<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.15 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-nasr-architecture-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="archi-nasr">the architecture of network attestation for secure routing</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-nasr-architecture-00"/>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="14"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 32?>

<t>This document describes the architecture of Network Attestation for Secure Routing(NASR). In this architecture, there are Three roles defined: attester, validator, and orchestration controller. Its' purpose is to attest to a trusted path and make sure the forwarding complies with the path, including node static security assessment, dynamic security defense, and routing path orchestration, forwarding path and security service consistency validation.</t>
    </abstract>
  </front>
  <middle>
    <?line 36?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the early stages of internet development, users' demand for the network was that access everywhere, but now users demand is to securely connect to everywhere. Users have higher requirements for data privacy and security, which includes both regulations and business requirements, and they are not satisfied with pure encryption-based data security measures that do not have any control over the underlay networks, they want their flows to transport on trusted devices, trusted links, trusted operating environments or trusted services which have been freshly appraised and verified for trustworthiness, avoid any exposure to insecure or untrusted devices.</t>
      <t>At least, the following three parts need to be included.</t>
      <t>1.Security of static nodes: the trustworthy of nodes in the routing path need to be attested; 
2.Routing path defense security: this requires the ability to resist attacks at the routing level, in terms of implementation, it is required that ISPs can match security defense capabilities during routing scheduling;
3.Path Validation: on the premise that a secure path has been formed, ensure that user traffic is indeed forwarded according to the pre-formed path.</t>
      <t>Therefore, this draft attempts to propose an architecture for NASR.</t>
    </section>
    <section anchor="nasr-architecture">
      <name>NASR architecture</name>
      <t>There are three roles in the NASR architecture, attester, orchestration controller and validator. The north-south messages can be classified as control plane, the east-west messages can be classified as data plane. The architecture of NASR involves both control plane and data plane.</t>
      <t>Orchestration controller obtain node information through north-south messages, then orchestrate forwarding paths, When forwarding east-west traffic, it is necessary to ensure that the actual forwarding path is consistent with the planned path, and the actual security services provided are also consistent with the planned ones. Path validation belongs to control plane, and proof of transit belongs to data plane.</t>
      <artwork><![CDATA[
    +--------------------------+      
    | Orchestration Controller |      
    +--------------------------+      
                /   \                 
               /     \                
              /       \               
             /         \              
            /           \             
           /             \            
+------------+           +-----------+
|  Attester  +-----------+ Validator |
+------------+           +-----------+
                        
     Figure 1: NASR architecture
]]></artwork>
      <section anchor="components">
        <name>Components</name>
        <section anchor="attester">
          <name>Attester</name>
          <t>Attester: attested node can provide the trusted and healthy information to the contoller, the attested node consists of two types, one is the Forwarding Function and the other is the Security Function. The security function include the security capabilities that the routing node itself can provide externally, the ability to security resource pool supported by virtualization, and the ability to provide specialized hardware security devices, such as IPS/firewall.</t>
          <t>In Remote ATtestation procedureS (RATS), one peer (the "Attester") produces believable information about itself ("Evidence") to enable a remote peer (the "Relying Party") to decide whether or not to consider that Attester a trustworthy peer, but in NASR attester produces path-level trust attributes, include hardware, software, secure configurations, integrity of routing forwarding table, usable security capabilities and so on to enable the controller to select trusted nodes to form routing paths.</t>
        </section>
        <section anchor="orchestration-controller">
          <name>Orchestration Controller</name>
          <t>Orchestration controller: the controller shouder the responsibility for verifing the authenticity of the information. The controller matches the user's requirements to form a trusted routing path.</t>
          <t>The controller can obtain informations from nodes in the network, matches the user's requirements, implement network programming to form a trusted routing path, and distribute the policies to the forwarding nodes.</t>
        </section>
        <section anchor="validator">
          <name>Validator</name>
          <t>Validator: the validator verifies whether the forwarding path is consistent with the issued routing policy and whether the security service is truly provided, by proof of transit which are tags recorded in data packets.</t>
          <t>After path policy execution or during the execution of routing policies, validator verifies if the path is executed as scheduled and the security service is truly provided.</t>
        </section>
      </section>
      <section anchor="control-plane">
        <name>Control Plane</name>
        <t>The north-south messages can be classified as control plane, path validation belongs to control plane. The control plane involves three functions. Firstly, orchestration controller obtain evidence or attestation result from attested node, after requirement matching and orchestration, a path strategy has been formed. Secondly, the controller issue the path policy to the attested node, such as router. Thirdly, during the forwarding process, cryptographic methods can be used to mark the proof of transit, through the proof of transit, the validator can verify whether the actual forwarded path comply with the distributed path.</t>
        <artwork><![CDATA[
+--------------------------+       +----------+  
| Orchestration Controller +-------+Validator |  
+----------------+---------+       +----------+  
      ^          |                       ^       
      |          |                       |       
      |          |                       |       
 Evidence  Path  |                   Path|       
      |    Distribution              Validation  
      |          |                       |       
+-----|----------v-----------------------|-------+      
| +---+-------------+             +------+------+|
| | Attested  Node  +             +Attested Node||
| +-----------------+             +-------------+|
+------------------------------------------------+
Figure 2: NASR Control plane function
]]></artwork>
      </section>
      <section anchor="data-plane">
        <name>Data Plane</name>
        <t>The east-west messages can be classified as data plane, mainly responsible for forwarding and processing tasks, and POT belongs to data plane. The attested node can be divided into forwarding function and security function. There are three cases for actual data forwarding. 
1, Case1: only forwarding, for each node that a user's data passes through, an immutable label will be added to the data header, which can be represented by POT (FF); 
2, Case2: only provide security services, for each security function node that a user's data passes through, an immutable label will be added to the data header, which can be represented by POT (SF); 
3, Mixture of the first and second cases, which is the actual situation of the current network. The data passes through both the forwarding function node and the security service function node. If it is on the same physical device, it is represented by POT (FF, SF). If it is a separate device, it is identified according to the case1 and case2.</t>
        <artwork><![CDATA[
    +------------+           +------------+            +------------+               
    | Forwarding |  POT(FF1) | Forwarding |  POT(FF2)  | Forwarding |               
===>| Function1  +-----------+ Function2  +------------+ Function3  |==>            
    +------------+           +------\-----+            +--/---------+               
                                     \\                 //                          
                                      \\               //                           
                                       \\ POT(FF2)    // POT(SF2)                           
                                        \\           //                             
                                         \\         //                              
                +-----------+            +-\--------/|              +-----------+   
                | Security  |  POT(SF1)  | Security  |  POT(SF2)    | Security  |   
            ===>| Function1 +------------+ Function2 +--------------+ Function3 |==>
                +-----------+            +-----------+              +-----------+   

