<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<rfc
      xmlns:xi="http://www.w3.org/2001/XInclude"
      category="info"
      docName="draft-jliu-savi-ipsa-00"
      ipr="trust200902"
      obsoletes=""
      updates=""
      submissionType="IETF"
      xml:lang="en"
      tocInclude="true"
      tocDepth="4"
      symRefs="true"
      sortRefs="true"
      version="3">

 <front>

   <title abbrev="A SAVI Solution for IP based Satellite Access">A SAVI Solution for IP based Satellite Access
</title>
    <seriesInfo name="Internet-Draft" value="draft-jliu-savi-ipsa-00"/>

    <author fullname="Jun Liu" initials="J." surname="Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street/>
         <city>Beijing 100084</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>juneliu@tsinghua.edu.cn</email>
     </address>
    </author>

    <author fullname="Hewu Li" initials="H." surname="Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street/>
         <city>Beijing 100084</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>lihewu@cernet.edu.cn</email>
     </address>
     </author>

    <author fullname="Tianyu Zhang" initials="T." surname="Zhang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street/>
         <city>Beijing 100084</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>ty-zhang20@tsinghua.org.cn</email>
     </address>
     </author>



    <author fullname="Qian Wu" initials="Q." surname="Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street/>
         <city>Beijing 100084</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>wuqian@cernet.edu.cn</email>
     </address>
     </author>


    <date year="2024"/>

   <area>General</area>
    <workgroup>SAVNET Working Group</workgroup>


   <keyword>SAVI</keyword>




   <abstract>
      <t>This document presents the source address validation solution for for IP based Satellite Access. This mechanism transfers user states through end network collaboration to solve the impact of dynamic handover of satellite-ground links on native SAVI. This document mainly describes the operations involved in overcoming the dynamics of the access link.</t>
    </abstract>
  </front>
  <middle>

<!--1.Introduction-->
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>Malicious source address spoofing is an important component of Distributed Denial of Service (DDoS) attacks. Source Address Validation Improvements (SAVI) <xref target="RFC7039" format="default"></xref><xref target="RFC7513" format="default"></xref><xref target="RFC8074" format="default"></xref> is a key technology used in terrestrial Internet to prevent source address spoofing. By listening to the control packets exchanged when the host obtains the IP address, a binding relationship between the IP address and the unforgeable link layer attributes (Anchors) is established for the terminal on the access device. And then source address validation is performed on the IP data packets, Only packets with matching source addresses and bound table entries will be forwarded to ensure the authenticity of the source address of data packets entering the internet. However, in the scenario of satellite access, the high dynamism of Low Earth Orbit (LEO) satellites keeps the anchor away from the user, resulting in the failure of anchor binding information. Each time a handover is made, the satellite storing binding information will move away from the corresponding user. So the user needs to perform identity authentication and anchor binding again. Frequent execution of this operation by a massive number of global user nodes will generate a signaling storm, leading to a sharp decline in the availability of SAVI.</t>

      <t>This document describes the mechanism for the source address validation method for IP based satellite access by end-network collaboration, considering the dynamic characteristics of satellite access scenarios. This technology requires the decomposition of user states in source address validation into collaborative management between the network side and user terminals. When handover occurs, the end-network collaboration completes a low-cost secure transfer of user states, avoiding anchor mobility caused by dynamic handover of satellite-ground links, which leads to a sharp increase in source address validation costs and a decrease in availability. This technology requires only one hop signaling interaction between the user terminal and the access satellite, without involving the ground Network Control Center (NCC) and Inter Satellite Links (ISL) <xref target="Starlink-ISL" format="default"></xref>, significantly reducing the rebinding delay caused by handover. In addition, due to the fact that the rebinding process does not occupy any ISL bandwidth, this method has high scalability for satellite access scenarios with a global massive number of users.</t>
    </section>

