<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" docName="draft-geng-apn-security-privacy-consideration-00" category="info" ipr="trust200902" obsoletes="" updates="" xml:lang="en" symRefs="true" sortRefs="true" tocInclude="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <!-- Generated by id2xml 1.5.2 on 2025-11-05T12:00:58Z -->
	<front>
    <title abbrev="APN Security and Privacy">APN Security and Privacy Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-apn-security-privacy-consideration-00"/>
    <author fullname="Nan Geng" initials="N. " surname="Geng">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city/>

          <code/>

          <country>China</country>
        </postal>

        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>Beijing</street>
          <street>China</street>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Voyer" fullname="Daniel Voyer">
      <organization>Bell Canada</organization>
      <address>
        <postal>
          <street>Canada</street>
        </postal>
        <email>daniel.voyer@bell.ca</email>
      </address>
    </author>
    <author initials="C." surname="Li" fullname="Cong Li">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>China</street>
        </postal>
        <email>licong@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <street>China</street>
        </postal>
        <email>liupengyjy@chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Cao" fullname="Chang Cao">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <street>China</street>
        </postal>
        <email>caoc15@chinaunicom.cn</email>
      </address>
    </author>
    
    <date year="2025" month="Nov" day="10"/>
    <abstract>
      <t>
   Application-aware Networking (APN) aims to convey Application-aware
   Information (APN attribute) including APN ID and APN parameters
   indicating application group-level and user group-level requirements
   along with the data packets into the network and enable the network
   to provide corresponding fine-granular network services.</t>
      <t>
   There have been challenges of the privacy and security issues that
   could potentially be introduced by conveying the APN attribute into
   the network.  This document describes the security and privacy
   considerations of APN in various possible scenarios wherein APN will
   be deployed.</t>
    </abstract>
    <note>
      <name>Requirements Language</name>
      <t>
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 <xref target="RFC2119" format="default"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
   Application-aware Networking (APN) is introduced in
   <xref target="I-D.li-apn-framework" format="default"/> and <xref target="I-D.li-apn-problem-statement-usecases" format="default"/>.
   APN conveys Application-aware Information (APN attribute) along with
   data packets into network and make the network aware of applications'
   requirements in order to provide corresponding network services.  The
   ever-emerging network services such as network slicing and iOAM can
   be further enhanced with the application awareness in the network
   enabled by APN.</t>
      <t>
   Since APN conveys an APN attribute along with the data packets into
   network, APN has been challenged that it may potentially impose
   privacy and security issues.</t>
      <t>
   This document describes the privacy and security considerations of
   APN.</t>
    </section>
    <section anchor="sect-2" numbered="true" toc="default">
      <name>Terminologies</name>
      <t>
   AI: Artificial Intelligence</t>
      <t>
   APN: Application-aware Networking</t>
      <t>
   BNG: Broadband Network Gateway</t>
      <t>
   CPE: Customer Premise Equipment</t>
      <t>
   DPI: Deep Packet Inspection</t>
      <t>
   OS: Operating System</t>
      <t>
   RG: Residential Gateway</t>
      <t>
   UPF: User Plane Function</t>
      <t>
   5GC: 5G Core</t>
    </section>
    <section anchor="sect-3" numbered="true" toc="default">
      <name>APN Framework</name>
      <t>
   The APN framework is introduced in <xref target="I-D.li-apn-framework" format="default"/>, as shown
   in the Figure 1.</t>
      <figure anchor="ure-apn6-framework">
        <name>APN6 Framework</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+-----+                                                    +-----+
|App x|-\                                                /-|App x|
+-----+ |  +-----+   +-----------------------+   +-----+ | +-----+
         \-|APN  |   |   Application-aware   |   |APN  |-/
           |-    |---|        Network        |---|-    |
         /-|Edge |   |  Service Provisioning |   |Edge |-\
+-----+ |  +-----+   +-----------------------+   +-----+ | +-----+
|App y|-/     |                                     |    \-|App y|
+-----+       |<--- Network Operator Controlled --->|      +-----+
]]></artwork>
      </figure>
      <t>
   With APN, the APN attribute is acquired based on the existing
   information in the packet header such as 5-tuple and/or QinQ (S-VLAN
   and C-VLAN) at the edge devices of the APN domain (i.e.  APN-Edge in
   the Figure 1), added to the data packets in the tunnel encapsulation,
   and delivered to the network, wherein, according to the carried APN
   attribute, the fine-granular network services are provisioned.</t>
