<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-erisav-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.2 -->
  <front>
    <title abbrev="ERISAV">Enhance with RPKI and IPsec for the Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-erisav-00"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="X." surname="Wang" fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="G." surname="Dong" fullname="Guozhen Dong">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>donggz@chinatelecom.cn</email>
      </address>
    </author>
    <date year="2022" month="September" day="15"/>
    <area>Security Area</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Packet forwarding on Internet typically takes no place with inspection of the source address. Thus malicious attacks or abnormal behavior have been launched with the spoofed source addresses. This document describes an inter-domain source address validation with RPKI (Resource Public Key Infrastructure) and IPsec (IP Security), including the motivation, tech framework, main interactive process, and optional extensions.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>IP spoofing has been a long-recognized threat to Internet security for decades. Inter-domain source address validation (SAV) has long served as the primary defense mechanism due to its better cost-effectiveness. However, over years of effort, inter-domain source address validation deployment is still not optimistic. An important reason for this is the difficulty of balancing the clear security benefits of partial deployments with the scalability of large-scale deployments. uRPF <xref target="RFC5635"/>, for example, is a routing-based scheme to filter spoofed traffic, which may result in a lack of security benefits due to the dynamic nature of routing or incomplete information caused by partial deployments.</t>
      <t>RPKI architecture <xref target="RFC6480"/> represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers. IPsec security architecture is used to secure the IP packet in host-to-host, host-to-network, and network-to-network modes. This document defines using present technologies to reinforce the security of source address in the inter-domain layer.</t>
      <t>This document describes an inter-domain source address validation with RPKI and IPsec, including the motivation, tech framework, main interactive process, and extensions.</t>
    </section>
    <section anchor="terms-and-definitions">
      <name>Terms and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>Commonly used terms in this document are described below.</t>
      <dl>
        <dt>AH:</dt>
        <dd>
          <t>IPsec Authentication Header, which is used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays.</t>
        </dd>
        <dt>ASBR:</dt>
        <dd>
          <t>AS border router, which is at the boundary of an AS.</t>
        </dd>
        <dt>CA:</dt>
        <dd>
          <t>Certification authority.</t>
        </dd>
        <dt>EE:</dt>
        <dd>
          <t>End entity.</t>
        </dd>
        <dt>IKE:</dt>
        <dd>
          <t>Internet Key Exchange, which is used in IPsec to negotiate IKE SA and IPsec SA.</t>
        </dd>
        <dt>NIR:</dt>
        <dd>
          <t>National Internet registry, which is a special case for RIR.</t>
        </dd>
        <dt>RIR:</dt>
        <dd>
          <t>Regional Internet registry, which is a governing body that is responsible for the administration of Internet addresses in a specific geographic region.</t>
        </dd>
        <dt>RPKI:</dt>
        <dd>
          <t>Resource Public Key Infrastructure, which is a special PKI.</t>
        </dd>
        <dt>Tag:</dt>
        <dd>
          <t>The authentic identification of the source address of a packet and placed at the AH's ICV field.</t>
        </dd>
      </dl>
    </section>
    <section anchor="desgin-objectives">
      <name>Desgin Objectives</name>
      <t>Source Address Validation (SAV) aims at preventing the source address from being spoofed. It should work at the network layer and provide a veritable IP source address.</t>
      <t>When a packet is sent to the network, for saving network bandwidth and computation resources, the router forwards the packet using the destination address and without any inspection of the source address. The packet may come from a forger or impostor of the source address so that the destination end becomes a latent victim.</t>
      <t>The design goals of ERISAV includes follows:</t>
      <ol spacing="normal" type="1"><li>Extensible current protocols. With the bindings and extensions of the current protocols, it would extremely reduce the cost of updating software, firmware, and hardware. And more importantly, it would be compatible with the current network. In ERISAV, it chooses the RPKI, IKE, and IPsec AH.</li>
        <li>Flatten end-to-end mode. Flatten mode, following the end-to-end design principle, ensures that the undeployed router has no perception of this mechanism. And it can be processed and deployed incrementally.</li>
        <li>Cryptography-based lightweight labels. A cryptographic packet-by-packet signature could guarantee that the reverse computation is infeasible and when it is cracked, the label has been changed to another. And this packet signature could efficiently be verified and resist to label-based replay attacks.</li>
        <li>Inter-domain collaboration trustness. Build an inter-domain trust alliance and complete source address validation via inter-domain collaboration.</li>
      </ol>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>ERISAV is a cryptography-based end-to-end inter-domain source address validation method that guarantees security benefits at partial deployment. ERISAV combines three existing mechanisms. It uses the RPKI trust chain for the ASN-IP Prefix binding relationship, IKE for tag/key negotiation and delivery, and IPsec AH for carrying the identification of the source address in data transmission.</t>
      <t>A typical workflow of ERISAV is shown in <xref target="figure1"/>.</t>
      <figure anchor="figure1">
        <name>RISAV workflow example.</name>
        <artwork><![CDATA[
                        +--------------+
                        |     IANA     |
                        +--------------+
                              |--------------------+
                              V                    |
                       +--------------+            |
                       |      RIR     |            |
                       +--------------+            |
                      /                \-----------+- 1. signed CA