<!--2.Terminology-->
    <section anchor="Terminology" numbered="true" toc="default">
      <name>Terminology</name>
        <t>Initial access satellite: the satellite that the user terminal connects to the satellite Internet for the first time.</t>
        <t>New access satellite: the user terminal reconnects to the satellite connected to the satellite Internet after handover.</t>
        <t>Binding anchor: "binding anchor" is defined as the physical and / or link layer attributes of the additional device, as defined in <xref target="RFC7039" format="default"></xref>. In this document, the binding anchor refers to the communication key of the link layer.</t>
        <t>Binding entry: the entry that associates the IP address and MAC address with the binding anchor.</t>

    </section>

<!--3.Background of SAVI for IP based satellite access-->
   <section numbered="true" toc="default">
      <name>The threat of IP source address spoofing in satellite access scenarios </name>
        

      <section numbered="true" toc="default">
        <name> Characteristics of Satellite Access Scenarios</name>
        <t>The satellite access scenario has many new network characteristics, including the use of ISL, the dynamism of the access link (frequent handover between user terminals and LEO satellites will inevitably lead to frequent updates of IP addresses), and the openness of satellite orbit information (accurate prediction of satellite motion can be achieved through calculation). Due to the global movement of satellites, they are mostly in an uncontrolled environment and face threats from a large number of malicious hosts distributed around the world. In addition, there is a significant performance gap between satellite processors and the ground device, and many terrestrial mature solutions are difficult to implement on satellites.</t> 

      </section>

      <section numbered="true" toc="default">
        <name>source address validation for IP based satellite access scenarios</name>
        <t>The use of ISL in satellite access scenarios increases the vulnerability of the network layer. DDoS attack is one of the most common attacks at the network layer. Due to limited computing resources, lack of traceability, and exposure to uncontrolled environments, source address spoofing attacks in satellite access scenarios are more severe than those in terrestrial networks. To defend against such attacks, the most effective technique in terrestrial networks is to filter address spoofing packets and ensure that malicious users in the network are located through traceability of the source address. SAVI and other source address validation technologies have been deployed in terrestrial networks, and their effectiveness has been proven to some extent. However, due to the fragility of satellite constellations described above, SAVI technology cannot be directly applied to satellite access scenarios.</t>
        <t>The source address validation scenario for IP based satellite access scenario is shown in Figure 1, which is divided into ground segment and space segment. The ground segment includes user terminals, authentication servers, and ground gateways connected to the Internet. The space segment consists of satellites with access capabilities (using ISL and supporting SAVI).</t>
      
      <figure anchor="Source_address_validation_for_ipsa">
      <name>The source address validation for IP based satellite access scenarios.</name>
        <artwork align="center" name="The source address validation for IP based satellite access scenarios." type="" alt=""><![CDATA[

        +----------------------------------------+
        |+---------+                 +---------+ |
Space   ||Satellite|       ISLs      |Satellite| |
Segment ||  (SAVI) | <-------------> |  (SAVI) | |
        |+----+----+                 +-----+---+ |
        +-----|----------------------------|-----+
              |                            |
        +-----|----------------------------|-----+
        |+----+----++--------------+   +---+---+ | +--------+
Ground  ||   User  ||Authentication|<->|Gateway|<->|Internet|
Segment || Terminal||    Server    |   |Station| | +--------+
        |+---------++--------------+   +-------+ |
        +----------------------------------------+

           ]]></artwork>
        </figure>
      
      
      </section>

      <section numbered="true" toc="default">
        <name>Deterioration of existing mobility processing mechanism</name>
        <t>A SAVI Solution for WLAN <xref target="draft-bi-savi-wlan-24" format="default"></xref> proposes to extend CAPWAP protocol by introducing host IP message elements. When the mobile host is disconnected from the original access device on the network side, the new access device sends a request to the original access device, and the original access device uses this message to report the MAC address and IP address to the new access device, so as to complete the migration of binding information. Related draft describes that the movement of hosts between APs and ACs can be applied to this extension.</t>
        <t>This solution can work effectively in the ground WLAN scenario, but it will fail in ISTN due to the extremely fast relative moving speed (up to 27000km/hour) between the access device (LEO satellite) and the host, and the large moving range (globally). This document refers to the implementation of this solution in ISTN as the anchor request. </t>
        <t>Specifically, after the satellite handover, the newly accessed satellite sends the anchor request to the satellite where the anchor binding information is located. After obtaining the anchor binding information, the binding relationship is added in the local data plane, and then the source address validation operation is performed locally. Because the handover frequency of access satellite is minute level and the scale is all users, this method will make the network face massive state migration signaling overhead.</t>

