Interdomain Routing Working Group Y. Liu Internet-Draft Intended status: Experimental S. Zhang Expires: February 14, 2021 Q. Li S. Peng August 13, 2020 Requirement for the transparency of RPKI draft-ypliu-transparencyrpki-00 Abstract Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on February 14, 2021. Copyright Notice Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect Liu, et al. Expires February 14, 2021 [Page 1] Internet-Draft Requirement for the transparency of RPKI August 2020 to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Transparency Requirements . . . . . . . . . . . . . . . . . . 3 3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 5. References . . . . . . . . . . . . . . . . . . . . . . . . . 5 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6 1. Introduction The certification authority (CA) or independent resource management agency in the RPKI may adversely affect the associated Internet Number Resource (INR) when performing authentication or actions for authentication, such as RFC 8211 [RFC8211]. In Resource Public Key Infrastructure (RPKI) [RFC6480], the operation is called "adverse operation" if its consequence may reduce the amount of Internet Number Resources (INRs) and contrary to the wishes of this INR's owner. There are several forms of adverse operations on objects in the RPKI repository, including Deletion, Suppression, Corruption, Modification, Revocation, and Injection. The adverse operation caused by CA's error or repository operation errors or attacks may be an attack on objects in the RPKI repository [RFC7132]. According to the RPKI specification, even if the INR owner believes that the operation is adverse, the operation will be performed according to the established regulations. For example, RPKI establishes a top-down authoritative architecture based on regional Internet registry (RIRs), which allocates IP address space to the lower level (the upper level allocates to the lower level and the lower level reallocates to the lower level). The security benefits from RPKI are implemented through this architecture. However, in the architecture, CA or resource management agency can unilaterally revoke any IP resources under its control, thus may result in an authority that abuses power. Therefore, it will cause serious security issues, once it is maliciously operated by some authorities. Therefore, we propose to establish a mechanism to increase the transparency of RPKI to curb strong CA or resource management agency. Liu, et al. Expires February 14, 2021 [Page 2] Internet-Draft Requirement for the transparency of RPKI August 2020 2. Transparency Requirements 2.1 the transparency requirements for CA or resource management agencies in RPKI In the current RPKI architecture, any adverse actions taken by a malicious CA or resource management agency are difficult to detect by others. Errors or attacks against CAs or management agency can cause IP addresses to be deleted or invalidated, which may have a significant impact on routing. The main reason for this type of problem is determined by the current architecture of RPKI. The current RPKI architecture has a centralized unilateral authorization, that is, the CA or resource management agency is free to perform any operations (issued, revoked, modified and updated) without any authentication and interaction. At the same time, RPKI's layered architecture gives CAs or resource management agency the ability to unilaterally revoke (or remove) IP prefixes under their control. This has led to concerns about the formation of powerful authorities in RPKI, which have the power to unilaterally operate IP resources and may abuse power. At present, it is difficult to distinguish whether an adverse operation is caused by improper operation of a resource management agency or a legitimate business operation. This draft proposes to reduce the technical risk by improving the operational transparency of RPKI. The current RPKI specification places power entirely in the hands of CAs or resource management agencies. In order to solve this problem, the draft proposes: to add a two-way authorization operation for all operations on objects in the RPKI repository, that is, the CA or the resource management authority needs to obtain the authorization of the INR owner for the Deletion, Suppression, Corruption, Modification, revocation, and Injection operations on the resources owned by the INR holder. This two-way authorization meets the wishes of both the CA or the resource management agency and the INR owner and the agreement between them, and it can restrain the excessive power of the CA or resource management organization, which can operate the INR object arbitrarily without the permission of the INR owner. It is recommended to modify the operation mode of RPKI so that the operations on the INR objects need to meet the wishes of both the operator and the INR owner. 