                     V                  V          |   certificate
             +--------+                +--------+  |
             |  LIR1  |                |  LIR2  |--+
             +--------+                +--------+
            /                                    \ 
           V                                      V
+--------------+                              +--------------+
|              |     --------------------     |              |
|              |      2. IKE negotiation      |              |
|              |       and SA delivery        |              |
|     AS X    ###### -------------------- ######    AS Y     |
|   Prefix Px #ASBR#                      #ASBR#  Prefix Py  |
|  Public Key ###### ++++++++++++++++++++ ###### Public Key  |
|              |     3. data transmission     |              |
|              |        using IPsec AH        |              |
|              |     ++++++++++++++++++++     |              |
+--------------+                              +--------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="interactive-process">
      <name>Interactive Process</name>
      <t>ERISAV mainly contains 3 steps.</t>
      <ol spacing="normal" type="1"><li>IANA issues a Certification Authority (CA) certificate to each Regional Internet Registry (RIR). RIR uses its root CA to issue a CA certificate for LIR or NIR which will issue a CA certificate for one AS. The AS issues a new End Entity (EE) certificate to enable verification of signatures on RPKI signed objects. This builds the trust chain using RPKI to guarantee the Internet number resource including AS number and IP prefix are correctly announced. Moreover, the public key of AS will be seated at the CA certificate, which will be used for communication with each other following.</li>
        <li>IPsec IKE negotiates the tag tagged in the packet. IKE also negotiates the authentication algorithm, authentication key, and others specified by SA. These will be stored in the SAD and SPD described in <xref target="RFC4301"/>. IPsec AH <xref target="RFC4302"/> is the authentication header of the IPsec Security Architecture. It authenticates the whole packet for integrity. However, source address validation does not require such strong authentication. It just needs to protect the source address from being spoofed. So it needs a new authentication process. This new authentication process will only take a few changeless fields as input. And the original tag will be seen as the authentication key. The result of this process will produce a new label called the packet signature that will be filled in the packet properly. And this label or the SA MUST send to all the ASBR for communication.</li>
        <li>Data transmission uses the IPsec AH header extension to the packet. IPsec AH carries the tag in its field. The tag represents the authenticity of the source address. When the source ASBR forwards a packet originating from the ASBR's located AS, the ASBR will check the destination of the packet. If it is forwarded to the ERISAV protection area, the ASBR will add the IPsec AH header extension with the related tag filled. If the destination ASBR receives a packet coming from the ERISAV protection area, the ASBR will compare the tag with its local tag. If they are matched, the source address of this packet will be seemd as not tampered. Otherwise, the packet will be discarded because the source address is a spoofing address.</li>
      </ol>
    </section>
    <section anchor="related-extensions">
      <name>Related Extensions</name>
      <t>As discussed before, there are almost negligible changes to current protocols. ERISAV just needs one new IPsec SA for the requirements of source address validation. It just requires requesting a new attribute for storing and transporting the tag information. The tag will be used as the key during the authentication process. The process of AH also needs some changes. It takes a few unchangeable fields as input to generate a signature replacing the original tag for security consideration.</t>
    </section>
    <section anchor="security-consideration">
      <name>Security Consideration</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-consideration">
      <name>IANA Consideration</name>
      <t>TBD.</t>
      <!-- # Acknowledgements -->
<!-- TBD. -->

</section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
        <front>
          <title>Security Architecture for the Internet Protocol</title>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <author fullname="K. Seo" initials="K." surname="Seo"/>
          <date month="December" year="2005"/>
          <abstract>
            <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4301"/>
        <seriesInfo name="DOI" value="10.17487/RFC4301"/>
      </reference>
      <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4302.xml">
        <front>
          <title>IP Authentication Header</title>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="December" year="2005"/>
          <abstract>
            <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.  This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4302"/>
        <seriesInfo name="DOI" value="10.17487/RFC4302"/>
      </reference>
      <reference anchor="RFC5635" target="https://www.rfc-editor.org/info/rfc5635" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5635.xml">
        <front>
          <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
          <author fullname="W. Kumari" initials="W." surname="Kumari"/>
          <author fullname="D. McPherson" initials="D." surname="McPherson"/>
          <date month="August" year="2009"/>
          <abstract>
            <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks.  This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5635"/>
        <seriesInfo name="DOI" value="10.17487/RFC5635"/>
      </reference>
      <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
        <front>
          <title>An Infrastructure to Support Secure Internet Routing</title>
          <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document describes an architecture for an infrastructure to support improved security of Internet routing.  The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security.  As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space.  Such verifiable authorizations could be used, for example, to more securely construct BGP route filters.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6480"/>
        <seriesInfo name="DOI" value="10.17487/RFC6480"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
