Internet DRAFT - draft-xu-erisav
draft-xu-erisav
Network Working Group K. Xu
Internet-Draft J. Wu
Intended status: Informational X. Wang
Expires: 19 March 2023 Tsinghua University
Y. Guo
Zhongguancun Laboratory
G. Dong
China Telecom
15 September 2022
Enhance with RPKI and IPsec for the Source Address Validation
draft-xu-erisav-00
Abstract
Packet forwarding on Internet typically takes no place with
inspection of the source address. Thus malicious attacks or abnormal
behavior have been launched with the spoofed source addresses. This
document describes an inter-domain source address validation with
RPKI (Resource Public Key Infrastructure) and IPsec (IP Security),
including the motivation, tech framework, main interactive process,
and optional extensions.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 19 March 2023.
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
Xu, et al. Expires 19 March 2023 [Page 1]
Internet-Draft ERISAV September 2022
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terms and Definitions . . . . . . . . . . . . . . . . . . . . 3
3. Desgin Objectives . . . . . . . . . . . . . . . . . . . . . . 3
4. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 4
5. Interactive Process . . . . . . . . . . . . . . . . . . . . . 5
6. Related Extensions . . . . . . . . . . . . . . . . . . . . . 6
7. Security Consideration . . . . . . . . . . . . . . . . . . . 6
8. IANA Consideration . . . . . . . . . . . . . . . . . . . . . 6
9. Normative References . . . . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction
IP spoofing has been a long-recognized threat to Internet security
for decades. Inter-domain source address validation (SAV) has long
served as the primary defense mechanism due to its better cost-
effectiveness. However, over years of effort, inter-domain source
address validation deployment is still not optimistic. An important
reason for this is the difficulty of balancing the clear security
benefits of partial deployments with the scalability of large-scale
deployments. uRPF [RFC5635], for example, is a routing-based scheme
to filter spoofed traffic, which may result in a lack of security
benefits due to the dynamic nature of routing or incomplete
information caused by partial deployments.
RPKI architecture [RFC6480] represents the allocation hierarchy of IP
address space and Autonomous System (AS) numbers. IPsec security
architecture is used to secure the IP packet in host-to-host, host-
to-network, and network-to-network modes. This document defines
using present technologies to reinforce the security of source
address in the inter-domain layer.
This document describes an inter-domain source address validation
with RPKI and IPsec, including the motivation, tech framework, main
interactive process, and extensions.
Xu, et al. Expires 19 March 2023 [Page 2]
Internet-Draft ERISAV September 2022
2. Terms and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
Commonly used terms in this document are described below.
AH: IPsec Authentication Header, which is used to provide
connectionless integrity and data origin authentication for IP
datagrams and to provide protection against replays.
ASBR: AS border router, which is at the boundary of an AS.
CA: Certification authority.
EE: End entity.
IKE: Internet Key Exchange, which is used in IPsec to negotiate IKE
SA and IPsec SA.
NIR: National Internet registry, which is a special case for RIR.
RIR: Regional Internet registry, which is a governing body that is
responsible for the administration of Internet addresses in a
specific geographic region.
RPKI: Resource Public Key Infrastructure, which is a special PKI.
Tag: The authentic identification of the source address of a packet
and placed at the AH's ICV field.
3. Desgin Objectives
Source Address Validation (SAV) aims at preventing the source address
from being spoofed. It should work at the network layer and provide
a veritable IP source address.
When a packet is sent to the network, for saving network bandwidth
and computation resources, the router forwards the packet using the
destination address and without any inspection of the source address.
The packet may come from a forger or impostor of the source address
so that the destination end becomes a latent victim.
The design goals of ERISAV includes follows:
Xu, et al. Expires 19 March 2023 [Page 3]
Internet-Draft ERISAV September 2022
1. Extensible current protocols. With the bindings and extensions
of the current protocols, it would extremely reduce the cost of
updating software, firmware, and hardware. And more importantly,
it would be compatible with the current network. In ERISAV, it
chooses the RPKI, IKE, and IPsec AH.
2. Flatten end-to-end mode. Flatten mode, following the end-to-end
design principle, ensures that the undeployed router has no
perception of this mechanism. And it can be processed and
deployed incrementally.
3. Cryptography-based lightweight labels. A cryptographic packet-
by-packet signature could guarantee that the reverse computation
is infeasible and when it is cracked, the label has been changed
to another. And this packet signature could efficiently be
verified and resist to label-based replay attacks.
4. Inter-domain collaboration trustness. Build an inter-domain
trust alliance and complete source address validation via inter-
domain collaboration.
4. Overview
ERISAV is a cryptography-based end-to-end inter-domain source address
validation method that guarantees security benefits at partial
deployment. ERISAV combines three existing mechanisms. It uses the
RPKI trust chain for the ASN-IP Prefix binding relationship, IKE for
tag/key negotiation and delivery, and IPsec AH for carrying the
identification of the source address in data transmission.
A typical workflow of ERISAV is shown in Figure 1.