      <t>
   The APN attribute is added by the edge device of an APN domain
   according to the local policy at the network edge device (i.e.  APN-
   Edge), which is under the control of the network operator.</t>
    </section>
    <section anchor="sect-4" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>
   The APN attribute is only used within the network operator's
   controlled limited domain.  A limited domain is intended as a portion
   of the operator infrastructure where APN is deployed.  When a packet
   reaches the boundary of the limited domain, an APN attribute is added
   to the packet, used in order to steer the packet within the limited
   domain and then removed when the packet leaves the limited domain.</t>
      <t>
   Within the APN network domain, the APN attribute is added at the
   ingress node and removed from the egress node.  In the APN network
   domain, the APN attribute only serves for the fine-granular network
   service provisioning, and there is no harm for the outside of the APN
   network domain.</t>
    </section>
    <section anchor="sect-5" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
   There are two typical scenarios besides the SD-WAN scenario described
   in the draft <xref target="I-D.yang-apn-sd-wan-usecase" format="default"/>: the home broadband
   scenario and the mobile broadband scenario.</t>
      <t>
   In the home broadband scenario, generally a home broadband user is
   authorized by the BNG.  If the validation is passed and the access
   control is released, so the user group can start enjoying the value-
   added service.  With APN, when the traffic traverses the metro
   network, the traffic flow can be indicated by the APN attribute that
   is added/removed at the edge devices of the Metro Network (APN
   domain) based on the mapping from the existing information (e.g. the
   QinQ which is composed of C-VLAN and S-VLAN) in the packet header and
   then carried in the tunnel encapsulation header.  The APN attribute
   will facilitate the fine-granular service in the APN domain.  Once
   the packets leave the APN domain, the APN attribute will be removed
   together with the tunnel encapsulation header.</t>
      <figure anchor="ure-home-broadband-scenario">
        <name>Home Broadband Scenario</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
                               |---- APN Domain ---|
+----+                                .-----.
| PC | \                             (       )
+----+  \--\                     .--(         )--.
  +-----+   \+----+  +----+     (                 )      +-------+
  | STB |----| RG |--| AN |----(   Metro Network   )-----|  BNG  |--->
  +-----+   /+----+  +----+     (                 )      +-------+
+-----+ /--/                     '--(         )--'
|Phone|/                            (       )
+-----+                              '-----'
                           QinQ                     QinQ
                          |----|----   Tunnel  ----|----|
]]></artwork>
      </figure>
      <t>
   In the mobile broadband scenario, a UE is authorized by the 5GC
   function, and the traffic steering and QoS policy are enforced by the
   UPF (User Plane Function) node.  If the validation is passed and the
   access control is released, so the user can start enjoying the value-
   added service.  With APN, when the traffic traverses the mobile
   transport network, the traffic flow can be indicated by the APN
   attribute that is added at the edge devices of the mobile transport
   network (APN domain) based on mapping from the existing information
   (e.g.  GTP-u tunnel encapsulation information) in the packet header
   and then carried in the tunnel encapsulation header.  The APN
   attribute will facilitate the fine-granular service in the APN
   domain.  Once the packets leave the APN domain, the APN attribute
   will be removed together with the tunnel encapsulation header.  In
   fact, the APN attribute can also be acquired at the gNB based on the
   mapping of the existing information of the packet header (e.g.
   5-tuple information) and carried along with the GTP-u tunnel
   encapsulation.  The mobile transport network can provide the
   corresponding service according to the APN attribute.  When the
   packet leaves the UPF, the APN attribute can be removed together with
   the GTP-u tunnel encapsulation.</t>
      <ul empty="true" spacing="normal">
        <li>
          <dl newline="false" spacing="normal" indent="33">
            <dt>|--</dt>
            <dd>
              <t>
	APN Domain  ---|
              </t>
              <t/>
            </dd>
          </dl>
        </li>
      </ul>
      <figure anchor="ure-mobile-broadband-scenario">
        <name>Mobile Broadband Scenario</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
 +----+                            .-----.
 | PC |                           (       )
 +----+                       .--(         )--.
   +----+     +------+       (                 )       +-------+
   | UE | --- | gNB  |------(  Mobile Transport )------|  UPF  |---->
   +----+     +------+       (     Network     )       +-------+
 +-----+                      '--(         )--'
 | CPE |                          (       )
 +-----+                           '-----'

