Re: [IPsec] FW: New Version Notification for draft-xu-erisav-00.txt and draft-xu-risav-00.txt

2022-09-19 Thread Paul Wouters

On Fri, 16 Sep 2022, guoyang...@zgclab.edu.cn wrote:


Source Address Validation (SAV) is a problem that can be partially solved by 
using IPsec or other approaches. However, IPsec AH needs to hash the whole
changeless fileds of the length-vairable packet and IPsec ESP needs to encrypt 
the whole packet. Therefore the AH or ESP are too costly and heavily to
implement the source address validation. We design a new tech mechanism that 
uses RPKI and IPsec to solve the inter-domain SAV problem.


I am a bit confused why the source address needs to be cryptographically
verified to make SAV based decisions. What would be the scenarios of
inter AS communication where the packet is maliciously modified between
the two ASes but in such a way that RPKI wouldn't already reject the
packet with a bad src/dst ?


This new mechanism needs to define a new type of IPsec SA using together with 
RPKI to validate the inter-domain layer source address. As it only needs to
choose a little fields to protect but not the whole packet, this will 
dramaticaly decrease the computation cost compared with the original IPsec AH or
ESP. Thus it may be used globally in the Internet.


I am not convinced a modified IPsec AH is the best choice. A new
protocol as this would be, would take quite some time to be widely
supported. With IPsec, there are already two failures in this space,
BEET (BTNS) and wrapped ESP (wESP). I know that the Linux IPsec
maintainers are very conservative adding more complexity to the IPsec
code.

Additionally, AH works poorly over NAT. Would there be a chance that
the two AS'es have to communicate via a NAT?

The drafts keep mentioning the "significant performance" difference.
Has there been any benchmarking / testing of this with real numbers?


I guess I am not fully understanding how this fits into the model of
the two ASes exchanging packets and how looking directly at those
src/dst would not be good enough? Would there be an attacker on the
switch connecting the two ASes ?

Paul

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] FW: New Version Notification for draft-xu-erisav-00.txt and draft-xu-risav-00.txt

2022-09-19 Thread Michael Richardson

Paul Wouters  wrote:
> I am a bit confused why the source address needs to be cryptographically
> verified to make SAV based decisions. What would be the scenarios of
> inter AS communication where the packet is maliciously modified between
> the two ASes but in such a way that RPKI wouldn't already reject the
> packet with a bad src/dst ?

I'm also confused by this proposal.
But, imagine if you will, that the RPKI is unable to transitively address all
of the transit points.   There are a lot of corner cases that the SAV WG(s)
have been unable to come to consensus about.  I think that a lot of them work
out to that many solutions only work if all operators conform to specific
network topology patterns.

But, if the originating AS is able to sign the packet in such a way that a
receiving AS is able to verify the traffic came from the originating AS.
This would definitely be a win, right?

How would this be possible to do,  well.
There are ways that I can imagine it might be made to work, but it seems very
difficult to do at speed, in practice.
One thought is that I wonder if there is some value if one could only verify
some small percentage of packets... with some consequence if the check fails
such that we probablistically catch violators and put them into some ACL.

> I am not convinced a modified IPsec AH is the best choice. A new
> protocol as this would be, would take quite some time to be widely
> supported. With IPsec, there are already two failures in this space,
> BEET (BTNS) and wrapped ESP (wESP). I know that the Linux IPsec

wasn't it BEEP?
BEEP is not really related to BTNS.
BEEP mode is really related to HIP, but, yes, BTNS could benefit from it.
wESP is, I agree, a total failure.

> Additionally, AH works poorly over NAT. Would there be a chance that
> the two AS'es have to communicate via a NAT?

Probably not.  BGP4 just doesn't do NAT44.
but, if it were a problem... IPv6 would still benefit.
If ASs can benefit from DDoS protection by agressively switching to IPv6,
then that might be a win-win.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec