<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-nasr-service-model-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="serviceModel-nasr">the service model of NASR</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-nasr-service-model-00"/>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="26"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 32?>

<t>This document describes the service model of Network Attestation for Secure foRwarding (NASR). It lists security capabilities and characteristics of connectivity services that operators can offer and clients can choose from.</t>
    </abstract>
  </front>
  <middle>
    <?line 36?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The NASR goal is to allow clients to choose desired security attributes of his received network service, achieving dependable forwarding by routing on top of only devices that satisfies certain security requirements. NASR then provides proof that packets or flows have traversed a network path with defined security properties.</t>
      <t>The service model enables users to specify their security requirements. The network service provider translates these requirements into network configurations, which are then used to prepare the network for transmission. After delivering the service, the provider returns proof of compliance to the user.</t>
    </section>
    <section anchor="abbreviations">
      <name>Abbreviations</name>
      <t>The following abbreviations are used in this document.</t>
      <t>NVF: Network Functions Virtualization.</t>
      <t>IDS: Intrusion Detection System.</t>
      <t>IPS: Intrusion Prevention System.</t>
      <t>PoT: Proof of Transit.</t>
      <t>SLA: Service Level Expectation.</t>
    </section>
    <section anchor="nasr-service-model">
      <name>NASR service model</name>
      <section anchor="service-model-from-user">
        <name>Service model from user</name>
        <section anchor="source">
          <name>Source</name>
          <t>Users can send requests for service creation, modification and deletion by specifying details such as destination, service type, and security requirements. For example, they define the destination IP, choose the type of service, and set security requirements like integrity, confidentiality, authentication and availability security features.</t>
          <t>The parameters from Users to Providers may involve: source device ID (with unique identifier), service type, destination device ID, security provision, Trusted Path Provision, etc. The detailed parameters for destination and Trusted Path Provision are showed below.</t>
        </section>
        <section anchor="destination">
          <name>Destination</name>
          <t>Destination: Used to indicate the destination of the visit, such as IP address.</t>
          <t>Path: a list of selected router ID list or IP addresses list on Path.</t>
          <t>Sevice type: used to indicate the type of data, such as eMBB data, mMTC data or uRLLC data.</t>
          <t>Geographic: used to indicate users' requirements for geographic location or restrictions, a customer may request certain geographic limits are applied to how the provider routes traffic for the network forwarding, due to policy reasons or security considerations, For example, some countries have regulations that explicitly prohibit data from leaving the country. In such cases, customers may request certain geographic limits be applied to how the provider routes traffic for network forwarding.</t>
        </section>
        <section anchor="trusted-path-provision">
          <name>Trusted Path Provision</name>
          <t>ISPs can provide secure forwarding service by selecting a trusted path for users, including choosing trusted routers that can provide the security services required by the user;</t>
          <t>The trusted path provision includes but is not limited to the following parameters.</t>
          <t>Node Type: NFV or Hardware, this field is used to identify whether the node is of hardware type or virtualization software type, different node types have different security configurations.</t>
          <t>Node Security Configuration: the node's basic security configuration baseline possessed by the node(such as router) itself, include security hardening, attack perception and so on. The security configuration baseline is represented using vectors or sets.</t>
          <artwork><![CDATA[
for example: 
+ Account management and authentication authorization
+ Password management
+ Access control
+ Service and Protocol Management
+ Log and Audit
+ System Security
+ Physical security
+ Data protection
+ ...
]]></artwork>
          <t>L2/L3 Security Feature: used to identify whether to enable authentication and encryption on L2 or L3. L2 authentication can be based on the device's MAC address and encryption can use MACsec; L3 can provide end-to-end authentication and encryption, such as VPN. They can be configured through Boolean values.</t>
          <artwork><![CDATA[
for example:
+ L2 authentication: true
+ L2 encryption: false
+ L3 authentication: true
+ L3 encryption: false
+ ...
