<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-idr-bgp-ls-security-capability-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="BGP-LS2C">the extensions of BGP-LS to carry security capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-idr-bgp-ls-security-capability-00"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="06"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <t>The goal is to collect the security capabilities of nodes, which will be one of the factors to form the routing topology, and use the routing programming capabilities to form a secure routing path.</t>
      <t>The BGP-LS protocol is extended to carry the security capabilities of the node. The controller collects topology information, forms a topology path with security capabilities according to security requirements, and supports SRv6 path sending to execute node forwarding through programming.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>SRv6 (Segment Routing IPv6, IPv6 segment routing) is based on source routing and centralized routing. It can realize network intelligent programming and select forwarding paths according to customer needs. At present, there is a lack of effective technical means to inject security factors into the process of collecting network topology and centralized routing to achieve safe routing path forwarding.</t>
      <t>The most important reason for using BGP-LS as the extended basic protocol is that BGP-LS shields the differences of other routing protocols, and the underlying routing protocol types do not need to be considered when transmitting security capabilities.</t>
      <t>RFC7752 standardized North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP, describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol, using a new BGP Network Layer Reachability Information (NLRI) encoding format.</t>
      <t>BGP-LS is a new way to collect network topology. The topology information discovered by the IGP protocol is summarized by the BGP protocol and sent to the upper controller. With the powerful routing and routing capabilities of the BGP protocol, there are three types of BGP-LS routes, which are used to carry node, link and route prefix information respectively. The three routes cooperate with each other to complete the transmission of topology information. The node routing function is to record the node information of the topology, the link routing function is to record the link information between two devices, and the address prefix routing function is to record the network segment information that the node can reach.</t>
      <t>The state information NLRI collected by BGP-LS is described in TLV (type/length/value triplet) format. Each link state described by NLRI can identify a node, link or prefix. Therefore, three types of NLRI are newly set in the standard, of which type 3 and 4 are used to distinguish the prefix of IPv4 and IPv6. There are only two types of NLRI attributes in the original BGP protocol: MP_ REACH_ NLRI, attribute type 14; MP_ UNREACH_ NLRI, attribute type 15.</t>
    </section>
    <section anchor="bgp-ls-node-type-carries-security-capability">
      <name>BGP-LS node type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
                   +----------+
          +--------+Controller+-----------+
          |        +----------+           |
    BGP-LS(Node)                          |
          |                               |
xxxxxxxx|xxxxxxxxx                        |
x         |      x                        |
x   +-----+-+    x                  +-----+-+
x   |Router |    x                  |Router |
x   +----+--+    x                  +-+---+-+
x        |       x                    |   |
x        |       x             +------+   |
x        |       x             |          |
x   +----+----+  x          +---+----+  +--+-----+ 
x   |Security |  x          |Security|  |Security|               
x   |Products |  x          |Products|  |Products|
x   +---------+  x          +--------+  +--------+
xxxxxxxxxxxxxxxxxx  
 
Figure1: Router and attached security products are used as node units
]]></artwork>
      </section>
      <section anchor="new-node-attribute-tlvs">
        <name>New Node Attribute TLVs</name>
        <t>The Local Node Descriptors TLV contains Node Descriptors for the node anchoring the local end of the link.  This is a mandatory TLV in all three types of NLRIs (node, link, and prefix).</t>
        <artwork><![CDATA[
0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |              Type             |             Length            |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     //              Node Descriptor Sub-TLVs (variable)            //
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

               Figure 2: Local Node Descriptors TLV Format
]]></artwork>
        <t>Node attribute TLVs are the TLVs that may be encoded in the BGP-LS attribute with a Node NLRI.  The following Node Attribute TLVs are defined:</t>
        <artwork><![CDATA[
   +-------------+----------------------+----------+
   |   TLV Code  | Description          |   Length | 
   |    Point    |                      |          | 
   +-------------+----------------------+----------+
   |     263     | Multi-Topology       | variable | 
   |             | Identifier           |          |                   
   |     1024    | Node Flag Bits       |        1 | 
   |     1025    | Opaque Node          | variable | 
   |             | Attribute            |          |                   
   |     1026    | Node Name            | variable | 
   |     1027    | IS-IS Area           | variable | 
   |             | Identifier           |          |                   
   |     1028    | IPv4 Router-ID of    |        4 | 
   |             | Local Node           |          |                   
   |     1029    | IPv6 Router-ID of    |       16 | 
   |             | Local Node           |          |                   
   +-------------+----------------------+----------+
              Table 3: Node Attribute TLVs
]]></artwork>
        <t>The security capability is transferred by adding the security capability attribute to the attributes of the local node.</t>
        <artwork><![CDATA[
   +-------------+----------------------+----------+
   |   TLV Code  | Description          |   Length | 
   |    Point    |                      |          | 
   +-------------+----------------------+----------+
   |     1030    | Node Security        | variable | 
   |             | Capability           |          | 
   +-------------+----------------------+----------+
              Table 4: New Node Attribute TLV
]]></artwork>
      </section>
      <section anchor="usage-of-new-attribute">
        <name>Usage of new attribute</name>
        <t>When programming the routing path, take the security capability requirement as one of the inputs. The description of the security capability requirement can be structured or one-dimensional matrix, which only needs to be consistent with the router's security capability description; There are many routing rules. After introducing security capability requirements, it is necessary to dynamically adjust the security capability as the position of routing rules according to the requirements. The main rule strategies are: ① Select the routing node that meets the security requirements as the forwarding node when the path is reachable; ② Select the shortest path when all the safety requirements are met; ③ When the same path length and security requirements are met, select the path with small load for forwarding.</t>
      </section>
    </section>
    <section anchor="bgp-ls-link-type-carries-security-capability">
      <name>BGP-LS Link type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities-1">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
                   +----------+
          +--------+Controller+-----------+
          |        +----------+           |
          |                               |
          |                               |
xxxxxxxxxxxxxxxxxx                        |
x         |      x                        |
x   +-----+-+    x  BGP-LS(Link)    +-----+-+
x   |Router |----x------------------|Router |
x   +----+--+    x                  +-+---+-+
x        |       x                    |   |
x        |       x             +------+   |
x        |       x             |          |
x   +----+----+  x          +---+----+  +--+-----+ 
x   |Security |  x          |Security|  |Security|               
x   |Products |  x          |Products|  |Products|
x   +---------+  x          +--------+  +--------+
xxxxxxxxxxxxxxxxxx  

