<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-risav-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="RISAV">An RPKI and IPsec-based AS-to-AS Approach for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-risav-02"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="B. M." surname="Schwartz" fullname="Benjamin M. Schwartz">
      <organization>Google LLC</organization>
      <address>
        <email>bemasc@google.com</email>
      </address>
    </author>
    <author initials="H. (Henry)" surname="Wang" fullname="Haiyang (Henry) Wang">
      <organization>The University of Minnesota at Duluth</organization>
      <address>
        <postal>
          <city>Minnesota</city>
          <country>USA</country>
        </postal>
        <email>haiyang@d.umn.edu</email>
      </address>
    </author>
    <date year="2022" month="October" day="20"/>
    <workgroup>ipsecme</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document presents RISAV, a protocol for establishing and using IPsec security between Autonomous Systems (ASes) using the RPKI identity system. In this protocol, the originating AS adds authenticating information to each outgoing packet at its Border Routers (ASBRs), and the receiving AS verifies and strips this information at its ASBRs. Packets that fail validation are dropped by the ASBR. RISAV achieves Source Address Validation among all participating ASes.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/bemasc/draft-xu-risav"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Source address spoofing is the practice of using a source IP address without proper authorization from its owner.  The basic internet routing architecture does not provide any defense against spoofing, so any system can send packets that claim any source address. This practice enables a variety of attacks, most notably volumetric DoS attacks as discussed in <xref target="RFC2827"/>.</t>
      <t>There are many possible approaches to preventing address spoofing. <xref section="2.1" sectionFormat="of" target="RFC5210"/> describes three classes of Source Address Validation (SAV): Access Network, Intra-AS, and Inter-AS. Inter-AS SAV is the most challenging class, because different ASes have different policies and operate independently. Inter-AS SAV requires the different ASes to collaborate to verify the source address. However, in the absence of total trust between all ASes, Inter-AS SAV is a prerequisite to defeat source address spoofing.</t>
      <t>Despite years of effort, current Inter-AS SAV protocols are not widely deployed. An important reason is the difficulty of balancing the clear security benefits of partial implementations with the scalability of large-scale deployments. uRPF <xref target="RFC5635"/> <xref target="RFC8704"/>, for example, is a routing-based scheme that filters out spoofed traffic.  In cases where the routing is dynamic or unknown, uRPF deployments must choose between false negatives (i.e. incomplete SAV) and false positives (i.e. broken routing).</t>
      <t>This document provides an RPKI- <xref target="RFC6480"/> and IPsec-based <xref target="RFC4301"/> approach to inter-AS source address validation (RISAV). RISAV is a cryptography-based SAV mechanism to reduce the spoofing of source addresses. In RISAV, the RPKI database acts as a root of trust for IPsec between participating ASes.  Each pair of ASes uses IKEv2 to negotiate an IPsec Security Association (SA). Packets between those ASes are then protected by a modified IPsec Authentication Header (AH) <xref target="RFC4302"/> or an Encapsulating Security Payload (ESP)<xref target="RFC4303"/>. IPsec authenticates the source address, allowing spoofed packets to be dropped at the border of the receiving AS.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Commonly used terms in this document are described below.</t>
        <dl>
          <dt>ACS:</dt>
          <dd>
            <t>AS Contact Server, which is the logical representative of one AS and is responsible for delivering session keys and other information to ASBR.</t>
          </dd>
          <dt>Contact IP:</dt>
          <dd>
            <t>The IP address of the ACS.</t>
          </dd>
          <dt>ASBR:</dt>
          <dd>
            <t>AS border router, which is at the boundary of an AS.</t>
          </dd>
          <dt>SAV:</dt>
          <dd>
            <t>Source Address Validation, which verifies the source address of an IP packet and guarantee the source address is valid.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The goal of this section is to provides the high level description of what RISAV is and how RISAV works.</t>
      <section anchor="what-risav-is">
        <name>What RISAV Is</name>
