Skip to main content

A SAVI Solution for IP based Satellite Access
draft-jliu-savi-ipsa-00

Document Type Active Internet-Draft (individual)
Authors Jun Liu , Hewu Li , Tianyu Zhang , Qian Wu
Last updated 2024-02-28
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-jliu-savi-ipsa-00
SAVNET Working Group                                              J. Liu
Internet-Draft                                                     H. Li
Intended status: Informational                                  T. Zhang
Expires: 31 August 2024                                            Q. Wu
                                                     Tsinghua University
                                                        28 February 2024

             A SAVI Solution for IP based Satellite Access
                        draft-jliu-savi-ipsa-00

Abstract

   This document presents the source address validation solution for for
   IP based Satellite Access.  This mechanism transfers user states
   through end network collaboration to solve the impact of dynamic
   handover of satellite-ground links on native SAVI.  This document
   mainly describes the operations involved in overcoming the dynamics
   of the access link.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 31 August 2024.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Liu, et al.              Expires 31 August 2024                 [Page 1]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  The threat of IP source address spoofing in satellite access
           scenarios . . . . . . . . . . . . . . . . . . . . . . . .   4
     3.1.  Characteristics of Satellite Access Scenarios . . . . . .   4
     3.2.  source address validation for IP based satellite access
           scenarios . . . . . . . . . . . . . . . . . . . . . . . .   4
     3.3.  Deterioration of existing mobility processing
           mechanism . . . . . . . . . . . . . . . . . . . . . . . .   5
   4.  Design requirements for source address validation for IP based
           satellite access  . . . . . . . . . . . . . . . . . . . .   6
     4.1.  The ability to effectively resist source address
           spoofing  . . . . . . . . . . . . . . . . . . . . . . . .   6
     4.2.  Lightweight signaling interaction . . . . . . . . . . . .   6
     4.3.  High scalability  . . . . . . . . . . . . . . . . . . . .   6
   5.  Specification of SAVI for for IP based satellite access . . .   6
     5.1.  Framework . . . . . . . . . . . . . . . . . . . . . . . .   6
     5.2.  The new binding anchor  . . . . . . . . . . . . . . . . .   8
     5.3.  Semantic extension of IPv6 address based on satellite
           characteristic  . . . . . . . . . . . . . . . . . . . . .   9
     5.4.  Reliable binding migration  . . . . . . . . . . . . . . .   9
     5.5.  Binding clearing  . . . . . . . . . . . . . . . . . . . .   9
   6.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   9
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   9
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   9
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  10
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  10
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  10

1.  Introduction

   Malicious source address spoofing is an important component of
   Distributed Denial of Service (DDoS) attacks.  Source Address
   Validation Improvements (SAVI) [RFC7039][RFC7513][RFC8074] is a key
   technology used in terrestrial Internet to prevent source address
   spoofing.  By listening to the control packets exchanged when the
   host obtains the IP address, a binding relationship between the IP

Liu, et al.              Expires 31 August 2024                 [Page 2]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

   address and the unforgeable link layer attributes (Anchors) is
   established for the terminal on the access device.  And then source
   address validation is performed on the IP data packets, Only packets
   with matching source addresses and bound table entries will be
   forwarded to ensure the authenticity of the source address of data
   packets entering the internet.  However, in the scenario of satellite
   access, the high dynamism of Low Earth Orbit (LEO) satellites keeps
   the anchor away from the user, resulting in the failure of anchor
   binding information.  Each time a handover is made, the satellite
   storing binding information will move away from the corresponding
   user.  So the user needs to perform identity authentication and
   anchor binding again.  Frequent execution of this operation by a
   massive number of global user nodes will generate a signaling storm,
   leading to a sharp decline in the availability of SAVI.

   This document describes the mechanism for the source address
   validation method for IP based satellite access by end-network
   collaboration, considering the dynamic characteristics of satellite
   access scenarios.  This technology requires the decomposition of user
   states in source address validation into collaborative management
   between the network side and user terminals.  When handover occurs,
   the end-network collaboration completes a low-cost secure transfer of
   user states, avoiding anchor mobility caused by dynamic handover of
   satellite-ground links, which leads to a sharp increase in source
   address validation costs and a decrease in availability.  This
   technology requires only one hop signaling interaction between the
   user terminal and the access satellite, without involving the ground
   Network Control Center (NCC) and Inter Satellite Links (ISL)
   [Starlink-ISL], significantly reducing the rebinding delay caused by
   handover.  In addition, due to the fact that the rebinding process
   does not occupy any ISL bandwidth, this method has high scalability
   for satellite access scenarios with a global massive number of users.