]]></artwork>
          <t>Connection Reliability Feature: Maximal occupancy level, Isolation, Diversity.&lt;RFC 9543&gt;. The maximal occupancy level specifies the number of flows to be admitted and optionally a maximum number of countable resource units (e.g., IP or MAC addresses). Isolation refers to the division of traffic , a customer may request that its traffic is isolated from the other network traffic supported by the same provider. Diversity allows connections based on different underlying network constructions.</t>
          <t>Security Services Configuration: Security services that can be provided based on traffic, such as firewall,IDS/IPS,attack-mitigation(anti-DDos), access control, Integrity Protection. Each type of security service requires two SLE parameters, processing latency and performance of security capabilities.</t>
          <artwork><![CDATA[
for example:
+ Security service type: anti-ddos
+ processing latency: 2ms
+ performance of security capabilities: 40G
+ ...
]]></artwork>
        </section>
      </section>
      <section anchor="service-model-to-user">
        <name>service model to user</name>
        <t>When users are very proficient in security configuration and requirements, they can directly fill in a fixed format list, the operator can provide feedback on whether the requirements are met; Users may not be security experts, they will propose vague security requirements, and the ISP generates one or more fixed format lists for users to choose from, there is an additional interaction process with the user here.</t>
      </section>
      <section anchor="service-result-model-to-user">
        <name>Service result model to user</name>
        <t>Path attestation result: after generating a path that meets the specific forwarding requirements of the user, it is used to record the initial path attestation result as a baseline for future verification, contains at least four fields: Identity, initial attestation result, verification reference and auxiliary information (e.g., node type along the path, isolation, firewall, IDS/IPS, etc.).</t>
        <t>Forwarding Path validation result: formed during the actual forwarding process both in-situ and out-of-band modes, it will be verified with path attestation result,  contains at least two fields: Identity, attestation results and auxiliary information (e.g., node type along the path, isolation, firewall, IDS/IPS, etc.).</t>
        <t>Service provision result: as security services can be provided, after the service is provided, need to provide service proof to the user, contains at least two fields: Identity, Service type, Service security details which may include satisfaction of  data integrity, encryption mechanisms, authentication methods and availability percentage (for example, 99.999%), etc.</t>
