Internet-Draft SPA-based SAVNET March 2025
Li, et al. Expires 4 September 2025 [Page]
Workgroup:
SAVNET
Internet-Draft:
draft-li-savnet-source-prefix-advertisement-02
Published:
Intended Status:
Informational
Expires:
Authors:
D. Li
Tsinghua University
N. Geng
Huawei
L. Qin
Zhongguancun Laboratory

Source Prefix Advertisement for Intra-domain SAVNET

Abstract

The new intra-domain source address validation (SAV) mechanism requires improving the accuracy (especially avoiding blocking legitimate traffic) and supporting automatic update (see [I-D.ietf-savnet-intra-domain-problem-statement]). To this end, this document proposes an intra-domain SAV mechanism, called source prefix advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for short), to advance the technology for intra-domain SAV. SPA-based SAVNET allows routers in an intra-domain network to exchange SPA information. By using SPA information and routing information, intra-domain routers can determine more accurate SAV rules in an automatic manner.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 4 September 2025.

Table of Contents

1. Introduction

The main purpose of intra-domain SAV for an AS is blocking spoofing data packets from host networks and customer networks that use a source address of other networks and blocking spoofing data packets from external ASes that use a source address of the local AS (see [I-D.ietf-savnet-intra-domain-problem-statement]). However, existing uRPF mechanisms [RFC3704] will improperly block legitimate data packets in the case of asymmetric forwarding or asymmetric routing, while ACL-based ingress filtering relies entirely on manual update (see [I-D.ietf-savnet-intra-domain-problem-statement]).

To improve the accuracy and enable automatic update, this document proposes an intra-domain SAV mechanism, called source prefix advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for short), to advance the technology for intra-domain SAV. SPA-based SAVNET allows routers in an intra-domain network to exchange SPA information. By using SPA information and routing information, intra-domain routers can determine more accurate SAV rules in an automatic manner.

The reader is encouraged to be familiar with [I-D.ietf-savnet-intra-domain-problem-statement] and [I-D.ietf-savnet-intra-domain-architecture].

1.1. Terminology

SAV Rule: The rule that describes the mapping relationship between a source address (prefix) and its valid incoming router interface(s).

SAVNET Router: An intra-domain router that deploys SPA-based SAVNET.

Host Network: An intra-domain stub network consists of hosts.

Customer Network: An intra-domain stub network consists of hosts and routers.

Host-facing Router: An intra-domain router facing an intra-domain host network.

Customer-facing Router: An intra-domain router facing an intra-domain customer network.

1.2. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

2. Overview of SPA-based SAVNET

The deployment scope of SPA-based SAVNET for an AS includes host-facing routers, customer-facing routers, and AS border routers. SPA-based SAVNET allows these routers to exchange SPA information through the existing internal gateway protocol (IGP). By learning SPA information from other SAVNET routers, each SAVNET router can generate an allowlist SAV rule (i.e., "Interface-based prefix allowlist" mode in [I-D.huang-savnet-sav-table]) or a blocklist SAV rule (i.e., "Interface-based prefix blocklist" mode in [I-D.huang-savnet-sav-table]) on the specific router interface:

SPA-based SAVNET provides incremental benefits when incrementally deployed within the deployment scope. Every SAVNET router that adopts SPA-based SAVNET can identify spoofing data packets coming from a host network, customer network, or an AS. By using allowlist SAV rules, host-facing routers and customer-facing routers that adopt SPA-based SAVNET will block spoofing data packets from host networks and customer networks that use a source address of other networks. By using blocklist SAV rules, AS border routers that adopt SPA-based SAVNET will block spoofing data packets from external ASes that use a source address of the local AS.

In the following, this document describes the protocol-independent designs for SPA-based SAVNET, include procedures for SPA information generation (in Section 3), SPA information communication (in Section 4), and SAV rule generation (in Section 5). SPA information communication can be implemented by using an existing routing protocol. Specific protocol designs or extensions for SPA information communication are not in the scope of this document.

3. SPA Information Generation

Each SAVNET router connected to an intra-domain stub network (e.g., a host network or a customer network) generates SPA information. The content of SPA information mainly includes two parts:

4. SPA Information Communication

After generating SPA information, each SAVNET router will provide its SPA information to other SAVNET routers. SPA information communication can be implemented by using the IGP (e.g., OSPF, IS-IS, or IBGP). During the propagation of IGP messages, SAVNET routers can learn both routing information and SPA information.

5. SAV Rule Generation

After receiving SPA information from other SAVNET router, SAVNET routers generate allowlist SAV rules or blocklist SAV rules on specific router interfaces.

The detailed procedure for allowlist generation is as follows:

  1. Considering all stub network connected to the router, create a set of SNI values of these stub network. Call it Set A.

  2. Considering all SPA information, for each SNI value in Set A, create a set of unique source prefixes that have the same SNI value. Include these prefixes into the allowlist SAV rule at router interfaces facing the stub network which has the same SNI value.

The detailed procedure for blocklist generation is as follows:

  1. Extract unique prefixes from SPA information and routing information learned from the IGP.

  2. Include these prefixes into the blocklist SAV rule at router interfaces facing an external AS.

6. Use Case

6.1. SAV on Host-facing Routers, Customer-facing Routers, and AS Border Routers

SPA-based SAVNET is used on host-facing Routers, customer-facing Routers, and AS border routers in an intra-domain network. It is a general intra-domain SAV mechanism that apply to different network topologies (e.g., mesh topology or tree topology) or routing scenarios (e.g., asymmetric routing or symmetric routing). The network operator can incrementally deploy SPA-based SAVNET in his/her AS to gradually improve the defense against source address spoofing attacks.