Figure 5: The peer node transmits the security capability through the link
]]></artwork>
        <t>The router and its attached security products are the basic units. When collecting status information, only some nodes can directly transmit the node status information to the controller through the BGP-LS protocol. Other nodes that do not directly transmit the node information need to transmit the node information to the direct node to achieve the transmission of security capability information. Therefore, for non direct nodes, It is required to report its own security capability information through the BGP-LS link state data packet.</t>
      </section>
      <section anchor="new-link-attribute-tlvs">
        <name>New Link Attribute TLVs</name>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+
     |  Protocol-ID  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                           Identifier                          |
     |                            (64 bits)                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //               Local Node Descriptors (variable)             //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //               Remote Node Descriptors (variable)            //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                  Link Descriptors (variable)                //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                      Figure 6: The Link NLRI Format
]]></artwork>
        <artwork><![CDATA[
   +-----------+---------------------+--------------+
   |  TLV Code | Description         |  IS-IS TLV   | 
   |   Point   |                     |   /Sub-TLV   | 
   +-----------+---------------------+--------------+
   |    1028   | IPv4 Router-ID of   |   134/---    | 
   |           | Local Node          |              |                  
   |    1029   | IPv6 Router-ID of   |   140/---    | 
   |           | Local Node          |              |                  
   |    1030   | IPv4 Router-ID of   |   134/---    | 
   |           | Remote Node         |              |                  
   |    1031   | IPv6 Router-ID of   |   140/---    | 
   |           | Remote Node         |              |                  
   |    1088   | Administrative      |     22/3     | 
   |           | group (color)       |              |                  
   |    1089   | Maximum link        |     22/9     | 
   |           | bandwidth           |              |                  
   |    1090   | Max. reservable     |    22/10     | 
   |           | link bandwidth      |              |                  
   |    1091   | Unreserved          |    22/11     | 
   |           | bandwidth           |              |                  
   |    1092   | TE Default Metric   |    22/18     | 
   |    1093   | Link Protection     |    22/20     | 
   |           | Type                |              |                  
   |    1094   | MPLS Protocol Mask  |     ---      | 
   |    1095   | IGP Metric          |     ---      | 
   |    1096   | Shared Risk Link    |     ---      | 
   |           | Group               |              |                  
   |    1097   | Opaque Link         |     ---      | 
   |           | Attribute           |              |                  
   |    1098   | Link Name           |     ---      | 
   +-----------+---------------------+--------------+

               Table 7: Link Attribute TLVs
]]></artwork>
        <t>The new attribute describes the link security capability and transmits the link security capability information through this attribute.</t>
        <artwork><![CDATA[
   +-----------+---------------------+--------------+
   |  TLV Code | Description         |  IS-IS TLV   | 
   |   Point   |                     |   /Sub-TLV   | 
   +-----------+---------------------+--------------+
   |    1099   | Link security info  |   ---        |
   +-----------+---------------------+--------------+

            Table 8: New Link Attribute TLVs
]]></artwork>
      </section>
      <section anchor="useage-of-new-attribute">
        <name>Useage of new attribute</name>
        <artwork><![CDATA[
+------+          +------+
|  A   |          |  B   |
+---+--+          +--+---+
    |SCicg A         |
    +--------------->|
    |       SCing B  |
    <----------------+
    |SCing <A,B>     |
    +---------------->
    |                |