      </section>
      <section anchor="interaction-process">
        <name>Interaction process</name>
        <t>The service model is used between customers and networks, the customer sends security requirements to the ISP, and the network analyzes and selects the path based on the user's security requirements, which are confirmed by the customer. The network orchestrator configures the network nodes and enables forwarding and service. After forwarding and service are completed, the proof of transit are fed back to the orchestrator, which generates a service result model and finally sends it to the customer.</t>
        <artwork><![CDATA[
+---------+                +------------+                +-----+       
|Customer |                |Orchestrator|                |Node |       
+----+----+                +-----+------+                +--+--+       
     |                           |                          |          
     |1.Request/HTTP             |                          |          
     |(Security Requirements)    |                          |          
     +-------------------------->|                          |          
     |                   +-------+-----+                    |          
     |                   |Specific     |                    |          
     |                   |requirements |                    |          
     |                   |analysis     |                    |          
     |                   +-------+-----+                    |          
     |                           |                          |          
     |                    +------+-----+                    |          
     |                    |Node&Path   |                    |          
     |                    |Selection   |                    |          
     |                    +------+-----+                    |          
     |2.Response/HTTP            |                          |          
     |(Service result model)     |                          |          
     <---------------------------+                          |          
     |----Ack------------------->|  3.Configure/PCEP        |          
     |                           +------------------------> |          
     |                           |(enable security abilities|          
     |                           |                          |          
     |                           |                  +-------+---------+
     |                           |                  |Actual Forwarding|
     |                           |                  |&services        |
     |                           |4.Response/PCEP   +-------+---------+
     |                           |<-------------------------+          
