Internet DRAFT - draft-zhao-sidr-architecture
draft-zhao-sidr-architecture
SIDR Z. Ye
Internet Draft Huawei Technologies
Expires: December 1 2007 July 20, 2006
Architecture to Secure Inter-Domain Routing
draft-zhao-sidr-architecture-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that
any applicable patent or other IPR claims of which he or she is
aware have been or will be disclosed, and any of which he or she
becomes aware will be disclosed, in accordance with Section 6 of
BCP 79.
This document may not be modified, and derivative works of it may not
be created, except to publish it as an RFC and to translate it into
languages other than English.
This document may only be posted in an Internet-Draft.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on January 20, 2005.
Copyright Notice
Copyright (C) The Internet Society (2006). All Rights Reserved.
Zhao Expires January 20, 2007 [Page 1]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
Abstract
This draft describes an architecture for secure inter-domain routing
(BGP [RFC4271]). The architecture consists of components (i.e.
functional modules) which address the requirements mentioned in
[REQUIREMENT]. The draft describes interfaces (i.e. security services)
that the architecture provides to routing engine as well.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119.
Table of Contents
1. Introduction................................................3
1.1. Overview...............................................3
1.2. Traditional Inter-Autonomous Routing System.............3
1.3. Goals of the architecture...............................3
2. Overview of the architecture.................................4
2.1. BGP Routing engine......................................5
2.2. BGP Security Architecture...............................6
2.3. Interface provided to BGP Routing engine................6
3. BGP Security Architecture....................................7
3.1. Payload Security........................................7
3.2. Semantics Security......................................8
3.2.1. Semantics Security of SIDR entities................8
3.2.1.1. AS (autonomous system)........................8
3.2.1.1.1. Entities inside an AS....................8
3.2.1.2. Address Holder................................9
3.2.1.3. Route Object..................................9
3.2.1.3.1. Authenticity of a Prefix.................9
3.2.1.3.2. Authenticity of Attributes...............9
3.2.2. Semantics Security of Entities Relationship........10
3.2.2.1. Relationship about Prefix Authorization.......10
3.2.2.2. Relationship during Transitive of Route Objects11
3.2.2.3. Other Relationship...........................11
3.3. Security Mechanism.....................................11
3.3.1. Certificate Mechanism.............................11
3.3.2. Signed Digital Data Object........................12
3.3.3. Protection Mechanisms of BGP Session..............12
3.3.4. Others...........................................12
3.4. Other Mechanism........................................12
3.4.1. Trust Mechanism...................................12
3.4.2. Transportation and Storage of Security Data........13
Zhao Expires January 20, 2007 [Page 2]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
4. Security Considerations.....................................13
5. Acknowledgments............................................13
6. References.................................................14
6.1. Normative References...................................14
6.2. Informative References.................................14
Author's Addresses............................................15
Intellectual Property Statement................................15
Disclaimer of Validity........................................15
Copyright Statement...........................................16
Acknowledgment................................................16
1. Introduction
1.1. Overview
This document describes an architecture for secure inter-domain
routing (BGP [RFC4271]). The architecture consists of components (i.e.
functional modules) which address the requirements mentioned in
[REQUIREMENT]. The draft describes interfaces (i.e. security services)
that the architecture provides to routing engine as well.
EDITORS NOTE: This is an early draft. Additional work will be needed.
Functional models should be refined and interfaces should be defined
as well.
1.2. Traditional Inter-Autonomous Routing System
An inter-autonomous routing system can be modeled simply as follow:
o ASes (autonomous systems). Each has a single interior routing plan
and uses inter-domain routing protocol (BGP) to determine how to
route packets to others.
o BGP sessions. ASes are interconnected to each other by EBGP
session and form a network of ASes.
o Route objects. A route object consisting of network reachability
information and relevant attributes is transmitted between ASes.
In general it is contained in the BGP UPDATE. ASes originate and
re-generate route objects and exchange them through established
BGP sessions.
1.3. Goals of the architecture
1. The architecture should use existing SIDR (Secure Inter-Domain
Routing) solutions as a reference and should be consistent to them
mostly. BGP security has been studies during the past decade and a
Zhao Expires January 20, 2007 [Page 3]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
number of solutions have been proposed. Each solution addresses
some aspects of the issues, so one important goal of this
architecture is consistency to these ideas and different deployment
scenarios.
2. Potential requirements must be taken into account. For example,
when a new attributes type is introduced in the future, the
architecture still can be kept stable.
3. Incremental deployment is a MUST requirement listed in section
3.2 of [REQUIREMENT] and is an architecture requirement as well. A
proposed security system MUST be able to coexist with traditional
systems (compatible with prior BGP system) and support incremental
additions of functional module.
