Internet-Draft sav enhanced by controller July 2024
Tong, et al. Expires 9 January 2025 [Page]
Workgroup:
Source Address Validation in Intra-domain and Inter-domain Networks
Internet-Draft:
draft-tong-savnet-sav-enhanced-by-controller-00
Published:
Intended Status:
Informational
Expires:
Authors:
T. Tong
China Unicom
C. Lin
New H3C Technologies
N. Wang
China Unicom

Source Address Validation enhanced by Network Controller

Abstract

Many newly proposed Source Address Validation (SAV) mechanisms such as IGP-based and BGP-based SAVNET solutions take a distributed manner to generate SAV rules, but they are faced with accuracy and managability challenges in incremental/partial deployment scenarios. This document proposes a network controller-based solution for enhancing SAVNET capability in intra-domain and inter-domain networks, which supports accurate verification, automated configuration, threat analysis, traceability and visualization.

About This Document

This note is to be removed before publishing as an RFC.

Status information for this document may be found at https://datatracker.ietf.org/doc/draft-tong-savnet-sav-enhanced-by-controller/.

Discussion of this document takes place on the Source Address Validation in Intra-domain and Inter-domain Networks Working Group mailing list (mailto:savnet@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/savnet/. Subscribe at https://www.ietf.org/mailman/listinfo/savnet/.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 9 January 2025.

Table of Contents

1. Introduction

Many newly proposed Source Address Validation (SAV) mechanisms such as IGP-based and BGP-based SAVNET solutions take a distributed manner to generate SAV rules. Distributed SAVNET solutions leverage protocol message exchanges among SAVNET routers to acquire source prefix information pertaining to other subnets within intra-domain networks or inter-domain networks, utilizing Source Prefix Announcement (SPA) and Source Prefix Path Detection (SPD) technologies with BGP/IGP protocols extensions. Nonetheless, under circumstances characterized by device heterogeneity, partial upgrades, asymmetric routing, and peculiar address, these solutions grapple with diminished accuracy in Source Address Validation (SAV). Furthermore,there are necessities for enhancement in areas such as automated configuration, threat analysis, traceability, and visualization.

In this document, on the basis of distributed intra-domain and inter-domain SAVNET architecture, we propose a controller-based and centralized SAVNET enhancement solution. The distributed SAVNET soulations rely on local routing information and SAV-specific information. In this solution, the controller can generate and deliver SAV rules based on the global information, and can also obtain ROA and other external information to generate inter-domain SAV rules, so as to achieve accurate source address verification (SAV) in both intra-domain and inter-domain in a combination of centralized and distributed ways.

In this solution, SAVNET-enabled routers and SAVNET-unenabled routers can cooperate via the network controller. More accurate source address verification rules can be generated based on more comprehensive information in the scenario of partial/incremental deployment of SAVNET. Concurrently, the SAVNET can support accurate verification, automated configuration, threat analysis, traceability and visualization..

1.1. Terminology

  • SAV: Source Address Validation

  • AS: Autonomous System

  • SAV-Specific Information: Information specialized for SAV rule generation, exchanged between routers or from the network controller.

  • SAV-related Information: The information used by a router to make SAV decisions. For intra-domain SAV, SAV-related information includes both local routing information and SAV-specific information.

  • SAV-specific Information Communication Mechanism: The mechanism for exchanging SAV-specific information between routers. It can be either a new protocol or an extension to an existing protocol.

  • SAV Information Base: A table or data structure in a router that stores specific SAV information and local routing information.

  • SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base or from network controller.

  • SAVNET Router: An intra-domain router which runs intra-domain SAVNET.

  • SAVNET Agent: The agent in a SAVNET router that is responsible for communicating SAV-specific information, processing SAV-related information, and generating SAV rules.

  • AS Edge Router: An intra-domain router of an AS which is connected to client subnets.

  • AS Border Router: An intra-domain router of an AS which is connected to other ASes.

  • Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.

  • Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.

2. Scenarios and Requirements for Centralized SAVNET

This section introduces the scenarios and requirements of centralized SAVNET, including incremental/partial deployment scenario, obtain information from external systems, automated configuration, analysis and traceability requirements,etc..

2.1. Challenges and Limitations of Distributed SAVNET in Incremental/partial deployment

The current distributed solutions exchange SAV-specific information between SAVNET routers depends on devices upgrade. Devices utilize the source prefix advertisement (SPA) information to notify other routers about their subnet and prefix information. Unique subnet ID for each subnet should be planned by network manager, and additional identification information such as subnet ID and access mode on the corresponding port of the device should be configured manually, so as to generate more accurate SAV rules.

