Network Working Group K. Xu Internet-Draft J. Wu Intended status: Informational X. Wang Expires: 16 August 2022 Y. Guo Tsinghua University 12 February 2022 Practical Inter-Domain Source Address Validation draft-xu-psav-00 Abstract Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. The inter-domain source address validation architecture is an effort to enhance the Internet by using state machine to generate consistent tags. When communicating between two end hosts at different ASes, tags will be added to the packets to identify the authenticity of the IP source address. This memo introduces PSAV, an Inter-AS source address validation mechanism. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 16 August 2022. Copyright Notice Copyright (c) 2022 IETF Trust and the persons identified as the document authors. All rights reserved. Xu, et al. Expires 16 August 2022 [Page 1] Internet-Draft PSAV February 2022 This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology and Abbreviation . . . . . . . . . . . . . . . . 3 3. PSAV Framework . . . . . . . . . . . . . . . . . . . . . . . 3 4. Control Plane . . . . . . . . . . . . . . . . . . . . . . . . 5 5. Data Plane . . . . . . . . . . . . . . . . . . . . . . . . . 6 6. Consistency . . . . . . . . . . . . . . . . . . . . . . . . . 7 7. Scalability . . . . . . . . . . . . . . . . . . . . . . . . . 7 7.1. Compatibility . . . . . . . . . . . . . . . . . . . . . . 7 7.2. Expansion Management . . . . . . . . . . . . . . . . . . 7 8. Security Consideration . . . . . . . . . . . . . . . . . . . 7 8.1. Attack towards community information . . . . . . . . . . 8 8.2. Attacks towards Initial Status Negotiation . . . . . . . 8 8.3. Tag Guessing and Key Cracking . . . . . . . . . . . . . . 8 9. IANA Consideration . . . . . . . . . . . . . . . . . . . . . 8 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 11. Normative References . . . . . . . . . . . . . . . . . . . . 8 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 1. Introduction IP spoofing has been a long-recognized threat to Internet security for decades. Inter-domain source address validation (SAV) has long served as the primary defense mechanism due to its better cost- effectiveness. However, over years of effort, the deployment of inter-domain source address validation is still not optimistic. An important reason for this is the difficulty of balancing the clear security benefits of partial deployments with the scalability of large-scale deployments. uRPF [RFC5635], for example, routing-based schemes to filter spoofed traffic, which may result in a lack of security benefits due to the dynamic nature of routing or incomplete information caused by partial deployments. And while cryptography- based schemes such as IPsec [RFC4301] can provide clear security gains, the additional end-to-end overhead will present new challenges in scalability. Xu, et al. Expires 16 August 2022 [Page 2] Internet-Draft PSAV February 2022 This document provides a framework of practical inter-domain SAV (PSAV). PSAV is a cryptography-based SAV to guarantee consistent security benefits. Key maintenance is performed between the source and destination ASes, and the key is used to generate packet tags to validate the authenticity of the source address. Meanwhile, in PSAV, ASes are organized as a hierarchical structure to provide scalability, in which only fully-connected key maintenance is performed between ASes on the same layer, and ASes between different layers achieve end-to-end source address validation through cross- layer validation and tag replacement. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119, BCP 14 [RFC2119] and indicate requirement layers for compliant CoAP implementations. 2. Terminology and Abbreviation +==============+======================================+ | Abbreviation | Description | +==============+======================================+ | TA | Trust Alliance, the IPv6 network | | | that uses the SAVA-X mechanism. | +--------------+--------------------------------------+ | ACS | AD Control Server, the server that | | | matains state machine with other ACS | | | and distribute information to AER. | +--------------+--------------------------------------+ | ABR | AS or AS community border router, | | | which is placed at the boundary of | | | an AS of trust alliance. | +--------------+--------------------------------------+ | Tag | The authentic identification of | | | source address of a packet. | +--------------+--------------------------------------+ Table 1 3. PSAV Framework PSAV is a cryptography-based end-to-end inter-domain source address verification method that guarantees security benefits at partial deployment. PSAV implements inter-AS tag maintenance by establishing a hierarchical community structure that utilizes border nodes on the forwarding path for tag replacement and validation. This mainly includes the following components. Xu, et al. Expires 16 August 2022 [Page 3] Internet-Draft PSAV February 2022 1. Tag generation. In PSAV, the packet tag is generated by maintaining the key between ASes and using the generation algorithm. The destination AS will validate the source address by the packet tag. The above process requires a mapping relationship between AS-IP_Prfix-Key, which will be provided based on existing Internet infrastructure, e.g., such as RPKI, ROVER, etc. 2. Hierarchical structure. In PSAV, AS is organized into hierarchical AS communities, which can provide good scalability by reducing the tag maintenance overhead in large-scale deployments, managing the validation responsibilities corresponding to address allocation, and shielding external community changes. To implement tag validation in AS communities, PSAV will provide corresponding tag cross-layer validation and replacement methods. 