Yes, I believe SAVA will have muilti-fence solution, to prevent source address 
spoofing in different grannality.
----- Original Message ----- 
From: "Fan Ye" <[EMAIL PROTECTED]>
To: "Jun Bi" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>; "Mark Williams" <[EMAIL PROTECTED]>; "Pekka Savola" 
<[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL 
PROTECTED]>
Sent: Tuesday, September 12, 2006 11:29 PM
Subject: Re: [SAVA] Re: [Int-area] Call For Participation and Interest: 
SourceAddress Validation Architecture (SAVA)


> I'm curious exactly what is the problem definition for SAVA and what is 
> the threat model. One definition is: given an IP packet at a destination 
> AS, determine (at dest AS router?)  whehter the packet's source IP address 
> is spoofed. This problem is related to several other problems including 
> DDoS attack, IP traceback, but not exactly the same. The threat model and 
> goals can be different. 
> 
> There're many types of threats: attackers control end hosts, attackers can 
> sniffer edge router/backbone traffic, attacker control edge 
> router/backbone router. There're different goals as well: simply determine 
> whether the source IP is correct (what action to take is orthogonal), 
> preventing DDoS attack traffic from reaching end-hosts, identifying the 
> true source AS of such packet.
> 
> As a first step, it helps to clarify exactly what the problem is (and is 
> not), what threats SAVA needs (and need not) to address, what goals it 
> wants to achieve.
> 
> Fan
> 
> [EMAIL PROTECTED] wrote on 09/12/2006 10:31:55 AM:
> 
>> Thank you for your valuable comments. 
>> I am trying to give some explain.
>> 
>> > 
>> > You should clarify what you mean by 'protection for the routing 
>> > infrastructure'.  What are you protecting against?  What do you mean 
>> > by 'protect'?  What do you mean by 'routing infrastructure' -- all 
>> > routers in the internet, or just the router in a particular service 
>> > provider's network?
>> > 
>> 
>>     In my mind, the goal of SAVA is to provid new mechnisms that can
>> be implemented in 
>>     the network equiments (rather than in the end systems) to 
>> provent  source address spoofing. 
>>     The word "protect" here means providing a way for spoofing 
> prevention.
>>     Depending on the solutions, the protection could be in different 
> level.
>>     The partial network (One or multiple ISP networks/enterpise 
>> networks ) who deployes SAVA should be protected. 
>>    Therefore, providing incentives to deploy and supporing the 
>> incremental deployment (partial deployment still works) and  should 
>> be mandoary requirements when we design new solutions.
>> 
>> > If this refers to ensuring that your own routing infrastructure is 
>> > secure, I argue this can already be achieved by appropriate edge 
>> > filtering at your own borders.  See 
>> > draft-savola-rtgwg-backbone-attacks-02.txt and OPSEC WG documents for 
>> > more.
>> 
>> The doucment is related, but I think the problem we stated in SAVA 
>> is not the goals that thoes document wants to resolve. 
>> (at least in section 1.2 of draft-savola-rtgwg-backbone-attacks-02.txt, 
>> it "assumes that the service provider is doing at least
>>    some form of address filtering at its border devices, i.e., by
>>    ensuring that only the infrastructure nodes can use infrastructure
>>    source IP addresses to talk to the other nodes in the infrastructure.
>> ". The assuption is exactly the problem we want to resoulve in SAVA.).
>> 
>> SAVA fouces on IP layer only, aims to reolve source spoofing, then 
>> provide a trustworthy infrastrucure,
>> DDoS attacks is a cross-layer problems, so the DDoS prevention is 
>> out of SAVA's scope.
>> But I think outcome of SAVA WG, providing an infrastuure without 
>> source address spoofing, 
>> will defintely help thoes drafts that study how to prevent DDoS on 
>> routers or hosts.
>> 
>> For the OPSEC documents, see my commets below on ingress filtering and 
> uRPF.
>> 
>> > On the other hand, if this refers to generic routing infrastructure 
>> > security, it isn't obvious how a source address validation proposal 
>> > would significantly improve the current situation.
>> > 
>> 
>> > It is not clear what you mean by 'works'.  You can protect your own 
>> > infrastructure just fine by applying the protection at all of _your_ 
>> > borders.  In most scenarios, that's sufficient, and could be phrased 
>> > as "works".  Or do you have "every packet that enters your network has 
> 
>> > a provably correct source address" as a goal here?
>> 
>>     The word "works" here means the edge network that deploys 
>> ingress filtering will be protected.
>>     Ingress filtering only benifits others, unless all edge networks
>> are deployed, you can't protect yourselve (because you can't make sure 
>> the source address of packets coming from outside world is not 
>> forged). I think this problem is also indicated by OPSEC documents.
>> 
>>  Thelack of incentive will be a key problme for the golabl 
>> deployment of ingress filtering.
>>     Why an edge network deploys ingress filtering to benefit others,
>> that might be why MIT 
>> spoofer project found lots of ASes are spoofalbe.
>> 
>> Thus, ingress filtiering is effective on edge network, but doesn't 
>> support the parial deployment and 
>> lacks of the incentives.
>> 
>> >> b)       uRPF does not work well in places where asymmetric 
>> routing happens. 
>> >> This constitutes a large part of the Internet
>> > 
>> > This is a common misconception.  Maybe you haven't seen RFC 3704 (BCP 
>> > 84) which describes how to do it. For more detail, also look at 
>> > draft-savola-bcp84-urpf-experiences-01.txt.
>> 
>> 
>> I disscussed with Prof. Lixia Zhang on routing table based methods. 
>> We think the routing table bas filitering methods (uRPF and 
>> variations) are somehow dangerous in backbone.
>> because it depends on the routing related problmes such as 
>> stablization/asymmetrion.
>> Routing table based forwarding is OK because if a packet is 
>> forwarded to a wroing path, 
>> it still has chances to be forwarded back to the right path by the 
>> next router. 
>> But wrong filtering table will make the packet dropped.
>> Therefore we think FIB based filtering can resolve part of the 
>> problem , but still doesn't work it all cases.
>> In SAVA, we  hope the  WG members can propose some new solutions in 
>> IPv6 to resovle the problem.
>> 
>> > 
>> > -- 
>> > Pekka Savola                 "You each name yourselves king, yet the
>> > Netcore Oy                    kingdom bleeds."
>> > Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
>> > _______________________________________________
>> > SAVA mailing list
>> > [EMAIL PROTECTED]
>> > http://www.nrc.tsinghua.edu.cn/mailman/listinfo/sava
>> >
>> 
>> _______________________________________________
>> SAVA mailing list
>> [EMAIL PROTECTED]
>> http://www.nrc.tsinghua.edu.cn/mailman/listinfo/sava
>
_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to