Internet DRAFT - draft-xu-psav

draft-xu-psav







Network Working Group                                              K. Xu
Internet-Draft                                                     J. Wu
Intended status: Informational                                   X. Wang
Expires: 16 August 2022                                           Y. Guo
                                                     Tsinghua University
                                                        12 February 2022


            Practical Inter-Domain Source Address Validation
                            draft-xu-psav-00

Abstract

   Because the Internet forwards packets according to the IP destination
   address, packet forwarding typically takes place without inspection
   of the source address and malicious attacks have been launched using
   spoofed source addresses.  The inter-domain source address validation
   architecture is an effort to enhance the Internet by using state
   machine to generate consistent tags.  When communicating between two
   end hosts at different ASes, tags will be added to the packets to
   identify the authenticity of the IP source address.

   This memo introduces PSAV, an Inter-AS source address validation
   mechanism.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 16 August 2022.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.





Xu, et al.               Expires 16 August 2022                 [Page 1]

Internet-Draft                    PSAV                     February 2022


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology and Abbreviation  . . . . . . . . . . . . . . . .   3
   3.  PSAV Framework  . . . . . . . . . . . . . . . . . . . . . . .   3
   4.  Control Plane . . . . . . . . . . . . . . . . . . . . . . . .   5
   5.  Data Plane  . . . . . . . . . . . . . . . . . . . . . . . . .   6
   6.  Consistency . . . . . . . . . . . . . . . . . . . . . . . . .   7
   7.  Scalability . . . . . . . . . . . . . . . . . . . . . . . . .   7
     7.1.  Compatibility . . . . . . . . . . . . . . . . . . . . . .   7
     7.2.  Expansion Management  . . . . . . . . . . . . . . . . . .   7
   8.  Security Consideration  . . . . . . . . . . . . . . . . . . .   7
     8.1.  Attack towards community information  . . . . . . . . . .   8
     8.2.  Attacks towards Initial Status Negotiation  . . . . . . .   8
     8.3.  Tag Guessing and Key Cracking . . . . . . . . . . . . . .   8
   9.  IANA Consideration  . . . . . . . . . . . . . . . . . . . . .   8
   10. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   8
   11. Normative References  . . . . . . . . . . . . . . . . . . . .   8
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   9

1.  Introduction

   IP spoofing has been a long-recognized threat to Internet security
   for decades.  Inter-domain source address validation (SAV) has long
   served as the primary defense mechanism due to its better cost-
   effectiveness.  However, over years of effort, the deployment of
   inter-domain source address validation is still not optimistic.  An
   important reason for this is the difficulty of balancing the clear
   security benefits of partial deployments with the scalability of
   large-scale deployments. uRPF [RFC5635], for example, routing-based
   schemes to filter spoofed traffic, which may result in a lack of
   security benefits due to the dynamic nature of routing or incomplete
   information caused by partial deployments.  And while cryptography-
   based schemes such as IPsec [RFC4301] can provide clear security
   gains, the additional end-to-end overhead will present new challenges
   in scalability.






Xu, et al.               Expires 16 August 2022                 [Page 2]

Internet-Draft                    PSAV                     February 2022


   This document provides a framework of practical inter-domain SAV
   (PSAV).  PSAV is a cryptography-based SAV to guarantee consistent
   security benefits.  Key maintenance is performed between the source
   and destination ASes, and the key is used to generate packet tags to
   validate the authenticity of the source address.  Meanwhile, in PSAV,
   ASes are organized as a hierarchical structure to provide
   scalability, in which only fully-connected key maintenance is
   performed between ASes on the same layer, and ASes between different
   layers achieve end-to-end source address validation through cross-
   layer validation and tag replacement.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119, BCP 14
   [RFC2119] and indicate requirement layers for compliant CoAP
   implementations.