However, devices are upgraded gradually due to various limitations such as device performance、version and vendor. As a result, there are some routers support SAVNET and others do not in an AS.

Routers with distributed solution could not generate accurate SAV rules in incremental/partial deployment scenario. Refer to [I-D.li-savnet-intra-domain-architecture] and [I-D.li-savnet-inter-domain-architecture].Though the SAVNET router can obtain routing information from the local RIB/FIB and generate SAV rules for certain prefixes, in the absence of SAV-specific information, the SAV generated based on the local RIB/FIB has the risk of the improper block and improper permit in special scenarios such as asymmetric routing scenario. Similarly, as not all devices support SAVNET, so it is difficult for SPD source prefix detection packets to be propagated hop-by-hop.

Figure 1 illustrates the asymmetric routing in a multi-homing subnet scenario which has been raised in [I-D.ietf-savnet-intra-domain-problem-statement]. Subnet 1 has a prefix of 10.0.0.0/15 and is connected to two edge routers, Router 1 and Router 2. Due to the load balancing policy in the inbound direction of subnet 1, R1 can only learn subnet prefix 10.1.0.0/16 from subnet 1, while R2 can only learn subfix 10.0.0.0/16 from subnet 1. After that, R1 learns another subnet prefix through the intra-domain routing protocol, and so does R2. The FIB of R1 and R2 are shown in Figure 1. R1 is a SAVNET router and R2 is a non-SAVNET router, and R1 and R2 communicate with each other through R3, regardless of whether R3 is a SAVNET router or not, the SPA message cannot be delivered and R2 cannot generate its own SAV-specific information or recognize the SAV-specific information transmitted from R1. Therefore, R1 can only collect part of the prefix information of the subnet to generate SAV rules, and R2 uses the FIB for SAV, then improper block will occure in both R1 and R2 due to incomplete information.

 +--------------------------------------------------------------------+
 |     AS                                                             |
 |                            +----------+                            |
 |                            | Router 3 |                            |
 | FIB on Router 1            +----------+     FIB on Router 2        |
 | Dest         Next_hop       / \     \       Dest         Next_hop  |
 | 10.1.0.0/16  Subnet 1       /        \      10.0.0.0/16  Subnet 1  |
 | 10.0.0.0/16  Router 3      /  SPA     \     10.1.0.0/16  Router 3  |
 |                        +----------+   +----------+                 |
 |                SAVNET  | Router 1 |   | Router 2 | No SAVNET       |
 |                        +---+#+----+   +---+#+----+                 |
 |                             \            /                         |
 |                              \          /                          |
 |                             +------------+                         |
 |                             |  Customer  |                         |
 |                             |  Network   |                         |
 |                             +------------+                         |
 |                             (10.0.0.0/15)                          |
 |                                                                    |
 +--------------------------------------------------------------------+
Figure 1: Asymmetric multi-homing scenario in incremental deployment of intra-domain

Incremental/partial deployment for inter-domain include: (1) devices partially support SAVNET in an AS; (2) some ASs support SAVNET, while others do not. Figure 2 shows that ASBR1/2/3 are SAVNET routers while ASBR4 is a non-SAVNET router, ASBR4 cannot generate accurate source address verification rules without obtaining SAV-specific information from other AS and other routers in its AS.

     +-----------------------+          +------------------------+
     | AS1     +----------+  |          |  +--------- +      AS2 |
     |      Y  |  ASBR 1  |  | -------- |  |  ASBR 3  |  Y       |
     |         +----------+  |          |  +----------+          |
     |         +----------+  |          |  +----------+          |
     |      Y  |  ASBR 2  |  | -------- |  |  ASBR 4  |  N       |
     |         +----------+  |          |  +----------+          |
     +-----------------------+          +------------------------+
Figure 2: Partial deployment of Savnet for inter-domain

As a result, there is a problem of low accuracy in partial/incremental deployment scenarios. In addition, how to improve the protection effect and enhance the incentive is also one of the enhanced capabilities.

2.2. Obtain information from external systems

ASBR in each AS collects the SAV-specific information in its AS domain and synchronizes the SAV-specific information with the ASBR of the adjacent AS domain, and also obtains the RPKI ROA and ASPA information, as well as general information such as RIB, FIB, IRR, etc..Based on the above information sources, each AS generates a relatively complete source address verification table. So each AS needs to establish an information exchange channel and mechanism with the RPKI ROA to ensure network security, but routers shouldn’t directly interact with the RPKI ROA and other external systems, and a controller is appropriate to obtain information such as RPKI ROA and ASPA.

