Hi,

Apologies for not replying in time. 
There may be some deviations in our statements.

We design this mechanism for inter-domain Source Address Validation (SAV).
Relying on RPKI alone cannot guarantee the authenticity of the source
address in the packet, a data-plane mechanism like IPsec is needed to 
guarantee that the source address cannot be spoofed. The overhead of 
using IPsec directly among ASes on a large scale is unaffordable, so 
we design the extension mechanism of IPsec to meet the SAV requirements 
inter-domain. It could be more like site-to-site mode, but the `site` 
here is an Autonomous System (AS) range. The following figure is the 
overview of this mechanism as shown at draft-xu-risav-00. This would 
work at the ASBR(AS Border Router)other than the end host. As shown 
below, all the processes are taken place at the ACS which is a special 
host or just an ASBR.

>                             +--------------+                               
>                             |     IANA     |                               
>                             +--------------+
>                                    |------------------------+
>                                    V                        |
>                           +--------------+                  |
>                           |      RIR     |                  |
>                           +--------------+                  |
>                          /                \-----------------+-1. signed CA
>                         V                  V                |  certificate
>             +--------------+               +--------------+ |
>             |     LIR1     |               |     LIR2     | |
>             +--------------+               +--------------+ |
>             /                                             \-+
>            V     +------ 2. signed EE certificate -------+ V
> +--------------+ |                                       | +--------------+
> |              | |    --------------------------------   | |              |
> |              | |          3. IKE negotiation           | |              |
> |     AS A     | |    --------------------------------   | |     AS B     |
> |              | V                                       V |              |
> |           ########  --------------------------------  ########          |
> |    ACS A  # ASBR #           4. SA Deliver            # ASBR # ACS B    |
> |           ########  --------------------------------  ########          |
> |              |                                           |   Prefix Y   |
> |   Prefix X   |      +++++++++++++++++++++++++++++++++    | Public Key B |
> | Public Key A |           5. data transmission            |              |
> |              |              using IPsec AH               |              |
> |              |      +++++++++++++++++++++++++++++++++    |              |
> +--------------+                                           +--------------+
>
> THIS FIG may be unfortunately displayed unformatted. You could get it from 
> fig1 
> of draft-xu-risav at https://datatracker.ietf.org/doc/draft-xu-risav.


> With what node does IKE negotiate?
1. The IKE negotiates between the ACS (AS Control Server) in every AS to 
ensure that the source address is not forged. The ACS may be an AS Border 
Router (ASBR) or a special server.


> Where is the AH introduced?
> In IPv4, whether we can introduce new headers is up for debate.
> For IPv6, it is not.
2. We don't introduce a new header or a new protocl. We have designed and 
implemented
this mechanism at the IPv6 range only with IPv6 destination extension header. 
You could refer to these links as follows. But we believe that using IPsec as a
base can  further reduce the complexity of the mechanism. The IPsec AH we use 
is a new one with a special SPI or special SPI prefix/suffix indicated and is 
used in transport mode. 
- https://datatracker.ietf.org/doc/draft-xu-savax-control/
- https://datatracker.ietf.org/doc/draft-xu-savax-data/
- https://datatracker.ietf.org/doc/draft-xu-savax-protocol/


> If we could asymmetrically sign every packet with a new AH protocol that used
> an assymetric key, that would be awesome.  I've wanted to do this forever,
> but it's just not affordable.

3. If we negotiate asymmetric keys for each data stream and perform packet-by-
packet encryption, the overhead of this operation is really unaffordable.
Our design is to maintain cryptographic relationships at the AS level rather
than at the host level, and we can use s/keys to reduce the number of 
negotiations, hoping that the above efforts will make the operational overhead
affordable between AS pairs that are expected to have SAV capabilities.

RFC 2289 A One-Time Password System         
https://www.rfc-editor.org/info/std61
RFC 1760 The S/KEY One-Time Password System 
https://www.rfc-editor.org/info/rfc1760



> What if we signed some small percentage (%0.01) of packets... would there be
> some way this could be useful for SAV?
4. Source address validation at a certain percentage could be an open 
discussion,
which would obviously provide better forwarding efficiency, although we are 
also 
concerned that lower availability may affect deployment incentives.