2. Overview of the architecture
+-------------------------------------------------------------------+
| BGP Routing engine |
| +----------------+ +----------------+ +----------------+ |
| | Input | | Route | | Output | |
| | Policy | | Selection | | Policy | |
| +----------------+ +----------------+ +----------------+ |
+---------|----------------------|----------------------|-----------+
| | |
V V V
+-------------------------------------------------------------------+
| BGP Security Architecture |
| +--------------+ +--------------------+ |
| | | | Semantics Security | |
| | Security | | +----------------+ | |
| | Mechanism | | | Entities | | |
Zhao Expires January 20, 2007 [Page 4]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
| | | | | Relationship | | |
| +--------------+ | +----------------+ | |
| | +----------------+ | |
| | | Entities | | |
| +--------------+ | | | | |
| | | | +----------------+ | |
| | Other | +--------------------+ |
| | Mechanisms | +--------------------+ |
| | | | Payload Security | |
| | | | | |
| +--------------+ +--------------------+ |
+-------------------------------------------------------------------+
Figure 1: Architecture of SIDR
The figure above depicts the architecture of BGP security and its
relationship with the BGP routing engine. The routing engine invokes
the interfaces to obtain security services.
2.1. BGP Routing engine
From an implementation point of view, a BGP routing engine consists
of three functional modules. Each functional module may be affected
by BGP security requirements.
o Input Policy.
Input policy contains rules to filter route information received from
peers. In a SIDR system, input policy may be affected through
introducing security rules.
o Route Selection.
Route selection is a complex procedure to determine a best path to a
specific destination. In a SIDR system, security should be considered
in this procedure.
Zhao Expires January 20, 2007 [Page 5]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
o Output Policy.
Output policy contains rules to determine which routes could be
advertised to peers. The output policy may be affected by introduced
security rules as well.
2.2. BGP Security Architecture
This BGP security architecture includes several components:
o Payload Security
As mentioned in section 1.3 of [REQUIREMENT], the data payload of the
protocol is one primary point where BGP may be secured. "Payload
security" functional module serves for this purpose.
o Semantics Security
This module is used to verify authenticity of entities of BGP system
and relationships among them.
o Security Mechanism
These mechanisms are basic security components which will be invoked
by payload and semantics security components.
Some standard security protocols such as IPSec, TLS and so on are all
included.
o Other mechanisms
This section describes the mechanisms which will not be invoked
directly by the routing engine, but is necessary to SIDR system.
Generally, they are not directly correlative with security
requirements.
These mechanisms may include key management, trust module,
transportation and storage of security data.
2.3. Interface provided to BGP Routing engine
The architecture provides interfaces through which the routing engine
obtains security services. These services include verifying the
validation of an entity in BGP system, verifying the relationship
between entities, inserting security information into PDUs (Protocol
Data Unit), processing security information in received PDUs and so
on.
Zhao Expires January 20, 2007 [Page 6]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
NOTE: Such interfaces are not necessarily implemented in one device.
For example, [IRV] proposes a solution in which a router consults a
dedicated server to verify an UPDATE.
3. BGP Security Architecture
The architecture focuses on functional partitioning, which concerns
more about what to do. Each component in it is a functional module.
[REQUIREMENT] is a guideline and restriction document to implement
these functional modules.
Section 1.3 of [REQUIREMENT] mentions two primary points in BGP
security, the data payload and the data semantics security of the
protocol which are all basic components of the architecture. Section
3 of [REQUIREMENT] lists some operational restrictions which could be
referenced during designing specific functions.
3.1. Payload Security
o Payload Security of a BGP session
This module mainly offers services to secure a BGP session between
ASes including protecting establishment and closure of a BGP session
and transportation of BGP protocol data. These services may include
data integrity, anti-replay, data origin authentication, peer entity
authentication and so on.
Generally, the security services will affect the efficiency of a
routing system, which is one restriction when designing this
functional module. Requirements in section 3.1 and 3.5 of
[REQUIREMENT] should be referenced.
A feasible solution may be implemented in different layers, such as
the network layer, the transport layer and the application layer.
IPSec, TCP MD5 option, TLS are all candidates. [TCPAUTH] proposes a
new option to secure a TCP session, which can be regarded as an
enhance version of the TCP MD5 option and can provide a integrality
service to a BGP session.
o Payload Security during the Propagation of an UPDATE Message
This module provides security services to protect propagation of a
UPDATE Message.
For example, an origin AS may sign specific attributes in a UPDATE in
order to make other ASes in the AS_PATH to verify whether information
has been modified during the transportation.
Zhao Expires January 20, 2007 [Page 7]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
Since this is a BGP problem, relevant services should be provided in
the application layer.