        <t>RISAV is a cryptographically-based inter-AS source address validation protocol that provides clear security benefits even at partial deployment. It aims to prove that each IP datagram was sent from inside the AS that owns its source address, defeating spoofing and replay attacks.  It is light-weight and efficient, and provides incremental deployment incentives.</t>
        <t>At the source AS Border Router, RISAV adds a MAC to each packet that proves ownership of the packet's source address.  At the recipient's ASBR, RISAV verifies and removes this MAC, recovering the unmodified original packet. The MAC is delivered in the Integrity Check Value (ICV) field of a modified IPsec AH, or as part of the normal IPsec ESP payload.</t>
      </section>
      <section anchor="how-risav-works">
        <name>How RISAV Works</name>
        <t>RISAV uses IKEv2 to negotiate an IPsec security association (SA) between any two ASes. RPKI provides the binding relationship between AS numbers, IP ranges, contact IPs, and public keys. After negotiation, all packets between these ASes are secured by use of a modified AH header or a standard ESP payload.</t>
        <t>Before deploying RISAV, each AS sets a contact IP representative. When negotiating or consulting with one AS, the peer <bcp14>MUST</bcp14> first communicate with this contact IP. The AS <bcp14>MUST</bcp14> publish exactly one contact IP for each supported address family (i.e. IPv4 and/or IPv6) in the RPKI database.</t>
        <t>A typical workflow of RISAV is shown in <xref target="figure1"/>.</t>
        <figure anchor="figure1">
          <name>RISAV workflow example.</name>
          <artwork><![CDATA[
                            +--------------+
                            |     IANA     |
                            +--------------+
                                   |--------------------------+
                                   V                          |
                            +--------------+                  |
                            |      RIR     |                  |
                            +--------------+                  |
                           /                \-----------------+-1. Signing CA
                          V                  V                |  Certificate
              +--------------+               +--------------+ |
              |     LIR1     |               |     LIR2     | |
              +--------------+               +--------------+ |
              /                                             \-+
             V                                               V
+--------------+                                           +--------------+
| 3. RISAV     |---------+                          +------| 3. RISAV     |
| Announcement |         | 2. Signing EE Certificate|      | Announcement |
|              | +-------+                          +----+ |              |
|     AS A     | |                                       | |     AS B     |
| contact IP a | V                                       V | contact IP b |
|           #######   --------------------------------  #######           |
|           # ACS #    4. SA Negotiation and Delivery   # ACS #           |
|           #######   --------------------------------  #######           |
|              |                                           |              |
|           ########  +++++++++++++++++++++++++++++++++ ########          |
|           # ASBR #       5. Data Transmission         # ASBR #          |
|           ########         with IPsec AH/ESP          ########          |
|              |      +++++++++++++++++++++++++++++++++    |              |
+--------------+                                           +--------------+
]]></artwork>
        </figure>
        <ol spacing="normal" type="1"><li>RPKI process. The five Regional Internet Registries (RIR), authorized by IANA, use their root certificate to sign the Certificate Authority (CA) certificate of the Local Internet Registry (LIR), which is used to authorize the Autonomous System (AS) (sometimes indirectly via the Internet Service Provider (ISP)). When they obtain their own CA certificate, the AS would sign an End Entity (EE) certificate with a Route Origin Authorisation (ROA) which is a cryptographically signed object that states which AS are authorized to originate a certain prefix. This authenticated binding of the ASN to its IP prefixes is published in the RPKI database. This is a prerequisite for RISAV.</li>
          <li>ACS EE certificate provisioning. The ACS would need its own EE certificate for IKEv2. This EE certificate is <bcp14>REQUIRED</bcp14> like the BGPsec Router Certificate defined in <xref target="RFC8209"/>.</li>
