Network Working Group                                    Dai GuangMing 
Internet Draft                                                 Z. Ye 
Expires: March 2007                                Huawei Technologies 
                                                    September 13, 2006 
                                      
                         Specific Route uRPF (SRU)  
                   draft-dai-specific-route-urpf-00.txt 


Status of this Memo 

   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware 
   have been or will be disclosed, and any of which he or she becomes 
   aware will be disclosed, in accordance with Section 6 of BCP 79. 

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups. Note that other 
   groups may also distribute working documents as Internet-Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time. It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 

   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt. 

   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html. 

   This Internet-Draft will expire on March 13, 2007. 

Copyright Notice 

   Copyright (C) The Internet Society (2006). All Rights Reserved. 

Abstract 

   This document describes a mechanism to extend Unicast Reverse Path 
   Forwarding(uRPF). By associating an uRPF flag with a specific route, 
   uRPF can be controlled in a finer granularity than traditional one. 
   It may be used to reduce the cost to network devices caused by uRPF. 

    

                                                        



 
 
 
Dai                    Expires March 13, 2007                 [Page 1] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

Conventions used in this document 

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in [RFC-2119] 

Table of Contents 

    
   1. Introduction................................................2 
      1.1. Current Implements......................................3 
      1.2. Some Problems..........................................3 
   2. Specific route uRPF (SRU)....................................3 
      2.1. Mechanism..............................................4 
      2.2. Process................................................4 
      2.3. Deployment.............................................4 
         2.3.1. Deployment model 1.................................4 
         2.3.2. Deployment model 2.................................5 
      2.4. Benefit................................................7 
      2.5. Design Consideration....................................7 
   3. Security Considerations......................................7 
   4. Acknowledgements............................................8 
   5. References..................................................8 
      5.1. Normative References....................................8 
      5.2. Informative References..................................8 
   Author's Addresses.............................................8 
   Intellectual Property Statement.................................9 
   Disclaimer of Validity.........................................9 
   Copyright Statement...........................................10 
   Acknowledgment................................................10 
    
    

1. Introduction 

   As a countermeasure against forged source address attacks, uRPF has 
   been deployed widely in operator's network. uRPF performs additional 
   lookup operation on the routing table based on the source address of 
   a packet to determine whether the packet is allowed to be received 
   from an interface, i.e. whether the source address of the packet is a 
   spoofed one.  

    




 
 
Dai                    Expires March 13, 2007                 [Page 2] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

1.1. Current Implements 

   [RFC3704] documents several types of PRF (Reverse Path Forwarding) 
   implements: loose RPF, strict RPF and feasible RPF. The loose RPF 
   only checks for the existence of a route; the strict RPF will further 
   compare the consistency of the incoming interface with the outgoing 
   interface of the route; the feasible RPF additionally takes all 
   available outgoing interfaces into account.  

   Some routers integrate uRPF with ACL (Access Control list). When uRPF 
   check for a packet fails, the ACLs configured in advance for the 
   route will be consulted to decide whether the packet should be 
   dropped. It is conceptually identical to uRPF check for a specific 
   packet stream defined by ACLs. 

    

1.2. Some Problems 

   Although uRPF benefits network security, it may also have a negative 
   effect to performance of network devices.  

   For an uRPF-enabled interface, performance of a network device is 
   unavoidably affected because it must look up route table both for 
   source and destination address. A device requires additional resource 
   to perform the second lookup operation at the same time, or it would 
   not reach the capacity of line-speed forwarding. 

   To some routers, mentioned ACL-based uRPF may worsen the situation 
   because it need to consult additional configured data, such as an ACL 
   table and an action table which containing deny, allow and some other 
   possible actions. All of above operations increase the processing 
   expense for packet forwarding.  

   In addition, no matter which type of uRFP is selected, each packet 
   received from an uRPF-enabled interface must be checked. uRPF in a 
   finer granularity is not available to reduce the expense. 

    

2. Specific route uRPF (SRU) 

   This draft documents a new type uPRF, specific route uRPF (SRU), 
   which can be performed to check uRPF in a finer granularity. In some 
   situations, ACL-based uRPF can achieve similar effect, but SRU is 
   more efficient and more scalable.  