     |                           |Forwarding&Service result |          
     <---------------------------+                          |          
     |5.Service result model     |                          |          
     |                           |                          |          
     |                           |                          |          

     Figure1: Interaction diagram of service model
]]></artwork>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>There is a risk of tampering for Path attestation result and Forwarding Path validation result, especially in the scenario of third-party auditing, it is required that both data transmission and storage cannot be tampered with.</t>
    </section>
  </middle>
  <back>
    <?line 189?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81abW8ctxH+LkD/gYDRRILvzo6cFPClCCpLVqJCcgVLcT8W
vF3uHaHd5XXJPflSN7+9zwzJXe69OLKdFFUC425JzgxnnnndG4/HhwfWyTr/
pyxNrabCNa06PNDLhj9ad/L8+cvnJ4cHmXRToevCiCfibKGye5xrZ5W2Vpva
rZc4evn67uLwQDZKTsWtytpGu/XhwcMcK7VTTa2ceF3Pda1Uo+u5uJP2XlyY
JgO/w4PcZLWsQCVvZOHG2ULV41raZmxVs9KZGlcmV+X4+XPa7LQrSdaFEmFZ
8LIwhXhzevtWQIzZrFGraVy/5tNE8PCglDVkUvXhwf3D9PBAiHEn4PicuPtn
92r9YJocd38icunA7+T5yXfjk/HJn8V4zI+EtqLQZalyqEbI1plKOp3JslyL
2Vq8r8qTpsiELkRtnJjrFTHFtoVpwHgs/I2vlS5JIVBrTaxNA/HOFrqW4trM
dKnoYQZlTsUrpf+GrfzAtLVr1mEnPVGV1OVUkOoqT/KvGa1VTGSSmarneaXF
bfs7MLNtqbe5+P/G0JKcWdfIzNH3uwXUBTu3laqdyJXNGj1Tdo8ZlYP278Wp
cwoAdUCZKEzjgaXw8e2DbHJS2xFZ/HgiLp0otXUWtDz2RCaXEkJpp8EFGIdq
JAkD/FmYyRKfzNS1ypxe0YEgBYkknTBL1UhnGgtCNfYWqvFUSo0L+KfZwhgL
cRpTTeKdK53nJYP6CQGrMXmbkfxeB8ojdG5kSfBxRgAu5qGjigeBKDSkG0Cr
u490DhproRCSnLTZqEwBVbmog7rCDUZCwihqRfrJ1VLVuZyVpLUmag3wbEzr
6CM068ySSJoawM1VogMLzduC9JepxkmgvJOmUf9qIR8Z0078pWDJWiwbs9KQ
nT6AJpNZyuxe4XIwYIHLWrGQK4UAg38bC/Fld4GldAvxoPFPrgrEiuT6oAeL
kDEnUZVD2KiabmlFi8esSLtUmS7WJJdu9klOdDbUF+/QkIi1LaXzMIVR0rNw
ejCJZ4GkQs/bhrFqR+JhobOFQDj0amnpnti+bNQyPOyOErCZU4inE3FaAKVQ
QQnrcrRMnGTEXzoRG+Xapo7qZkhXy1LLGvcAP9pLCpl4QJ5yXNReyKjGwhAE
iY1Ml1l4lht2d6n3MrE37y6mnZ9etHXmD73TjWtlqX9hIrzz8vyWkwASCvnx
uXKKN4vbtXXKe87lzWDPDcQAo41NN+ZuiqVw0TtSmfbC3F6dUtbx5rvC2VK8
fg/zu16KJx6kA8zw8yfdQY8j8mbWmV/FsmlDmvqZoUWeb+FUjAZFMYcsGAln
yIDEdETkdIF8wNeg0AHqir/A/QI4vYvCtUpErpYQY8nz4ZmBSCRLSXbEVPYA
GblUqPcSxvcQWQcXYggkJMXlzSjGGFoiwqTOPnYwD7ebD4LsvSLkqzmtjTzu
c7IVjE4PKMHR1+TecoX7+Vi87skW0BOCOUSPQIRnID050jEb4efoyTcB7VZU
cg3uK1OukMYsGyaELHF5Lo44dLS1hl2ElwrRqzneVGOqju70aBBrVtqy/u+o
DIIP3FBkuumfK5f54OGthx2p9KYZ8CAl7CbETmYX5gErMwU3nETUnffn6VHy
dUqK4Wii65z0vG1jjrxKEA836oB1eSNknkPl0DkrnWSZIvxS5vQYKOEzoE3J
AcEFKvVLTXJW2fCw5rt4/1OddqddrBtIF2GGwkn2EqnrV6/Co+r67ow/Erf2
7dWV/8bkf1Rm3sglQuoO6hzvvx6ilAww7w6J0gQ0GgqYqEl0FsK0FBnMYipc
lqAVPLpLdykNXWnng6JcIsJ6KWC5jXhsOEMjnhfwfR/bh7E+5GCgsOUQvTSl
zoi1tBRATZKq4FyWqMakMvBxC6lDaUYZmnNqo+ZtGcI3p171HqKioCsZ1As9