3.2. Semantics Security
Semantics Security is a central component of the architecture. It
focuses on the authenticity of SIDR entities and relationships
between them. Whether an AS number is valid is an example of the
former. Whether an AS is authorized to originate an address prefix by
its address holder is an example of the latter.
Current deployment mechanisms, such as route filters, are used to
deal with some semantics problems. One example is to filter bogon
address prefixes. Another example is to determine whether an origin
AS is listed in AS_PATH attribute.
Generally, semantics security protects two aspects: authenticity of
entities and authenticity of relationships.
3.2.1. Semantics Security of SIDR entities
Authenticity of entities is the precondition to validate relationship.
There are several top level entities in a SIDR system: ASes, address
holders, route objects.
NOTE: In current BGP system, ASes trust each other and address
holders need not participate. However, in a SIDR system, an address
holder needs to authorize ASes to originate its prefix so it is a
necessary entity.
3.2.1.1. AS (autonomous system)
o the authenticity of an AS
An AS number is an identity of an AS. This functional module is used
to determine if a specific AS number is valid and to verify related
identity claimed by an AS.
3.2.1.1.1. Entities inside an AS
An AS is a complicated system and consists of various components,
such as ASBR (AS border router), RR (route reflector), PE (provider
edge) and so on. Not all BGP entities need to participate in a SIDR
system or at least different entities may play different roles.
On the one hand route information is originated from inside of an AS
such as static route and IGP route, on the other hand
Zhao Expires January 20, 2007 [Page 8]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
misconfigurations and deliberate attacks toward AS are root of
problems we faces. Therefore, a complete SIDR system may include
components to ensure security inside an AS and should protect AS from
advertising invalid UPDATEs.
o the authenticity of an ASBR
An ASBR (AS border router) is a BGP speaker router which is
responsible for advertising route information representing the AS.
This functional module is to validate if a speaker has the identity
claimed by it.
o the authenticity of other entities
TBD.
3.2.1.2. Address Holder
o the authenticity of an address holder
An address holder, such as IANA, RIR, did not appear in the
traditional BGP system. Since validation of a prefix and whether an
AS is authorized to advertise a prefix are all concerned by SIDR. An
address holder is supposed to participate in the SIDR system.
This module is to validating if an address holder is a valid holder.
3.2.1.3. Route Object
The term "route object" mainly refers to prefixes and related path
attributes conveyed in a BGP UPDATE message.
3.2.1.3.1. Authenticity of a Prefix
A valid prefix should be an allocated global unicast address.
Allocation of IPv4 address space can be consulted from [IANA].
3.2.1.3.2. Authenticity of Attributes
EDITORS NOTE: attributes should be classified in order to be
compatible with new attributes. This may be potential work items.
o Authenticity of an AS_PATH attribute
Validation of AS_PATH is mentioned in section 1.3 of [REQUIREMENT].
The first category summarized in it is whether the AS_PATH actually
exists. Since BGP is a path vector protocol and does not maintain a
Zhao Expires January 20, 2007 [Page 9]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
topology, there is not a protocol mechanism to resolve this problem.
This functional module focuses on the problem. It is used to check if
an AS_PATH is a valid path in the network.
NOTE [SoBGP] proposes a topology map to resolve this problem.
Existence of an AS path may not mean its validation. A further demand
may be a valley-free path, but it is difficult to validate such
semantics.
o Authenticity of Other path attributes
TBD.
3.2.2. Semantics Security of Entities Relationship
This section describes relationships between the entities mentioned
above. In particular this includes relationships about prefixes
authorization and relationship occurring during propagation of route
information.
3.2.2.1. Relationship about Prefix Authorization
Following table depict potential relationships about prefixes
authorization.
+--------------+----------------+----------------+------------------+
| | Address Holder | AS | ASBR |
+--------------+----------------+----------------+------------------+
| | Authorize to |Authorize to | |
|Address Holder| own |originate | N/A |
| | | | |
+--------------+----------------+----------------+------------------+
| | |Authorize to |Authorize to |
| AS | N/A |originate |advertise |
| | | | |
+--------------+----------------+----------------+------------------+
Zhao Expires January 20, 2007 [Page 10]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
o Ownership of an Address
The ownership of an address is the anchor of subsequent authorization.
This functional module is used to verify whether an address holder
own specific prefixes.
o Prefix Authorization
This function module involves several types of authorization as
follows:
- Is a subordinate address holder authorized to own specific prefixes
by an upper address holder?
- Is an AS authorized to originate specific prefixes by an address
holder or another AS?
- Is a router authorized to advertise specific prefixes representing
a specific AS?
