<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-secure-routing-requirements-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.0 -->
  <front>
    <title abbrev="Use Cases">The Requirements for Secure Routing</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-secure-routing-requirements-00"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2022" month="September" day="29"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <t>At present, the routing process is to look up its own routing table through the router to realize packet forwarding or data discarding. With the development of the network, attention is paid not only to reachability but also to security capability in the routing process. With the frequent occurrence of security incidents, more and more network devices have security functions, secure routing and secure path is required by many scenarios.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>At present, the routing process is to find its own routing table through the router to realize packet forwarding or data discarding. The routing methods include programmable and non programmable, and the data is forwarded based on the principle of fast access. With the development of network, people not only pay attention to the reachability in the routing process, but also pay more attention to the link security. Link security includes routing security and node security. In addition to the traditional ground network, the future development of satellite network will also involve link security. Due to the higher openness of satellite network, the security vulnerability of inter satellite nodes will affect the security of the whole network.</t>
      <t>Security attacks are happening almost every moment in the world, so network devices are also updating and iterating to cope with complex security environments. In addition to proprietary security devices, many network devices have integrated security functions, such as routers with anti DDoS attack functions. At present, most routers have anti DDoS functions in advanced settings. Usually, this function is not turned on by default. If a route is DDoS protected, the whole network speed will drop dramatically. For example, the switch has anti DDoS function, intrusion detection (IDS) function and firewall function. For example, the gateway has anti-virus, intrusion detection, firewall, VPN and other security functions.</t>
      <t>Starting from the requirements of network operators and users, it is necessary to take the security attribute as the key factor to select the route and transmission path to measure the link transmission security. To achieve this goal, the following contents may need to be studied.</t>
      <ol spacing="normal" type="1"><li>A method or protocol for routing and data transmission according to security capabilities;</li>
        <li>An interactive protocol that allows the perception and measurement of the security of the link in the path;</li>
        <li>Security measurement and feedback model: the authorized third party makes decisions on security measurement and gives the results as reference suggestions then provide the results to the user, the user can determine the degree of dependence and trust on the security of the link;</li>
        <li>Atomized description and definition of security functions: reorganize and define the security functions supported by existing network devices, and encode them. Generally, the security functions of a device can be described as a collection.</li>
