On Fri, 16 Sep 2022, guoyang...@zgclab.edu.cn wrote:

Source Address Validation (SAV) is a problem that can be partially solved by 
using IPsec or other approaches. However, IPsec AH needs to hash the whole
changeless fileds of the length-vairable packet and IPsec ESP needs to encrypt 
the whole packet. Therefore the AH or ESP are too costly and heavily to
implement the source address validation. We design a new tech mechanism that 
uses RPKI and IPsec to solve the inter-domain SAV problem.

I am a bit confused why the source address needs to be cryptographically
verified to make SAV based decisions. What would be the scenarios of
inter AS communication where the packet is maliciously modified between
the two ASes but in such a way that RPKI wouldn't already reject the
packet with a bad src/dst ?

This new mechanism needs to define a new type of IPsec SA using together with 
RPKI to validate the inter-domain layer source address. As it only needs to
choose a little fields to protect but not the whole packet, this will 
dramaticaly decrease the computation cost compared with the original IPsec AH or
ESP. Thus it may be used globally in the Internet.

I am not convinced a modified IPsec AH is the best choice. A new
protocol as this would be, would take quite some time to be widely
supported. With IPsec, there are already two failures in this space,
BEET (BTNS) and wrapped ESP (wESP). I know that the Linux IPsec
maintainers are very conservative adding more complexity to the IPsec
code.

Additionally, AH works poorly over NAT. Would there be a chance that
the two AS'es have to communicate via a NAT?

The drafts keep mentioning the "significant performance" difference.
Has there been any benchmarking / testing of this with real numbers?


I guess I am not fully understanding how this fits into the model of
the two ASes exchanging packets and how looking directly at those
src/dst would not be good enough? Would there be an attacker on the
switch connecting the two ASes ?

Paul

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to