2.2 Transparency requirement for Relying Party in RPKI In RPKI, each RP chooses its own set of trust anchors (TAs), which are specified in section 3 of [RFC8630]. Each RP maintains a local cache of RPKI objects and is consistent with the repository. Section 5 of [RFC6481] describes how to maintain a local cache. The RP needs to verify whether the resource certificate conforms to the configuration file described in Section 4 of [RFC6487]. Section 7.1 Liu, et al. Expires February 14, 2021 [Page 3] Internet-Draft Requirement for the transparency of RPKI August 2020 of [RFC6487] describes the process of verifying certificate resources and syntax that each RP should follow, and Section 7.2 introduces the process of RP performing certificate path verification. In order to verify the ROA, the RP needs to perform all the checks specified in [RFC6488], as well as additional specific verification steps to the ROA. More details on ROA verification are in Section 4 of [RFC6482]. To reduce the risk of RPKI, the RP should be able to detect when the RPKI error caused the BGP route to be incorrectly classified as "invalid". The RP can check if it has received all the objects in the manifest, and if the manifest is valid. If the manifest is invalid, the RP should issue an alert for missing information (as indicated in Section 6.5 of [RFC6486]), and the RP decides to respond to this alert at its discretion. The event that the misconfigured or attacked CA or resource management agency incorrectly adds or destroys the ROA is not transparent. If the resource management agency ensures that its manifest is consistent with the objects in the repository, the RP will not issue an alert. The current RPKI specification does not focus on alerts, but it is important. Although the alerts themselves don't solve the problem, they do indicate that there is a problem and can trigger a mitigation mechanism. There is another important threat to transparency: mirror world attack. In a mirror world attack, the resource management agency in an adversarial RPKI provides a view of the RPKI for some RPs while a different view for other RPs. The current RPKI has no mechanism to prevent such attack. The current RPKI system relies entirely on RPs to acquire, update, and verify all signature objects. Therefore, a RP is very likely to obtain the wrong ROAs due to the wrong operation or misbehavior of the issuer, so it cannot distinguish whether this is an error or a normal operation. Therefore, the current architecture of RPKI determines that it is difficult to defend against malicious operations by CA or resource management agency and more complex collusion attacks. In the current RPKI system, the RP node is considered to be secure and reliable. If the RP is malicious, its connected BGP router can be a victim, causing serious routing security problems and corresponding blocking IP addresses. A malicious RP provides an incorrect manifest of valid ROAs, which causes the router to make an error in the validity of the route origination, and indirectly causes some legitimate IP address traffic to be blocked or redirected. For the above problems, under the current architecture and mechanism of RPKI, it is difficult to distinguish whether the operation on various resource certificate objects is due to the misconfiguration (or the malicious behavior) of the resource management agency, or the normal Liu, et al. Expires February 14, 2021 [Page 4] Internet-Draft Requirement for the transparency of RPKI August 2020 contract between the issuer and the recipient of the resource certificate. At the same time, the current RPKI system makes the load of RPs very heavy. The RPs need to perform the acquisition, verification and synchronization of all resource certificates and ROAs, and also need to interact with the BGP routers connected to them. The reliability, security, and performance of RPs are the bottleneck of the entire RPKI system. 3. IANA Considerations This document makes no request of IANA. Note to RFC Editor: this section may be removed on publication as an RFC. 4. Security Considerations 5. References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629, DOI 10.17487/RFC2629, June 1999, . [RFC6480] Lepinski, M. and S. Kent, "An Infrastructure to Support Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480, February 2012, . [RFC6481] Huston, G., Loomans, R., and G. Michaelson, "A Profile for Resource Certificate Repository Structure", RFC 6481, DOI 10.17487/RFC6481, February 2012, . [RFC6482] Lepinski, M., Kent, S., and D. Kong, "A Profile for Route Origin Authorizations (ROAs)", RFC 6482, DOI 10.17487/RFC6482, February 2012, . [RFC6486] Austein, R., Huston, G., Kent, S., and M. Lepinski, "Manifests for the Resource Public Key Infrastructure (RPKI)", RFC 6486, DOI 10.17487/RFC6486, February 2012, . Liu, et al. Expires February 14, 2021 [Page 5] Internet-Draft Requirement for the transparency of RPKI August 2020 [RFC6487] Huston, G., Michaelson, G., and R. Loomans, "A Profile for X.509 PKIX Resource Certificates", RFC 6487, DOI 10.17487/RFC6487, February 2012, . [RFC6488] Lepinski, M., Chi, A., and S. Kent, "Signed Object Template for the Resource Public Key Infrastructure (RPKI)", RFC 6488, DOI 10.17487/RFC6488, February 2012, . [RFC7132] Kent, S. and A. Chi, "Threat Model for BGP Path Security", RFC 7132, DOI 10.17487/RFC7132, February 2014, . [RFC8211] Kent, S. and D. Ma, "Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI)", RFC 8211, DOI 10.17487/RFC8211, September 2017, . [RFC8360] Huston, G., Michaelson, G., Martinez, C., Bruijnzeels, T., Newton, A., and D. Shaw, "Resource Public Key Infrastructure (RPKI) Validation Reconsidered", RFC 8360, DOI 10.17487/RFC8360, April 2018, . Authors' Addresses Yaping Liu Shuo Zhang Qingyuan Li No. 230, West Waihuan Street. Higher Education Mega Center Guangzhou, Guangdong 510006 China Email: liqingyuan94@live.cn Sufang Liu, et al. Expires February 14, 2021 [Page 6]