2.  Terminology and Abbreviation

          +==============+======================================+
          | Abbreviation | Description                          |
          +==============+======================================+
          | TA           | Trust Alliance, the IPv6 network     |
          |              | that uses the SAVA-X mechanism.      |
          +--------------+--------------------------------------+
          | ACS          | AD Control Server, the server that   |
          |              | matains state machine with other ACS |
          |              | and distribute information to AER.   |
          +--------------+--------------------------------------+
          | ABR          | AS or AS community border router,    |
          |              | which is placed at the boundary of   |
          |              | an AS of trust alliance.             |
          +--------------+--------------------------------------+
          | Tag          | The authentic identification of      |
          |              | source address of a packet.          |
          +--------------+--------------------------------------+

                                  Table 1

3.  PSAV Framework

   PSAV is a cryptography-based end-to-end inter-domain source address
   verification method that guarantees security benefits at partial
   deployment.  PSAV implements inter-AS tag maintenance by establishing
   a hierarchical community structure that utilizes border nodes on the
   forwarding path for tag replacement and validation.  This mainly
   includes the following components.




Xu, et al.               Expires 16 August 2022                 [Page 3]

Internet-Draft                    PSAV                     February 2022


   1.  Tag generation.  In PSAV, the packet tag is generated by
       maintaining the key between ASes and using the generation
       algorithm.  The destination AS will validate the source address
       by the packet tag.  The above process requires a mapping
       relationship between AS-IP_Prfix-Key, which will be provided
       based on existing Internet infrastructure, e.g., such as RPKI,
       ROVER, etc.

   2.  Hierarchical structure.  In PSAV, AS is organized into
       hierarchical AS communities, which can provide good scalability
       by reducing the tag maintenance overhead in large-scale
       deployments, managing the validation responsibilities
       corresponding to address allocation, and shielding external
       community changes.  To implement tag validation in AS
       communities, PSAV will provide corresponding tag cross-layer
       validation and replacement methods.

   3.  Membership configuration.  AS sends join, exit, or update to all
       participating nodes through a specific message format, and the
       participating nodes further complete membership configuration by
       verifying the authenticity of the messages to form a distributed
       consensus.

   A typical workflow of PSAV is shown in Figure 1.  AS1 joins the PSAV
   trust alliance with the signed join information, maintains the packet
   tag with AS2.  After that, AS1 sends out the packet with Tag <AS1,
   AS2>, and AS2 validates it and replaces the Tag with <AS2, AS3>.
   Then AS3 validates and replaces the tag with <AS3, AS4>.  After AS4
   validation, confirm that the packet source address is true.






















Xu, et al.               Expires 16 August 2022                 [Page 4]

Internet-Draft                    PSAV                     February 2022


   +----------------------------------------------------------------+
   |             +---------------+                +---------------+ |
   |             |               |   <AS3, AS4>   |               | |
   |             |      AS3      |****************|      AS4      | |
   |             |               |                |               | |
   |             +---------------+                +---------------+ |
   |           //            *    \\                                |
   |         //               *     \\       AS Community (N-1)     |
   +-------//------------------*------\\----------------------------+
         //                     *       \\
       //              <AS2, AS3>*        \\
     //                           *         \\
   //                              *          \\
   +--------------------------------*-----------+
   |                                 *          |
   | +----------+                  +----------+ |
   | |          |    <AS1, AS2>    |          | |
   | |   AS1    |******************|   AS2    | |
   | |          |                  |          | |
   | +----------+                  +----------+ |
   |               AS Community N               |
   +--------------------------------------------+

                      Figure 1: PSAV workflow example.

4.  Control Plane

   The functions of control plane of PSAV includes AS community
   information management, ACS-ACS communication, and ACS-ABR
   communication.

   To eliminate the impact of routing dynamic caused by BGP or other
   routing protocols, PSAV requires its own AS community information
   management.  These information of one AS includes AS Number (ASN), AS
   Community Number (ASCN), IP Prefix and Public Key. PSAV does not bind
   any methods of inter-domain mapping information, and it can both use
   centralized or distributed methods to maintain AS community
   information independently.  When an AS or AS community wants to join
   or exit the Trust Alliance construted by all the member ASes and AS
   communities, it SHOULD submit an certificate signning request message
   containing its own information.  It also needs to submit such CSR
   message for updating its information recorded by all members in trust
   alliance.

