<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-psav-00" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title abbrev="PSAV">Practical Inter-Domain Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-psav-00"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="X." surname="Wang" fullname="Xiaoliang Wang">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization abbrev="Tsinghua University">Institute for Network Sciences and Cyberspace, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>guoyangf19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2022" month="February" day="12"/>
    <area>Operations and Management Area</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. The inter-domain source address validation architecture is an effort to enhance the Internet by using state machine to generate consistent tags. When communicating between two end hosts at different ASes, tags will be added to the packets to identify the authenticity of the IP source address.</t>
      <t>This memo introduces PSAV, an Inter-AS source address validation mechanism.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>IP spoofing has been a long-recognized threat to Internet security for decades. Inter-domain source address validation (SAV) has long served as the primary defense mechanism due to its better cost-effectiveness. However, over years of effort, the deployment of inter-domain source address validation is still not optimistic. An important reason for this is the difficulty of balancing the clear security benefits of partial deployments with the scalability of large-scale deployments. uRPF <xref target="RFC5635" format="default"/>, for example, routing-based schemes to filter spoofed traffic, which may result in a lack of security benefits due to the dynamic nature of routing or incomplete information caused by partial deployments. And while cryptography-based schemes such as IPsec <xref target="RFC4301" format="default"/> can provide clear security gains, the additional end-to-end overhead will present new challenges in scalability.</t>
      <t>This document provides a framework of practical inter-domain SAV (PSAV). PSAV is a cryptography-based SAV to guarantee consistent security benefits. Key maintenance is performed between the source and destination ASes, and the key is used to generate packet tags to validate the authenticity of the source address. Meanwhile, in PSAV, ASes are organized as a hierarchical structure to provide scalability, in which only fully-connected key maintenance is performed between ASes on the same layer, and ASes between different layers achieve end-to-end source address validation through cross-layer validation and tag replacement.</t>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119, BCP 14
<xref target="RFC2119" format="default"/> and indicate requirement layers for compliant CoAP
implementations.</t>
    </section>
    <section anchor="terminology-and-abbreviation" numbered="true" toc="default">
      <name>Terminology and Abbreviation</name>
      <table align="center">
        <thead>
          <tr>
            <th align="left">Abbreviation</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TA</td>
            <td align="left">Trust Alliance, the IPv6 network that uses the SAVA-X mechanism.</td>
          </tr>
          <tr>
            <td align="left">ACS</td>
            <td align="left">AD Control Server, the server that matains state machine with other ACS and distribute information to AER.</td>
          </tr>
          <tr>
            <td align="left">ABR</td>
            <td align="left">AS or AS community border router, which is placed at the boundary of an AS of trust alliance.</td>
          </tr>
          <tr>
            <td align="left">Tag</td>
            <td align="left">The authentic identification of source address of a packet.</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="psav-framework" numbered="true" toc="default">
      <name>PSAV Framework</name>
      <t>PSAV is a cryptography-based end-to-end inter-domain source address verification method that guarantees security benefits at partial deployment. PSAV implements inter-AS tag maintenance by establishing a hierarchical community structure that utilizes border nodes on the forwarding path for tag replacement and validation. This mainly includes the following components.</t>
      <ol spacing="normal" type="1"><li>Tag generation. In PSAV, the packet tag is generated by maintaining the key between ASes and using the generation algorithm. The destination AS will validate the source address by the packet tag. The above process requires a mapping relationship between AS-IP_Prfix-Key, which will be provided based on existing Internet infrastructure, e.g., such as RPKI, ROVER, etc.</li>
        <li>Hierarchical structure. In PSAV, AS is organized into hierarchical AS communities, which can provide good scalability by reducing the tag maintenance overhead in large-scale deployments, managing the validation responsibilities corresponding to address allocation, and shielding external community changes. To implement tag validation in AS communities, PSAV will provide corresponding tag cross-layer validation and replacement methods.</li>
        <li>Membership configuration. AS sends join, exit, or update to all participating nodes through a specific message format, and the participating nodes further complete membership configuration by verifying the authenticity of the messages to form a distributed consensus.</li>
