<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-ipsecme-risav-03" category="std" consensus="true" submissionType="IETF" updates="4302" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="RISAV">An RPKI and IPsec-based AS-to-AS Approach for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-ipsecme-risav-03"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="B. M." surname="Schwartz" fullname="Benjamin M. Schwartz">
      <organization>Meta Platforms, Inc.</organization>
      <address>
        <postal>
          <city>New York, NY</city>
          <country>USA</country>
        </postal>
        <email>ietf@bemasc.net</email>
      </address>
    </author>
    <author initials="H. (Henry)" surname="Wang" fullname="Haiyang (Henry) Wang">
      <organization>The University of Minnesota at Duluth</organization>
      <address>
        <postal>
          <city>Minnesota</city>
          <country>USA</country>
        </postal>
        <email>haiyang@d.umn.edu</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <workgroup>ipsecme</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 102?>

<t>This document presents RISAV, a protocol for establishing and using IPsec security between Autonomous Systems (ASes) using the RPKI identity system. In this protocol, the originating AS adds authenticating information to each outgoing packet at its Border Routers (ASBRs), and the receiving AS verifies and strips this information at its ASBRs. Packets that fail validation are dropped by the ASBR. RISAV achieves Source Address Validation among all participating ASes.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/bemasc/draft-xu-risav"/>.</t>
    </note>
  </front>
  <middle>
    <?line 107?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source address spoofing is the practice of using a source IP address without proper authorization from its owner.  The basic Internet routing architecture does not provide any defense against spoofing, so any system can send packets that claim any source address. This practice enables a variety of attacks, and we have summarized malicious attacks launched or amplified by spoofing address in <xref target="appendix-a"/>.</t>
      <t>There are many possible approaches to preventing address spoofing. <xref section="2.1" sectionFormat="of" target="RFC5210"/> describes three classes of Source Address Validation (SAV): Access Network, Intra-AS, and Inter-AS. Inter-AS SAV is the most challenging class because different ASes have different policies and operate independently. Inter-AS SAV requires the different ASes to collaborate to verify the source address. However, in the absence of total trust between all ASes, Inter-AS SAV is a prerequisite to defeating source address spoofing.</t>
      <t>Despite years of effort, current Inter-AS SAV protocols are not widely deployed. An important reason is the difficulty of balancing the clear security benefits of partial implementations with the scalability of large-scale deployments. uRPF <xref target="RFC5635"/> <xref target="RFC8704"/>, for example, is a routing-based scheme that filters out spoofed traffic.  In cases where the routing is dynamic or unknown, uRPF deployments must choose between false negatives (i.e. incomplete SAV) and false positives (i.e. broken routing).</t>
      <t>This document provides an RPKI- <xref target="RFC6480"/> and IPsec-based <xref target="RFC4301"/> approach to inter-AS source address validation (RISAV). RISAV is a cryptography-based SAV mechanism to reduce the spoofing of source addresses. In RISAV, the RPKI database acts as a root of trust for IPsec between participating ASes.  Each pair of ASes uses IKEv2 to negotiate an IPsec Security Association (SA). Packets between those ASes are then protected by a modified IPsec Authentication Header (AH) <xref target="RFC4302"/> or an Encapsulating Security Payload (ESP)<xref target="RFC4303"/>. IPsec authenticates the source address, allowing spoofed packets to be dropped at the border of the receiving AS.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Commonly used terms in this document are described below.</t>
        <dl>
          <dt>ACS:</dt>
          <dd>
            <t>AS Contact Server, which is the logical representation of one AS and is responsible for delivering session keys and other information to ASBR.</t>
          </dd>
          <dt>Contact IP:</dt>
          <dd>
            <t>The IP address of the ACS.</t>
          </dd>
          <dt>ASBR:</dt>
          <dd>
            <t>AS border router, which is at the boundary of an AS.</t>
          </dd>
          <dt>SAV:</dt>
          <dd>
            <t>Source Address Validation, which verifies the source address of an IP packet and guarantees the source address is valid.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The goal of this section is to provide a high-level description of what RISAV is and how RISAV works.</t>
      <section anchor="what-risav-is-and-is-not">
        <name>What RISAV Is and Is Not</name>
        <t>RISAV is a cryptographically-based inter-AS source address validation protocol that provides clear security benefits even at partial deployment. It is lightweight and efficient and provides incremental deployment incentives.</t>
        <t>RISAV adds IP packet header authentication to IPsec. It aims to prove that each IP datagram was sent from inside the AS that owns its source address, defeating spoofing and replay attacks. It supports, but does not require, encryption of the whole IP packet.</t>
        <t>RISAV does not aim to defend against specific network attacks such as DoS or DDoS, though RISAV could do more help to avert them.</t>
      </section>
      <section anchor="how-risav-works">
        <name>How RISAV Works</name>
        <t>A typical workflow of RISAV is shown in <xref target="figure1"/>.</t>
        <figure anchor="figure1">
          <name>RISAV workflow example.</name>
          <artwork><![CDATA[
                            +-------------+
                            |    IANA     |
                            +-------------+
                                   |-------------------------+
                                   V                         |
                            +-------------+                  |
                            |     RIR     |                  |
                            +-------------+                  |
                           /               \-----------------+-1. Signing CA
                          V                 V                |  Certificate
              +--------------+              +--------------+ |
              |     LIR1     |              |     LIR2     | |
              +--------------+              +--------------+ |
              /                                            \-+
             V                                              V
+--------------+                                          +--------------+
| 3. RISAV     |---------+                         +------| 3. RISAV     |
| Announcement |         |2. Signing EE Certificate|      | Announcement |
|              | +-------+                         +----+ |              |
|     AS A     | |                                      | |     AS B     |
| contact IP a | V                                      V | contact IP b |
|           #######  --------------------------------  #######           |
|           # ACS #   4. SA Negotiation and Delivery   # ACS #           |
|           #######  --------------------------------  #######           |
|              |                                          |              |
|           ######## +++++++++++++++++++++++++++++++++ ########          |
|           # ASBR #      5. Data Transmission         # ASBR #          |
|           ########        with IPsec AH/ESP          ########          |
|              |     +++++++++++++++++++++++++++++++++    |              |
+--------------+                                          +--------------+
]]></artwork>
        </figure>
        <section anchor="procedure-in-rpki">
          <name>Procedure in RPKI</name>
          <t>RPKI <xref target="RFC6480"/> is a prerequisite for RISAV.</t>
          <t>The five Regional Internet Registries (RIR), authorized by IANA, use their root certificate to sign the Certificate Authority (CA) certificate of the Local Internet Registry (LIR), which is used to authorize the Autonomous System (AS) (sometimes indirectly via the Internet Service Provider (ISP)). When they obtain their own CA certificate, the AS would sign an End Entity (EE) certificate with a Route Origin Authorisation (ROA) which is a cryptographically signed object that states which AS is authorized to originate a certain prefix, descripted in <xref target="RFC6482"/>. This authenticated binding of the ASN to its IP prefixes is published in the RPKI database.</t>
          <t>Beyond ROA, RISAV also <bcp14>REQUIRED</bcp14> RPKI to provide the binding relationship between AS numbers, IP prefixes, contact IPs, and public keys. This process requires RISAV announcement, which tells other AS that this AS enables RISAV. Before deploying RISAV, each AS selects one or more representative contact IPs and publishes them in the RPKI database. When negotiating or consulting with one AS, the peer <bcp14>MUST</bcp14> first communicate with one of these contact IPs.  Each contact IP is used to enable RISAV only for its own address family (i.e. IPv4 or IPv6), so ASes wishing to offer RISAV on both IPv4 and IPv6 must publish at least two contact IPs.</t>
        </section>
        <section anchor="procedure-of-acs">
          <name>Procedure of ACS</name>
          <t>The entity who occupis the contact IPs are the AS Contact Server (ACS). The ACS initiates the RISAV announcement. In practice, each participating AS is <bcp14>REQUIRED</bcp14> to announce its support for RISAV in the RPKI database.</t>
          <t>RISAV uses IKEv2 to negotiate IPsec security associations (SA) between any two ASes. ACS represents the AS to negotiate IPsec SAs with pair ASes. The ACS needs its own EE certificate for IKEv2. This EE certificate is <bcp14>REQUIRED</bcp14> like the BGPsec Router Certificate defined in <xref target="RFC8209"/>.</t>
          <t>After SAs negotiation and synchronization, all ASBRs would get the SAs from its local AS's ACS, including the session key and other parameters.</t>
        </section>
        <section anchor="procedure-of-traffic-forwarding">
          <name>Procedure of Traffic Forwarding</name>
          <t>After SA negotiation and RPKI synchronization, RISAV is established. All packets between these ASes <bcp14>SHOULD</bcp14> be secured by adding a modified AH header or a standard ESP header.</t>
          <t>Basically, at the source AS Border Router, RISAV adds a MAC (Message Authentication Code) to each outgoing packet that proves ownership of the packet's source address. At the recipient's ASBR, RISAV verifies and removes this MAC from the incoming traffic, recovering the unmodified original packet. The MAC is located in the Integrity Check Value (ICV) field of a modified IPsec AH or as part of the standard IPsec ESP payload.</t>
          <t>RISAV uses modified IPsec AH for authentication of the IP source address by default. It uses ESP-NULL encryption when using IPsec ESP.</t>
        </section>
      </section>
    </section>
    <section anchor="control-plane">
      <name>Control Plane</name>
      <t>The functions of the control plane of RISAV include enabling and disabling RISAV, and it provides a green channel for quickly restarting the system in exceptional cases.</t>
      <section anchor="enabling-risav">
        <name>Enabling RISAV</name>
        <t>When RISAV is to be enabled, it should:</t>
        <ul spacing="normal">
          <li>
            <t>announce that this AS supports RISAV,</t>
          </li>
          <li>
            <t>publish contact IPs,</t>
          </li>
          <li>
            <t>and perform IPsec session initialization (i.e. IKEv2).</t>
          </li>
        </ul>
        <!--
TODO: we may need to enrich this process and describe ASN.1 format of RISAVAnnouncement with more details.