                          Figure 3: NASR Data Plane Function                                                                       
]]></artwork>
      </section>
    </section>
    <section anchor="orchestration-controller-1">
      <name>Orchestration Controller</name>
      <t>The orchestration controller includes two major functions, one is orchestrater and the other is the controller. The core function of the orchestrator is to obtain input information and generate corresponding strategies (AI can be considered based on actual situations); The function of the controller is to follow the strategy of the orchestrator and distribute the strategy to the actual nodes.</t>
      <artwork><![CDATA[
                |         |                                            
                |         |                                            
           User's        User's                                        
           Network       Security                                      
           Requirements  Requirments                                   
                |         |                                            
                v         v                                            
             +------------------+                  +------------------+
 Devices'    |                  | Path and Security|                  |
-----------> |  Orchestrater    +----------------> |  Controller      |
 Status      |                  |   Policy         |                  |
             +------------------+                  +--------+---------+
                ^         ^                                 |          
                |         |                            Policy          
            Networks'   Security                       Distribution    
            Conditon    Incidents                           |          
                |         |                                 |          
                |         |                                 v          

                Figure 4: Orchestration controller functions
]]></artwork>
      <t>Path orchestration relies on five types of information collected:
1. The status of the device, such as its availability, health status;
2. The state of the network, such as the level of congestion of the network;
3. Security incidents, such as recent security incidents;
4. User network requirements, such as latency, bandwidth, and budget requirements;
5. The security needs of users, such as the security level.</t>
    </section>
    <section anchor="validator-1">
      <name>Validator</name>
      <t>Path and service verification have two modes, one final node validation mode and the other is intermediate node validation mode.</t>
      <section anchor="final-node-validation-mode">
        <name>Final node validation mode</name>
        <t>After passing through all nodes, the user's traffic data is fed back to the validator with the POT tag made at the last node. After the validator completes the verification, a report is generated and provided to the customer. Customers can obtain actual traffic data from the report to determine whether it has been forwarded along the planned path and whether the network has provided users with predetermined security services.</t>
        <artwork><![CDATA[
                                   +-----------+                 +------+
                                   | Validator +---------------->|      |
                                   +-----------+    Report       |      |
                                         ^                       |      |
                                         |                       |      |
                                         |POT(FF)s               |User  |
                                         |POT(SF)s               |      |
                                         |POT(FF,SF)s            |      |
+----------+       +----------+     +----+-----+                 |      |
| Attested |       | Attested |     | Attested |    traffic      |      |
| Node     +------>| Node     +---->| Node     +---------------->|      |
+----------+       +----------+     +----------+                 +------+