2.3. Automated configuration

Due to the existence of special addresses in the network, such as anycast addresses, the existing distributed SAVNET solutions need to manually identify special addresses and adopt corresponding policies, which brings high management overhead.

For example, in Figure 3, P1~P4 are common prefixes, P5 is an anycast prefix with multiple legitimate origins including customer network 1, customer network 3 and external Internet. SAVNET with whitelist to be generated on interfaces a, b, and c, and SAVNET blacklist to can be generated on interfaces d and e. If subnet 1 could not recognize P5 as the an anycast prefix, the blacklist of interfaces d and e includes the prefix P5, causing legitimate packets with P5 as the source to be filtered by mistake when they enter from interfaces d and e. Therefore, in order not to include an anycast prefix into a blacklist, it needs to use a special flag to indicate the anycast prefix when subnet 1 advertises the prefix P5 through the SPA. Prefix type can be obtained and configured on the edge router through the controller if centralized management is possible,.

 +----------------------------------+     +--------------+
 |  AS  1                           |     |   Other AS   |
 |            +-----------+         |     |              |
 |            |  Router 3 |         |---- |   Internet   |
 |            +-----------+         |     |              |
 |               /     \            |     |              |
 |              /       \           |     |              |
 |    +----------+   +----------+   |     | +----------+ |
 |    | Router 1 |   | Router 2 |   |     | | Router 4 | |
 |    +---+#+----+   +- -+#+---+    |     | +---+#+----+ |
 +---------|-----\--------|------\--+     +------|-------+
           |       \      |        \             |
           |         \    |          \           |
           |           \  |            \         |
      +------------+   +------------+  +------------+
      |  Customer  |   |  Customer  |  |  Customer  |
      |  Network 1 |   |  Network 2 |  |  Network 3 |
      +------------+   +------------+  +------------+
  ( prefix-1 and 5)( prefix-2 and 3)( prefix-4 and 5)
Figure 3: Impact of anycast prefix

In addition, network providers assign access devices, access ports, and public IP addresses to users who connected to their networks, so that the address allocation system in the carrier's network contains information about the customer's network. Source address verification technology can be combined with address allocation systems to automate configuration and achieve traceability based on source prefix. Centralized network controller can switch the authentication mode of all SAVNET routers flexibly through the delivery configuration.

2.4. Analysis and traceability requirements

Current scheme provides flexible verification modes such as dropping, rate limiting, or allowness for the forged packets in the latest draft sav_table [I-D.huang-savnet-sav-table]. It will play a great role if the controller can collect more source address forgery information from the router, analyze and trace the source in a centralized manner, visualize the source and target of the attack and threat tracing. Besides, with the continuous expansion of the network scale and the increasing allocation of IP addresses, IP address conflicts include IP address conflicts and IP prefix conflicts will appear, which affects the normal network operation. The controller can find whether the prefixes are reused by checking the prefixes and their binding subnet ID.

3. Centralized SAVNET capability enhancement solution

Figure 4 shows the intra-domain and inter-domain network of the operator network. Customer networks generally access the Internet through the metro network in every province which is an AS and connected to the border router of the operator's backbone network. Border router of operator's backbone network is also interconnected with other operator networks. Since not all customer networks deploy source address verification, it is need for operator network to deploy SAV technology on the border gateway devices of metro networks to perform prefix-level source address verification. It can also deploy the inter-domain SAV to protect the prefixes of Adjacent ASes.There a network controller in an AS domain that manages the access, aggregation, and core devices in the network and knows the network topology of the AS.

               +------------+      +------------+
               |  Other AS  |      |  Other AS  |
               +------------+      +------------+
                     |                   |
                     |                   |
         +----------------------------------------------+
         |                                          AS  |
         |       Network Provider Backbone Network      |
         |                                              |
         +----------------------------------------------+
              |                |                  |
              |                |                  |
         +----------+     +----------+      +----------+
         |   AS 1   |     |   AS2    |      |   AS3    |
         +----------+     +----------+      +----------+
Figure 4: Typical carrier network architecture

Every AS has a network controller that manages the access, aggregation and core devices in the network and knows the network topology of the whole AS.