1. ITU - Introduction to ASN.1: https://www.itu.int/en/ITU-T/asn1/Pages/introduction.aspx
2. RFC 6025 - ASN.1 Translation: https://www.rfc-editor.org/rfc/rfc6025
3. RFC 3641 - Generic String Encoding Rules (GSER) for ASN.1 Types: https://www.rfc-editor.org/rfc/rfc3641.html
4. RFC 6268 - Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX): https://www.rfc-editor.org/rfc/rfc6268
-->

<t>These functions are achieved in two steps.  First, each participating AS publishes a Signed Object <xref target="RFC6488"/> in its RPKI Repository containing a <tt>RISAVAnnouncement</tt>. The ASN.1 form of <tt>RISAVAnnouncement</tt> is as follows:</t>
        <sourcecode type="ASN.1"><![CDATA[
RPKI-RISAV-2023
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
    pkcs-9(9) smime(16) modules(0) id-mod-rpki-risav-2023(TBD) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE
  FROM CryptographicMessageSyntax-2010 -- in [RFC6268]
    { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
      pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

  IPAddressFamily, IPAddress
  FROM IPAddrAndASCertExtn -- In [RFC3779]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) mod(0) id-mod-ip-addr-and-as-ident(30) } ;

ct-rpkiRISAVAnnouncement CONTENT-TYPE ::=
     { TYPE RISAVAnnouncement
       IDENTIFIED BY id-ct-risav }

id-ct-risav OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840)
    rsadsi(113549) pkcs(1) pkcs-9(9) id-smime(16) id-ct(1) risav(TDB2) }

RISAVAnnouncement ::= SEQUENCE {
  version [0] INTEGER DEFAULT 0,
  asID ASID,
  contactIP SEQUENCE (SIZE(1..2)) OF IPAddressFamily,
  testing BOOLEAN DEFAULT FALSE }

ASID ::= INTEGER
END
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>version: The version number of RISAVAnnouncement here <bcp14>MUST</bcp14> be 0.</t>
          </li>
          <li>
            <t>asID: The asID field contains the AS number of one Autonomous System that is going to support  RISAV.</t>
          </li>
          <li>
            <t>contactIP: Within the IPAddressFamily structure, addressFamily contains the Address Family Identifier (AFI) of an IP address family. Contact IP of RISAV only supports IPv4 and IPv6 but there could be one more IPv4 or IPv6 address.  Therefore, addressFamily <bcp14>MUST</bcp14> be either 0001 or 0002 while addresses are a list of IP addresses. The inherit attribute <bcp14>MUST</bcp14> be prohibited in IPAddressChoice as there is no need to look into the list of historical contactIPs.</t>
          </li>
          <li>
            <t>testing: The "testing" field indicates whether this contact IP is potentially unreliable.  When this field is set to <tt>true</tt>, other ASes <bcp14>MUST</bcp14> fall back to ordinary operation if IKE negotiation fails.  Otherwise, the contact IP is presumed to be fully reliable, and other ASes <bcp14>SHOULD</bcp14> drop all non-RISAV traffic from this AS if IKE negotiation fails (see <xref target="downgrade"/>). So it has the default value of FALSE.</t>
          </li>
        </ul>
        <t>When a participating AS discovers another participating AS (via its general synchronization process of the RPKI database), it initiates an IKEv2 handshake between its own contact IP and the other AS's contact IP.  This handshake <bcp14>MUST</bcp14> include an IKE_AUTH exchange that authenticates both ASes with their RPKI ROA certificates.</t>
        <t>Once this handshake is complete, each AS <bcp14>MUST</bcp14> activate RISAV on all outgoing packets, and <bcp14>SHOULD</bcp14> drop all non-RISAV traffic from the other AS after a reasonable grace period (e.g. 60 seconds).</t>
        <t>RISAV participants add one or more <tt>RISAVAnnouncement</tt>s to the repository of RPKI. The RPKI procedures are otherwise the same as in the traditional RPKI. For more information about RPKI, see <xref target="RFC6480"/>.</t>
      </section>
      <section anchor="disabling-risav">
        <name>Disabling RISAV</name>
        <section anchor="targeted-shutdown">
          <name>Targeted shutdown</name>
          <t>IKEv2 SAs can be terminated on demand using the Delete payload (<xref section="1.4.1" sectionFormat="comma" target="RFC7296"/>).  In ordinary uses of IKEv2, the SAs exist in inbound-outbound pairs, and deletion of one triggers a response deleting the other.</t>
          <t>In RISAV, SAs do not necessarily exist in pairs.  Instead, RISAV's use of IPsec is strictly unidirectional, so deletion does not trigger an explicit response.  Instead, ASes are permitted to delete both inbound and outbound SAs, and deletion of an inbound SA <bcp14>SHOULD</bcp14> cause the other network to retry RISAV negotiation.  If this, or any, RISAV IKEv2 handshake fails with a NO_ADDITIONAL_SAS notification (<xref section="1.3" sectionFormat="comma" target="RFC7296"/>), the following convention applies:</t>
          <ul spacing="normal">
            <li>
              <t>AS $A is said to have signaled a "RISAV shutdown" to $B if it sends NO_ADDITIONAL_SAS on a handshake with no child SAs.</t>
            </li>
            <li>
              <t>In response, $B <bcp14>MUST</bcp14> halt all further RISAV negotiation to $A until:
              </t>
              <ul spacing="normal">
                <li>
                  <t>At least one hour has passed, OR</t>
                </li>
                <li>
                  <t>$A negotiates a new SA from $A to $B.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>After at most 24 hours, $B <bcp14>SHOULD</bcp14> resume its regular negotiation policy with $A.</t>
            </li>
          </ul>
          <t>This convention enables participating ASes to shut down RISAV with any other AS, by deleting all SAs and rejecting all new ones.  It also avoids tight retry loops after a shutdown has occurred, but ensures that RISAV is retried at least once a day.</t>
        </section>
        <section anchor="total-shutdown">
          <name>Total shutdown</name>
          <t>To disable RISAV entirely, a participating AS <bcp14>MUST</bcp14> perform the following steps in order:</t>
          <ol spacing="normal" type="1"><li>
              <t>Apply a targeted shutdown (<xref target="targeted-shutdown"/>) to all other networks and delete all existing SAs.