 
 
Dai                    Expires March 13, 2007                 [Page 3] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

    

2.1. Mechanism 

   Forwarding Information Base (FIB, [RFC1812]) is a core component of 
   IP forwarding process. A FIB entry contains at least the output 
   interface and next hop for a specific prefix. In this proposal, an 
   additional uRPF flag is associated with each FIB entry. This flag 
   indicates whether a packet destining the prefix should be check 
   against uRPF. 

    

2.2. Process 

   After applying this mechanism, the forwarding process will seem as 
   follows: 

     -Firstly, a router processor consults FIB using the destination 
     address of a received packet as usual. 

     -Then, if an entry is found, its uRPF flag will be checked. If the 
     flag is set, a subsequent uRPF check will be performed. Or else, 
     uRPF check will not happen to the packet. 

     -Finally, according to the result of the uRPF check, the route 
     processor decides whether to drop the packet or not. 

      

2.3. Deployment 

2.3.1. Deployment model 1 

     uRPF-Enabled Interface+------+ BGP UPDATE  +------+ 

                  -------->| AS1  |<------------| AS2  | 

                           +------+             +------+ 

                              ^  

                              |BGP UPDATE 

                              | 

                           +------+ 
 
 
Dai                    Expires March 13, 2007                 [Page 4] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

                           | AS3  | 

                           +------+ 

                      Figure 1: A deployment scenario 

   Figure 1 illustrates a possible application scene. Suppose AS2 asks 
   AS1 to perform an uRPF check before forwarding packets to it. However, 
   AS3 has not such request. In order to meet the requirement, AS1 could 
   design a following routing policy. 

       -When receiving a BGP UPDATE, AS1 gets the former AS Number from 
       its AS_PATH attribute. 

       -If the former AS is AS2, before installing routes in the UPDATE 
       into RIB, AS1 associate an uRPF flag with them.  

       -Otherwise, the UPDATE will be treated as usual. 

       -When a route in RIB is selected as a best route and is installed 
       into FIB, its uRPF flag should be attached to corresponding FIB 
       entry.  

       -When a router processor selects a FIB entry, it will also check 
       its uRPF flag to decide whether to perform an uRPF check. 

   Through above measures, user requirement will be satisfied. It is 
   impossible or at least difficult for current uRPF technologies, such 
   as ACL-based uRPF, to meet the request. Moreover, only nodes in AS2 
   are requested to support SRU, no other network device and protocols 
   need to be modified. 

    

2.3.2. Deployment model 2 

   Since a SRU check is a check against each individual route, the uRPF 
   operation may be treated as an extended attribute of a route. Thus, 
   besides being deployed by manual configurations, it also can be 
   propagated with routes by using dynamic routing protocols.  

    

    

    

 
 
Dai                    Expires March 13, 2007                 [Page 5] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

                             +-------+  

                             |   ST  |  

                             +-------+  

                                | 

                                |   iBGP UPDATE with a special  

                                V   COMMUNITY attribute 

                    ------------------------------ 

                    |                            |       

                    |                            |       

                    V                            V 

           +-----------------+           +----------------+  

           | RA (iBGP Router)|           |RB (iBGP Router)|  

           +-----------------+           +----------------+  

                   Figure 2: Another deployment scenario 

   Figure 2 illustrates a possible deployment scenario within a BGP 
   Autonomous System(AS). ST is a station which maintains uRPF policies 
   and is responsible to distribute them within an AS. The following 
   steps could be taken to distribute policies. 

   o Configuring BGP routers of an AS in advance 

   For a BGP router which supports SRU, policies used to map route 
   attributes to uRPF operations are pre-configured. For example, a 
   special COMMUNITY attribute value may be selected to mean to enable 
   uRPF to a prefix and another value means to disable. 

   o Distribute uRPF policies 

   When a ST decides to enable the uRPF operation of a specific route, 
   it only needs to propagate a BGP UPDATE within the AS and attach the 
   pre-defined COMMUNITY attribute on it. After receiving the UPDATE, a 
   BGP router will apply the attached policies. Deployment and 
   revocation of policies can be performed in the same way.  
 
