<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-risav-01" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.0 -->
  <front>
    <title abbrev="RISAV">An RPKI and IPsec-based AS-to-AS Approach for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-risav-01"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="B. M." surname="Schwartz" fullname="Benjamin M. Schwartz">
      <organization>Google LLC</organization>
      <address>
        <email>bemasc@google.com</email>
      </address>
    </author>
    <author initials="H. (Henry)" surname="Wang" fullname="Haiyang (Henry) Wang">
      <organization>The University of Minnesota at Duluth</organization>
      <address>
        <postal>
          <city>Minnesota</city>
          <country>USA</country>
        </postal>
        <email>haiyang@d.umn.edu</email>
      </address>
    </author>
    <date year="2022" month="October" day="11"/>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document presents RISAV, a protocol for establishing and using IPsec security between Autonomous Systems (ASes) using the RPKI identity system. In this protocol, the originating AS adds authenticating information to each outgoing packet at its Border Routers (ASBRs), and the receiving AS verifies and strips this information at its ASBRs. Packets that fail validation are dropped by the ASBR. RISAV achieves Source Address Validation among all participating ASes.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Source address spoofing has been identified years ago at <xref target="RFC2827"/>, and <xref target="RFC5210"/> has proposed an Source Address Validation Architecture (SAVA) to alleviate such concerns. SAVA classifies this solution into three layers: Access Network, Intra-AS, and Inter-AS. The Inter-AS concerns the SAV at the AS boundaries. It is more challenging for developing the inter-AS source address validation approach because different ASes run different policies in different ISPs independently. It requires the different ASes to collaborate to verify the source address. The inter-AS SAV is more effective than Access or Intra-AS due to its better cost-effectiveness. However, over years of effort, inter-AS source address validation deployment is still not optimistic. An important reason is the difficulty of balancing the clear security benefits of partial implementations with the scalability of large-scale deployments. uRPF <xref target="RFC5635"/> <xref target="RFC8704"/>, for example, is a routing-based schemes filter spoofing source address's traffic, which may result in a lack of security benefits due to the dynamic nature of routing or incomplete information caused by partial deployments.</t>
      <t>This document provides an RPKI- <xref target="RFC6480"/> and IPsec-based <xref target="RFC4301"/> inter-AS approach to source address validation (RISAV). RISAV is a cryptography-based SAV mechanism to reduce the spoofing source address. RPKI provides the reflection relationship between AS numbers (ASN) and IP prefixes. IKEv2 is used to negotiate between two ASes with the Security Association (SA) which contains the algorithm, secret key generating material, and IPsec packet type, and so forth. IPsec is designed for secure the Internet at the IP layer. It introduces two protocols, one is AH (authentication header) <xref target="RFC4302"/> which provides authenticity of the whole packet, including the source address. The other is ESP (IP Encapsulating Security Payload) <xref target="RFC4303"/> which encrypts the whole packet's payload.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Commonly used terms in this document are described below.</t>
        <dl>
          <dt>ACS:</dt>
          <dd>
            <t>AS Contact Server, which is the logical representative of one AS and is responsible for delivering session keys and other information to ASBR.</t>
          </dd>
          <dt>Contact IP:</dt>
          <dd>
            <t>The IP address of the ACS.</t>
          </dd>
          <dt>ASBR:</dt>
          <dd>
            <t>AS border router, which is at the boundary of an AS.</t>
          </dd>
          <dt>SAV:</dt>
          <dd>
            <t>Source Address Validation, which verifies the source address of an IP packet and guarantee the source address is valid.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The goal of this section is to provides the high level description of what RISAV is and how RISAV works.</t>
      <section anchor="what-risav-is">
        <name>What RISAV Is</name>