  - Note that the shutdown procedure can fail if another network's ACS is unreachable.</t>
            </li>
            <li>
              <t>Stop requiring RISAV authentication of incoming packets.</t>
            </li>
            <li>
              <t>Remove the <tt>RISAVAnnouncement</tt> from the RPKI Repository.</t>
            </li>
            <li>
              <t>Wait at least 24 hours.</t>
            </li>
            <li>
              <t>Shut down the contact IP.</t>
            </li>
          </ol>
          <t>Conversely, if any AS no longer publishes a <tt>RISAVAnnouncement</tt>, other ASes <bcp14>MUST</bcp14> immediately stop sending RISAV to that AS, but <bcp14>MUST NOT</bcp14> delete any active Tunnel Mode SAs for at least 24 hours, in order to continue to process encrypted incoming traffic.</t>
          <ul empty="true">
            <li>
              <t>TODO: Discuss changes to the contact IP, check if there are any race conditions between activation and deactivation, IKEv2 handshakes in progress, SA expiration, etc.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="green-channel">
        <name>Green Channel</name>
        <t>In the event of a misconfiguration or loss of state, it is possible that a negotiated SA could become nonfunctional before its expiration time.  For example, if one AS is forced to reset its ACS and ASBRs, it may lose the private keys for all active RISAV SAs.  If RISAV were applied to the IKEv2 traffic used for bootstrapping, the participating ASes would be unable to communicate until these broken SAs expire, likely after multiple hours or days.</t>
        <t>To ensure that RISAV participants can rapidly recover from this error state, RISAV places control plane traffic in a "green channel" that is exempt from RISAV's protections.  This "channel" is defined by two requirements:</t>
        <ul spacing="normal">
          <li>
            <t>RISAV senders <bcp14>MUST NOT</bcp14> add RISAV protection to packets to or from any announced contact IP</t>
          </li>
          <li>
            <t>RISAV recipients <bcp14>MUST NOT</bcp14> enforce RISAV validation on packets sent to or from any announced contact IP.</t>
          </li>
        </ul>
        <t>Although the green channel denies RISAV protection to the ACS, the additional mitigations described in <xref target="data-plane"/> ensure that the ACS has limited exposure to address-spoofing and DDoS attacks. In addition, the ACS can use the IKEv2 COOKIE (<xref section="2.6" sectionFormat="of" target="RFC7296"/>) and PUZZLE (<xref target="RFC8019"/>) systems to reject attacks based on source address spoofing.</t>
      </section>
    </section>
    <section anchor="data-plane">
      <name>Data Plane</name>
      <t>All the ASBRs of the AS are <bcp14>REQUIRED</bcp14> to enable RISAV.  The destination ASBR uses the IPsec SPI, destination address, and source address to locate the correct SA.</t>
      <t>As defined in <xref target="RFC4301"/>, the Security Association Database (SAD) stores all the SAs. Each data item in the SAD includes a cryptographic algorithm (e.g. HMAC-SHA-256), its corresponding key, and other relevant parameters.</t>
      <t>When an outgoing packet arrives at the source ASBR, its treatment depends on the source and destination address. If the source address belongs to the AS in which the ASBR is located, and the destination address is in an AS for which the ASBR has an active RISAV SA, then the packet needs to be modified for RISAV.</t>
      <t>The modification that is applied depends on whether IPsec "transport mode" or "tunnel mode" is active.  RISAV implementations <bcp14>MUST</bcp14> support transport mode, and <bcp14>MAY</bcp14> support tunnel mode.  The initiator chooses the mode by including or omitting the USE_TRANSPORT_MODE notification in the IKEv2 handshake, retrying in the other configuration if necessary.</t>
      <t>When a packet arrives at the destination ASBR, it will check the destination address and the source address. If the destination belongs to the AS in which the destination ASBR is located, and the source address is in an AS with which this AS has an active RISAV SA, then the packet is subject to RISAV processing.</t>
      <t>To avoid DoS attacks, participating ASes <bcp14>MUST</bcp14> drop any outgoing packet to the contact IP of another AS.  Only the AS operator's systems (i.e. the ACS and ASBRs) are permitted to send packets to the contact IPs of other ASes.  ASBRs <bcp14>MAY</bcp14> drop inbound packets to the contact IP from non-participating ASes.</t>
      <section anchor="transport-mode">
        <name>Transport Mode</name>
        <t>To avoid conflict with other uses of IPsec (<xref target="conflict"/>), RISAV updates the IPsec Authentication Header (AH) format, converting one RESERVED octet (which is previously required to always be zero) into a new "Scope" field.  The updated format is shown in <xref target="fig2"/>.</t>
        <figure anchor="fig2">
          <name>Updated AH Format.</name>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header   |  Payload Len  |   RESERVED    |     Scope     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Security Parameters Index (SPI)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Sequence Number Field                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                Integrity Check Value-ICV (variable)           |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The "Scope" field identifies the scope of protection for this authentication header, i.e. the entities that are expected to produce and consume it.  Two Scope values are defined:</t>
        <ul spacing="normal">
          <li>
            <t>0: IP.  This is the pre-existing use of the Authentication Header, to authenticate packets from the source IP to the destination IP.</t>
          </li>
          <li>
            <t>1: AS.  This header authenticates the packet from the source AS to the destination AS.</t>
          </li>
        </ul>
        <t>Other Scope values could be defined in the future.</t>
        <t>The AS-scoped AH headers are only for AS-to-AS communication.  Sending ASes <bcp14>MUST NOT</bcp14> add such headers unless the receiving AS has explicitly opted to receive them.  Receiving ASes <bcp14>MUST</bcp14> strip off all such headers for packets whose destination is inside the AS, even if the AS is not currently inspecting the ICV values.</t>
        <t>Transport mode normally imposes a space overhead of 32 octets, no more than general IPsec AH.</t>
        <section anchor="icmp-rewriting">
          <name>ICMP rewriting</name>
          <t>There are several situations in which an intermediate router on the path may generate an ICMP response to a packet, such as a Packet Too Big (PTB) response for Path MTU Discovery, or a Time Exceeded message for Traceroute.  These ICMP responses generally echo a portion of the original packet in their payload.</t>
          <t>An ASBR considers an ICMP payload to match a Transport Mode RISAV SA if:</t>
          <ol spacing="normal" type="1"><li>
              <t>The payload's source address is in this AS, AND</t>
            </li>
            <li>
              <t>The payload's destination address is in the other AS, AND</t>
            </li>
            <li>
              <t>The payload contains a RISAV AH header whose SPI matches the SA's.</t>
            </li>
          </ol>
          <t>When an ASBR observes a matching ICMP response, it <bcp14>MUST</bcp14> forward it to the intended recipient, with the following modifications:</t>
          <ul spacing="normal">
            <li>
              <t>The ASBR <bcp14>MUST</bcp14> remove the RISAV AH header from the payload, so that the echoed payload data matches the packet sent by the original sender.</t>
            </li>
            <li>
              <t>When processing a Packet Too Big message, the ASBR <bcp14>MUST</bcp14> reduce the indicated <tt>MTU</tt> value by the total length of the RISAV AH header.</t>
            </li>
          </ul>
          <t>These changes ensure that RISAV remains transparent to the endpoints, similar to the ICMP rewriting required for Network Address Translation <xref target="RFC5508"/> (though much simpler).</t>
        </section>
      </section>
      <section anchor="tunnel-mode">
        <name>Tunnel Mode</name>
        <t>As RISAV does not require encryption for packet, so it uses ESP-NULL to authenticate the packet in tunnel mode.</t>
        <t>Traditionally, the ESP ICV is computed on the entire ESP packet, excluding the Authentication Data field. Here, in RISAV, the ESP ICV <bcp14>SHOULD</bcp14> be calculated including the IP Source Address at first, following by SPI, Sequence Number, Payload Data, Padding (if present), Pad Length, and Next Header. Destination Address is ignored.</t>
        <t>In tunnel mode, a RISAV sender ASBR wraps each outgoing packet in an ESP payload (<xref target="RFC4303"/>) and sends it as directed by the corresponding SA.  This may require the ASBR to set the Contact IP as the source address, even if it would not otherwise send packets from that address.  (See also "Anycast", <xref target="reliability"/>).</t>