2.  Terminology

   Initial access satellite: the satellite that the user terminal
   connects to the satellite Internet for the first time.

   New access satellite: the user terminal reconnects to the satellite
   connected to the satellite Internet after handover.

   Binding anchor: "binding anchor" is defined as the physical and / or
   link layer attributes of the additional device, as defined in
   [RFC7039].  In this document, the binding anchor refers to the
   communication key of the link layer.

   Binding entry: the entry that associates the IP address and MAC
   address with the binding anchor.

Liu, et al.              Expires 31 August 2024                 [Page 3]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

3.  The threat of IP source address spoofing in satellite access
    scenarios

3.1.  Characteristics of Satellite Access Scenarios

   The satellite access scenario has many new network characteristics,
   including the use of ISL, the dynamism of the access link (frequent
   handover between user terminals and LEO satellites will inevitably
   lead to frequent updates of IP addresses), and the openness of
   satellite orbit information (accurate prediction of satellite motion
   can be achieved through calculation).  Due to the global movement of
   satellites, they are mostly in an uncontrolled environment and face
   threats from a large number of malicious hosts distributed around the
   world.  In addition, there is a significant performance gap between
   satellite processors and the ground device, and many terrestrial
   mature solutions are difficult to implement on satellites.

3.2.  source address validation for IP based satellite access scenarios

   The use of ISL in satellite access scenarios increases the
   vulnerability of the network layer.  DDoS attack is one of the most
   common attacks at the network layer.  Due to limited computing
   resources, lack of traceability, and exposure to uncontrolled
   environments, source address spoofing attacks in satellite access
   scenarios are more severe than those in terrestrial networks.  To
   defend against such attacks, the most effective technique in
   terrestrial networks is to filter address spoofing packets and ensure
   that malicious users in the network are located through traceability
   of the source address.  SAVI and other source address validation
   technologies have been deployed in terrestrial networks, and their
   effectiveness has been proven to some extent.  However, due to the
   fragility of satellite constellations described above, SAVI
   technology cannot be directly applied to satellite access scenarios.

   The source address validation scenario for IP based satellite access
   scenario is shown in Figure 1, which is divided into ground segment
   and space segment.  The ground segment includes user terminals,
   authentication servers, and ground gateways connected to the
   Internet.  The space segment consists of satellites with access
   capabilities (using ISL and supporting SAVI).

Liu, et al.              Expires 31 August 2024                 [Page 4]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

               +----------------------------------------+
               |+---------+                 +---------+ |
       Space   ||Satellite|       ISLs      |Satellite| |
       Segment ||  (SAVI) | <-------------> |  (SAVI) | |
               |+----+----+                 +-----+---+ |
               +-----|----------------------------|-----+
                     |                            |
               +-----|----------------------------|-----+
               |+----+----++--------------+   +---+---+ | +--------+
       Ground  ||   User  ||Authentication|<->|Gateway|<->|Internet|
       Segment || Terminal||    Server    |   |Station| | +--------+
               |+---------++--------------+   +-------+ |
               +----------------------------------------+

   Figure 1: The source address validation for IP based satellite access
                                 scenarios.

3.3.  Deterioration of existing mobility processing mechanism

   A SAVI Solution for WLAN [draft-bi-savi-wlan-24] proposes to extend
   CAPWAP protocol by introducing host IP message elements.  When the
   mobile host is disconnected from the original access device on the
   network side, the new access device sends a request to the original
   access device, and the original access device uses this message to
   report the MAC address and IP address to the new access device, so as
   to complete the migration of binding information.  Related draft
   describes that the movement of hosts between APs and ACs can be
   applied to this extension.

   This solution can work effectively in the ground WLAN scenario, but
   it will fail in ISTN due to the extremely fast relative moving speed
   (up to 27000km/hour) between the access device (LEO satellite) and
   the host, and the large moving range (globally).  This document
   refers to the implementation of this solution in ISTN as the anchor
   request.

   Specifically, after the satellite handover, the newly accessed
   satellite sends the anchor request to the satellite where the anchor
   binding information is located.  After obtaining the anchor binding
   information, the binding relationship is added in the local data
   plane, and then the source address validation operation is performed
   locally.  Because the handover frequency of access satellite is
   minute level and the scale is all users, this method will make the
   network face massive state migration signaling overhead.