        <t>RISAV is a cryptographically-based inter-AS source address validation approach that guarantees security benefits at partial deployment. It aims to provide the IP datagram with a valid source address, with the capability of anti-spoofing, anti-replay, light-weight and efficient, and incremental deployment incentives. As a result, RISAV adds a tag to a packet at the source AS Border Router (ASBR) proving that the packet is with a valid source address, and it would verify and remove this tag at the destination ASBR. The tag will be encapsulated in the Integrity Check Value (ICV) field of IPsec AH/ESP.</t>
      </section>
      <section anchor="how-risav-works">
        <name>How RISAV Works</name>
        <t>RISAV uses IKEv2 to negotiate an IPsec security association (SA) between any two ASes. RPKI provides the binding relationship between AS numbers, IP ranges, contact IPs, and public keys. After negotiation, all packets between these ASes are secured by use of a modified AH header or a standard ESP payload.</t>
        <t>Before deploying RISAV, each AS sets a contact IP representative. When negotiating or consulting with one AS, the peer <bcp14>MUST</bcp14> first communicate with this contact IP. The AS <bcp14>MUST</bcp14> publish exactly one contact IP for each supported address family (i.e. IPv4 and/or IPv6) in the RPKI database.</t>
        <t>A typical workflow of RISAV is shown in <xref target="figure1"/>.</t>
        <figure anchor="figure1">
          <name>RISAV workflow example.</name>
          <artwork><![CDATA[
                            +--------------+
                            |     IANA     |
                            +--------------+
                                   |--------------------------+
                                   V                          |
                            +--------------+                  |
                            |      RIR     |                  |
                            +--------------+                  |
                           /                \-----------------+-1. Signing CA
                          V                  V                |  Certificate
              +--------------+               +--------------+ |
              |     LIR1     |               |     LIR2     | |
              +--------------+               +--------------+ |
              /                                             \-+
             V                                               V
+--------------+                                           +--------------+
| 3. RISAV     |---------+                          +------| 3. RISAV     |
| Announcement |         | 2. Signing EE Certificate|      | Announcement |
|              | +-------+                          +----+ |              |
|     AS A     | |                                       | |     AS B     |
| contact IP a | V                                       V | contact IP b |
|           #######   --------------------------------  #######           |
|           # ACS #    4. SA Negotiation and Delivery   # ACS #           |
|           #######   --------------------------------  #######           |
|              |                                           |              |
|           ########  +++++++++++++++++++++++++++++++++ ########          |
|           # ASBR #       5. Data Transmission         # ASBR #          |
|           ########         with IPsec AH/ESP          ########          |
|              |      +++++++++++++++++++++++++++++++++    |              |
+--------------+                                           +--------------+
]]></artwork>
        </figure>
        <ol spacing="normal" type="1"><li>RPKI process. The five Regional Internet Registry (RIR), authorized by IANA, use their root certificate to sign the Certificate Authority (CA) certificate of the Local Internet Registry (LIR). And after that LIR would use a CA certificate to authorize indirectly the Internet Service Provider (ISP) or directly the Autonomous System (AS). When they obtain their own CA certificate, the AS would sign an End Entity (EE) certificate with a Route Origin Authorisation (ROA) which is a cryptographically signed object that states which AS are authorized to originate a certain prefix. Such the reflection of the ASN relationship with IP prefixes would be broadcast to the network. This is the prerequisite.</li>
          <li>ACS EE certificate provisioning. The ACS would need its own EE certificate for IKEv2. This EE certificate is <bcp14>REQUIRED</bcp14> like the BGPsec Router Certificate defined in <xref target="RFC8209"/>.</li>
          <li>RISAV announcement. Each participating AS announces its support for RISAV in the RPKI database, including the IP address of its ACS (the "contact IP").</li>
          <li>SA negotiation and delivery. The ACSes negotiate an SA using IKEv2. When all negotiations are done, the IPsec is established.  After syncrhonization, all ASBRs would get the SA, including the session key and other parameters.</li>