        <t>Tunnel mode imposes a space overhead of 73 octets in IPv6.</t>
      </section>
    </section>
    <section anchor="mtu-handling">
      <name>MTU Handling</name>
      <t>Like any IPsec tunnel, RISAV normally reduces the effective IP Maximum Transmission Unit (MTU) on all paths where RISAV is active.  To ensure standards compliance and avoid operational issues, participating ASes <bcp14>MUST</bcp14> choose a minimum acceptable "inner MTU", and reject any RISAV negotiations whose inner MTU would be lower.</t>
      <t>There are two ways for a participating AS to compute the inner MTU:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Prior knowledge of the outer MTU</strong>.  If a participating AS knows the minimum outer MTU on all active routes to another AS (e.g., from the terms of a transit or peering agreement), it <bcp14>SHOULD</bcp14> use this information to calculate the inner MTU of a RISAV SA with that AS.</t>
        </li>
        <li>
          <t><strong>Estimation of the outer MTU</strong>.  If the outer MTU is not known in advance, the participating ASes <bcp14>MUST</bcp14> estimate and continuously monitor the MTU, disabling the SA if the inner MTU falls below the minimum acceptable value.  An acceptable MTU estimation procedure is described in <xref target="mtu-estimation"/>.</t>
        </li>
      </ol>
      <t>If the minimum acceptable inner MTU is close or equal to a common outer MTU value (e.g., 1500 octets), RISAV will not be usable in its baseline configuration.  To enable larger inner MTUs, participating ASes <bcp14>MAY</bcp14> offer support for AGGFRAG <xref target="RFC9347"/> in the IKEv2 handshake if they are able to deploy it (see <xref target="ts-replay"/>).</t>
      <section anchor="mtu-enforcement">
        <name>MTU Enforcement</name>
        <t>In tunnel mode, RISAV ASBRs <bcp14>MUST</bcp14> treat the tunnel as a single IP hop whose MTU is given by the current (estimated) inner MTU.  Oversize packets that reach the ASBR <bcp14>SHALL</bcp14> generate Packet Too Big (PTB) ICMP responses (or be fragmented forward, in IPv4) as usual.</t>
        <t>In transport mode, RISAV ASBRs <bcp14>SHOULD NOT</bcp14> enforce the estimated inner MTU.  Instead, ASBRs <bcp14>SHOULD</bcp14> add RISAV headers and attempt to send packets as normal, regardless of size.  (This may cause a PTB ICMP response at the current router or a later hop, which is modified and forwarded as described in <xref target="icmp-rewriting"/>.)</t>
        <t>In either mode, the ASBR <bcp14>SHOULD</bcp14> apply TCP MSS clamping <xref section="3.2" sectionFormat="comma" target="RFC4459"/> to outbound packets based on the current estimated inner MTU.</t>
      </section>
      <section anchor="mtu-estimation">
        <name>MTU Estimation</name>
        <t>This section describes an MTU estimation procedure that is considered acceptable for deployment of RISAV.  Other procedures with similar performance may also be acceptable.</t>
        <section anchor="step-1-initial-estimate">
          <name>Step 1: Initial estimate</name>
          <t>To compute an initial estimate, the participating ASes use IKEv2 Path MTU Discovery (PMTUD) <xref section="2.5.2" sectionFormat="comma" target="RFC7383"/> between their ACSes during the IKEv2 handshake.  However, unlike the recommendations in <xref target="RFC7383"/>, the PMTUD process is performed to single-octet granularity.  The IKEv2 handshake only proceeds if the resulting outer MTU estimate is compatible with the minimum acceptable inner MTU when using the intended SA parameters.</t>
        </section>
        <section anchor="step-2-mtu-monitoring">
          <name>Step 2: MTU monitoring</name>
          <t>The initial MTU estimate may not be correct indefinitely:</t>
          <ul spacing="normal">
            <li>
              <t>The Path MTU may change due to a configuration change in either participating AS.</t>
            </li>
            <li>
              <t>The Path MTU may change due to a routing change outside of either AS.</t>
            </li>
            <li>
              <t>The Path MTU may be different for packets to or from different portions of the participating ASes.</t>
            </li>
          </ul>
          <t>To ensure that the MTU estimate remains acceptable, and allow for different MTUs across different paths, each ASBR maintains an MTU estimate for each active SA, and updates its MTU estimate whenever it observes a PTB message.  The ASBR's procedure is as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>Find the matching SA ({icmp-rewriting}) for this PTB message.  If there is none, abort.</t>
            </li>
            <li>
              <t>Check the SA's current estimated outer MTU against the PTB MTU.  If the current estimate is smaller or equal, abort.</t>
            </li>
            <li>
              <t>Perform an outward Traceroute to the PTB payload's destination IP, using packets whose size is the current outer MTU estimate, stopping at the first IP that is equal to the PTB message's sender IP or is inside the destination AS.</t>
            </li>
            <li>
              <t>If a PTB message is received, reduce the current MTU estimate accordingly.</t>
            </li>
            <li>
              <t>If the new estimated inner MTU is below the AS's minimum acceptable MTU, notify the ACS to tear down this SA.</t>
            </li>
          </ol>
          <t>Note that the PTB MTU value is not used, because it could have been forged by an off-path attacker.  To preclude such attacks, all Traceroute and PMTUD probe packets contain at least 16 bytes of entropy, which the ASBR checks in the echoed payload.</t>
          <t>To prevent wasteful misbehaviors and reflection attacks, this procedure is rate-limited to some reasonable frequency (e.g., at most once per minute per SA).</t>
        </section>
      </section>
    </section>
    <section anchor="ts-replay">
      <name>Traffic Selectors and Replay Protection in RISAV</name>
      <t>The IKEv2 configuration protocol is highly flexible, allowing participating ASes to negotiate many different RISAV configurations.  For RISAV, two important IKEv2 parameters are the Traffic Selector (<xref section="2.9" sectionFormat="comma" target="RFC7296"/>) and the Replay Status.</t>
      <ul empty="true">
        <li>
          <t>TODO: Write draft porting Replay Status from RFC 2407 to IKEv2.</t>
        </li>
      </ul>
      <section anchor="disabling-replay-protection">
        <name>Disabling replay protection</name>
        <t>In the simplest RISAV configuration, the sending AS requests creation of a single "Child SA" whose Traffic Selector-initiator (TSi) lists all the IP ranges of the sending AS, and the Traffic Selector-responder (TSr) lists all the IP ranges of the receiving AS.  This allows a single SA to carry all RISAV traffic from one AS to another.  However, this SA is likely to be shared across many ASBRs, and potentially many cores within each ASBR, in both participating ASes.</t>
        <t>It is difficult or impossible for a multi-sender SA to use monotonic sequence numbers, as required for anti-replay defense and Extended Sequence Numbers (ESN) (see <xref section="2.2" sectionFormat="comma" target="RFC4303"/>).  If the sender cannot ensure correctly ordered sequence numbers, it <bcp14>MUST</bcp14> set the REPLAY-STATUS indication to FALSE in the CREATE_CHILD_SA notification, and <bcp14>MUST</bcp14> delete the SA if the recipient does not confirm that replay detection is disabled.</t>
      </section>
      <section anchor="enabling-replay-protection">
        <name>Enabling replay protection</name>
        <t>If the sender wishes to allow replay detection, it can create many Child SAs, one for each of its ASBRs (or each core within an ASBR).  The <bcp14>OPTIONAL</bcp14> <tt>CPU_QUEUES</tt> IKEv2 notification <xref target="I-D.ietf-ipsecme-multi-sa-performance"/> may make this process more efficient.  If the sending ASBRs are used for distinct subsets of the sender's IP addresses, the TSi values <bcp14>SHOULD</bcp14> be narrowed accordingly to allow routing optimizations by the receiver.</t>
        <t>Even if the sender creates many separate SAs, the receiver might not be able to perform replay detection unless each SA is processed by a single receiving ASBR.  In Tunnel Mode, the receiver can route each SA to a specific ASBR using IKEv2 Active Session Redirect (<xref section="5" sectionFormat="comma" target="RFC5685"/>).</t>
        <t>In Transport Mode, assignment of SAs to receiving ASBRs may be possible in cases where each ASBR in the receiving AS is responsible for a distinct subset of its IPs.  To support this configuration, the receiving AS <bcp14>MAY</bcp14> narrow the initial TSr to just the IP ranges for a single ASBR, returning ADDITIONAL_TS_POSSIBLE.  In response, the sending AS <bcp14>MUST</bcp14> reissue the CREATE_CHILD_SA request, with TSr containing the remainder of the IP addresses, allowing the negotiation of separate SAs for each receiving ASBR.</t>