3. Membership configuration. AS sends join, exit, or update to all participating nodes through a specific message format, and the participating nodes further complete membership configuration by verifying the authenticity of the messages to form a distributed consensus. A typical workflow of PSAV is shown in Figure 1. AS1 joins the PSAV trust alliance with the signed join information, maintains the packet tag with AS2. After that, AS1 sends out the packet with Tag , and AS2 validates it and replaces the Tag with . Then AS3 validates and replaces the tag with . After AS4 validation, confirm that the packet source address is true. Xu, et al. Expires 16 August 2022 [Page 4] Internet-Draft PSAV February 2022 +----------------------------------------------------------------+ | +---------------+ +---------------+ | | | | | | | | | AS3 |****************| AS4 | | | | | | | | | +---------------+ +---------------+ | | // * \\ | | // * \\ AS Community (N-1) | +-------//------------------*------\\----------------------------+ // * \\ // * \\ // * \\ // * \\ +--------------------------------*-----------+ | * | | +----------+ +----------+ | | | | | | | | | AS1 |******************| AS2 | | | | | | | | | +----------+ +----------+ | | AS Community N | +--------------------------------------------+ Figure 1: PSAV workflow example. 4. Control Plane The functions of control plane of PSAV includes AS community information management, ACS-ACS communication, and ACS-ABR communication. To eliminate the impact of routing dynamic caused by BGP or other routing protocols, PSAV requires its own AS community information management. These information of one AS includes AS Number (ASN), AS Community Number (ASCN), IP Prefix and Public Key. PSAV does not bind any methods of inter-domain mapping information, and it can both use centralized or distributed methods to maintain AS community information independently. When an AS or AS community wants to join or exit the Trust Alliance construted by all the member ASes and AS communities, it SHOULD submit an certificate signning request message containing its own information. It also needs to submit such CSR message for updating its information recorded by all members in trust alliance. The communication among ACSes is to maintain the tags used in packets in network. PSAV provides a tag generation mechanism on one-to-one state machine. In this mechanism, each AS or AS community needs one ACS. ACS negotiates initial state of the state machine with its Xu, et al. Expires 16 August 2022 [Page 5] Internet-Draft PSAV February 2022 relavent ACS. The state transfers to the next state triggered by time flies. For crossing different layer of AS communities, it is used the tag generated by the state machine maintained by AS or AS community with its direct paternal AS community in PSAV. The communication between ACS and ABR is to deliver the AS community information and tags. PSAV requires a heart-beat mechanism for service availability implemented in ACS-ACS commmunication and ACS-ABR communication. When it detects that one ACS or ABR has 'died', the other end WOULD remove its tag generation mechanism maintained with this 'died' end and sends a request message to force execute the exit trust alliance process of the other end. 5. Data Plane The functions of data plane of PSAV includes prefix checking and tag processing. The tag delivered from the control plane indicates the source address of one packet is not tampered. As the tag in use is generated by one-to-one state machine pair, it MUST be completely consistent at the same time. It needs to divide the role of different interfaces of an ABR for functioning properly. In ABR, the interface takes the role of INGRESS, EGRESS, or TRUST. The INGRESS port links to the devices inside the AS or AS community, the EGRESS port links to the devices outside the AS or AS community, and the TRUST port links to the ABR inside the same AS or AS community. The INGRESS port validates and removes the tag in use. The EGRESS port adds or replaces the tag in the packet. The TRUST port does nothing to the packet. When a packet arrives at the ABR, it SHOULD be checked its source address and destination address first. If it originates and destinates the trust alliance, it MUST be tagged with a tag at the first hop and removed tag at the last hop. When this packet forwards crossing different layers of AS communities, it SHOULD be replaced with relavent tags maintained by its ACS with direct paternal ACS. In ABR, it maintains two mapping tables to record the AS community information and tags in use. The AS-Prefix mapping table preserves the ASN or ASCN and IP address prefix relationships. The AS-Tag mapping table holds the ASN or ASCN and relevant tags. When a packet is needed to add, replace, or remove tag, the ABR WOULD get the ASN or ASCN which the packet belongs to first via the source address of the packet from the AS-Prefix mapping table. The ABR WOULD obtain the tag should be used by the ASN or ASCN from the AS-Tag mapping table. Xu, et al. Expires 16 August 2022 [Page 6] Internet-Draft PSAV February 2022 6. Consistency PSAV is a cryptography-based source address validation mechanism to guarantee consistent security benefits and provide scalability for different deployment scales and validation granularity. PSAV uses the hierarchical structure to reduce the size of the secret symmetric keys to cut down the maintenance overhead. Hierarchy validation filters malicious traffic as early as possible to avoid wasting network resources. PSAV also provides clear security responsibilities corresponding to IP address allocation authority. 