          <li>IPsec communication. It uses IPsec AH for authentication of the IP source address by default. IPsec is often used in tunnel mode as the IPsec VPN. Here, It expands the gateway to the ASBR. When two ends x and y in AS A and B respectively are communicating, the packet from x arriving at its ASBR RA would use the established IPsec channel for adding the representative tag which is generated with the negotiated and synchronized algorithm, session key, IPsec type, and other items and is filled in the ICV field. After the packet arrives at ASBR RB of AS B, it would be inspected by comparing the consistency of the tag at the packet's ICV field and the tag generated in the same way at the source ASBR.</li>
        </ol>
      </section>
    </section>
    <section anchor="control-plane">
      <name>Control Plane</name>
      <t>The functions of the control plane of RISAV include:</t>
      <ul spacing="normal">
        <li>Announcing that this AS supports RISAV.</li>
        <li>Publishing contact IPs.</li>
        <li>Performing IPsec session initialization (i.e. IKEv2).</li>
      </ul>
      <t>These functions are achieved in two steps.  First, each participating AS publishes a Signed Object <xref target="RFC6488"/> in its RPKI Repository containing a <tt>RISAVAnnouncement</tt>:</t>
      <artwork><![CDATA[
RISAVAnnouncement ::= SEQUENCE {
         version [0] INTEGER DEFAULT 0,
         asID ASID,
         contactIP ipAddress,
         testing Boolean }
]]></artwork>
      <t>When a participating AS discovers another participating AS (via its regular sync of the RPKI database), it initiates an IKEv2 handshake between its own contact IP and the other AS's contact IP.  This handshake <bcp14>MUST</bcp14> include an IKE_AUTH exchange that authenticates both ASes with their RPKI ROA certificates.</t>
      <t>Once this handshake is complete, each AS <bcp14>MUST</bcp14> activate RISAV on all outgoing packets, and <bcp14>SHOULD</bcp14> drop all non-RISAV traffic from the other AS after a reasonable grace period (e.g. 60 seconds).</t>
      <t>The "testing" field indicates whether this contact IP is potentially unreliable.  When this field is set to <tt>true</tt>, other ASes <bcp14>MUST</bcp14> fall back to ordinary operation if IKE negotiation fails.  Otherwise, the contact IP is presumed to be fully reliable, and other ASes <bcp14>SHOULD</bcp14> drop all non-RISAV traffic from this AS if IKE negotiation fails (see <xref target="downgrade"/>).</t>
      <t>For more information about RPKI, one can refer to <xref target="RFC6480"/>.</t>
      <section anchor="disabling-risav">
        <name>Disabling RISAV</name>
        <t>To disable RISAV, a participating AS <bcp14>MUST</bcp14> perform the following steps in order:</t>
        <ol spacing="normal" type="1"><li>Stop requiring RISAV authentication of incoming packets.</li>
          <li>Remove the <tt>RISAVAnnouncement</tt> from the RPKI Repository.</li>
          <li>Wait at least 24 hours.</li>
          <li>Stop sending RISAV and shut down the contact IP.</li>
        </ol>
        <t>Conversely, if any AS no longer publishes a <tt>RISAVAnnouncement</tt>, other ASes <bcp14>MUST</bcp14> immediately stop sending RISAV to that AS, but <bcp14>MUST NOT</bcp14> delete any negotiated Tunnel Mode SAs for at least 24 hours, in order to continue to process encrypted incoming traffic.</t>
        <ul empty="true">
          <li>
            <t>TODO: Discuss changes to the contact IP, check if there are any race conditions between activation and deactivation, IKEv2 handshakes in progress, SA expiration, etc.</t>
          </li>
        </ul>
        <t>SA has its own expiration time and IKE has its keepalive mechanism. In abnormal case, i.e. the connection is failed after the IKE handshake is established, SA will be always in effect during its lifetime until it expires or the IKE keepalive is failed. In normal case, i.e. the connection is actively down, SA will be expired and RISAV will be disabled immediately.</t>
        <ul empty="true">
          <li>
            <t>OPEN QUESTION: Does IKEv2 have an authenticated permanent rejection option that would help here?</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="data-plane">
      <name>Data Plane</name>
      <t>All the ASBRs of the AS are <bcp14>REQUIRED</bcp14> to enable RISAV. It uses SPI for destination ASBR to locate the SA uniquely when processing the AH header in RISAV.</t>
      <t>As defined in <xref target="RFC4301"/>, the Security Association Database (SAD) stores all the SAs. One data item in SAD includes an Authentication algorithm and corresponding key when AH is supported. The authentication algorithm could be HMAC-MD5, HMAC-SHA-1, or others.</t>