Xu, et al. Expires 19 March 2023 [Page 4]
Internet-Draft ERISAV September 2022
+--------------+
| IANA |
+--------------+
|--------------------+
V |
+--------------+ |
| RIR | |
+--------------+ |
/ \-----------+- 1. signed CA
V V | certificate
+--------+ +--------+ |
| LIR1 | | LIR2 |--+
+--------+ +--------+
/ \
V V
+--------------+ +--------------+
| | -------------------- | |
| | 2. IKE negotiation | |
| | and SA delivery | |
| AS X ###### -------------------- ###### AS Y |
| Prefix Px #ASBR# #ASBR# Prefix Py |
| Public Key ###### ++++++++++++++++++++ ###### Public Key |
| | 3. data transmission | |
| | using IPsec AH | |
| | ++++++++++++++++++++ | |
+--------------+ +--------------+
Figure 1: RISAV workflow example.
5. Interactive Process
ERISAV mainly contains 3 steps.
1. IANA issues a Certification Authority (CA) certificate to each
Regional Internet Registry (RIR). RIR uses its root CA to issue
a CA certificate for LIR or NIR which will issue a CA certificate
for one AS. The AS issues a new End Entity (EE) certificate to
enable verification of signatures on RPKI signed objects. This
builds the trust chain using RPKI to guarantee the Internet
number resource including AS number and IP prefix are correctly
announced. Moreover, the public key of AS will be seated at the
CA certificate, which will be used for communication with each
other following.
2. IPsec IKE negotiates the tag tagged in the packet. IKE also
negotiates the authentication algorithm, authentication key, and
others specified by SA. These will be stored in the SAD and SPD
described in [RFC4301]. IPsec AH [RFC4302] is the authentication
Xu, et al. Expires 19 March 2023 [Page 5]
Internet-Draft ERISAV September 2022
header of the IPsec Security Architecture. It authenticates the
whole packet for integrity. However, source address validation
does not require such strong authentication. It just needs to
protect the source address from being spoofed. So it needs a new
authentication process. This new authentication process will
only take a few changeless fields as input. And the original tag
will be seen as the authentication key. The result of this
process will produce a new label called the packet signature that
will be filled in the packet properly. And this label or the SA
MUST send to all the ASBR for communication.
3. Data transmission uses the IPsec AH header extension to the
packet. IPsec AH carries the tag in its field. The tag
represents the authenticity of the source address. When the
source ASBR forwards a packet originating from the ASBR's located
AS, the ASBR will check the destination of the packet. If it is
forwarded to the ERISAV protection area, the ASBR will add the
IPsec AH header extension with the related tag filled. If the
destination ASBR receives a packet coming from the ERISAV
protection area, the ASBR will compare the tag with its local
tag. If they are matched, the source address of this packet will
be seemd as not tampered. Otherwise, the packet will be
discarded because the source address is a spoofing address.
6. Related Extensions
As discussed before, there are almost negligible changes to current
protocols. ERISAV just needs one new IPsec SA for the requirements
of source address validation. It just requires requesting a new
attribute for storing and transporting the tag information. The tag
will be used as the key during the authentication process. The
process of AH also needs some changes. It takes a few unchangeable
fields as input to generate a signature replacing the original tag
for security consideration.
7. Security Consideration
TBD.
8. IANA Consideration
TBD.
9. Normative References
Xu, et al. Expires 19 March 2023 [Page 6]
Internet-Draft ERISAV September 2022
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC4301] Kent, S. and K. Seo, "Security Architecture for the
Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,
December 2005, <https://www.rfc-editor.org/info/rfc4301>.
[RFC4302] Kent, S., "IP Authentication Header", RFC 4302,
DOI 10.17487/RFC4302, December 2005,
<https://www.rfc-editor.org/info/rfc4302>.
[RFC5635] Kumari, W. and D. McPherson, "Remote Triggered Black Hole
Filtering with Unicast Reverse Path Forwarding (uRPF)",
RFC 5635, DOI 10.17487/RFC5635, August 2009,
<https://www.rfc-editor.org/info/rfc5635>.
[RFC6480] Lepinski, M. and S. Kent, "An Infrastructure to Support
Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480,
February 2012, <https://www.rfc-editor.org/info/rfc6480>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
Authors' Addresses
Ke Xu
Tsinghua University
Beijing
China
Email: xuke@tsinghua.edu.cn
Jianping Wu
Tsinghua University
Beijing
China
Email: jianping@cernet.edu.cn
Xiaoliang Wang
Tsinghua University
Beijing
China
Email: wangxiaoliang0623@foxmail.com
Xu, et al. Expires 19 March 2023 [Page 7]
Internet-Draft ERISAV September 2022
Yangfei Guo
Zhongguancun Laboratory
Beijing
China
Email: guoyangfei@zgclab.edu.cn
Guozhen Dong
China Telecom
Beijing
China
Email: donggz@chinatelecom.cn
Xu, et al. Expires 19 March 2023 [Page 8]