                             |----  Tunnel  ----|

                  |---------      GTP-u Tunnel     --------|
]]></artwork>
      </figure>
      <t>
   In the typical APN scenarios like the home broadband scenario and the
   mobile broadband scenario, before the traffic is delivered to the
   network domain, the end user must be authenticated and authorized
   firstly to guarantee the security of the network domain.  When the
   traffic traverses the APN domain, the APN attribute is added and
   removed at the edge of the APN domain along with the tunnel
   encapsulation.  That is, the APN attribute is only used locally in
   the APN domain and will not introduce the extra security issues.</t>
    </section>
    <section anchor="sect-6" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
   There are no IANA considerations in this document.</t>
    </section>
    <section anchor="sect-7" numbered="true" toc="default">
      <name>Contributors</name>
      <artwork name="" type="" align="left" alt=""><![CDATA[
Chongfeng Xie
China Telecom
China

Email: xiechf@chinatelecom.cn

Liang Geng
China Mobile
China

Email: gengliang@chinamobile.com

Shuai Zhang
China Unicom
China

Email: zhangs366@chinaunicom.cn
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="I-D.li-6man-app-aware-ipv6-network" target="https://datatracker.ietf.org/doc/html/draft-li-6man-app-aware-ipv6-network-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.draft-li-6man-app-aware-ipv6-network-03.xml">
        <front>
          <title>Application-aware IPv6 Networking (APN6) Encapsulation</title>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Shuping Peng" initials="S." surname="Peng">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Cong Li" initials="C." surname="Li">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Chongfeng Xie" initials="C." surname="Xie">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Daniel Voyer" initials="D." surname="Voyer">
            <organization>Bell Canada</organization>
          </author>
          <author fullname="Xing Li" initials="X." surname="Li">
            <organization>Tsinghua University</organization>
          </author>
          <author fullname="Peng Liu" initials="P." surname="Liu">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Chang Liu" initials="C." surname="Liu">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Kentaro Ebisawa" initials="K." surname="Ebisawa">
            <organization>Toyota Motor Corporation</organization>
          </author>
          <date day="22" month="February" year="2021"/>
          <abstract>
            <t>Application-aware IPv6 Networking (APN6) framework makes use of IPv6 encapsulation in order to convey the application-aware information along with the data packet to the network so to facilitate the service deployment and SLA guarantee. This document defines the encodings of the application characteristic information, for the APN6 framework, that can be exchanged between an application or a network edge device such as CPE (Customer-Premises Equipment) and the network infrastructure through the use of IPv6 extension headers.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-li-6man-app-aware-ipv6-network-03"/>
      </reference>
      <reference anchor="I-D.li-apn-framework" target="https://datatracker.ietf.org/doc/html/draft-li-apn-framework-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-apn-framework.xml">
        <front>
          <title>Application-aware Networking (APN) Framework</title>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Shuping Peng" initials="S." surname="Peng">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Daniel Voyer" initials="D." surname="Voyer">
            <organization>Bell Canada</organization>
          </author>
          <author fullname="Cong Li" initials="C." surname="Li">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Peng Liu" initials="P." surname="Liu">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Chang Cao" initials="C." surname="Cao">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
            <organization>Verizon Inc.</organization>
          </author>
          <date day="3" month="April" year="2023"/>
          <abstract>