      <t>When a packet arrives at the source ASBR, it will be checked with the destination address by this ASBR first. If the destination address is in the protection range of RISAV, the packet will be checked by the source address next. If the source address belongs to the AS in which the ASBR locates, the packet needs to be modified for RISAV.</t>
      <t>The modification that is applied depends on whether IPsec "transport mode" or "tunnel mode" is active.  This is determined by the presence or absence of the USE_TRANSPORT_MODE notification in the IKEv2 handshake.  RISAV implementations <bcp14>MUST</bcp14> support transport mode, and <bcp14>MAY</bcp14> support tunnel mode.</t>
      <ul empty="true">
        <li>
          <t>OPEN QUESTION: How do peers express a preference or requirement for transport or tunnel mode?</t>
        </li>
      </ul>
      <t>When a packet arrives at the destination ASBR, it will check the destination address and the source address. If the destination belongs to the AS that the destination ASBR locates in and the source address is in an AS with which this AS has a RISAV SA, the packet is subject to RISAV processing.</t>
      <t>To avoid DoS attacks, participating ASes <bcp14>MUST</bcp14> drop any outgoing packet to the contact IP of another AS.  Only the AS operator's systems (i.e. the ACS and ASBRs) are permitted to send packets to the contact IPs of other ASes.  ASBRs <bcp14>MAY</bcp14> drop inbound packets to the contact IP from non-participating ASes.</t>
      <section anchor="transport-mode">
        <name>Transport Mode</name>
        <t>To avoid conflict with other uses of IPsec, RISAV defines its own variant of the IPsec Authentication Header (AH).  The RISAV-AH header format is shown in <xref target="fig2"/>.</t>
        <figure anchor="fig2">
          <name>RISAV-AH Format.</name>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header   |  Payload Len  |           RESERVED            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Security Parameters Index (SPI)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Integrity Check Value (ICV)                   |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>This format is identical to IPsec standard AH except that the Sequence Number is omitted, because RISAV is presumed to be a "multi-sender SA" for which anti-replay defense is not supported <xref section="2.5" sectionFormat="comma" target="RFC4302"/>.  This change saves 8 octets when the ICV is 16, 24, or 32 octets.  For a 16-octet ICV (most common), RISAV-AH adds 24 octets to each packet.</t>
        <t>The RISAV-AH header is only for AS-to-AS communication.  ASes <bcp14>MUST</bcp14> strip off all RISAV-AH headers for packets whose destination is inside the AS, even if the AS is not currently inspecting the ICV values.</t>
        <t>In transport mode, each AS's SA Database (SAD) is indexed by SPI and counterpart AS, regardless of the source and destination IPs.</t>
      </section>
      <section anchor="tunnel-mode">
        <name>Tunnel Mode</name>
        <t>In tunnel mode, a RISAV sender ASBR wraps each outgoing packet in an ESP payload.  Each ASBR uses its own source address, and sets the destination address to the contact IP of the destination AS.</t>
        <t>The contact IP decrypts all IPsec traffic to recover the original packets, which are forwarded to the correct destination.  After decryption, the receiving AS <bcp14>MUST</bcp14> check that the source IP and destination IP are in the same AS as the outer source and destination, respectively.</t>
        <t>In Tunnel mode, each ASBR maintains its own copy of the SA Database (SAD).  The SAD is indexed by SPI and counterpart AS, except for the replay defense window, which is additionally scoped to the source IP. If a valid ESP packet is received from an unknown IP address, the receiving AS <bcp14>SHOULD</bcp14> allocate a new replay defense window, subject to resource constraints.  This allows replay defense to work as usual.  (If the contact IP is implemented as an ECMP cluster, effective replay defense may require consistent hashing.)</t>
        <t>Tunnel mode imposes a space overhead of 73 octets in IPv6.</t>
        <ul empty="true">
          <li>
            <t>PROBLEM: ESP doesn't protect the source IP, so a packet could be replayed by changing the source IP.  Can we negotiate an extension to ESP that covers the IP header?  Or could we always send from the contact IP and encode the ASBR ID in the low bits of the SPI?</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>OPEN QUESTION: Do we need multiple contact IPs per AS, to support fragmented ASes?</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="possible-extensions">