          <li>RISAV announcement. Each participating AS announces its support for RISAV in the RPKI database, including the IP address of its ACS (the "contact IP").</li>
          <li>SA negotiation and delivery. The ACSes negotiate an SA using IKEv2. After synchronization, all ASBRs would get the SA, including the session key and other parameters.</li>
          <li>IPsec communication. RISAV uses IPsec AH (i.e. "transport mode") for authentication of the IP source address by default. When an ASBR in AS A sends a packet to AS B, it uses the established IPsec channel to add the required AH header. The ASBR in AS B validates the AH header to ensure that the packet was not spoofed, and removes the header.</li>
        </ol>
      </section>
    </section>
    <section anchor="control-plane">
      <name>Control Plane</name>
      <t>The functions of the control plane of RISAV include:</t>
      <ul spacing="normal">
        <li>Announcing that this AS supports RISAV.</li>
        <li>Publishing contact IPs.</li>
        <li>Performing IPsec session initialization (i.e. IKEv2).</li>
      </ul>
      <t>These functions are achieved in two steps.  First, each participating AS publishes a Signed Object <xref target="RFC6488"/> in its RPKI Repository containing a <tt>RISAVAnnouncement</tt>:</t>
      <sourcecode type="ASN.1"><![CDATA[
RISAVAnnouncement ::= SEQUENCE {
         version [0] INTEGER DEFAULT 0,
         asID ASID,
         contactIP ipAddress,
         testing BOOLEAN }
]]></sourcecode>
      <t>When a participating AS discovers another participating AS (via its regular sync of the RPKI database), it initiates an IKEv2 handshake between its own contact IP and the other AS's contact IP.  This handshake <bcp14>MUST</bcp14> include an IKE_AUTH exchange that authenticates both ASes with their RPKI ROA certificates.</t>
      <t>Once this handshake is complete, each AS <bcp14>MUST</bcp14> activate RISAV on all outgoing packets, and <bcp14>SHOULD</bcp14> drop all non-RISAV traffic from the other AS after a reasonable grace period (e.g. 60 seconds).</t>
      <t>The "testing" field indicates whether this contact IP is potentially unreliable.  When this field is set to <tt>true</tt>, other ASes <bcp14>MUST</bcp14> fall back to ordinary operation if IKE negotiation fails.  Otherwise, the contact IP is presumed to be fully reliable, and other ASes <bcp14>SHOULD</bcp14> drop all non-RISAV traffic from this AS if IKE negotiation fails (see <xref target="downgrade"/>).</t>
      <t>For more information about RPKI, see <xref target="RFC6480"/>.</t>
      <section anchor="disabling-risav">
        <name>Disabling RISAV</name>
        <t>To disable RISAV, a participating AS <bcp14>MUST</bcp14> perform the following steps in order:</t>
        <ol spacing="normal" type="1"><li>Stop requiring RISAV authentication of incoming packets.</li>
          <li>Remove the <tt>RISAVAnnouncement</tt> from the RPKI Repository.</li>
          <li>Wait at least 24 hours.</li>
          <li>Stop sending RISAV and shut down the contact IP.</li>
        </ol>
        <t>Conversely, if any AS no longer publishes a <tt>RISAVAnnouncement</tt>, other ASes <bcp14>MUST</bcp14> immediately stop sending RISAV to that AS, but <bcp14>MUST NOT</bcp14> delete any negotiated Tunnel Mode SAs for at least 24 hours, in order to continue to process encrypted incoming traffic.</t>
        <ul empty="true">
          <li>
            <t>TODO: Discuss changes to the contact IP, check if there are any race conditions between activation and deactivation, IKEv2 handshakes in progress, SA expiration, etc.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>SA has its own expiration time and IKE has its keepalive mechanism. In abnormal case, i.e. the connection is failed after the IKE handshake is established, SA will be always in effect during its lifetime until it expires or the IKE keepalive is failed. In normal case, i.e. the connection is actively down, SA will be expired and RISAV will be disabled immediately.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>OPEN QUESTION: Does IKEv2 have an authenticated permanent rejection option that would help here?</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="data-plane">
      <name>Data Plane</name>
      <t>All the ASBRs of the AS are <bcp14>REQUIRED</bcp14> to enable RISAV. The destination ASBR uses the IPsec SPI to locate the correct SA.</t>
      <t>As defined in <xref target="RFC4301"/>, the Security Association Database (SAD) stores all the SAs. Each data item in the SAD includes a cryptographic algorithm (e.g. HMAC-SHA-256), its corresponding key, and other relevant parameters.</t>