        <t>Future IKEv2 extensions such as Sequence Number Subspaces <xref target="I-D.ponchon-ipsecme-anti-replay-subspaces"/> or Lightweight SAs <xref target="I-D.mrossberg-ipsecme-multiple-sequence-counters"/> may enable more efficient and easily deployed anti-replay configurations for RISAV.</t>
      </section>
      <section anchor="changes-to-as-ip-ranges">
        <name>Changes to AS IP ranges</name>
        <t>If the ACS receives a TSi value that includes IP addresses not owned by the counterpart AS, it <bcp14>MUST</bcp14> reject the SA to prevent IP hijacking.  However, each AS's copy of the RPKI database can be up to 24 hours out of date.  Therefore, when an AS acquires a new IP range, it <bcp14>MUST</bcp14> wait at least 24 hours before including it in a RISAV TSi.</t>
        <t>If a tunnel mode SA is established, the receiving AS <bcp14>MUST</bcp14> drop any packet from the tunnel whose source address is not within the tunnel's TSi.</t>
      </section>
    </section>
    <section anchor="possible-extensions">
      <name>Possible Extensions</name>
      <t>This section presents potential additions to the design.</t>
      <ul empty="true">
        <li>
          <t>TODO: Remove this section once we have consensus on whether these extensions are worthwhile.</t>
        </li>
      </ul>
      <section anchor="header-only-authentication">
        <name>Header-only authentication</name>
        <t>An IPsec Authentication Header authenticates the whole constant part of a packet, including the entire payload. To improve efficiency, we could define an IKE parameter to negotiate a header-only variant of transport mode that only authenticates the IP source address, IP destination address, etc.</t>
        <t>This would likely result in a 10-30x decrease in cryptographic cost compared to standard IPsec.  However, it would also offer no SAV defense against any attacker who can view legitimate traffic.  An attacker who can read a single authenticated packet could simply replace the payload, allowing it to issue an unlimited number of spoofed packets.</t>
      </section>
      <section anchor="time-based-key-rotation">
        <name>Time-based key rotation</name>
        <t>Each IKEv2 handshake negotiates a fixed shared secret, known to both parties. In some cases, it might be desirable to rotate the shared secret frequently:</t>
        <ul spacing="normal">
          <li>
            <t>In transport mode, frequent rotation would limit how long a single packet can be replayed by a spoofing attacker.</t>
          </li>
          <li>
            <t>If the ASBRs are less secure than the ACS, frequent rotation could limit the impact of a compromised ASBR.</t>
          </li>
        </ul>
        <t>However, increasing the frequency of IKEv2 handshakes would increase the burden on the ACS. One alternative possibility is to use a state machine. The state machine runs and triggers the state transition when time is up. The tag is generated in the process of state transition as the side product. The two ACS in peer AS respectively before data transmission will maintain one state machine pair for each bound. The state machine runs simultaneously after the initial state, state transition algorithm, and state transition interval are negotiated, thus they generate the same tag at the same time. Time triggers state transition which means the ACS <bcp14>MUST</bcp14> synchronize the time to the same time base using like NTP defined in <xref target="RFC5905"/>.</t>
        <t>For the tag generation method, it <bcp14>MUST</bcp14> be to specify the initial state and initial state length of the state machine, the identifier of a state machine, state transition interval, length of generated Tag, and Tag. For the SA, they will transfer all these payloads in a secure channel between ACS and ASBRs, for instance, in ESP <xref target="RFC4303"/>. It is <bcp14>RECOMMENDED</bcp14> to transfer the tags rather than the SA for security and efficiency considerations. The initial state and its length can be specified at the Key Exchange Payload with nothing to be changed. The state machine identifier is the SPI value as the SPI value is uniquely in RISAV. The state transition interval and length of generated Tag should be negotiated by the pair ACS, which will need to allocate one SA attribute. The generated Tag will be sent from ACS to ASBR in a secure channel which <bcp14>MAY</bcp14> be, for example, ESP <xref target="RFC4303"/>.</t>
      </section>
      <section anchor="static-negotiation">
        <name>Static Negotiation</name>
        <t>The use of IKEv2 between ASes might be fragile, and creates a number of potential race conditions (e.g. if the RPKI database contents change during the handshake).  It is also potentially costly to implement, requiring O(N^2) network activity for N participating ASes.  If these challenges prove significant, one alternative would be to perform the handshake statically via the RPKI database.  For example, static-static ECDH <xref target="RFC6278"/> would allow ASes to agree on shared secrets simply by syncing the RPKI database.</t>
        <t>Static negotiation makes endpoints nearly stateless, which simplifies the provisioning of ASBRs.  However, it requires inventing a novel IPsec negotiation system, so it seems best to try a design using IKEv2 first.</t>
      </section>
    </section>
    <section anchor="security-consideration">
      <name>Security Consideration</name>
      <section anchor="threat-models">
        <name>Threat models</name>
        <t>In general, RISAV seeks to provide a strong defense against arbitrary active attackers who are external to the source and destination ASes.  However, different RISAV modes and configurations offer different security properties.</t>
        <section anchor="replay-attacks">
          <name>Replay attacks</name>
          <t>When replay detection is disabled, off-path attackers cannot spoof the source IPs of a participating AS, but any attacker with access to valid traffic can replay it (from anywhere), potentially enabling DoS attacks by replaying expensive traffic (e.g. TCP SYNs, QUIC Initials).  ASes that wish to have replay defense must enable it during the IKEv2 handshake (see <xref target="ts-replay"/>).</t>
        </section>
        <section anchor="downgrade">
          <name>Downgrade attacks</name>
          <t>An on-path attacker between two participating ASes could attempt to defeat RISAV by blocking IKEv2 handshakes to the Contact IP of a target AS.  If the AS initiating the handshake falls back to non-RISAV behavior after a handshake failure, this enables the attacker to remove all RISAV protection.</t>
          <t>This vulnerable behavior is required when the "testing" flag is set, but is otherwise discouraged.</t>
        </section>
      </section>
      <section anchor="incremental-benefit-from-partial-deployment">
        <name>Incremental benefit from partial deployment</name>
        <t>RISAV provides significant security benefits even if it is only deployed by a fraction of all ASes.  This is particularly clear in the context of reflection attacks.  If two networks implement RISAV, no one in any other network can trigger a reflection attack between these two networks.  Thus, if X% of ASes (selected at random) implement RISAV, participating ASes should see an X% reduction in reflection attack traffic volume.</t>
      </section>
      <section anchor="compatibility">
        <name>Compatibility</name>
        <section anchor="conflict">
          <name>With end-to-end IPsec</name>
          <t>When RISAV is used in transport mode, there is a risk of confusion between the RISAV AH header and end-to-end AH headers used by applications.  (In tunnel mode, no such confusion is possible.)  This risk is particularly clear during transition periods, when the recipient is not sure whether the sender is using RISAV or not.</t>
          <t>To prevent any such confusion, RISAV's transport mode uses a distinctive Scope value in the Authentication Header.  The receiving AS absorbs (and strips) all AH headers with this scope, and ignores those with any other scope, including ordinary end-to-end AH headers.</t>
        </section>
        <section anchor="with-other-sav-mechanisms">
          <name>With other SAV mechanisms</name>
          <t>RISAV is independent from intra-domain SAV and access-layer SAV, such as <xref target="RFC8704"/> or SAVI <xref target="RFC7039"/>. When these techniques are used together, intra-domain and access-layer SAV checks <bcp14>MUST</bcp14> be enforced before applying RISAV.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="reliability">
        <name>Reliability</name>
        <t>The ACS, represented by a contact IP, must be a high-availability, high-performance service to avoid outages.  There are various strategies to achieve this, including:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Election</strong>. This might be achieved by electing one distinguished ASBR as the ACS. The distinguished ASBR acting as an ACS will represent the whole AS to communicate with peer AS's ACS. This election takes place prior to the IKE negotiation. In this arrangement, an ASBR <bcp14>MUST</bcp14> be a BGP speaker before it is elected as the distinguished ASBR, and a new election <bcp14>MUST</bcp14> replace the ACS if it fails.</t>