            <t>A multitude of applications are carried over the network, which have varying needs for network bandwidth, latency, jitter, and packet loss, etc. Some new emerging applications have very demanding performance requirements. However, in current networks, the network and applications are decoupled, that is, the network is not aware of the applications' requirements in a fine granularity. Therefore, it is difficult to provide truly fine-granularity traffic operations for the applications and guarantee their SLA requirements. This document proposes a new framework, named Application-aware Networking (APN), where application-aware information (i.e. APN attribute) including APN identification (ID) and/or APN parameters (e.g. network performance requirements) is encapsulated at network edge devices and carried in packets traversing an APN domain in order to facilitate service provisioning, perform fine-granularity traffic steering and network resource adjustment.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-li-apn-framework-07"/>
      </reference>
      <reference anchor="I-D.li-apn-problem-statement-usecases" target="https://datatracker.ietf.org/doc/html/draft-li-apn-problem-statement-usecases-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-apn-problem-statement-usecases.xml">
        <front>
          <title>Problem Statement and Use Cases of Application-aware Networking (APN)</title>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Shuping Peng" initials="S." surname="Peng">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Daniel Voyer" initials="D." surname="Voyer">
            <organization>Bell Canada</organization>
          </author>
          <author fullname="Chongfeng Xie" initials="C." surname="Xie">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Peng Liu" initials="P." surname="Liu">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Zhuangzhuang Qin" initials="Z." surname="Qin">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
            <organization>Verizon Inc.</organization>
          </author>
          <date day="3" month="April" year="2023"/>
          <abstract>
            <t>Network operators are facing the challenge of providing better network services for users. As the ever-developing 5G and industrial verticals evolve, more and more services that have diverse network requirements such as ultra-low latency and high reliability are emerging, and therefore differentiated service treatment is desired by users. On the other hand, as network technologies such as Hierarchical QoS (H-QoS), SR Policy, and Network Slicing keep evolving, the network has the capability to provide more fine- granularity differentiated services. However, network operators are typically unaware of the applications that are traversing their network infrastructure, which means that not very effective differentiated service treatment can be provided to the traffic flows. As network technologies evolve including deployments of IPv6, SRv6, Segment Routing over MPLS dataplane, the programmability provided by IPv6 and Segment Routing can be augmented by conveying application related information into the network satisfying the fine- granularity requirements. This document analyzes the existing problems caused by lack of service awareness, and outlines various use cases that could benefit from an Application-aware Networking (APN) framework.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-li-apn-problem-statement-usecases-08"/>
      </reference>
      <reference anchor="I-D.yang-apn-sd-wan-usecase" target="https://datatracker.ietf.org/doc/html/draft-yang-apn-sd-wan-usecase-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.draft-yang-apn-sd-wan-usecase-01.xml">
        <front>
          <title>Usage scenarios of Application-aware Networking (APN) for SD-WAN</title>
          <author fullname="Feng Yang" initials="F." surname="Yang">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Shuping Peng" initials="S." surname="Peng">
            <organization>Huawei</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei</organization>
          </author>
          <date day="18" month="February" year="2021"/>
          <abstract>
            <t>This document describes the usage of Application-aware Networking (APN) in SD-WAN scenarios. In these scenarios, APN is able to identify a particular application, steer its traffic flows along explicit path across the network, and provide SLA guaranteed network services such as low latency and high reliability.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-yang-apn-sd-wan-usecase-01"/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
    </references>
  </back>
</rfc>