084rmR2sVHIV00so8lBJ1d48mYSpR51+7CMVNPtk/WzrpnOC3U7DCeP2xkfi
QNkrbVDkRJ+naMvA5hTnGxv2V9Ak/gygEQCVlS0f5OjIeglbvTsElaZMfV4O
1urqxwDFnDjHBPx9DHID9l2gCdxxGBUeVYbUMrBGvR7dIE/3ocanYuQtcce+
9+biHSHoJ6gAauBMwF2KKnOi2jmPj41rlCkKpANGiYz21WU4H9y2QSRJ0zqw
V7huHUjWVB5TXc806GEAZL+SgjqplPoLxKZRnKUbpp1oX0M30gIzuynRIgom
JLyloSBle/3T6aMYcrwtjwWwqsoimj0xI91d1eyhKLlRugrUnZladpHcGkFF
2l1q+z2icJGOmg/lAhmyZVStAEXqK9jTndfAr/g7PCh6/54iQD8Vpxm7JVyv
lnOObT6hbuRY7imDbejYjbSWutfkXKAGvZCsaEtKehIrHyIK93ImM6W4Hhy6
MnNePoVv8ANfkCU9Pvgt1pYa304f9PCcwgwAHqo9ejSZTOJVDw+uTp5dveit
fuHLgelHMGpCjb+rxlB11qy9jfD/1Qlp9+rFhD5t7Cb/RZAiG+Xc/SxiCQGE
XZ+exTy3SZbOQTbagmt+D+qDUICCcOzMWO0wz4BOn/ze3bxhFK2jSBFEdP8F
cDpfiFfGIEjXYiXLVu2DCptp855xmMNLPfupKGRp/fMX+4+82H1kYMCz0Dzj
im8B91jgdYa8lu91BVCYLGuXaEjWyDeozEfi0poylLfn1OGgSFlP/vL24ky8
/O7bFz9416p2nw6Fsw6Tg7qtZoAGQpbvLIERSkA5Aic5HKne8CV4KiM91bZK
zrGDMapgdF9QooBEIjtSk/lkRIUPVJ3gQlkaN8Qr4FQRqlQGkg7xnCqwkOP2
VhmcTohV3IlwoZkwROcETSQNgz8mybjVtsulaVwf5CwyQpdmJ71i/YDBdqMO
Kg067Pfhua1xrOR+JGlpUSr56YUNZV5w1tuY6jZi9e1WLuxS5qyTLk98z9+m
94kCefMBEo/QND5DUzjyIXgMe+o5MzmSwOv4/NzYY5pzpBFtxJM8bkw4mvnr
TsRrCeJ9nzMUMWZriPpgxO3V6yS7jkhk4kBqIbMQDAlTyAhwwIq77JRmOnP6
iLNuqikUznyzPDeW9mxznoqTyi89gvtUfPv8xy2XRUk1HJoAtrHV/UeYUzS+
yAV8uGaEeWg0JdLhzzDbydAKx+o7tJ9k9BzPMio+aU7KU1J8ek/oJvn9yM4P
NOK4bRBTC6XyGWVgcEkrlUGtT8LCXN+HdpEcjIqnWZKdUQWjXo2CPZAsNE6i
Fngl563a3ev6Vpj4odhEpVuThDR9q7kkqgyVm5u3sX1JmQzzyJmZe8M1Aa6I
YKJ9XOJumgaTpMtgdT8Di7WjoHOTjWEFENuWbtuMXCrLZG7qNwJdPFQK1/Cl
MNeg7KGVogEdxxEfX7O0kh7oO/SWxA/Vk0vLShibqg5a1oihGpdb7haHfF32
dRLprGgpbRDuuqkJjxeoz8BmR90KgmaBGO0LWmD8kmsEGjtEftusRgOSPl6r
OhQ9sn0Ph5HNmt9ukBVpTwj9XTEr6PWIb5PoPqMQpVnCLmKJGLJ4NnA8oTl5
/3d4cNHrk22ElK7zoYlIAmgyb7uhH2CBsju1RUTIDHkBQo8R41uf51o3NsV4
Rp8JFZatw2CfRbWCOCNrj1VGYofCKSxu63v7sP3jFUoZKBnR2gG87Y5ObCPx
jIITpO8ctE2WaxXHtLGp7NgR7E2C/Mcq6nYweYrfOlHj8M/Pi/14KzQkPHwP
cQHcfd+ejN6S2rRS2ULW2lZ2awCH0Lgwud0exHFXgzvMlTgq0sHCy5eTly9f
/unY6z2EncvtILV7DB/DwQxVhEJG6ecHJEGoLXwo7qsiGqfa3VE4ah0xuA/I
sURBp1Kufwnvd3yTbztUDUt8strXe3ik43rObeyGobCKQg7fFZgmW9Akyees
WLjbgXQE99hG+HcTiR97iVlzceC/ezVIRbZxhNEwTvFDcOeH4Lyn4MoK2TJo
LBUx3rDPYjIpgJJMQowL7ctlbxVQDwQ7TcTKBjXF03H8eyo2/vql/avx8eHB
h7MIhg+bWz/8PbnJ9ipPD+LjINHTj/HcL9HTVCJPfXNXyvlRS5HQN5O3vu5/
9tPd3c0XEDrqyse3CYaPP5nQwD7Dvx8+TaIduyLxp7t1/XhCH25jQbJvx2MJ
DaLKlxDiqGMR6L5Qot9NRzt2fyahp7+XROyVX3Gh80U6gv397BZh/MsIfdbV
TuC0don+V2157Sc77Xa0Pf50Qn/Z77S7L7VXIjpxitZ6t/e/mMTWXj27OXt9
8xFC+7nuDzE/fCqyj8Lor/85ROx0/9cusp/Q0J/50+cR+nDqy/6+ZfjwmYS+
6krh+OQxhL7tUR9s/5lX24/WBKuPIdRr4qsNR/ojXeS7yc5u+zek/f8B5E5C
gdQF+/Y300Fln2s5b2SV/B4g/lDi126EJC5P35zS4C95NSn+/YSe/qf7oVel
KtO/06pNP/M0fN6/9Cdq6WufIcW4EqjG2YlotL3n2hf9iv95DLUve+YeXND+
ZuuNVofnHlz2at8wWHRHstHGDzx0k4+XsqHAQy9C+PWQH350b/t4kMJtOXdq
6U96fD2P6pW6LTSlYUDlbxCa8kn/uzmq4uPv6P4LWZuIFqUpAAA=

-->

</rfc>