                    Figure 5: Final node validation mode
]]></artwork>
      </section>
      <section anchor="intermediate-node-validation-mode">
        <name>Intermediate node validation mode</name>
        <t>After passing through one or several nodes, the POT is verified. If the verification passes, it continues to be forwarded. If the verification fails, the result is fed back to the orchestration controller. The orchestration controller makes real-time adjustments and sends the strategy to the next node for path control.</t>
        <artwork><![CDATA[
+--------------------------------+                    
| Orchestration Controller       |                    
+-------------------------------++                    
              ^                 |                     
              |                 |                     
              |                 |                     
              |                 |                     
    +---------+-----------+     |             +------+
    |   Validator         |>>>>>>>>>>>>>>>>>>>|      |
    +---------------------+     |    Report   |      |
     ^               ^          |             |      |
     |               |          |             |      |
     |POT(FF)        |POT(FF)   |             |User  |
     |POT(SF)        |POT(SF)   v             |      |
     |POT(FF,SF)     |POT(FF,SF)              |      |
+----+-----+       +-+------------+           |      |
| Attested |       | Attested     |  traffic  |      |
| Node     +------>| Node         +---------->|      |
+----------+       +--------------+           +------+

     Figure 6: Intermediate node validation mode
]]></artwork>
      </section>
    </section>
    <section anchor="trusted-path-procedures">
      <name>Trusted path procedures</name>
      <section anchor="indirect-model">
        <name>Indirect Model</name>
        <t>Indirect Model: the controller Obtains security function information through the attester node, and then send the security informations to validator, after verifying the authenticity of the information, the controller can obtain attestation result. After forming routing policy according to users' requirements, secure path policies can be distributed to routing nodes, the whole process can be seen in Figure2.</t>
        <artwork><![CDATA[
+------------+     +----------+               +-----------+   +------------+
|SecFunction |     | Attester |               | Validator |   | Controller |
+-----+------+     +-----+----+               +-----+-----+   +------+-----+
      |                  |                          |                |
      |               secure                        |                |
      |                boot                         |                |
      |                  |                          |                |
      +------------------>                          |                |
      | aware security   |                          |                |
      | capabilities     |                          |                |
      |                  +-------------------------->                |
      |                  |   security capabilities  |                |
      |                  | & trustworthiness claim  +---------------->
      |                  |                          |Attestation     |
      |                  |                          | Result         |
      |                  |                          |                |
      |                  |                                           |
      |                  <-------------------------------------------+
      |                  |  Secure path routing policy issurance     |

                    
                     Figure 7: Indirect Model
]]></artwork>
        <t>When the network node receives the routing policy, it enable the security functions, then all traffic forwarding will receive security services. During the data forwarding process or after the data forwarding is completed, security validation can be performed on the entire process, including verification of secure paths and verification of whether security services are provided, the final validation results will be given to the controller or present to users.</t>
        <artwork><![CDATA[
+------------+     +----------+           +-----------+       +------------+
|SecFunction |     | Attester |           | Validator |       | Controller |
+-----+------+     +-----+----+           +-----+-----+       +------+-----+
      |                  |                      |                    |
      <------------------+                      |                    |
      |enable SecFunction|                      |                    |
      |----------------->|                      |                    |
      |  ok       traffic forwarding            |                    |
      |                  |                      |                    |
      |                  +---------------------->                    |
      |                  |Secure path validation+--------------------+
      |                  |                      |  Validation Result |

        Figure 8: Path and security service validation Process
]]></artwork>
      </section>
      <section anchor="direct-model">
        <name>Direct Model</name>
        <t>Direct Model: If the security function has a public address, the security function proactively reports its own information to the validator, after verifying the authenticity of the information, the controller can obtain attestation result. After forming routing policy according to users' requirements, secure path policies can be distributed to secfunction, the whole process can be seen in Figure4.</t>
        <artwork><![CDATA[
+-----------+                  +----------+  +----------+
|SecFunction|                  |Validator |  |Controller|
+-----+-----+                  +----+-----+  +----+-----+
      |                             |             |
      |                             |             |
      +---------------------------->|             |
      |security capability report   |             |
      |         +--------+          +------------>|
      |         |Attester|          | attestation |
      |         +---+----+          |   result    |
      |             |                             |
      |<------------+<----------------------------+
      |             |  secure path routing        |
      |             |    policy issurance         |
      |             |                             |

             Figure 9: Direct Model
]]></artwork>
        <t>In the direct model the network node and secfuntion both receive the routing policy, then all traffic forwarding will receive security services. During the data forwarding process or after the data forwarding is completed, security validation can be performed on the entire process, including verification of secure paths and verification of whether security services are provided, the final validation results will be given to the controller or present to users.</t>
        <artwork><![CDATA[
+-----------+  +--------+      +----------+  +----------+
|SecFunction|  |Attester|      |Validator |  |Controller|
+-----+-----+  +----+---+      +----+-----+  +----+-----+
      |             |               |             |
      |             |               |             |
      |             +-------------->|             |
      |             |path validation|             |
      |             |               |             |
      |                             |             |
      +---------------------------->|             |
      |security service validation  +------------->
      |                             |validation   |
      |                             |result       |

  Figure 10: Path and security service validation Process
]]></artwork>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <?line 332?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