          </li>
          <li>
            <t><strong>Anycast</strong>.  The ACS could be implemented as an anycast service operated by all the ASBRs.  Route flapping can be mitigated using IKEv2 redirection (<xref section="4" sectionFormat="comma" target="RFC5685"/>).  Negotiated SAs must be written into a database that is replicated across all ASBRs.</t>
          </li>
        </ul>
      </section>
      <section anchor="MPProblem">
        <name>Synchronizing Multiple ASBRs</name>
        <t>To ensure coherent behavior across the AS, the ACS <bcp14>MUST</bcp14> deliver each SA to all relevant ASBRs in the AS immediately after it is negotiated.  RISAV does not standardize a mechanism for this update broadcast.</t>
        <t>During the SA broadcast, ASBRs will briefly be out of sync.  RISAV recommends a grace period to prevent outages during the update process.</t>
      </section>
      <section anchor="performance">
        <name>Performance</name>
        <t>RISAV requires participating ASes to perform symmetric cryptography on every RISAV-protected packet that they originate or terminate.  This will require significant additional compute capacity that may not be present on existing networks.  However, until most ASes actually implement RISAV, the implementation cost for the few that do is greatly reduced.  For example, if 5% of networks implement RISAV, then participating networks will only need to apply RISAV to 5% of their traffic.</t>
        <t>Thanks to broad interest in optimization of IPsec, very high performance implementations are already available.  For example, as of 2021 an IPsec throughput of 1 Terabit per second was achievable using optimized software on a single server <xref target="INTEL"/>.</t>
      </section>
      <section anchor="nat-scenario">
        <name>NAT scenario</name>
        <t>As all the outer IP header should be the unicast IP address, NAT-traversal mode is not necessary in inter-AS SAV.</t>
      </section>
    </section>
    <section anchor="consistency-with-existing-standards">
      <name>Consistency with Existing Standards</name>
      <section anchor="ipv6">
        <name>IPv6</name>
        <t>RISAV modifies the handling of IPv6 packets as they traverse the network, resulting in novel networking behaviors.  This section describes why those behaviors should not be viewed as violating the requirements of <xref target="RFC8200"/>.</t>
        <section anchor="mtu">
          <name>MTU</name>
          <t><xref section="5" sectionFormat="of" target="RFC8200"/> says:</t>
          <ul empty="true">
            <li>
              <t>IPv6 requires that every link in the Internet have an MTU of 1280 octets or greater.  This is known as the IPv6 minimum link MTU.</t>
            </li>
          </ul>
          <t>RISAV adds ~30-80 octets of overhead to each packet, reducing the effective link MTU.  A naive version of RISAV could violate the 1280-octet rule, when running over a (compliant) path with a Path MTU of 1280 octets.</t>
          <t>This violation is avoided by the requirements described in <xref target="mtu-handling"/>.  The resulting behavior is fully compliant when the underlying Path MTU is stable, and should compensate or disable RISAV within a few seconds if the Path MTU changes.</t>
        </section>
        <section anchor="header-modifications">
          <name>Header modifications</name>
          <t><xref section="4" sectionFormat="of" target="RFC8200"/> says:</t>
          <ul empty="true">
            <li>
              <t>Extension headers (except for the Hop-by-Hop Options header) are not processed, inserted, or deleted by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header.</t>
            </li>
          </ul>
          <t>In "tunnel mode" (<xref target="tunnel-mode"/>), RISAV acts as a classic site-to-site tunnel, potentially adding its own extension headers.  <xref section="4.1" sectionFormat="of" target="RFC8200"/> specifically allows such tunnels, and they are commonly used.</t>
          <t>In "transport mode" (<xref target="transport-mode"/>), a RISAV ASBR does insert a new extension header, which could be viewed as a violation of this guidance.  However, this new extension header is an implementation detail of a lightweight tunnel: it is only added after confirming that another router on the path will remove it, so that its presence is not detectable by either endpoint.  (<xref target="icmp-rewriting"/> adds further requirements to ensure that this header cannot be detected in ICMP responses either.)</t>
        </section>
        <section anchor="ip-address-usage">
          <name>IP address usage</name>
          <t>In some RISAV configurations, it is expected that many ASBRs will decrypt and process packets with the destination IP of the ACS and/or emit packets using the source IP of the ACS.  This can be viewed as replacing the central ACS with an "anycast" service, which is generally considered permissible.</t>
        </section>
      </section>
      <section anchor="rpki-usage">
        <name>RPKI Usage</name>
        <t><xref target="RFC9255"/> describes limits on the use of RPKI certificates for new purposes, including the following excerpts:</t>
        <ul empty="true">
          <li>
            <t>The RPKI was designed and specified to sign certificates for use within the RPKI itself and to generate Route Origin Authorizations (ROAs) [RFC6480] for use in routing. Its design intentionally precluded use for attesting to real-world identity...</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>RPKI-based credentials of INRs <bcp14>MUST NOT</bcp14> be used to authenticate real-world documents or transactions.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>When a document is signed with the private key associated with an RPKI certificate, the signer is speaking for the INRs (the IP address space and AS numbers) in the certificate. ... If the signature is valid, the message content comes from a party that is authorized to speak for that subset of INRs.</t>
          </li>
        </ul>
        <t>RISAV's usage of RPKI key material falls squarely within these limits.  The RPKI signature used in the IKEv2 handshake serves only to confirm that this party is authorized to originate and terminate IP packets using the corresponding IP ranges.  The "identity" of this party is not relevant to RISAV.</t>
      </section>
    </section>
    <section anchor="iana-consideration">
      <name>IANA Consideration</name>
      <ul empty="true">
        <li>
          <t>TODO: Register RISAVAnnouncement.</t>
        </li>
      </ul>
      <section anchor="smi-security-for-smime-cms-content-type-1284011354919161">
        <name>SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)</name>
        <t>Please add the id-mod-rpki-risav-2023 to the SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0) registry (https://www.iana.org/assignments/smi-numbers/smi-numbers.xml#security-smime-0) as follows:</t>
        <artwork><![CDATA[
Decimal    Description                   Specification
---------------------------------------------------------------------
TBD        id-mod-rpki-risav-2023        [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="smi-security-for-smime-cms-content-type-registry">
        <name>SMI Security for S/MIME CMS Content Type registry</name>
        <t>Please add the RISAVAnnouncement to the SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1) registry (https://www.iana.org/assignments/smi-numbers/smi-numbers.xml#security-smime-1) as follows:</t>
        <artwork><![CDATA[
Decimal     Description                    Specification
---------------------------------------------------------------------
TBD         id-ct-risav                    [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="rpki-signed-object-registry">
        <name>RPKI Signed Object registry</name>
        <t>Please add RISAVAnnouncement to the RPKI Signed Object registry (https://www.iana.org/assignments/rpki/rpki.xhtml#signed-objects) as follows:</t>
        <artwork><![CDATA[
Name          OID                          Specification
---------------------------------------------------------------------
RISAV
Announcement  1.2.840.113549.1.9.16.1.TBD  [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="rpki-repository-name-scheme-registry">
        <name>RPKI Repository Name Scheme Registry</name>
        <t>Please add an item for the RISAV Announcement file extension to the "RPKI Repository Name Scheme" registry created by <xref target="RFC6481"/> as follows:</t>
        <artwork><![CDATA[
Filename
Extension  RPKI Object                      Reference
---------------------------------------------------------------------
.ra        RISAVAnnouncement                [RFC-to-be]