> I am not convinced a modified IPsec AH is the best choice. A new
> protocol as this would be, would take quite some time to be widely
> supported. With IPsec, there are already two failures in this space,
> BEET (BTNS) and wrapped ESP (wESP). I know that the Linux IPsec
> maintainers are very conservative adding more complexity to the IPsec
> code.

5. Indeed, making any adjustments to a mature and well-designed system will
face many challenges. The only difference we did is to add a Prefix Length 
field and a SIG Length field to the AH header format. Also, this mechanism 
works at the ASBR, so there should be nothing change with the end host.
This particular AH would be added at the source ASBR and removed at the
destination ASBR. In addition, we believe that this mechanism can be turned
off between ASes that do not require SAV.

> Additionally, AH works poorly over NAT. Would there be a chance that
> the two AS'es have to communicate via a NAT?

6. As this is designed for inter-domain layer SAV, it may not concern 
the NAT sceneries. 

> The drafts keep mentioning the "significant performance" difference.
> Has there been any benchmarking / testing of this with real numbers?

7. We have conducted preliminary experiments on commercial routers that
have 100Gbps common interfaces. We use native IPv6 with crc32 and the result
shows that it could complete packet-by-packet hash with a Negligible 
increased latency and throughput loss. We would share further experimental 
instructions if required.

> I guess I am not fully understanding how this fits into the model of
> the two ASes exchanging packets and how looking directly at those
> src/dst would not be good enough? Would there be an attacker on the
> switch connecting the two ASes ?

8. In the inter-domain SAV scenario, the traffic sent by one AS may forge
the source address belonging to another AS, and when the destination AS
receives the packet, it cannot judge whether the src in the packet is 
real or not, and we do not want something like this to happen from a 
security perspective. We need a mechanism to guarantee the destination 
AS has the ability to verify the authenticity of SRC from the data-plane, 
instead of directly believing the SRC shown in the current packet, thus 
making it impossible for the malicious AS to spoof the source address 
of other AS.


Best regards,

Yangfei Guo.

============================================================
 
From: Michael Richardson
Date: 2022-09-19 22:17
To: Paul Wouters; ipsec
CC: guoyang...@zgclab.edu.cn
Subject: Re: [IPsec] FW: New Version Notification for draft-xu-erisav-00.txt 
and draft-xu-risav-00.txt
 
Paul Wouters <paul.wouters=40aiven...@dmarc.ietf.org> wrote:
    > I am a bit confused why the source address needs to be cryptographically
    > verified to make SAV based decisions. What would be the scenarios of
    > inter AS communication where the packet is maliciously modified between
    > the two ASes but in such a way that RPKI wouldn't already reject the
    > packet with a bad src/dst ?
 
I'm also confused by this proposal.
But, imagine if you will, that the RPKI is unable to transitively address all
of the transit points.   There are a lot of corner cases that the SAV WG(s)
have been unable to come to consensus about.  I think that a lot of them work
out to that many solutions only work if all operators conform to specific
network topology patterns.
 
But, if the originating AS is able to sign the packet in such a way that a
receiving AS is able to verify the traffic came from the originating AS.
This would definitely be a win, right?
 
How would this be possible to do, .... well.
There are ways that I can imagine it might be made to work, but it seems very
difficult to do at speed, in practice.
One thought is that I wonder if there is some value if one could only verify
some small percentage of packets... with some consequence if the check fails
such that we probablistically catch violators and put them into some ACL.
 
    > I am not convinced a modified IPsec AH is the best choice. A new
    > protocol as this would be, would take quite some time to be widely
    > supported. With IPsec, there are already two failures in this space,
    > BEET (BTNS) and wrapped ESP (wESP). I know that the Linux IPsec
 
wasn't it BEEP?
BEEP is not really related to BTNS.
BEEP mode is really related to HIP, but, yes, BTNS could benefit from it.
wESP is, I agree, a total failure.
 
    > Additionally, AH works poorly over NAT. Would there be a chance that
    > the two AS'es have to communicate via a NAT?
 
Probably not.  BGP4 just doesn't do NAT44.
but, if it were a problem... IPv6 would still benefit.
If ASs can benefit from DDoS protection by agressively switching to IPv6,
then that might be a win-win.
 
--
Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software Works
-= IPv6 IoT consulting =-
 
 
 
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to