3.2.2.2. Relationship during Transitive of Route Objects
Since route processing is a per-hop based behavior, except for
immediate ASes, a receiver could not tell which AS an UPDATE has
arrived at.
o Authenticity of AS_PATH Travel.
This function is used to verify whether the UPDATE has actually
traveled the ASes listed in AS_PATH.
3.2.2.3. Other Relationship
o Relationship between ASes
Do two ASes really interconnect each other?
3.3. Security Mechanism
3.3.1. Certificate Mechanism
In this document, a certificate means a public-key certificate which
binds a public/private key pair to a specific subject. It may also
include extensions about the subject.
Zhao Expires January 20, 2007 [Page 11]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
In SIDR system, a certificate mechanism serves for identity
authentication, data integrality validation and prefix authorization.
NOTE: Generally lifetime of a subject is longer than validity period
of authorization, so it may be not adequate to convey a short-term
authorization in a public-key certificate.
3.3.2. Signed Digital Data Object
A signed digital data object is used to convey authorizations and
policies to specific subjects and is protected by a digital signature.
For example, it can be used to verify whether an AS is authorized to
advertise a block of address space.
3.3.3. Protection Mechanisms of BGP Session
Mechanisms to protecting BGP sessions serve for payload security,
which may include data integrity, anti-replay, peer authentication,
etc.
Some standardized security protocols provide these mechanisms, such
as IPSec, TLS. [TCPAUTH] proposes a lightweight solution to provide
an integrality service to a TCP session.
3.3.4. Others
TBD.
3.4. Other Mechanism
3.4.1. Trust Mechanism
+-------------------------------------+
| trust mechanism |
| +-------------+ +-------------+ |
| | underlying | | underlying | |
| | trust model | | trust model | |
| +-------------+ +-------------+ |
+-------------------------------------+
Zhao Expires January 20, 2007 [Page 12]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
With regard to trust models in SIDR systems, there are two issues
involved. One is which type of underlying trust model to choose. The
other is how to cooperate with a SIDR system which has a different
trust model. The former is a business issue which depends on
practical requirements. The latter is an unsolved technical issue.
Section 5 of [REQUIREMENT] mentions some requirements about the trust
model. From the point of view of this architecture, an underlying
trust model should be transparent to the routing engineer.
3.4.2. Transportation and Storage of Security Data
TBD.
4. Security Considerations
Security is the subject matter of this entire document.
5. Acknowledgments
The authors gratefully acknowledge the contributions of:
o tbd, xxx, yyy, ...
o We would like to thank Miao Fuyou and Hui Liu for their helpful
comments and suggestions.
o This listing is intended to acknowledge contributions, not to imply
that the individual or organizations approve the content of this
document.
o Apologies to those who commented on/contributed to the document and
were not listed.
Zhao Expires January 20, 2007 [Page 13]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
6. References
6.1. Normative References
[RFC4271] Y. Rekhter, T. Li, S. Hares, "A Border Gateway Protocol 4
(BGP-4)", RFC 4271, January 2006
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[IPSec] S. Kent, K. Seo, "Security Architecture for the Internet
Protocol", RFC 4301, December 2005.
6.2. Informative References
[REQUIREMENT] B. Christian, T. Tauber, "BGP Security Requirements",
draft-ietf-rpsec-bgpsecrec-05, April 2006.
[RFC2828] Shirey, R., "Internet Security Glossary", RFC 2828, May
2000.
[IRV] Geoffrey Goodell, William Aiello, Timothy Griffin, John
Ioannidis, Patrick McDaniel, Aviel Rubin, "Working Around
BGP: An Incremental Approach to Improving Security and
Accuracy of Interdomain Routing".
[SBGP] Charles Lynn, Joanne Mikkelson, Karen Seo, "Secure BGP (S-
BGP)", draft-clynn-s-bgp-protocol-01.txt, June 2003.
[SoBGP] R. White, "Architecture and Deployment Considerations for
Secure Origin BGP (soBGP)", draft-white-sobgp-architecture-
01.txt, May 24, 2005.
[TCPAUTH] R. Bonica, B. Weis, S. Viswanathan, A. Lange, O. Wheeler,
"Authentication for TCP-based Routing and Management
Protocols", draft-bonica-tcp-auth-04.txt, February 2006.
Zhao Expires January 20, 2007 [Page 14]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
Author's Addresses
Zhao Ye
Huawei Technologies
No.3, Xinxi Road, Shangdi Information Industry Base
Haidian District, Beijing City
P.R. China 100085
Phone: 86-10-5849 1057
Email: yezhao@huawei.com
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Zhao Expires January 20, 2007 [Page 15]
Internet-Draft Architecture to Secure Inter-Domain Routing July 2006
Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Zhao Expires January 20, 2007 [Page 16]