Liu, et al.              Expires 31 August 2024                 [Page 5]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

4.  Design requirements for source address validation for IP based
    satellite access

4.1.  The ability to effectively resist source address spoofing

   The source address validation for IP based satellite access can
   effectively resist various attacks initiated by malicious users
   through source address spoofing, such as DDoS.  By matching and
   validating the source address of user data packets with anchor
   binding information on the access satellite, packets with forged
   source addresses will be identified and discarded, thus avoiding
   malicious packets from entering the network.

4.2.  Lightweight signaling interaction

   The cost of source address validation for IP based satellite access
   must be within the acceptable range of the devices involved.  When
   satellite handover occurs, the signaling interaction required to
   handle user state transitions should be sufficiently streamlined to
   reduce additional latency and bandwidth waste.  In addition, the
   processing and computational costs of data should also take into
   account the performance limitations of onboard processing devices.

4.3.  High scalability

   The source address validation for IP based satellite access should be
   easy to deploy in a lightweight manner on a large number of globally
   distributed users and satellites, with performance not deteriorating
   with the growth of user and satellite scale, and support incremental
   deployment.

5.  Specification of SAVI for for IP based satellite access

5.1.  Framework

   SAVI for IP based satellite access provides a framework for low-cost
   migration of anchor binding status information in wide area high-
   speed dynamic network scenarios represented by IP based satellite
   access.  In the existing SAVI technology, the user state managed only
   by the network side is decomposed into the collaborative management
   of the user end and the network side, that is, the satellite sends
   the user state (such as the user IP address, MAC address and binding
   anchor) to the user terminal for maintenance, and when the handover
   occurs, the user terminal and the network side infrastructure linkage
   complete the user state transfer.

   The core workflow of SAVI for based satellite access is briefly
   described as follows:

Liu, et al.              Expires 31 August 2024                 [Page 6]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

   a.  Tthe orbit deployment stage

   The satellite uses encryption methods (such as asymmetric encryption
   algorithm) to generate key pairs, binds satellite characteristic
   information (such as satellite ID) with the satellite's own public
   key to form a public key comparison table, distributes it to other
   satellites in the constellation through earth stations or GEO
   satellites, and requests to update the local public key comparison
   table.

   b.  The identity authentication stage

   The corresponding communication key is obtained after successful
   authentication through a specific identity authentication mechanism
   (such as 802.1x).

   c.  The address allocation stage

   This document takes the StateLess Address Autoconfiguration (SLAAC)
   as an example.  The initial access satellite sends the address prefix
   and satellite ID to the user terminal through the extended RA
   message.  The user terminal generates a temporary IPv6 address and
   sends it back to the initial access satellite through the NS message
   for duplicate address detection (DAD).

   d.  The initial binding stage

   After the initial access satellite completes the duplicate address
   detection of the temporary address, the communication key is used as
   the anchor of the source address validation, bound with the user's
   MAC address and IPv6 address to form the binding information, which
   is added to the binding state table (BST) of the initial satellite,
   and the lifetime of this entry is set.  After signing the binding
   information with its own private key, it is sent to the user terminal
   through the extended Na message.

   e.  The rebinding stage

Liu, et al.              Expires 31 August 2024                 [Page 7]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

   After the user terminal switches the new access satellite, it sends
   the signed binding information to the new satellite through the
   extended RS message.  The new access satellite queries the initial
   satellite public key in the local public key comparison table through
   the initial satellite ID parsed from the user's IPv6 address, obtains
   the original binding information after verifying the signature of the
   received information, and then queries the local BST.  If the query
   is successful, Explain that the user terminal has been connected to
   the satellite, reset the lifetime of the entry.  If the query fails,
   match and verify the binding information with the MAC address and
   IPv6 address of the current user terminal.  If the matching passes,
   add it as a new entry to the local BST and set the lifetime.

   The new access satellite informs the user terminal that the
   communication key will be used for subsequent data transmission
   encryption.

5.2.  The new binding anchor

   Unlike existing SAVI solutions that use Ethernet ports or MAC
   addresses as anchors, this document proposes to use the communication
   key of the data link layer as an anchor.  The communication key
   conforms to the characteristic description of the anchor in the SAVI
   framework.  More importantly, the new access satellite can inherit
   the communication key after completing the migration of the anchor
   binding state information, so as to avoid reperforming identity
   authentication and key negotiation to obtain the communication key
   after handover, so that the user terminal only needs to authenticate
   when it accesses the IP based satellite access for the first time.