      <t>When an outgoing packet arrives at the source ASBR, its treatment depends on the source and destination address. If the source address belongs to the AS in which the ASBR is located, and the destination address is in an AS for which the ASBR has an active RISAV SA, then the packet needs to be modified for RISAV.</t>
      <t>The modification that is applied depends on whether IPsec "transport mode" or "tunnel mode" is active.  This is determined by the presence or absence of the USE_TRANSPORT_MODE notification in the IKEv2 handshake.  RISAV implementations <bcp14>MUST</bcp14> support transport mode, and <bcp14>MAY</bcp14> support tunnel mode.</t>
      <ul empty="true">
        <li>
          <t>OPEN QUESTION: How do peers express a preference or requirement for transport or tunnel mode?</t>
        </li>
      </ul>
      <t>When a packet arrives at the destination ASBR, it will check the destination address and the source address. If the destination belongs to the AS in which the destination ASBR is located, and the source address is in an AS with which this AS has an active RISAV SA, then the packet is subject to RISAV processing.</t>
      <t>To avoid DoS attacks, participating ASes <bcp14>MUST</bcp14> drop any outgoing packet to the contact IP of another AS.  Only the AS operator's systems (i.e. the ACS and ASBRs) are permitted to send packets to the contact IPs of other ASes.  ASBRs <bcp14>MAY</bcp14> drop inbound packets to the contact IP from non-participating ASes.</t>
      <section anchor="transport-mode">
        <name>Transport Mode</name>
        <t>To avoid conflict with other uses of IPsec (<xref target="conflict"/>), RISAV defines its own variant of the IPsec Authentication Header (AH).  The RISAV-AH header format is shown in <xref target="fig2"/>.</t>
        <figure anchor="fig2">
          <name>RISAV-AH Format.</name>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header   |  Payload Len  |           RESERVED            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Security Parameters Index (SPI)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Integrity Check Value (ICV)                   |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>This format is identical to IPsec standard AH except that the Sequence Number is omitted, because RISAV is presumed to be a "multi-sender SA" for which anti-replay defense is not supported (<xref section="2.5" sectionFormat="comma" target="RFC4302"/>).  This change saves 8 octets when the ICV is 16, 24, or 32 octets.  For a 16-octet ICV (most common), RISAV-AH adds 24 octets to each packet.</t>
        <t>The RISAV-AH header is only for AS-to-AS communication.  ASes <bcp14>MUST</bcp14> strip off all RISAV-AH headers for packets whose destination is inside the AS, even if the AS is not currently inspecting the ICV values.</t>
        <t>In transport mode, each AS's SA Database (SAD) is indexed by SPI and counterpart AS, regardless of the source and destination IPs.</t>
      </section>
      <section anchor="tunnel-mode">
        <name>Tunnel Mode</name>
        <t>In tunnel mode, a RISAV sender ASBR wraps each outgoing packet in an ESP payload.  Each ASBR uses its own source address, and sets the destination address to the contact IP of the destination AS.</t>
        <t>The contact IP decrypts all IPsec traffic to recover the original packets, which are forwarded to the correct destination.  After decryption, the receiving AS <bcp14>MUST</bcp14> check that the source IP and destination IP are in the same AS as the outer source and destination, respectively.</t>
        <t>In tunnel mode, each ASBR maintains its own copy of the SA Database (SAD).  Each copy of the SAD is indexed by SPI and counterpart AS. If a valid ESP packet is received from an unknown IP address, the receiving AS <bcp14>SHOULD</bcp14> allocate a new replay defense window, subject to resource constraints.  This allows replay defense to work as usual.  (If the contact IP is implemented as an ECMP cluster, effective replay defense may require consistent hashing.)</t>
        <t>Tunnel mode imposes a space overhead of 73 octets in IPv6.</t>
        <ul empty="true">
          <li>
            <t>PROBLEM: ESP doesn't protect the source IP, so a packet could be replayed by changing the source IP.  Can we negotiate an extension to ESP that covers the IP header?  Or could we always send from the contact IP and encode the ASBR ID in the low bits of the SPI?</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="possible-extensions">
      <name>Possible Extensions</name>
      <t>This section presents potential additions to the design.</t>
      <ul empty="true">
        <li>
          <t>TODO: Remove this section once we have consensus on whether these extensions are worthwhile.</t>
        </li>
      </ul>
      <section anchor="header-only-authentication">