      <name>Possible Extensions</name>
      <t>This section presents potential additions to the design.</t>
      <ul empty="true">
        <li>
          <t>TODO: Remove this section once we have consensus on whether these extensions are worthwhile.</t>
        </li>
      </ul>
      <section anchor="header-only-authentication">
        <name>Header-only authentication</name>
        <t>Original IPsec AH needs to authenticate the whole constant part of a packet so that it needs to spend amounts of time finding and processing unchangeable fields in the packet. However, RISAV only needs to find a few changeless fields to authenticate the packet decreasing the cost dramatically.</t>
        <t>As authenticating the whole packet causes a heavy burden in the computation, we could define an IKE parameter to negotiate a header-only variant of transport mode that only authenticates the IP source address, IP destination address, etc.</t>
        <t>This would likely result in a 10-30x decrease in cryptographic cost compared to standard IPsec.  However, it would also offer no SAV defense against any attacker who can view legitimate traffic.  An attacker who can read a single authenticated packet could simply replace the payload, allowing it to issue an unlimited number of spoofed packets.</t>
      </section>
      <section anchor="time-based-key-rotation">
        <name>Time-based key rotation</name>
        <t>It has two ways for an ACS to generate tags. One is using a state machine. The state machine runs and triggers the state transition when time is up. The tag is generated in the process of state transition as the side product. The two ACS in peer AS respectively before data transmission will maintain one state machine pair for each bound. The state machine runs simultaneously after the initial state, state transition algorithm, and state transition interval are negotiated, thus they generate the same tag at the same time. Time triggers state transition which means the ACS <bcp14>MUST</bcp14> synchronize the time to the same time base using like NTP defined in <xref target="RFC5905"/>.</t>
        <t>For the tag generation method, it <bcp14>MUST</bcp14> be to specify the initial state and initial state length of the state machine, the identifier of a state machine, state transition interval, length of generated Tag, and Tag. For the SA, they will transfer all these payloads in a secure channel between ACS and ASBRs, for instance, in ESP <xref target="RFC4303"/>. It is <bcp14>RECOMMENDED</bcp14> to transfer the tags rather than the SA for security and efficiency considerations. The initial state and its length can be specified at the Key Exchange Payload with nothing to be changed. The state machine identifier is the SPI value as the SPI value is uniquely in RISAV. The state transition interval and length of generated Tag should be negotiated by the pair ACS, which will need to allocate one SA attribute. The generated Tag will be sent from ACS to ASBR in a secure channel which <bcp14>MAY</bcp14> be, for example, ESP <xref target="RFC4303"/>.</t>
      </section>
      <section anchor="static-negotiation">
        <name>Static Negotiation</name>
        <t>The use of IKEv2 between ASes might be fragile, and creates a number of potential race conditions (e.g. if the RPKI database contents change during the handshake).  It is also potentially costly to implement, requiring O(N^2) network activity for N participating ASes.  If these challenges prove significant, one alternative would be to perform the handshake statically via the RPKI database.  For example, static-static ECDH <xref target="RFC6278"/> would allow ASes to agree on shared secrets simply by syncing the RPKI database.</t>
        <t>Static negotiation makes endpoints nearly stateless, which simplifies the provisioning of ASBRs.  However, it requires inventing a novel IPsec negotiation system, so it seems best to try a design using IKEv2 first.</t>
      </section>
    </section>
    <section anchor="security-consideration">
      <name>Security Consideration</name>
      <section anchor="threat-models">
        <name>Threat models</name>
        <t>In general, RISAV seeks to provide a strong defense against arbitrary active attackers who are external to the source and destination AS.  However, different RISAV modes and configurations offer different security properties.</t>
        <section anchor="replay-attacks">
          <name>Replay attacks</name>
          <t>In Transport Mode, off-path attackers cannot spoof the source IPs of a participating AS, but any attacker with access to valid traffic can replay it (from anywhere), potentially enabling DoS attacks by replaying expensive traffic (e.g. TCP SYNs, QUIC Initials).  ASes that wish to have replay defense, and are willing to pay the extra data-plane costs, should prefer tunnel mode.</t>