   The BST of SAVI for IP based satellite access mainly contains fields,
   as shown in Figure 1.

              +------+--------------+------------+---------------+
              |Anchor|  MAC Address |   IPv6 Address    |Lifetime|
              +------+--------------+-------------------+--------+
              |   1  |5489-98f6-16c0|2001:da8:26d:131::1|  6000  |
              +------+--------------+-------------------+--------+
              |   2  |21a5-3659-d721|2001:da8:26d:030::1|  300   |
              +------+--------------+-------------------+--------+

    Figure 2: Example Binding State Table for IP based satellite access.

Liu, et al.              Expires 31 August 2024                 [Page 8]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

5.3.  Semantic extension of IPv6 address based on satellite
      characteristic

   By embedding satellite characteristic information, such as satellite
   ID, into the IPv6 address, it can be used as the stable
   identification of the network side state maintenance equipment when
   the user first accesses.  Any new access satellite can resolve the
   identification from the IP address of the user terminal, so as to
   query the elements required to decrypt the user state of the
   corresponding application.

   The IPv6 address structure of the SAVI for IP based satellite access
   embedded with satellite ID is shown in Figure 3.

                   |   N bits    | M bits | 128-N-M bits |
                   +-------------+--------+--------------+
                   |Global Prefix|  SatID | Interface ID |
                   +-------------+--------+--------------+

             Figure 3: The structure of IPv6 address expanded.

5.4.  Reliable binding migration

   Through encryption and decryption technologies such as asymmetric
   encryption algorithm, the encrypted binding state information is
   stored in the user terminal, and the terminal sends it to the new
   access satellite for decryption verification and rebinding after each
   handover, so as to ensure the security of the user state in the
   process of transferring from the previous access satellite to the new
   access satellite via the user terminal in the clear text
   communication environment without performing identity authentication.

5.5.  Binding clearing

   In order to reduce the storage burden of satellite nodes, the entries
   in the BST will be automatically deleted once the lifetime reaches to
   zero.

6.  Acknowledgements

7.  IANA Considerations

   This memo includes no request to IANA.

8.  References

Liu, et al.              Expires 31 August 2024                 [Page 9]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

8.1.  Normative References

   [RFC7039]  Wu, J., Bi, J., Bagnulo, M., Baker, F., and C. Vogt, Ed.,
              "Source Address Validation Improvement (SAVI) Framework",
              RFC 7039, DOI 10.17487/RFC7039, October 2013,
              <https://www.rfc-editor.org/info/rfc7039>.

   [RFC7513]  Bi, J., Wu, J., Yao, G., and F. Baker, "Source Address
              Validation Improvement (SAVI) Solution for DHCP",
              RFC 7513, DOI 10.17487/RFC7513, May 2015,
              <https://www.rfc-editor.org/info/rfc7513>.

   [RFC8074]  Bi, J., Yao, G., Halpern, J., and E. Levy-Abegnoli, Ed.,
              "Source Address Validation Improvement (SAVI) for Mixed
              Address Assignment Methods Scenario", RFC 8074,
              DOI 10.17487/RFC8074, February 2017,
              <https://www.rfc-editor.org/info/rfc8074>.

8.2.  Informative References

   [draft-bi-savi-wlan-24]
              Bi, J., "A SAVI Solution for WLAN", 2024,
              <https://datatracker.ietf.org/doc/draft-bi-savi-wlan/>.

   [Starlink-ISL]
              "Starlink block v1.5",
              <https://space.skyrocket.de/doc_sdat/starlink-v1-5.html>.

Authors' Addresses

   Jun Liu
   Tsinghua University
   Beijing 100084
   China
   Email: juneliu@tsinghua.edu.cn

   Hewu Li
   Tsinghua University
   Beijing 100084
   China
   Email: lihewu@cernet.edu.cn

   Tianyu Zhang
   Tsinghua University
   Beijing 100084
   China

Liu, et al.              Expires 31 August 2024                [Page 10]
Internet-Draft  A SAVI Solution for IP based Satellite A   February 2024

   Email: ty-zhang20@tsinghua.org.cn

   Qian Wu
   Tsinghua University
   Beijing 100084
   China
   Email: wuqian@cernet.edu.cn

Liu, et al.              Expires 31 August 2024                [Page 11]