      </ol>
    </section>
    <section anchor="secure-routing-use-cases">
      <name>Secure Routing Use Cases</name>
      <section anchor="requirements-of-network-operators">
        <name>Requirements of network operators</name>
        <t>Transmission security generally adopts encryption, IPSec and other measures to ensure end-to-end security. The operator channel is responsible for data transmission, but lacks the ability to provide security consultation for users. The network is more complex and the intersection is more obvious. The traditional security domain is gradually broken. The online real-time streaming security needs are obvious. The operator needs to obtain the security status of each device in the network.</t>
        <t>For customers with high security requirements, operators need to transmit data at the security level expected by customers. For example, in addition to the IP address, each node also has a description of its own security functions, that is, security vectors. When the user sends a request, the security requirement is converted into a security vector. When forwarding data, the IP address and security vector are selected as the elements to achieve best delivery.</t>
        <artwork><![CDATA[
     A(ip,sv)          B(ip,sv)       C(ip,sv)
     ----------      ----------      ----------
────►│ Router ├──────┤ Router ├─────►│ Router ├────────┐
     └───┬────┘      └───┬────┘      └───┬────┘        │
         │               │               │             │
         │               │               │             │
         │               │               │             │
         │           ┌───▼────┐      ┌───▼────┐   ┌────▼───┐
         └───────────► Router ├──────► Router ├───► Router ├──►
                     └────────┘      └────────┘   └────────┘
                      D(ip,sv)        E(ip,sv)     F(ip,sv)
 Figure1: Select path according to IP address and security vector
]]></artwork>
      </section>
      <section anchor="requirements-of-users">
        <name>Requirements of users</name>
        <t>The user's security awareness is at the highest level in history. The application security measures at the upper level can no longer meet the needs. The user needs the pipeline to provide an objective presentation of security. Security needs to be quantified, objective and authoritative.</t>
        <t>Users need to convert security requirements into security vectors, and general users may not have security background knowledge. Therefore, in most cases, a security vector translator is required to convert perceptual requirements into objective security vectors. How to use the security vector for route selection and data forwarding, for example, you can choose the route according to the best effort delivery principle and the maximum satisfaction security vector.</t>
        <artwork><![CDATA[
(ip,sv)      (ip,sv)
             ┌───────┐     ┌───────┐
   ──────────► Router├─────►Router ├──────┐
(Src,Dst,sv) └──┬────┘     └───────┘      │
                │                         │
                │                         │
                │      (ip,sv)            │
                │     ┌───────┐       ┌───▼──┐
                └────►│Router ├──────►│Router├───►DST
                      └───────┘       └──────┘
                                       (ip,sv)
Figure2: Select the path according to the user's security vector requirements
]]></artwork>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>