Figure 1 shows an example. Customer Network is multi-homed to Routers A and B. Host Network is single-homed to Router C. Routers D and E are connected to external ASes. Data packets from Customer Network can use source addresses in prefixes P1 and P2. Data packets from Host Network can use source addresses in prefix P3. P' is the source IP address space for intra-domain router IPs and link IPs. Assume there is an asymmetric forwarding behavior or an asymmetric route between Router A, Router B, and Customer Network due to traffic engineering and load balance. For example, Router A forwards only data packets with destination addresses in prefix P1 to Customer Network while forwards others to Router B. Router B forwards only data packets with destination addresses in prefix P2 to Customer Network while forwards others to Router A. However, Customer Network will sends data packets with source addresses in prefixes P1 and P2 to both routers. In this case, as described in [I-D.ietf-savnet-intra-domain-problem-statement], strict uRPF on Router A's Interface # will improperly block data packets with source addresses in prefix P2, and strict uRPF on Router A's Interface # will improperly block data packets with source addresses in prefix P2, and strict uRPF on Router B's Interface # will improperly block data packets with source addresses in prefix P1.

            +----------------------------------+
            |            Other ASes            |
            +----------------------------------+
               |                             |
+--------------|-----------------------------|--------+
|   AS         |                             |        |
|        +-----#----+                  +-----#----+   |
|        | Router D | -----------------| Router E |   |
|        +----------+                  +----------+   |
|              |                             |        |
|              |                             |        |
|              |                             |        |
|        +----------+                  +----------+   |
|        | Router F |                  | Router G |   |
|        +----------+                  +----------+   |
|         /         \                        |        |
|        /           \                       |        |
|       /             \                      |        |
| +----------+   +----------+          +----------+   |
| | Router A |---| Router B +----------+ Router C |   |
| +----#-----+   +-------#--+          +-----#----+   |
|       \               /                    |        |
|        \             /                     |        |
|         \           /                      |        |
|        +--------------+            +--------------+ |
|        |   Customer   |            |    Host      | |
|        |   Network    |            |   Network    | |
|        |  (P1 and P2) |            |    (P3)      | |
|        +--------------+            +--------------+ |
+-----------------------------------------------------+
SAV Rules generated by SPA-based SAVNET:
- Allowlist at Router A's Interface #: [P1, P2]
- Allowlist at Router B's Interface #: [P1, P2]
- Allowlist at Router C's Interface #: [P3]
- Blocklist at Router D's Interface #: [P1, P2, P3, P']
- Blocklist at Router E's Interface #: [P1, P2, P3, P']
Figure 1: An example of the most recommended use case of SPA-based SAVNET

When deploying SPA-based SAVNET in this AS, SAVNET Routers A, B, and C will provide SPA information to other SAVNET routers. By using the received SPA information, Routers A and B will include both prefixes P1 and P2 in the allowlist at the Interface #, because both prefixes have the SNI value of Customer Network, even if the prefix that routers A and B learn from the local route to Customer Network may be different. Router C will include prefix P3 in the allowlist at its Interface #. Routers D and E will include all internal prefixes in the blocklist at their Interfaces #.

By using the generated allowlist SAV rules or blocklist SAV rules, SPA-based SAVNET effectively blocks spoofing data packets from host networks and customer networks that use a source address of other networks and blocks spoofing data packets from external ASes that use a source address of the local AS, while avoiding blocking legitimate data packets.

6.2. A Special Scenario: Direct Server Return (DSR)

In the case of DSR, the content server in a stub network will send data packets using source addresses of the anycast server in another AS (see [I-D.ietf-savnet-intra-domain-problem-statement]). To avoid blocking these special data packets, these specially used source addresses must be added into the allowlist SAV rule at interfaces facing a stub network where the content server locates. Since routers as well as current routing architecture do not have this information, this may requires manual configuration.

7. Security Considerations

The security considerations described in [I-D.ietf-savnet-intra-domain-problem-statement] and [I-D.ietf-savnet-intra-domain-architecture] also applies to this document.

8. IANA Considerations

This document has no IANA actions.

9. References

9.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.

9.2. Informative References

[RFC2827]
Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827, , <https://www.rfc-editor.org/info/rfc2827>.
[RFC3704]
Baker, F. and P. Savola, "Ingress Filtering for Multihomed Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, , <https://www.rfc-editor.org/info/rfc3704>.
[I-D.huang-savnet-sav-table]
Huang, M., Cheng, W., Li, D., Geng, N., Liu, Chen, L., and C. Lin, "General Source Address Validation Capabilities", Work in Progress, Internet-Draft, draft-huang-savnet-sav-table-08, , <https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-08>.
[I-D.ietf-savnet-intra-domain-problem-statement]
Li, D., Wu, J., Qin, L., Huang, M., and N. Geng, "Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements", Work in Progress, Internet-Draft, draft-ietf-savnet-intra-domain-problem-statement-12, , <https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-12>.
[I-D.ietf-savnet-intra-domain-architecture]
Li, D., Wu, J., Qin, L., Geng, N., and L. Chen, "Intra-domain Source Address Validation (SAVNET) Architecture", Work in Progress, Internet-Draft, draft-ietf-savnet-intra-domain-architecture-01, , <https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-01>.

Authors' Addresses

Dan Li
Tsinghua University
Beijing
China
Nan Geng
Huawei
Beijing
China
Lancheng Qin
Zhongguancun Laboratory
Beijing
China