   The communication among ACSes is to maintain the tags used in packets
   in network.  PSAV provides a tag generation mechanism on one-to-one
   state machine.  In this mechanism, each AS or AS community needs one
   ACS.  ACS negotiates initial state of the state machine with its



Xu, et al.               Expires 16 August 2022                 [Page 5]

Internet-Draft                    PSAV                     February 2022


   relavent ACS.  The state transfers to the next state triggered by
   time flies.  For crossing different layer of AS communities, it is
   used the tag generated by the state machine maintained by AS or AS
   community with its direct paternal AS community in PSAV.  The
   communication between ACS and ABR is to deliver the AS community
   information and tags.

   PSAV requires a heart-beat mechanism for service availability
   implemented in ACS-ACS commmunication and ACS-ABR communication.
   When it detects that one ACS or ABR has 'died', the other end WOULD
   remove its tag generation mechanism maintained with this 'died' end
   and sends a request message to force execute the exit trust alliance
   process of the other end.

5.  Data Plane

   The functions of data plane of PSAV includes prefix checking and tag
   processing.

   The tag delivered from the control plane indicates the source address
   of one packet is not tampered.  As the tag in use is generated by
   one-to-one state machine pair, it MUST be completely consistent at
   the same time.

   It needs to divide the role of different interfaces of an ABR for
   functioning properly.  In ABR, the interface takes the role of
   INGRESS, EGRESS, or TRUST.  The INGRESS port links to the devices
   inside the AS or AS community, the EGRESS port links to the devices
   outside the AS or AS community, and the TRUST port links to the ABR
   inside the same AS or AS community.  The INGRESS port validates and
   removes the tag in use.  The EGRESS port adds or replaces the tag in
   the packet.  The TRUST port does nothing to the packet.

   When a packet arrives at the ABR, it SHOULD be checked its source
   address and destination address first.  If it originates and
   destinates the trust alliance, it MUST be tagged with a tag at the
   first hop and removed tag at the last hop.  When this packet forwards
   crossing different layers of AS communities, it SHOULD be replaced
   with relavent tags maintained by its ACS with direct paternal ACS.
   In ABR, it maintains two mapping tables to record the AS community
   information and tags in use.  The AS-Prefix mapping table preserves
   the ASN or ASCN and IP address prefix relationships.  The AS-Tag
   mapping table holds the ASN or ASCN and relevant tags.  When a packet
   is needed to add, replace, or remove tag, the ABR WOULD get the ASN
   or ASCN which the packet belongs to first via the source address of
   the packet from the AS-Prefix mapping table.  The ABR WOULD obtain
   the tag should be used by the ASN or ASCN from the AS-Tag mapping
   table.



Xu, et al.               Expires 16 August 2022                 [Page 6]

Internet-Draft                    PSAV                     February 2022


6.  Consistency

   PSAV is a cryptography-based source address validation mechanism to
   guarantee consistent security benefits and provide scalability for
   different deployment scales and validation granularity.  PSAV uses
   the hierarchical structure to reduce the size of the secret symmetric
   keys to cut down the maintenance overhead.  Hierarchy validation
   filters malicious traffic as early as possible to avoid wasting
   network resources.  PSAV also provides clear security
   responsibilities corresponding to IP address allocation authority.

7.  Scalability

7.1.  Compatibility

   Hierarchy effectively blocks external changes and provides
   scalability in large-scale deployments.  AS the forwarding path is
   indepent of the tag validation by using a mechanism for crossing
   different layers, PSAV is a segmented end-to-end cryptography scheme
   essentially.  So it does not need to obtain the routing information
   and has nothing influence on existing routing infrastructure.
   Meanwhile, PSAV supports that packets can pass through networks where
   PSAV has not yes been deployed without affecting validation as it is
   end-to-end validation in nature, which is guaranteeing a definite
   security benefit for the deployer without requiring a deployment
   rate.