  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81YzW4buxXeC9A7EPCiuYBk+Lrd1N00iZPWRe9FUDvtsqBm
KIk1h5xLcqT4Fi2KrLvIwgi66LLLPkHQp8mT9DuHnD9pbGeRAhW88HB4fnj+
vo+zXC7nsxClLf8ojbPqQkTfqPlM157/DfH87OznZ+fzWSHjhdB27cSJeLlV
xS3kmlWlQ9DOxrsaolevbl7PZ9IreSGuVdF4He/ms/0Gb2xU3qooXtmNtkp5
bTfiRoZb8dr5Avbms9IVVlbQUnq5jstiq+wykBK19K6JEFh69UOjvaqUjWF5
dkZSUUcDmZutEr8bvBVr55MLWE/ScGy18mp3Id4GJV7KoMJ8ZqSFd8rOZ7f7
i/lMiGXn6vKS/Ehrt+pu73yJKJyIUkYYPD87P1+e0Z9YLnlNaFjVxqgSURKy
ia6SURfSmDuxuhPvKnPu14XQa2FdFBu9I6vYtnUelpfCOzqIKnWE6ycCB3E7
1W5PSRHQHC4o+pYeUri+U9pQNNtV5ze0RVspvnMrbViuQCYuxAulf8ORwIJr
bPR3eSetqEpqcyEo7lVS+cuC3lWs5LRwFXmZbP5Wi+vmKxgLjdHHVmAHMZWr
EL0sIj0/j6L2KiCzCxGR6lwQWHSFCoFCH50wzt2KphYa+Xd72+2KcmUU5PC8
2XbyypMMatXoH5WoZXGL8kTZ7KUvSQpZQFqlKHUo0tKp+IOOSUGpdsq4mmpN
uDUvoWRQI7cLIWPEMpqC3KqlLjmDzqIOksFiK3FYBEmsmiikCY5ehNwwopB1
+x6FNHHcgR9ragl2ooC0V7ZQ5E+nS9tCl9QQC1E59AL6PP2TvaWDaOgUW4li
68TWjS3oBBBLLdi5QAryUi3hBI6Yu7KkKq+kvROhUFZ67cJpm8tKl6XhLj+h
/vKubFj/l+d2rWH4f5fYm4HhSqEny0CxM02pyJGNl1XFxuj8FqkdLi54lcuC
9OrQWqOYYM6USD6/rj3lozaco7UMSH5xkNCDwuqKqlaO5LpKquXdoNBwXj79
sLama2fR1xypSEVxqAfNf9sVwym6ffDYhiV0mrs3KTalGoheYRKWGGkD5Wjq
tCCN2EAHCbWn5JJuIlXXQSACJqzBufrK3WPWpoNou3Nmd+T2ZaNam1u92aIs
XK2spZqaUpisd4fZNcYq3wYTAppwYSjmKAjJi/VaFXEsn6fCfutMZ4L74boL
V4yozSCAl2i/Gr5xg5nKoTBwek/p4fPnVEKFKdGR7qh7SQWHoqlRgm2fwkuf
nhCGAoeHtygzzFiU0rveVWV32jvLwHmUMtQNylZFCXc6iWx3kfp9cpZQuNAh
UZXTY6UptkKG3LAheSZRheLy0l3n2PQCp2I4JjhCrSRb6yU7EUbhcicxEsmF
SIGAnrehIUimbFOj5t3UtIyzDaCf+3VFp1zLxkSEZC1kskf72AzCEpFzVS6O
0yxCraCES6NE+IjRdFzglBiPUO8kJSHXHA6PaGwRjuNzLCiS4GHkZKnIJv33
7Ory+pvee8r2GjN4Dwvd6oSlDfKxR9u3ppZIfBMmTSw6hQvx+zffswkXqYuO
05nqGiXCxbb2rsrjaEDI+mFGbYjCcD6w0iYgi3Ahcg4UDSmqNepceavGTYWy
8HpFecAB6A2IGQZpQZSJIdS0fZiyxXPZSxsyTU2YhZ2VkoGmTDftRrv6GXLj
MKK3Gt2Y6mXjpMljyhnj9nTeAvSXj1hJ6gVkHgZW8Do2pVYlB+dbFHAGFsIf
qh5XOMM0dQitDCAjX4AQLuHWJEfQKvxiPjuHepsmFIIBatlbiFtJ8x6+pogh
9oWqu6rJgRgSmcMRxvHJI4jiB3s/Pe34/UgD1yEisKLmrTAgwfFILNFcwDHB
pPYl9HgSRYIDSq7QgTt2EPojtUSYQy4r0EaEm6aHWqtEekKz2aiQGh+bGKB3
oD4jiYwGVHGL7j/EMpW9r3AzySC88YpBulQYyyVbSLWEC1GL5lNxQmx+RrPK
VXxYIEThdR9tTBRt02gdsrSukS7gKii1tMRcOoGDJugnXGjq2vmYqJd6pwPX
0cE4TuwER3ApGtWp+JUiaMtTcFKzo4mXFHB8ViqfZQVjNDxQ9cakSXGaeN34
tjW8ZOHtyfh2NjUMaN/NVBeKTesu5rmrIY7D+Ls6TamrNzA8mE65bjjZynKT
I4PL6JbKlsPOxsFb27j0SBADk9hsqBEBTWRv3VLFYUcmBmUYurm2M0VIWMk1
17cpNKHyJGectPGwS8bbAMAms7AWllsuyd0cVAdPvMmtdto1WcOQSfXQjGun
ZgGgb9mk66d3t8rmM1tDFUX0eBl1RWMK/1cjIkdDLJGKkb0uXOk9DuxWUeqD
bgg4bsMpJjbaFlHeNSRChE4F+gkcpyUAxNN6TUP8WAxQo52xOSsx5UgeEDBD
BBJdUTNMU4d0xg6QUR+T1Ks3tOSZMPMxmNcyxWLsHHU2kcN8M5miOjyBdXuV
Ym6pCLGI9tOk6gYRyA2Fnc+NWXbQnINoUHZRWqCIkb82wGl5qD0rH9x7KEqL
g9P197lekhOfoDQ1O4ngMbVu7BFxBScRCKOJq3JK/4ofXe/xe/5M14uw+0Z0
vxfjlZf5Me9fdj/xxPN89vn+b/3fx0+f79/z2EEIP9//c/Qy//3rkfdfIp/+
PmRXP9/fD1b/Pd70D/FV99Cu99lufhLj39Mr/+8aPt//fZCO/xwE/Qv3jDYc
7vkwsn0/lp76+/jp8Yp44P3U8sdPA+PjkDziyGSJTOx5fMMDlsXlQXO+Gj6/
7hvztd4AQL+lr7nMrJk+jxjp46OknQiTDICxkFE/D8CfhAHTx9RSNn//yaOd
b/EYOWmyY2qDkcNIBnPcoA2uWFFPsMhOBQgTkpMUEK+x9NXQbpg3qJghCuCW
VPJUzmBH5FfXisFzAPXQ4VZ/Ui3p5guqPCR4A7bcQScY1Q8N3cHWmi6RvRIK
Y+bLpGmneLK+pWB1yJeH/zRUJkA4BJtEAzOVSrFPFxbcescf/4i85w8zt9bt
jSo3iuMBtg0OwnjJN/CC6N3iGHoSMBumCsPvgwPH8y0E9GTC9T4Wx4j5a7cn
PfD/4HNNstzep1oA64g3MYQeCxe8sSMAd67haii2zmXF+f44LHVaZshTa0j3
yDf4rNdyt0q+01VT0dciHeh+OirKDNA9YI66cQyLkzNyYkA+8p41fem8mwTI
x8ERBp5d+2JxCcpCpxiMpElMe3hkdUPv/fHgOoaY0buvKXDEXJ4QeCo3D6LX
hymd4+AwO3kCirodB1h0eX3zEAA8mYOHdjwIKUe/ro4TiJx3INJ+RzjurkMQ
yE09nBADRBFXz79/Ll7SZa3kD510cf3zCa3+JcEK3ZpU5fpP1ta15JqxCztP
BW3t7q9k9Uhj+yZpfXGZJIiZ0qhMT/PZfwGXpd/4Sh0AAA==

-->

</rfc>