        <name>Header-only authentication</name>
        <t>RISAV-AH, like standard IPsec AH, authenticates the whole constant part of a packet, including the entire payload. To improve efficiency, we could define an IKE parameter to negotiate a header-only variant of transport mode that only authenticates the IP source address, IP destination address, etc.</t>
        <t>This would likely result in a 10-30x decrease in cryptographic cost compared to standard IPsec.  However, it would also offer no SAV defense against any attacker who can view legitimate traffic.  An attacker who can read a single authenticated packet could simply replace the payload, allowing it to issue an unlimited number of spoofed packets.</t>
      </section>
      <section anchor="time-based-key-rotation">
        <name>Time-based key rotation</name>
        <t>Each IKEv2 handshake negotiates a fixed shared secret, known to both parties. In some cases, it might be desirable to rotate the shared secret frequently:</t>
        <ul spacing="normal">
          <li>In transport mode, frequent rotation would limit how long a single packet can be replayed by a spoofing attacker.</li>
          <li>If the ASBRs are less secure than the ACS, frequent rotation could limit the impact of a compromised ASBR.</li>
        </ul>
        <t>However, increasing the frequency of IKEv2 handshakes would increase the burden on the ACS. One alternative possibility is to use a state machine. The state machine runs and triggers the state transition when time is up. The tag is generated in the process of state transition as the side product. The two ACS in peer AS respectively before data transmission will maintain one state machine pair for each bound. The state machine runs simultaneously after the initial state, state transition algorithm, and state transition interval are negotiated, thus they generate the same tag at the same time. Time triggers state transition which means the ACS <bcp14>MUST</bcp14> synchronize the time to the same time base using like NTP defined in <xref target="RFC5905"/>.</t>
        <t>For the tag generation method, it <bcp14>MUST</bcp14> be to specify the initial state and initial state length of the state machine, the identifier of a state machine, state transition interval, length of generated Tag, and Tag. For the SA, they will transfer all these payloads in a secure channel between ACS and ASBRs, for instance, in ESP <xref target="RFC4303"/>. It is <bcp14>RECOMMENDED</bcp14> to transfer the tags rather than the SA for security and efficiency considerations. The initial state and its length can be specified at the Key Exchange Payload with nothing to be changed. The state machine identifier is the SPI value as the SPI value is uniquely in RISAV. The state transition interval and length of generated Tag should be negotiated by the pair ACS, which will need to allocate one SA attribute. The generated Tag will be sent from ACS to ASBR in a secure channel which <bcp14>MAY</bcp14> be, for example, ESP <xref target="RFC4303"/>.</t>
      </section>
      <section anchor="static-negotiation">
        <name>Static Negotiation</name>
        <t>The use of IKEv2 between ASes might be fragile, and creates a number of potential race conditions (e.g. if the RPKI database contents change during the handshake).  It is also potentially costly to implement, requiring O(N^2) network activity for N participating ASes.  If these challenges prove significant, one alternative would be to perform the handshake statically via the RPKI database.  For example, static-static ECDH <xref target="RFC6278"/> would allow ASes to agree on shared secrets simply by syncing the RPKI database.</t>
        <t>Static negotiation makes endpoints nearly stateless, which simplifies the provisioning of ASBRs.  However, it requires inventing a novel IPsec negotiation system, so it seems best to try a design using IKEv2 first.</t>
      </section>
    </section>
    <section anchor="security-consideration">
      <name>Security Consideration</name>
      <section anchor="threat-models">
        <name>Threat models</name>
        <t>In general, RISAV seeks to provide a strong defense against arbitrary active attackers who are external to the source and destination ASes.  However, different RISAV modes and configurations offer different security properties.</t>
        <section anchor="replay-attacks">
          <name>Replay attacks</name>
          <t>In Transport Mode, off-path attackers cannot spoof the source IPs of a participating AS, but any attacker with access to valid traffic can replay it (from anywhere), potentially enabling DoS attacks by replaying expensive traffic (e.g. TCP SYNs, QUIC Initials).  ASes that wish to have replay defense, and are willing to pay the extra data-plane costs, should prefer tunnel mode.</t>