Figure 9: Assosiation security capability interaction
]]></artwork>
        <t>The Assosiation security capability depends on the security capability enabled by the node. As a node directly connected to the controller, node B first interacts with the enabled security capability information of the opposite end in a two-way manner, and then the opposite end initiates the transmission of the assosiation security capability information.</t>
        <t>The decision of assosiation security capability can be divided into two situations: one is under the same security domain, and the other is under different security domains. 
1. The decision rules for link security capabilities under different security domains are as follows: SCing represents the enabled security capabilities of a node.
Example: SCing A=[1,0,0,1,0,……]，SCing B=[1,1,0,1,0,……]，SCing Assosiation&lt;A,B&gt; = SCing A &amp;&amp; SCing B</t>
        <t>When the link passes through more than two nodes, it is necessary to logically and operate the security capabilities of all nodes in the path to obtain the link security capabilities.</t>
        <ol spacing="normal" type="1"><li>The decision rules of assosiation security capability in the same security domain are as follows: SCing indicates the security capability of a node that has been enabled.
Example: SCing A=[1,0,0,1,0,......]&amp;#65292;SCing B=[1,1,0,1,0,......]&amp;#65292;SCing Assosiation&lt;A,B&gt; = SCing A || SCing B</li>
        </ol>
        <t>When the link passes through more than two nodes, it is necessary to logically or operate the security capabilities of all nodes in the path to obtain the link security capabilities.</t>
      </section>
    </section>
    <section anchor="bgp-ls-prefix-type-carries-security-capability">
      <name>BGP-LS Prefix type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities-2">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
      +----------+                  +----------+
      +Controller+                  +Controller+  
      +----------+                  +----------+ 
          |                               |
          | AS 100                        |
xxxxxxxxxxxxxxxxxx                        |AS 200
x         |      x                 xxxxxxx|xxxxxxxx
x   +-----+-+    x  BGP-LS(Prefix) x  +-----+-+   x
x   |RouterA|----x-----------------x--|RouterE|   x
x   +----+--+    x                 x  +-+---+-+   x
x        |       x       xxxxxxxxxxx  |   |       x
x        |       x       x     +------+   |       x
x        |       x       x     |          |       x
x   +----+--+    x       x  +---+--+  +--+---+    x
x   |Router |    x       x  |Router|--|Router|    x            
x   +-------+    x       x  +------+  +------+    x
xxxxxxxxxxxxxxxxxx       xxxxxxxxxxxxxxxxxxxxxxxxxx

Figure 10: Security capability is transferred between ASs through Prefix
]]></artwork>
        <t>The router and its attached security products are the basic units. When collecting the status information, only some nodes can directly transmit the node status information to the controller through the BGP-LS protocol. Other nodes that do not directly transmit the node information need to transmit the node information to the directly connected node to achieve the transmission of security capability information. In the figure, nodes A and E are direct connected nodes, which are connected to their respective controllers. Nodes A and E are responsible for collecting the security capabilities of other nodes in their respective fields.</t>
      </section>
      <section anchor="new-link-attribute-tlvs-1">
        <name>New Link Attribute TLVs</name>
        <t>The IPv4 and IPv6 Prefix NLRIs (NLRI Type = 3 and Type = 4) use the same format, as shown in the following figure.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+
     |  Protocol-ID  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                           Identifier                          |
     |                            (64 bits)                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //              Local Node Descriptors (variable)              //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                Prefix Descriptors (variable)                //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

            Figure 11: The IPv4/IPv6 Topology Prefix NLRI Format
]]></artwork>
        <artwork><![CDATA[
   +---------------+----------------------+----------+
   |    TLV Code   | Description          |   Length | 
   |     Point     |                      |          |                 
   +---------------+----------------------+----------+
   |      1152     | IGP Flags            |        1 | 
   |      1153     | IGP Route Tag        |      4*n | 
   |      1154     | IGP Extended Route   |      8*n | 
   |               | Tag                  |          |                 
   |      1155     | Prefix Metric        |        4 |     
   |      1156     | OSPF Forwarding      |        4 |       
   |               | Address              |          |                 
   |      1157     | Opaque Prefix        | variable |  
   |               | Attribute            |          |                 
   +---------------+----------------------+----------+
           Table 12: Prefix Attribute TLVs
]]></artwork>
        <t>An AS has at least one super direct connection node, which has the security capability information of all nodes under the AS. By adding new attributes to Prefix, the security capabilities of the entire AS can be transferred.</t>
        <artwork><![CDATA[
   +---------------+--------------------------+----------+
   |    TLV Code   | Description              |   Length | 
   |     Point     |                          |          |                 
   +---------------+--------------------------+----------+
   |      1158     | AS security capabilities | variable | 
   +---------------+--------------------------+----------+
]]></artwork>
        <t>AS Security capabilities means the security capability information of all nodes under the AS, that is, the security capability information of all nodes is spliced, such as {[IP address (A)+node security capability], [IP address (B)+node security capability]...}.</t>
      </section>
      <section anchor="usage-of-new-attribute-1">
        <name>Usage of new attribute</name>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>







  </back>
  <!-- ##markdown-source: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-->

</rfc>