        </section>
        <section anchor="downgrade">
          <name>Downgrade attacks</name>
          <t>An on-path attacker between two participating ASes could attempt to defeat RISAV by blocking IKEv2 handshakes to the Contact IP of a target AS.  If the AS initiating the handshake falls back to non-RISAV behavior after a handshake failure, this enables the attacker to remove all RISAV protection.</t>
          <t>This vulnerable behavior is required when the "testing" flag is set, but is otherwise discouraged.</t>
        </section>
      </section>
      <section anchor="incremental-benefit-from-partial-deployment">
        <name>Incremental benefit from partial deployment</name>
        <t>RISAV provides significant security benefits even if it is only deployed by a fraction of all ASes.  This is particularly clear in the context of reflection attacks.  If two networks implement RISAV, no one in any other network can trigger a reflection attack between these two networks.  Thus, if X% of ASes (selected at random) implement RISAV, participating ASes should see an X% reduction in reflection attack traffic volume.</t>
      </section>
      <section anchor="MPProblem">
        <name>Multipath Problem</name>
        <t>This is the problem that requires one AS should be logically presented as one entity. That means all ASBRs of one AS should be acted like one ASBR. Otherwise, different source ASBR would add different IPsec ICV value to the packet. After forwarding, the packet may not arrive at the ASBR as the source ASBR thought. The ICV check may be failed. So the ACS is the entity that represents the AS to negotiate and communicate with peers. The ACS would deliver the messages including SAs and generate tags to the ASBR so that all ASBRs in the same AS would work like one ASBR for they have the same processing material and process in the same way. Thus, the multipath problem is solved.</t>
      </section>
      <section anchor="compatibility">
        <name>Compatibility</name>
        <section anchor="with-end-to-end-ipsec">
          <name>With end-to-end IPsec</name>
          <t>When RISAV is used in transport mode, there is a risk of confusion between the RISAV AH header and end-to-end AH headers used by applications.  This risk is particularly clear during transition periods, when the recipient is not sure whether the sender is using RISAV or not.</t>
          <t>To avoid any such confusion, RISAV's transport mode uses a specialized RISAV-AH header.  (In tunnel mode, no such confusion is possible.)</t>
        </section>
        <section anchor="with-other-sav-mechanisms">
          <name>With other SAV mechanisms</name>
          <t>RISAV can <bcp14>OPTIONAL</bcp14> cooperate with intra-domain SAV and access-layer SAV, such as <xref target="RFC8704"/> or SAVI <xref target="RFC7039"/>. Only when intra-domain or access-layer SAV, if deployed, check passed can the packet process and forward correctly.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="reliability">
        <name>Reliability</name>
        <t>The ACS, represented by a contact IP, must be a high-availability, high-performance service to avoid outages.  When it chooses to use a logical ACS, one AS will elect one distinguished ASBR as the ACS. The distinguished ASBR acting as an ACS will represent the whole AS to communicate with peer AS's ACS. This election takes place prior to the IKE negotiation. An ASBR <bcp14>MUST</bcp14> be a BGP speaker before it is elected as the distinguished ASBR.</t>
      </section>
      <section anchor="performance">
        <name>Performance</name>
        <t>RISAV requires participating ASes to perform symmetric cryptography on every RISAV-protected packet that they originate or terminate.  This will require significant additional compute capacity that may not be present on existing networks.  However, until most ASes actually implement RISAV, the implementation cost for the few that do is greatly reduced.  For example, if 5% of networks implement RISAV, then participating networks will only need to apply RISAV to 5% of their traffic.</t>
        <t>Thanks to broad interest in optimization of IPsec, very high performance implementations are already available.  For example, as of 2021 an IPsec throughput of 1 Terabit per second was achievable using optimized software on a single server <xref target="INTEL"/>.</t>
      </section>
      <section anchor="mtu">
        <name>MTU</name>
        <ul empty="true">
          <li>
            <t>TODO: Figure out what to say about MTU, PMTUD, etc.  Perhaps an MTU probe is required after setup?  Or on an ongoing basis?</t>