7. Scalability 7.1. Compatibility Hierarchy effectively blocks external changes and provides scalability in large-scale deployments. AS the forwarding path is indepent of the tag validation by using a mechanism for crossing different layers, PSAV is a segmented end-to-end cryptography scheme essentially. So it does not need to obtain the routing information and has nothing influence on existing routing infrastructure. Meanwhile, PSAV supports that packets can pass through networks where PSAV has not yes been deployed without affecting validation as it is end-to-end validation in nature, which is guaranteeing a definite security benefit for the deployer without requiring a deployment rate. 7.2. Expansion Management On one hand, PSAV effectively isolates structural changes outside the community from internal nodes, as the hierarchical community design minimizes the impact of changes on the rest of the system. On the other hand, PSAV can be implemented with any existing distributed consensus algorithm for inter-AS consensus infrastructure. It should be noted that PSAV has no special requirements for the efficiency of this process based on the assumption that AS community information does not change frequently. Therefore, the decentralized maintenance approach can further reduce the management complexity of the expansion process. 8. Security Consideration Xu, et al. Expires 16 August 2022 [Page 7] Internet-Draft PSAV February 2022 8.1. Attack towards community information The distributied method to maintain the AS community information MAY suffer from the consistency challenges, such as witch attacks and eclipse attacks. However, the situation in PSAV is different from the normal distributed consensus scenario. Due to the hierarchical structure of PSAV, the failure of consensus on local community information does not affect other non-adjacent communities in the system. At the same time, the updated community information only needs the signature confirmation of its parent, brother and child communities, which means that the attack on the special node needs to hold specific resources, which further increases the difficulty of the attack. 8.2. Attacks towards Initial Status Negotiation This is the problem posed in the PSAV implementation. As the clock- synchronized state machine will run locally after the initial status negotiation stage, the attacker can only attack on this negotiation. However, when the ACS-ACS pair or ACS-ABR pair is going to connect, the SSL/TLS will be used to guarantee security in communication. Therefore PSAV can ensure that attackers cannot obtain the initial status even if it can eavesdrop the negotiation packet online. 8.3. Tag Guessing and Key Cracking For resisting reply attack, the eventual tag used in a packet is generated by the ABR with hashing a five-tuple including the signature generated from the state machine, the source address, the destination address, the first 8-bit of payload and source address prefix length. The attacker could guess the tag and crack that key using brute force. Nevertheless, it depends on the irreversibility of a Hash function to prevent backstepping the key from the tag. Furthermore, to decrease such probability, the signature generatated from the state machine will be updated periodically. 9. IANA Consideration TBD. 10. Acknowledgements TBD. 11. Normative References Xu, et al. Expires 16 August 2022 [Page 8] Internet-Draft PSAV February 2022 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC4301] Kent, S. and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, December 2005, . [RFC5210] Wu, J., Bi, J., Li, X., Ren, G., Xu, K., and M. Williams, "A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience", RFC 5210, DOI 10.17487/RFC5210, June 2008, . [RFC5635] Kumari, W. and D. McPherson, "Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)", RFC 5635, DOI 10.17487/RFC5635, August 2009, . Authors' Addresses Ke Xu Computer Science, Tsinghua University Qinghuayuan street, Haidian District Beijing 100084 China Email: xuke@tsinghua.edu.cn Jianping Wu Computer Science, Tsinghua University Qinghuayuan street, Haidian District Beijing 100084 China Email: jianping@cernet.edu.cn Xu, et al. Expires 16 August 2022 [Page 9] Internet-Draft PSAV February 2022 Xiaoliang Wang Computer Science, Tsinghua University Qinghuayuan street, Haidian District Beijing 100084 China Email: wangxiaoliang0623@foxmail.com Yangfei Guo Institute for Network Sciences and Cyberspace, Tsinghua University Qinghuayuan street, Haidian District Beijing 100084 China Email: guoyangf19@mails.tsinghua.edu.cn Xu, et al. Expires 16 August 2022 [Page 10]