      </section>

    </section>










<!--3.Background of SAVI for IP based satellite access-->
   <section numbered="true" toc="default">
      <name>Design requirements for source address validation for IP based satellite access</name>
        

      <section numbered="true" toc="default">
        <name> The ability to effectively resist source address spoofing</name>

        <t>The source address validation for IP based satellite access can effectively resist various attacks initiated by malicious users through source address spoofing, such as DDoS. By matching and validating the source address of user data packets with anchor binding information on the access satellite, packets with forged source addresses will be identified and discarded, thus avoiding malicious packets from entering the network. </t>

      </section>

      <section numbered="true" toc="default">
        <name>Lightweight signaling interaction</name>
        <t>The cost of source address validation for IP based satellite access must be within the acceptable range of the devices involved. When satellite handover occurs, the signaling interaction required to handle user state transitions should be sufficiently streamlined to reduce additional latency and bandwidth waste. In addition, the processing and computational costs of data should also take into account the performance limitations of onboard processing devices.</t>

      </section>

      <section numbered="true" toc="default">
        <name>High scalability</name>
        <t>The source address validation for IP based satellite access should be easy to deploy in a lightweight manner on a large number of globally distributed users and satellites, with performance not deteriorating with the growth of user and satellite scale, and support incremental deployment.</t>

      </section>
      


    </section>

<!--4.Specification of SAVI for IP based satellite access-->
    <section numbered="true" toc="default">
      <name>Specification of SAVI for for IP based satellite access</name>
      

      <section numbered="true" toc="default">
      <name>Framework</name>
      
      <t>SAVI for IP based satellite access provides a framework for low-cost migration of anchor binding status information in wide area high-speed dynamic network scenarios represented by IP based satellite access. In the existing SAVI technology, the user state managed only by the network side is decomposed into the collaborative management of the user end and the network side, that is, the satellite sends the user state (such as the user IP address, MAC address and binding anchor) to the user terminal for maintenance, and when the handover occurs, the user terminal and the network side infrastructure linkage complete the user state transfer.</t>

      <t>The core workflow of SAVI for based satellite access is briefly described as follows:</t>

      <t>a. Tthe orbit deployment stage</t>
      <t>The satellite uses encryption methods (such as asymmetric encryption algorithm) to generate key pairs, binds satellite characteristic information (such as satellite ID) with the satellite's own public key to form a public key comparison table, distributes it to other satellites in the constellation through earth stations or GEO satellites, and requests to update the local public key comparison table.</t>

      <t>b. The identity authentication stage</t>
      <t>The corresponding communication key is obtained after successful authentication through a specific identity authentication mechanism (such as 802.1x).</t>

      <t>c. The address allocation stage</t>
      <t>This document takes the StateLess Address Autoconfiguration (SLAAC) as an example. The initial access satellite sends the address prefix and satellite ID to the user terminal through the extended RA message. The user terminal generates a temporary IPv6 address and sends it back to the initial access satellite through the NS message for duplicate address detection (DAD).</t>

      <t>d. The initial binding stage</t>
      <t>After the initial access satellite completes the duplicate address detection of the temporary address, the communication key is used as the anchor of the source address validation, bound with the user's MAC address and IPv6 address to form the binding information, which is added to the binding state table (BST) of the initial satellite, and the lifetime of this entry is set. After signing the binding information with its own private key, it is sent to the user terminal through the extended Na message.</t>