3.1. Centralized SAVNET solution

3.1.1. Intra-domain SAVNET enhancement

This section describes the intra-Domain SAV Enhancement based on Controller. TBD. Figure 5 shows the architecture of the SAV capability enhancement system, which consists of the infrastructure layer, management and control layer, application layer. The infrastructure layer is divided into a data plane and a control plane. Management and control layer refers to a centralized network controller. Application layer at the upper layer can obtain external SAV control policies and display SAV threat information.

     +---------------------------------------------------------+
     |                   Application layer                     |
     |     (handle and display, SAV control strategy)          |
     + --------------------------------------------------------+
                                 |
                                 |
     +---------------------------------------------------------+
     |                Manage and control layer                 |
     |  (SAV rule generation and threat information analysis)  |
     + --------------------------------------------------------+
                                 |
                                 |
     +---------------------------------------------------------+
     |                 Infrastructure layer                    |
     |        (SAV rules management, threat escalation)        |
     + --------------------------------------------------------+
Figure 5: In-domain SAVNET capability enhancement architecture based on network controller

The scheme not only has the ability to generate source address verification rules through the source prefix information advertised among devices, but also has the ability to receive the SAV rules/policies generated by the network controller.

The scheme achives: Collaboration of control plane : Coordination between the control plane of infrastructure layer and the centralized network controller. Collaboration of devices: Collaboration between devices that support SAV and devices that do not support SAV.

3.1.2. Inter-domain SAVNET Capability Enhancement Program Architecture

This section describes the intra-Domain SAV Enhancement based on Controller as showed in figure 6. The controller can collect all SAV-Specific information in the AS, and deliver it to the ASBR device for sending to other adjacent ASs. In addition, controller can obtain more comprehensive information to generate more accurate SAV rules by interacting with external systems. To ensure accurate verification, we recommend that generate SAV rule based on a variety of network information,in, RIB, FIB, IRR, RPKI ROA objects, ASPA objects, network topology, SAV-specific messages, BGP messages and so on..

             +----------------------------------------------+
             |         Application layer                    |
             +----------------------------------------------+
                                  |
             +----------------------------------------------+
             |         Network orchestration layer          |
             + ---------------------------------------------+
                       |                            |
                       |                            |
     +----------------------------+    +--------------------------+
     |  Manage and control layer  |    | Manage and control layer |
     |               AS1          |    |            AS2           |
     +----------------------------+    +--------------------------+

Figure 6: Inter-domain SAVNET capability enhancement architecture based on network controllers

4. Scheme design

This section describes the key technologies, centralized SAV rule generation and use case.

4.1. Key technologies

This section will describe the key technologies of centralized SAV, including the key module of devices and controller, and the interfaces between devices and controller. TBD.

4.2. Centralized SAV rule generation

This section will describe the centralized SAV rules generation method and three steps. TBD.

4.3. Use Case

Several use cases will illustrate that centralized intra-domain SAVNET can achieve more accurate and comprehensive SAV.

Case 1: More accurate intra-domain edge protection TBD.

Case 2: More accurate intra-domain border protection TBD.

Case 3: More accurate Inter-domain protection TBD.

Case 4: Accurate protection with anycast address TBD.

5. Security Considerations

TBD.

6. IANA Considerations

TBD.

7. Acknowledgments

TBD.

8. References

8.1. Normative References

[RFC9552]
Talaulikar, K., Ed., "Distribution of Link-State and Traffic Engineering Information Using BGP", RFC 9552, DOI 10.17487/RFC9552, , <https://www.rfc-editor.org/rfc/rfc9552>.

8.2. Informative References

[I-D.huang-savnet-sav-table]
Huang, M., Cheng, W., Li, D., Geng, N., Liu, Chen, L., and C. Lin, "General Source Address Validation Capabilities", Work in Progress, Internet-Draft, draft-huang-savnet-sav-table-06, , <https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-06>.
[I-D.li-savnet-inter-domain-architecture]
"*** BROKEN REFERENCE ***".
[I-D.li-savnet-intra-domain-architecture]
Li, D., Wu, J., Qin, L., Geng, N., Chen, L., Huang, M., and F. Gao, "Intra-domain Source Address Validation (SAVNET) Architecture", Work in Progress, Internet-Draft, draft-li-savnet-intra-domain-architecture-07, , <https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07>.
[I-D.li-savnet-intra-domain-problem-statement]
Li, D., Wu, J., Qin, L., Huang, M., and N. Geng, "Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements", Work in Progress, Internet-Draft, draft-li-savnet-intra-domain-problem-statement-07, , <https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-problem-statement-07>.

Authors' Addresses

Tian Tong
China Unicom
Changwang Lin
New H3C Technologies
Nan Wang
China Unicom