        </section>
        <section anchor="downgrade">
          <name>Downgrade attacks</name>
          <t>An on-path attacker between two participating ASes could attempt to defeat RISAV by blocking IKEv2 handshakes to the Contact IP of a target AS.  If the AS initiating the handshake falls back to non-RISAV behavior after a handshake failure, this enables the attacker to remove all RISAV protection.</t>
          <t>This vulnerable behavior is required when the "testing" flag is set, but is otherwise discouraged.</t>
        </section>
      </section>
      <section anchor="incremental-benefit-from-partial-deployment">
        <name>Incremental benefit from partial deployment</name>
        <t>RISAV provides significant security benefits even if it is only deployed by a fraction of all ASes.  This is particularly clear in the context of reflection attacks.  If two networks implement RISAV, no one in any other network can trigger a reflection attack between these two networks.  Thus, if X% of ASes (selected at random) implement RISAV, participating ASes should see an X% reduction in reflection attack traffic volume.</t>
      </section>
      <section anchor="compatibility">
        <name>Compatibility</name>
        <section anchor="conflict">
          <name>With end-to-end IPsec</name>
          <t>When RISAV is used in transport mode, there is a risk of confusion between the RISAV AH header and end-to-end AH headers used by applications.  This risk is particularly clear during transition periods, when the recipient is not sure whether the sender is using RISAV or not.</t>
          <t>To avoid any such confusion, RISAV's transport mode uses a specialized RISAV-AH header.  (In tunnel mode, no such confusion is possible.)</t>
        </section>
        <section anchor="with-other-sav-mechanisms">
          <name>With other SAV mechanisms</name>
          <t>RISAV is independent from intra-domain SAV and access-layer SAV, such as <xref target="RFC8704"/> or SAVI <xref target="RFC7039"/>. When these techniques are used together, intra-domain and access-layer SAV checks <bcp14>MUST</bcp14> be enforced before applying RISAV.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="reliability">
        <name>Reliability</name>
        <t>The ACS, represented by a contact IP, must be a high-availability, high-performance service to avoid outages.  This might be achieved by electing one distinguished ASBR as the ACS. The distinguished ASBR acting as an ACS will represent the whole AS to communicate with peer AS's ACS. This election takes place prior to the IKE negotiation. In this arrangement, an ASBR <bcp14>MUST</bcp14> be a BGP speaker before it is elected as the distinguished ASBR.</t>
      </section>
      <section anchor="MPProblem">
        <name>Synchronizing Multiple ASBRs</name>
        <t>In RISAV, all ASBRs of each AS must have the same Security Associations, because the recipient does not keep distinct state for each sending ASBR (except for the replay window in tunnel mode). For example, ASBRs cannot perform IKE negotiation independently.  Instead, the ACS is the entity that represents the AS to negotiate associations with other ASes.</t>
        <t>To ensure coherent behavior across the AS, the ACS <bcp14>MUST</bcp14> deliver each SA to all ASBRs in the AS immediately after it is negotiated.  RISAV does not standardize a mechanism for this update broadcast.</t>
        <t>During the SA broadcast, ASBRs will briefly be out of sync.  RISAV recommends a grace period to prevent outages during the update process.</t>
      </section>
      <section anchor="performance">
        <name>Performance</name>
        <t>RISAV requires participating ASes to perform symmetric cryptography on every RISAV-protected packet that they originate or terminate.  This will require significant additional compute capacity that may not be present on existing networks.  However, until most ASes actually implement RISAV, the implementation cost for the few that do is greatly reduced.  For example, if 5% of networks implement RISAV, then participating networks will only need to apply RISAV to 5% of their traffic.</t>
        <t>Thanks to broad interest in optimization of IPsec, very high performance implementations are already available.  For example, as of 2021 an IPsec throughput of 1 Terabit per second was achievable using optimized software on a single server <xref target="INTEL"/>.</t>
      </section>
      <section anchor="mtu">
        <name>MTU</name>
        <ul empty="true">
          <li>
            <t>TODO: Figure out what to say about MTU, PMTUD, etc.  Perhaps an MTU probe is required after setup?  Or on an ongoing basis?</t>