]]></artwork>
        <!-- # Acknowledgements -->
<!-- TBD. Russ Housley -->

</section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2410" target="https://www.rfc-editor.org/info/rfc2410" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2410.xml">
          <front>
            <title>The NULL Encryption Algorithm and Its Use With IPsec</title>
            <author fullname="R. Glenn" initials="R." surname="Glenn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="November" year="1998"/>
            <abstract>
              <t>This memo defines the NULL encryption algorithm and its use with the IPsec Encapsulating Security Payload (ESP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2410"/>
          <seriesInfo name="DOI" value="10.17487/RFC2410"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4302.xml">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC5635" target="https://www.rfc-editor.org/info/rfc5635" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5635.xml">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5905.xml">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC6278" target="https://www.rfc-editor.org/info/rfc6278" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6278.xml">
          <front>
            <title>Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax</title>
            <author fullname="J. Herzog" initials="J." surname="Herzog"/>
            <author fullname="R. Khazan" initials="R." surname="Khazan"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes how to use the 'static-static Elliptic Curve Diffie-Hellman key-agreement scheme (i.e., Elliptic Curve Diffie- Hellman where both participants use static Diffie-Hellman values) with the Cryptographic Message Syntax. In this form of key agreement, the Diffie-Hellman values of both the sender and receiver are long-term values contained in certificates. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6278"/>
          <seriesInfo name="DOI" value="10.17487/RFC6278"/>
        </reference>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6481" target="https://www.rfc-editor.org/info/rfc6481" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6481.xml">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7296" target="https://www.rfc-editor.org/info/rfc7296" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8209" target="https://www.rfc-editor.org/info/rfc8209" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8209.xml">
          <front>
            <title>A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests</title>
            <author fullname="M. Reynolds" initials="M." surname="Reynolds"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the Border Gateway Protocol (BGP), as part of an extension to that protocol known as BGPsec. BGP is the standard for inter-domain routing in the Internet; it is the "glue" that holds the Internet together. BGPsec is being developed as one component of a solution that addresses the requirement to provide security for BGP. The goal of BGPsec is to provide full AS path validation based on the use of strong cryptographic primitives. The end entity (EE) certificates specified by this profile are issued to routers within an AS. Each of these certificates is issued under a Resource Public Key Infrastructure (RPKI) Certification Authority (CA) certificate. These CA certificates and EE certificates both contain the AS Resource extension. An EE certificate of this type asserts that the router or routers holding the corresponding private key are authorized to emit secure route advertisements on behalf of the AS(es) specified in the certificate. This document also profiles the format of certification requests and specifies Relying Party (RP) certificate path validation procedures for these EE certificates. This document extends the RPKI; therefore, this document updates the RPKI Resource Certificates Profile (RFC 6487).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8209"/>
          <seriesInfo name="DOI" value="10.17487/RFC8209"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6482" target="https://www.rfc-editor.org/info/rfc6482" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6482.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6482"/>
          <seriesInfo name="DOI" value="10.17487/RFC6482"/>
        </reference>
        <reference anchor="RFC6488" target="https://www.rfc-editor.org/info/rfc6488" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6488.xml">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="RFC9347" target="https://www.rfc-editor.org/info/rfc9347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9347.xml">
          <front>
            <title>Aggregation and Fragmentation Mode for Encapsulating Security Payload (ESP) and Its Use for IP Traffic Flow Security (IP-TFS)</title>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for aggregation and fragmentation of IP packets when they are being encapsulated in Encapsulating Security Payload (ESP). This new payload type can be used for various purposes, such as decreasing encapsulation overhead for small IP packets; however, the focus in this document is to enhance IP Traffic Flow Security (IP-TFS) by adding Traffic Flow Confidentiality (TFC) to encrypted IP-encapsulated traffic. TFC is provided by obscuring the size and frequency of IP traffic using a fixed-size, constant-send-rate IPsec tunnel. The solution allows for congestion control, as well as nonconstant send-rate usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9347"/>
          <seriesInfo name="DOI" value="10.17487/RFC9347"/>
        </reference>
        <reference anchor="RFC4459" target="https://www.rfc-editor.org/info/rfc4459" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4459.xml">
          <front>
            <title>MTU and Fragmentation Issues with In-the-Network Tunneling</title>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>Tunneling techniques such as IP-in-IP when deployed in the middle of the network, typically between routers, have certain issues regarding how large packets can be handled: whether such packets would be fragmented and reassembled (and how), whether Path MTU Discovery would be used, or how this scenario could be operationally avoided. This memo justifies why this is a common, non-trivial problem, and goes on to describe the different solutions and their characteristics at some length. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4459"/>
          <seriesInfo name="DOI" value="10.17487/RFC4459"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="INTEL" target="https://networkbuilders.intel.com/solutionslibrary/3rd-generation-intel-xeon-scalable-processor-achieving-1-tbps-ipsec-with-intel-advanced-vector-extensions-512-technology-guide">
          <front>
            <title>Achieving 1 Tbps IPsec with AVX-512</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC8019" target="https://www.rfc-editor.org/info/rfc8019" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8019.xml">
          <front>
            <title>Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document recommends implementation and configuration best practices for Internet Key Exchange Protocol version 2 (IKEv2) Responders, to allow them to resist Denial-of-Service and Distributed Denial-of-Service attacks. Additionally, the document introduces a new mechanism called "Client Puzzles" that helps accomplish this task.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8019"/>
          <seriesInfo name="DOI" value="10.17487/RFC8019"/>
        </reference>
        <reference anchor="RFC5508" target="https://www.rfc-editor.org/info/rfc5508" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5508.xml">
          <front>
            <title>NAT Behavioral Requirements for ICMP</title>
            <author fullname="P. Srisuresh" initials="P." surname="Srisuresh"/>
            <author fullname="B. Ford" initials="B." surname="Ford"/>
            <author fullname="S. Sivakumar" initials="S." surname="Sivakumar"/>
            <author fullname="S. Guha" initials="S." surname="Guha"/>
            <date month="April" year="2009"/>
            <abstract>
              <t>This document specifies the behavioral properties required of the Network Address Translator (NAT) devices in conjunction with the Internet Control Message Protocol (ICMP). The objective of this memo is to make NAT devices more predictable and compatible with diverse application protocols that traverse the devices. Companion documents provide behavioral recommendations specific to TCP, UDP, and other protocols. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="148"/>
          <seriesInfo name="RFC" value="5508"/>
          <seriesInfo name="DOI" value="10.17487/RFC5508"/>
        </reference>
        <reference anchor="RFC7383" target="https://www.rfc-editor.org/info/rfc7383" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7383.xml">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages. This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-multi-sa-performance" target="https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-multi-sa-performance-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ipsecme-multi-sa-performance.xml">