      </ol>
      <t>A typical workflow of PSAV is shown in <xref target="figure1" format="default"/>. AS1 joins the PSAV trust alliance with the signed join information, maintains the packet tag with AS2. After that, AS1 sends out the packet with Tag &lt;AS1, AS2&gt;, and AS2 validates it and replaces the Tag with &lt;AS2, AS3&gt;. Then AS3 validates and replaces the tag with &lt;AS3, AS4&gt;. After AS4 validation, confirm that the packet source address is true.</t>
      <figure anchor="figure1">
        <name>PSAV workflow example.</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+----------------------------------------------------------------+
|             +---------------+                +---------------+ |
|             |               |   <AS3, AS4>   |               | |
|             |      AS3      |****************|      AS4      | |
|             |               |                |               | |
|             +---------------+                +---------------+ |
|           //            *    \\                                |
|         //               *     \\       AS Community (N-1)     |
+-------//------------------*------\\----------------------------+
      //                     *       \\
    //              <AS2, AS3>*        \\
  //                           *         \\
//                              *          \\
+--------------------------------*-----------+
|                                 *          |
| +----------+                  +----------+ |
| |          |    <AS1, AS2>    |          | |
| |   AS1    |******************|   AS2    | |
| |          |                  |          | |
| +----------+                  +----------+ |
|               AS Community N               |
+--------------------------------------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="control-plane" numbered="true" toc="default">
      <name>Control Plane</name>
      <t>The functions of control plane of PSAV includes AS community information management, ACS-ACS communication, and ACS-ABR communication.</t>
      <t>To eliminate the impact of routing dynamic caused by BGP or other routing protocols, PSAV requires its own AS community information management. These information of one AS includes AS Number (ASN), AS Community Number (ASCN), IP Prefix and Public Key. PSAV does not bind any methods of inter-domain mapping information, and it can both use centralized or distributed methods to maintain AS community information independently. When an AS or AS community wants to join or exit the Trust Alliance construted by all the member ASes and AS communities, it SHOULD submit an certificate signning request message containing its own information. It also needs to submit such CSR message for updating its information recorded by all members in trust alliance.</t>
      <t>The communication among ACSes is to maintain the tags used in packets in network. PSAV provides a tag generation mechanism on one-to-one state machine. In this mechanism, each AS or AS community needs one ACS. ACS negotiates initial state of the state machine with its relavent ACS. The state transfers to the next state triggered by time flies. For crossing different layer of AS communities, it is used the tag generated by the state machine maintained by AS or AS community with its direct paternal AS community in PSAV. The communication between ACS and ABR is to deliver the AS community information and tags.</t>
      <t>PSAV requires a heart-beat mechanism for service availability implemented in ACS-ACS commmunication and ACS-ABR communication. When it detects that one ACS or ABR has 'died', the other end WOULD remove its tag generation mechanism maintained with this 'died' end and sends a request message to force execute the exit trust alliance process of the other end.</t>
    </section>
    <section anchor="data-plane" numbered="true" toc="default">
      <name>Data Plane</name>
      <t>The functions of data plane of PSAV includes prefix checking and tag processing.</t>
      <t>The tag delivered from the control plane indicates the source address of one packet is not tampered. As the tag in use is generated by one-to-one state machine pair, it MUST be completely consistent at the same time.</t>
      <t>It needs to divide the role of different interfaces of an ABR for functioning properly. In ABR, the interface takes the role of INGRESS, EGRESS, or TRUST. The INGRESS port links to the devices inside the AS or AS community, the EGRESS port links to the devices outside the AS or AS community, and the TRUST port links to the ABR inside the same AS or AS community. The INGRESS port validates and removes the tag in use. The EGRESS port adds or replaces the tag in the packet. The TRUST port does nothing to the packet.</t>
      <t>When a packet arrives at the ABR, it SHOULD be checked its source address and destination address first. If it originates and destinates the trust alliance, it MUST be tagged with a tag at the first hop and removed tag at the last hop. When this packet forwards crossing different layers of AS communities, it SHOULD be replaced with relavent tags maintained by its ACS with direct paternal ACS. In ABR, it maintains two mapping tables to record the AS community information and tags in use. The AS-Prefix mapping table preserves the ASN or ASCN and IP address prefix relationships. The AS-Tag mapping table holds the ASN or ASCN and relevant tags. When a packet is needed to add, replace, or remove tag, the ABR WOULD get the ASN or ASCN which the packet belongs to first via the source address of the packet from the AS-Prefix mapping table. The ABR WOULD obtain the tag should be used by the ASN or ASCN from the AS-Tag mapping table.</t>