          </li>
        </ul>
      </section>
      <section anchor="nat-scenario">
        <name>NAT scenario</name>
        <t>As all the outer IP header should be the unicast IP address, NAT-traversal mode is not necessary in inter-AS SAV.</t>
      </section>
    </section>
    <section anchor="iana-consideration">
      <name>IANA Consideration</name>
      <t>IF APPROVED IANA is requested to add the following entry to the Assigned Internet Protocol Numbers registry:</t>
      <ul spacing="normal">
        <li>Decimal: $TBD</li>
        <li>Keyword: RISAV-AH</li>
        <li>Protocol: AS-to-AS Authentication Header</li>
        <li>IPv6 Extension Header: Y</li>
        <li>Refrence: (This document)</li>
      </ul>
      <!-- # Acknowledgements -->
<!-- TBD. -->

</section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4302.xml">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.  This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC5635" target="https://www.rfc-editor.org/info/rfc5635" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5635.xml">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks.  This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5905.xml">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol.  NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC6278" target="https://www.rfc-editor.org/info/rfc6278" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6278.xml">
          <front>
            <title>Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax</title>
            <author fullname="J. Herzog" initials="J." surname="Herzog"/>
            <author fullname="R. Khazan" initials="R." surname="Khazan"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes how to use the 'static-static Elliptic Curve Diffie-Hellman key-agreement scheme (i.e., Elliptic Curve Diffie- Hellman where both participants use static Diffie-Hellman values) with the Cryptographic Message Syntax.  In this form of key agreement, the Diffie-Hellman values of both the sender and receiver are long-term values contained in certificates.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6278"/>
          <seriesInfo name="DOI" value="10.17487/RFC6278"/>
        </reference>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing.  The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security.  As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space.  Such verifiable authorizations could be used, for example, to more securely construct BGP route filters.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation.  This document is a framework document that describes and motivates the design of the SAVI methods.  Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8209" target="https://www.rfc-editor.org/info/rfc8209" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8209.xml">
          <front>
            <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
            <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec.  BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together.  BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP.  The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives.  The end entity (EE) certificates specified by this profile are issued to routers within an AS.  Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate.  These CA certificates and EE certificates both contain the AS Resource extension.  An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate.  This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates.  This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8209"/>
          <seriesInfo name="DOI" value="10.17487/RFC8209"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38).  Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704).  However, as shown in this document, the existing feasible-path uRPF still has shortcomings.  This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704).  The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV).  Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques.  This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6488" target="https://www.rfc-editor.org/info/rfc6488" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6488.xml">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI).  These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="INTEL" target="https://networkbuilders.intel.com/solutionslibrary/3rd-generation-intel-xeon-scalable-processor-achieving-1-tbps-ipsec-with-intel-advanced-vector-extensions-512-technology-guide">
          <front>
            <title>Achieving 1 Tbps IPsec with AVX-512</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