          </li>
        </ul>
      </section>
      <section anchor="nat-scenario">
        <name>NAT scenario</name>
        <t>As all the outter IP header should be the unicast IP address, NAT-traversal mode is not necesarry in inter-AS SAV.</t>
      </section>
    </section>
    <section anchor="iana-consideration">
      <name>IANA Consideration</name>
      <t>IF APPROVED IANA is requested to add the following entry to the Assigned Internet Protocol Numbers registry:</t>
      <ul spacing="normal">
        <li>Decimal: $TBD</li>
        <li>Keyword: RISAV-AH</li>
        <li>Protocol: AS-to-AS Authentication Header</li>
        <li>IPv6 Extension Header: Y</li>
        <li>Refrence: (This document)</li>
      </ul>
      <!-- # Acknowledgements -->
<!-- TBD. -->

</section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4302.xml">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.  This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC5635" target="https://www.rfc-editor.org/info/rfc5635" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5635.xml">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks.  This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5905.xml">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol.  NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC6278" target="https://www.rfc-editor.org/info/rfc6278" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6278.xml">
          <front>
            <title>Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax</title>
            <author fullname="J. Herzog" initials="J." surname="Herzog"/>
            <author fullname="R. Khazan" initials="R." surname="Khazan"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes how to use the 'static-static Elliptic Curve Diffie-Hellman key-agreement scheme (i.e., Elliptic Curve Diffie- Hellman where both participants use static Diffie-Hellman values) with the Cryptographic Message Syntax.  In this form of key agreement, the Diffie-Hellman values of both the sender and receiver are long-term values contained in certificates.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6278"/>
          <seriesInfo name="DOI" value="10.17487/RFC6278"/>
        </reference>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing.  The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security.  As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space.  Such verifiable authorizations could be used, for example, to more securely construct BGP route filters.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation.  This document is a framework document that describes and motivates the design of the SAVI methods.  Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8209" target="https://www.rfc-editor.org/info/rfc8209" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8209.xml">
          <front>
            <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
            <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec.  BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together.  BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP.  The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives.  The end entity (EE) certificates specified by this profile are issued to routers within an AS.  Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate.  These CA certificates and EE certificates both contain the AS Resource extension.  An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate.  This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates.  This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8209"/>
          <seriesInfo name="DOI" value="10.17487/RFC8209"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38).  Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704).  However, as shown in this document, the existing feasible-path uRPF still has shortcomings.  This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704).  The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV).  Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques.  This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6488" target="https://www.rfc-editor.org/info/rfc6488" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6488.xml">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI).  These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="INTEL" target="https://networkbuilders.intel.com/solutionslibrary/3rd-generation-intel-xeon-scalable-processor-achieving-1-tbps-ipsec-with-intel-advanced-vector-extensions-512-technology-guide">
          <front>
            <title>Achieving 1 Tbps IPsec with AVX-512</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