          <front>
            <title>IKEv2 support for per-resource Child SAs</title>
            <author fullname="Antony Antony" initials="A." surname="Antony">
              <organization>secunet Security Networks AG</organization>
            </author>
            <author fullname="Tobias Brunner" initials="T." surname="Brunner">
              <organization>codelabs GmbH</organization>
            </author>
            <author fullname="Steffen Klassert" initials="S." surname="Klassert">
              <organization>secunet Security Networks AG</organization>
            </author>
            <author fullname="Paul Wouters" initials="P." surname="Wouters">
              <organization>Aiven</organization>
            </author>
            <date day="22" month="October" year="2023"/>
            <abstract>
              <t>This document defines two Notify Message Type Payloads for the Internet Key Exchange Protocol Version 2 (IKEv2) to support the negotiation of multiple Child SAs with the same Traffic Selectors used on different resources, such as CPUs, to increase bandwidth of IPsec traffic between peers. The SA_RESOURCE_INFO notification is used to convey information that the negotiated Child SA and subsequent new Child SAs with the same Traffic Selectors are a logical group of Child SAs where most or all of the Child SAs are bound to a specific resource, such as a specific CPU. The TS_MAX_QUEUE notify conveys that the peer is unwilling to create more additional Child SAs for this particular negotiated Traffic Selector combination. Using multiple Child SAs with the same Traffic Selectors has the benefit that each resource holding the Child SA has its own Sequence Number Counter, ensuring that CPUs don't have to synchronize their crypto state or disable their packet replay protection.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-multi-sa-performance-02"/>
        </reference>
        <reference anchor="RFC5685" target="https://www.rfc-editor.org/info/rfc5685" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5685.xml">
          <front>
            <title>Redirect Mechanism for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Devarapalli" initials="V." surname="Devarapalli"/>
            <author fullname="K. Weniger" initials="K." surname="Weniger"/>
            <date month="November" year="2009"/>
            <abstract>
              <t>The Internet Key Exchange Protocol version 2 (IKEv2) is a protocol for setting up Virtual Private Network (VPN) tunnels from a remote location to a gateway so that the VPN client can access services in the network behind the gateway. This document defines an IKEv2 extension that allows an overloaded VPN gateway or a VPN gateway that is being shut down for maintenance to redirect the VPN client to attach to another gateway. The proposed mechanism can also be used in Mobile IPv6 to enable the home agent to redirect the mobile node to another home agent. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5685"/>
          <seriesInfo name="DOI" value="10.17487/RFC5685"/>
        </reference>
        <reference anchor="I-D.ponchon-ipsecme-anti-replay-subspaces" target="https://datatracker.ietf.org/api/v1/doc/document/draft-ponchon-ipsecme-anti-replay-subspaces/" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ponchon-ipsecme-anti-replay-subspaces.xml">
          <front>
            <title>IPsec and IKE anti-replay sequence number subspaces for traffic-engineered paths and multi-core processing</title>
            <author fullname="Paul Ponchon"/>
            <author fullname="Mohsin Shaikh"/>
            <author fullname="Hadi Dernaika"/>
            <author fullname="Pierre Pfister"/>
            <author fullname="Guillaume Solignac"/>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>This document discusses the challenges of running IPsec with anti-
   replay in multi-core environments where packets may be re-ordered
   (e.g., when sent over multiple IP paths, traffic-engineered paths
   and/or using different QoS classes).  A new solution based on
   splitting the anti-replay sequence number space into multiple
   different sequencing subspaces is proposed.  Since this solution
   requires support on both parties, an IKE extension is proposed in
   order to negotiate the use of the anti-replay sequence number
   subspaces.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ponchon-ipsecme-anti-replay-subspaces-03"/>
        </reference>
        <reference anchor="I-D.mrossberg-ipsecme-multiple-sequence-counters" target="https://datatracker.ietf.org/doc/html/draft-mrossberg-ipsecme-multiple-sequence-counters-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.mrossberg-ipsecme-multiple-sequence-counters.xml">
          <front>
            <title>Broadening the Scope of Encapsulating Security Payload (ESP) Protocol</title>
            <author fullname="Michael Rossberg" initials="M." surname="Rossberg">
              <organization>Technische Universität Ilmenau</organization>
            </author>
            <author fullname="Steffen Klassert" initials="S." surname="Klassert">
              <organization>secunet Security Networks AG</organization>
            </author>
            <author fullname="Michael Pfeiffer" initials="M." surname="Pfeiffer">
              <organization>Technische Universität Ilmenau</organization>
            </author>
            <date day="15" month="August" year="2023"/>
            <abstract>
              <t>There are certain use cases where the Encapusalating Security Payload (ESP) protocol in its current form cannot reach its maximum potential regarding security, features and performance. Although these scenarios are quite different, the shortcomings could be remedied by three measures: Introducing more fine-grained sub-child-SAs, adapting the ESP header and trailer format, and allowing parts of the transport layer header to be unencrypted. These mechanisms are neither completely interdependent, nor are they entirely orthogonal, as the implementation of one measure does influence the integration of another. Although an independent specification and implementation of these mechanisms is possible, it may be worthwhile to consider a combined solution to avoid a combinatorial explosion of optional features. Therefore, this document does not yet propose a specific change to ESP. Instead, explains the relevant scenarios, details possible modifications of the protocol, collects arguments for (and against) these changes, and discusses their implications.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mrossberg-ipsecme-multiple-sequence-counters-01"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC9255" target="https://www.rfc-editor.org/info/rfc9255" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9255.xml">
          <front>
            <title>The 'I' in RPKI Does Not Stand for Identity</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>There is a false notion that Internet Number Resources (INRs) in the RPKI can be associated with the real-world identity of the 'holder' of an INR. This document specifies that RPKI does not associate to the INR holder.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9255"/>
          <seriesInfo name="DOI" value="10.17487/RFC9255"/>
        </reference>
      </references>
    </references>
    <?line 669?>

<section anchor="appendix-a">
      <name>Summary of Attacks Launched By Spoofing Address</name>
      <t>The malicious attacks that spoofing addresses can launch can be classified into two types: direct attacks and reflection attacks. Regardless of the scenario, the packets sent out by the attacker would use a spoofed IP address as its source address.</t>
      <section anchor="direct-attack">
        <name>Direct Attack</name>
        <t>The packet with a spoofed address will go to the victim directly. These attacks include DoS, DDoS, flooding-based attacks, etc. In this case, it is hard to say whether this action is launched by the user's misconfiguration or a malicious attacker's intent even if SAV is deployed. But SAV could help to locate where the abnormal traffic originates and to stop it as soon as possible.</t>
      </section>
      <section anchor="reflection-attack">
        <name>Reflection Attack</name>
        <t>Attackers would not send packets to victims directly, but they would send packets to a server that runs amplification services, such as DNS, NTP, SNMP, SSDP, and other UDP/TCP-based services. The packet sent to the public server would be multiplicatively amplified and replied to the victim, which would be more destructive than a direct attack. In this case, if SAV is deployed, attackers can almost not launch such attacks.</t>
      </section>
    </section>
    <section anchor="example-risavannouncement-econtent-payload">
      <name>Example RISAVAnnouncement eContent Payload</name>
      <t>TBD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