      <t>e. The rebinding stage</t>
      <t>After the user terminal switches the new access satellite, it sends the signed binding information to the new satellite through the extended RS message. The new access satellite queries the initial satellite public key in the local public key comparison table through the initial satellite ID parsed from the user's IPv6 address, obtains the original binding information after verifying the signature of the received information, and then queries the local BST. If the query is successful, Explain that the user terminal has been connected to the satellite, reset the lifetime of the entry. If the query fails, match and verify the binding information with the MAC address and IPv6 address of the current user terminal. If the matching passes, add it as a new entry to the local BST and set the lifetime.</t>
      <t>The new access satellite informs the user terminal that the communication key will be used for subsequent data transmission encryption.</t>

      </section>


      <section numbered="true" toc="default">
      <name>The new binding anchor</name>
      
      <t>Unlike existing SAVI solutions that use Ethernet ports or MAC addresses as anchors, this document proposes to use the communication key of the data link layer as an anchor. The communication key conforms to the characteristic description of the anchor in the SAVI framework. More importantly, the new access satellite can inherit the communication key after completing the migration of the anchor binding state information, so as to avoid reperforming identity authentication and key negotiation to obtain the communication key after handover, so that the user terminal only needs to authenticate when it accesses the IP based satellite access for the first time.</t>

      <t>The BST of SAVI for IP based satellite access mainly contains fields, as shown in Figure 1.</t>


      <figure align="center" suppress-title="true">
        <name>Example Binding State Table for IP based satellite access.</name>
          <artwork align="center"><![CDATA[

      +------+--------------+------------+---------------+
      |Anchor|  MAC Address |   IPv6 Address    |Lifetime|
      +------+--------------+-------------------+--------+
      |   1  |5489-98f6-16c0|2001:da8:26d:131::1|  6000  |
      +------+--------------+-------------------+--------+
      |   2  |21a5-3659-d721|2001:da8:26d:030::1|  300   |
      +------+--------------+-------------------+--------+

        ]]></artwork>
              <!-- <postamble>Figure 2: DHCPv6 general model and its possible extensions.</postamble> -->
      </figure>
 
      </section>
      
      <section numbered="true" toc="default">
      <name>Semantic extension of IPv6 address based on satellite characteristic</name>
      <t>By embedding satellite characteristic information, such as satellite ID, into the IPv6 address, it can be used as the stable identification of the network side state maintenance equipment when the user first accesses. Any new access satellite can resolve the identification from the IP address of the user terminal, so as to query the elements required to decrypt the user state of the corresponding application.</t>
      
      <t>The IPv6 address structure of the SAVI for IP based satellite access embedded with satellite ID is shown in Figure 3.</t>

      <figure align="center" suppress-title="true">
        <name>The structure of IPv6 address expanded.</name>
          <artwork align="center"><![CDATA[

      
  |   N bits    | M bits | 128-N-M bits |
  +-------------+--------+--------------+
  |Global Prefix|  SatID | Interface ID |
  +-------------+--------+--------------+
      

        ]]></artwork>
              <!-- <postamble>Figure 1: DHCPv6 general model and its possible extensions.</postamble> -->
      </figure>
      
      </section>

      <section numbered="true" toc="default">
      <name>Reliable binding migration</name>
      <t>Through encryption and decryption technologies such as asymmetric encryption algorithm, the encrypted binding state information is stored in the user terminal, and the terminal sends it to the new access satellite for decryption verification and rebinding after each handover, so as to ensure the security of the user state in the process of transferring from the previous access satellite to the new access satellite via the user terminal in the clear text communication environment without performing identity authentication.</t>
      
      </section>

      <section numbered="true" toc="default">
      <name>Binding clearing</name>
      <t>In order to reduce the storage burden of satellite nodes, the entries in the BST will be automatically deleted once the lifetime reaches to zero.</t>
      
      </section>

    </section>
   

  