 
Dai                    Expires March 13, 2007                 [Page 6] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

   The above deployment manner is similar to that of some black hole 
   filtering which counters DDOS attacks. Certainly, we could also 
   transmit uRPF policies in routing advertisements directly, such as 
   using a new route attribute. Thus the first step could be omitted.  

    

2.4. Benefit 

   As a countermeasure towards DDOS, uRPF could only mitigate spoofed 
   address attacks. It does not make sense, when not any attack occurs. 
   Essentially, uRPF is similar to black hole filtering. The difference 
   between them is the latter lacks of measure to decide whether a 
   spoofed address attack has taken place. Thus, every received packet 
   has to be checked. If a dedicated device, such as an IDR system, is 
   available to detecting such attacks in time, SRU may be a better 
   choose. 

   Anyway, SRU provide a measure in a finer granularity and can be used 
   to perform uRPF on demand in the future and reduces its performance 
   impact on forwarding. 

    

2.5. Design Consideration 

   FIB can be assumed as a 'forward policies database' for each received 
   packet, so an uRPF flag of a FIB entry will affect all the interfaces 
   in a device. In order to provide flexibility and apply different uRPF 
   policy to different interface, interface information should be 
   introduced in a fib entry. The information consists of interfaces 
   index in which received packets will be performed uRPF check. In this 
   way, although a single FIB is used, policies can be difference in 
   each individual interface. 

   An interface, which does not enable route-base uRPF, can simply 
   ignore the uRPF flag and interfaces information corresponding to the 
   found FIB entry. Thus, received packets from the interface can be 
   performed [RFC3704] uRPF check. In this way SRU may coexistence with 
   [RFC3704] uRPF. 

    

3. Security Considerations 

   To be added. 

 
 
Dai                    Expires March 13, 2007                 [Page 7] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

    

4. Acknowledgements 

   To be added. 

    

5. References 

5.1. Normative References 

   [RFC1208]  Jacobsen, O. and D. Lynch, "Glossary of networking terms", 
   RFC 1208, March 1991. 

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate 
   equirement Levels", BCP 14, RFC 2119, March 1997. 

   [RFC1812]  Baker, F, "Requirements for IP Version 4 Routers", RFC 
   1812, June 1995. 

   [RFC2827]  P. Ferguson, D. Senie, "Network Ingress Filtering: 
   Defeating Denial of Service Attacks which employ IP Source Address 
   Spoofing", BCP 38, RFC 2827, May 2000 

   [RFC4271]  Y. Rekhter, T. Li, S. Hares, "A Border Gateway Protocol 4 
   (BGP-4)", RFC 4271, January 2006 

    

5.2. Informative References 

   [RFC3704]  F. Baker, P. Savola, "Ingress Filtering for Multihomed 
   Networks", BCP 84, RFC 3704, March 2004. 

    

Author's Addresses 

   Dai Guangming 
   Huawei Technologies 
   No.3, Xinxi Road, Shangdi Information Industry Base 
   Haidian District, Beijing City 100085 
   Email: daigm@huawei.com 
    


 
 
Dai                    Expires March 13, 2007                 [Page 8] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

   Zhao Ye 
   Huawei Technologies 
   No.3, Xinxi Road, Shangdi Information Industry Base 
   Haidian District, Beijing City 100085 
   Email: ye.zhao_ietf@hotmail.com 
    

Intellectual Property Statement 

   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights. Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 

   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 

   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard. Please address the information to the IETF at 
   ietf-ipr@ietf.org 

    

Disclaimer of Validity 

   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 

    



 
 
Dai                    Expires March 13, 2007                 [Page 9] 

Internet-Draft   Control Plane Security Capabilities     September 2006 
    

Copyright Statement 

   Copyright (C) The Internet Society (2006). 

   This document is subject to the rights, licenses and restrictions 
   contained in BCP 78, and except as set forth therein, the authors 
   retain all their rights. 

    

Acknowledgment 

   Funding for the RFC Editor function is currently provided by the 
   Internet Society. 
































 
 
Dai                    Expires March 13, 2007                [Page 10]