    </section>
    <section anchor="consistency" numbered="true" toc="default">
      <name>Consistency</name>
      <t>PSAV is a cryptography-based source address validation mechanism to guarantee consistent security benefits and provide scalability for different deployment scales and validation granularity. PSAV uses the hierarchical structure to reduce the size of the secret symmetric keys to cut down the maintenance overhead. Hierarchy validation filters malicious traffic as early as possible to avoid wasting network resources. PSAV also provides clear security responsibilities corresponding to IP address allocation authority.</t>
    </section>
    <section anchor="scalability" numbered="true" toc="default">
      <name>Scalability</name>
      <section anchor="compatibility" numbered="true" toc="default">
        <name>Compatibility</name>
        <t>Hierarchy effectively blocks external changes and provides scalability in large-scale deployments. AS the forwarding path is indepent of the tag validation by using a mechanism for crossing different layers, PSAV is a segmented end-to-end cryptography scheme essentially. So it does not need to obtain the routing information and has nothing influence on existing routing infrastructure. Meanwhile, PSAV supports that packets can pass through networks where PSAV has not yes been deployed without affecting validation as it is end-to-end validation in nature, which is guaranteeing a definite security benefit for the deployer without requiring a deployment rate.</t>
      </section>
      <section anchor="expansion-management" numbered="true" toc="default">
        <name>Expansion Management</name>
        <t>On one hand, PSAV effectively isolates structural changes outside the community from internal nodes, as the hierarchical community design minimizes the impact of changes on the rest of the system. On the other hand, PSAV can be implemented with any existing distributed consensus algorithm for inter-AS consensus infrastructure. It should be noted that PSAV has no special requirements for the efficiency of this process based on the assumption that AS community information does not change frequently. Therefore, the decentralized maintenance approach can further reduce the management complexity of the expansion process.</t>
      </section>
    </section>
    <section anchor="security-consideration" numbered="true" toc="default">
      <name>Security Consideration</name>
      <section anchor="attack-towards-community-information" numbered="true" toc="default">
        <name>Attack towards community information</name>
        <t>The distributied method to maintain the AS community information MAY suffer from the consistency challenges, such as witch attacks and eclipse attacks. However, the situation
in PSAV is different from the normal distributed consensus scenario. Due to the hierarchical structure of PSAV, the failure of consensus on local community information does not affect other non-adjacent communities in the system. At the same time, the updated community information only needs the signature confirmation of its parent, brother and child communities, which means that the attack on the special node needs to hold specific resources, which further increases the difficulty of the attack.</t>
      </section>
      <section anchor="attacks-towards-initial-status-negotiation" numbered="true" toc="default">
        <name>Attacks towards Initial Status Negotiation</name>
        <t>This is the problem posed in the PSAV implementation. As the clock-synchronized state machine will run locally after the initial status negotiation stage, the attacker can only attack on this negotiation. However, when the ACS-ACS pair or ACS-ABR pair is going to connect, the SSL/TLS will be used to guarantee security in communication. Therefore PSAV can ensure that attackers cannot obtain the initial status even if it can eavesdrop the negotiation packet online.</t>
      </section>
      <section anchor="tag-guessing-and-key-cracking" numbered="true" toc="default">
        <name>Tag Guessing and Key Cracking</name>
        <t>For resisting reply attack, the eventual tag used in a packet is generated by the ABR with hashing a five-tuple including the signature generated from the state machine, the source address, the destination address, the first 8-bit of payload and source address prefix length. The attacker could guess the tag and crack that key using brute force. Nevertheless, it depends on the irreversibility of a Hash function to prevent backstepping the key from the tag. Furthermore, to decrease such probability, the signature generatated from the state machine will be updated periodically.</t>
      </section>
    </section>
    <section anchor="iana-consideration" numbered="true" toc="default">
      <name>IANA Consideration</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5635.xml"/>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