    <section anchor="Acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
    
    </section>
    <!-- Possibly a 'Contributors' section ... -->

   <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <!--
    <section anchor="Security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>All drafts are required to have a security considerations section.
     See <xref target="RFC3552" format="default">RFC 3552</xref> for a guide.</t>
    </section>
    -->
  </middle>
  <!--  *****BACK MATTER ***** -->

 <back>
    <!-- References split into informative and normative -->

   <!-- There are 2 ways to insert reference entries from the citation libraries:
    1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
    2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
       (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

    Both are cited textually in the same manner: by using xref elements.
    If you use the PI option, xml2rfc will, by default, try to find included files in the same
    directory as the including file. You can also define the XML_LIBRARY environment variable
    with a value containing a set of directories to search.  These can be either in the local
    filing system or remote ones accessed by http (http://domain/dir/... ).-->

   <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        
        





        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039">
        <front>
        <title>Source Address Validation Improvement (SAVI) Framework</title>
        <author initials="J." surname="Wu" fullname="J. Wu">
        <organization/>
        </author>
        <author initials="J." surname="Bi" fullname="J. Bi">
        <organization/>
        </author>
        <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
        <organization/>
        </author>
        <author initials="F." surname="Baker" fullname="F. Baker">
        <organization/>
        </author>
        <author initials="C." surname="Vogt" fullname="C. Vogt" role="editor">
        <organization/>
        </author>
        <date year="2013" month="October"/>
        <abstract>
        <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
        </abstract>
        </front>
        <seriesInfo name="RFC" value="7039"/>
        <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>

        
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513">
        <front>
        <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
        <author initials="J." surname="Bi" fullname="J. Bi">
        <organization/>
        </author>
        <author initials="J." surname="Wu" fullname="J. Wu">
        <organization/>
        </author>
        <author initials="G." surname="Yao" fullname="G. Yao">
        <organization/>
        </author>
        <author initials="F." surname="Baker" fullname="F. Baker">
        <organization/>
        </author>
        <date year="2015" month="May"/>
        <abstract>
        <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
        </abstract>
        </front>
        <seriesInfo name="RFC" value="7513"/>
        <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>


        
        <reference anchor="RFC8074" target="https://www.rfc-editor.org/info/rfc8074">
        <front>
        <title>Source Address Validation Improvement (SAVI) for Mixed Address Assignment Methods Scenario</title>
        <author initials="J." surname="Bi" fullname="J. Bi">
        <organization/>
        </author>
        <author initials="G." surname="Yao" fullname="G. Yao">
        <organization/>
        </author>
        <author initials="J." surname="Halpern" fullname="J. Halpern">
        <organization/>
        </author>
        <author initials="E." surname="Levy-Abegnoli" fullname="E. Levy-Abegnoli" role="editor">
        <organization/>
        </author>
        <date year="2017" month="February"/>
        <abstract>
        <t>In networks that use multiple techniques for address assignment, the spoofing of addresses assigned by each technique can be prevented using the appropriate Source Address Validation Improvement (SAVI) methods. This document reviews how multiple SAVI methods can coexist in a single SAVI device and how collisions are resolved when the same binding entry is discovered by two or more methods.</t>
        </abstract>
        </front>
        <seriesInfo name="RFC" value="8074"/>
        <seriesInfo name="DOI" value="10.17487/RFC8074"/>
        </reference>

      </references>

      <references>
        <name>Informative References</name>
        <!-- Here we use entities that we defined at the beginning. -->

      
        <reference anchor="draft-bi-savi-wlan-24" target="https://datatracker.ietf.org/doc/draft-bi-savi-wlan/">
          <front>
            <title>A SAVI Solution for WLAN</title>
            <author initials="J." surname="Bi">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>

      
        <reference anchor="Starlink-ISL" target="https://space.skyrocket.de/doc_sdat/starlink-v1-5.html">
          <front>
            <title>Starlink block v1.5</title>
            <author/>
            <date/>
          </front>
        </reference>






      </references>      
   




      


    </references>
    

 </back>
</rfc>