7.2.  Expansion Management

   On one hand, PSAV effectively isolates structural changes outside the
   community from internal nodes, as the hierarchical community design
   minimizes the impact of changes on the rest of the system.  On the
   other hand, PSAV can be implemented with any existing distributed
   consensus algorithm for inter-AS consensus infrastructure.  It should
   be noted that PSAV has no special requirements for the efficiency of
   this process based on the assumption that AS community information
   does not change frequently.  Therefore, the decentralized maintenance
   approach can further reduce the management complexity of the
   expansion process.

8.  Security Consideration










Xu, et al.               Expires 16 August 2022                 [Page 7]

Internet-Draft                    PSAV                     February 2022


8.1.  Attack towards community information

   The distributied method to maintain the AS community information MAY
   suffer from the consistency challenges, such as witch attacks and
   eclipse attacks.  However, the situation in PSAV is different from
   the normal distributed consensus scenario.  Due to the hierarchical
   structure of PSAV, the failure of consensus on local community
   information does not affect other non-adjacent communities in the
   system.  At the same time, the updated community information only
   needs the signature confirmation of its parent, brother and child
   communities, which means that the attack on the special node needs to
   hold specific resources, which further increases the difficulty of
   the attack.

8.2.  Attacks towards Initial Status Negotiation

   This is the problem posed in the PSAV implementation.  As the clock-
   synchronized state machine will run locally after the initial status
   negotiation stage, the attacker can only attack on this negotiation.
   However, when the ACS-ACS pair or ACS-ABR pair is going to connect,
   the SSL/TLS will be used to guarantee security in communication.
   Therefore PSAV can ensure that attackers cannot obtain the initial
   status even if it can eavesdrop the negotiation packet online.

8.3.  Tag Guessing and Key Cracking

   For resisting reply attack, the eventual tag used in a packet is
   generated by the ABR with hashing a five-tuple including the
   signature generated from the state machine, the source address, the
   destination address, the first 8-bit of payload and source address
   prefix length.  The attacker could guess the tag and crack that key
   using brute force.  Nevertheless, it depends on the irreversibility
   of a Hash function to prevent backstepping the key from the tag.
   Furthermore, to decrease such probability, the signature generatated
   from the state machine will be updated periodically.

9.  IANA Consideration

   TBD.

10.  Acknowledgements

   TBD.

11.  Normative References






Xu, et al.               Expires 16 August 2022                 [Page 8]

Internet-Draft                    PSAV                     February 2022


   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC4301]  Kent, S. and K. Seo, "Security Architecture for the
              Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,
              December 2005, <https://www.rfc-editor.org/info/rfc4301>.

   [RFC5210]  Wu, J., Bi, J., Li, X., Ren, G., Xu, K., and M. Williams,
              "A Source Address Validation Architecture (SAVA) Testbed
              and Deployment Experience", RFC 5210,
              DOI 10.17487/RFC5210, June 2008,
              <https://www.rfc-editor.org/info/rfc5210>.

   [RFC5635]  Kumari, W. and D. McPherson, "Remote Triggered Black Hole
              Filtering with Unicast Reverse Path Forwarding (uRPF)",
              RFC 5635, DOI 10.17487/RFC5635, August 2009,
              <https://www.rfc-editor.org/info/rfc5635>.

Authors' Addresses

   Ke Xu
   Computer Science, Tsinghua University
   Qinghuayuan street, Haidian District
   Beijing
   100084
   China

   Email: xuke@tsinghua.edu.cn


   Jianping Wu
   Computer Science, Tsinghua University
   Qinghuayuan street, Haidian District
   Beijing
   100084
   China

   Email: jianping@cernet.edu.cn











Xu, et al.               Expires 16 August 2022                 [Page 9]

Internet-Draft                    PSAV                     February 2022


   Xiaoliang Wang
   Computer Science, Tsinghua University
   Qinghuayuan street, Haidian District
   Beijing
   100084
   China

   Email: wangxiaoliang0623@foxmail.com


   Yangfei Guo
   Institute for Network Sciences and Cyberspace, Tsinghua University
   Qinghuayuan street, Haidian District
   Beijing
   100084
   China

   Email: guoyangf19@mails.tsinghua.edu.cn

































Xu, et al.               Expires 16 August 2022                [Page 10]