOI 10.17487/RFC1104, June 1989,
<https://www.rfc-editor.org/info/rfc1104>.
[RFC7908] Sriram, K., Montgomery, D., McPherson, D., Osterweil, E.,
and B. Dickson, "Problem Definition and Classification of
BGP Route Leaks", RFC 7908, DOI 10.17487/RFC7908, June
2016, <https://www.rfc-editor.org/info/rfc7908>.
[RFC8955] Loibl, C., Hares, S., Raszuk, R., McPherson, D., and M.
Bacher, "Dissemination of Flow Specification Rules",
RFC 8955, DOI 10.17487/RFC8955, December 2020,
<https://www.rfc-editor.org/info/rfc8955>.
[RFC9117] Uttaro, J., Alcaide, J., Filsfils, C., Smith, D., and P.
Mohapatra, "Revised Validation Procedure for BGP Flow
Specifications", RFC 9117, DOI 10.17487/RFC9117, August
2021, <https://www.rfc-editor.org/info/rfc9117>.
Authors' Addresses
Weiqiang Cheng (editor)
China Mobile
China
Email: chengweiqiang@chinamobile.com
Dan Li
Tsinghua University
China
Email: tolidan@tsinghua.edu.cn
Ce Zheng
China Mobile
China
Email: zhengce@chinamobile.com
Mingqing Huang
Huawei
China
Email: huangmingqing@huawei.com
Cheng, et al. Expires 9 January 2024 [Page 7]
Internet-Draft Inter-domain Traffic Redirection risks July 2023
Fang Gao
Zhongguancun Laboratory
China
Email: gaofang@zgclab.edu.cn
Mingxing Liu
Huawei
China
Email: liumingxing7@huawei.com
Cheng, et al. Expires 9 January 2024 [Page 8]