<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-oiwa-path-characteristics-service-00" category="exp" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="SHNM - PCS">Secure Hybrid Network Monitoring - Path Characteristics Service</title>
    <seriesInfo name="Internet-Draft" value="draft-oiwa-path-characteristics-service-00"/>
    <author fullname="Yutaka OIWA">
      <organization abbrev="AIST Japan">National Institute of Advanced Industrial Science and Technology (AIST)</organization>
      <address>
        <email>y.oiwa@aist.go.jp</email>
      </address>
    </author>
    <author fullname="Satoru Kanno">
      <organization abbrev="GMO CONNECT">GMO CONNECT Inc.</organization>
      <address>
        <email>kanno@gmo-connect.jp</email>
      </address>
    </author>
    <author fullname="Yumi Sakemi">
      <organization abbrev="GMO CONNECT">GMO CONNECT Inc.</organization>
      <address>
        <email>sakemi-yumi@gmo-connect.jp</email>
      </address>
    </author>
    <date year="2025" month="October" day="07"/>
    <area>General</area>
    <keyword>Internet-Draft</keyword>
    <keyword>Hybrid cloud</keyword>
    <keyword>Multi cloud</keyword>
    <keyword>Security monitoring</keyword>
    <keyword>Telemetry</keyword>
    <keyword>Monitoring</keyword>
    <abstract>
      <?line 55?>

<t>"Secure hybrid network monitoring - Problem statement" identifies challenges in securing and monitoring networks deployed across hybrid and mixed cloud environments. This document introduces the Path Characteristics Service (PCS), a framework that enables applications and operators to obtain and evaluate verifiable information about the characteristics of the network paths they use. It outlines a non-normative architecture and interfaces for PCS and explains how PCS can help address the identified challenges; it does not define protocol requirements.</t>
    </abstract>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Virtualized resources such as cloud computing infrastructure are rapidly replacing traditional network and computing environments, including on-premises servers and locally managed clusters. In such infrastructures, the physical characteristics of resources - e.g., server location, local network topology, or the operators of network devices - are typically hidden from users in exchange for flexibility, redundancy, and cost benefits. At the same time, cryptographic protection mechanisms such as TLS or IPsec are widely used to secure communications into and out of these systems.</t>
      <t>However, as identified in "Secure hybrid network monitoring - Problem statement" <xref target="I-D.oiwa-secure-hybrid-network"/>, there remain many cases where application-level security depends not only on encrypted communication channels but also on specific properties of the underlying network and intermediate nodes. Examples include:</t>
      <ul spacing="normal">
        <li>
          <t>Sensitivity to traffic analysis, where encrypted flows may still leak metadata;</t>
        </li>
        <li>
          <t>Legal or regulatory requirements mandating that certain properties (e.g., jurisdiction, physical location, or operational control) be verifiable;</t>
        </li>
        <li>
          <t>Threats such as Denial-of-Service (DoS) attacks, which cannot be prevented solely through encryption.</t>
        </li>
      </ul>
      <t>In non-virtualized, self-managed networks, operators can use existing mechanisms (e.g., NETCONF, path validation) to obtain status and operational information about network components. These mechanisms are not sufficient in modern hybrid or multi-cloud settings, where visibility into the underlying infrastructure is significantly limited.</t>
      <t>To address these gaps, this document introduces the Path Characteristics Service (PCS) as a technical approach for continuously obtaining and verifying relevant characteristics of the network paths used in complex environments such as hybrid or multi-cloud deployments. PCS is intended to provide a common framework for securely obtaining, interpreting, and acting upon path-level information, thereby enabling high-security applications to maintain trust in the network even in the presence of virtualization and limited direct control.</t>
      <t>This document builds upon the problem statement and gap analysis presented in <xref target="I-D.oiwa-secure-hybrid-network"/>, and outlines a potential PCS architecture and its role in addressing the identified challenges.</t>
      <t>PCS is a framework for obtaining, synthesizing, and evaluating verifiable information about the characteristics of network paths used by an application or tenant. In this document, "path characteristics" include properties that can affect security or compliance (e.g., jurisdictional residency, operator identity along the path, path segments and facilities traversed, transport security properties, or exposure to known risks). PCS defines:</t>
      <ul spacing="normal">
        <li>
          <t>(1) mechanisms to obtain path-related evidence from multiple sources,</t>
        </li>
        <li>
          <t>(2) methods to reconstruct a coherent view of the path and its attributes from such evidence,</t>
        </li>
        <li>
          <t>(3) a policy-matching mechanism that evaluates whether a given path conforms to declarative requirements.</t>
        </li>
      </ul>
      <t>PCS does not mandate a specific transport or routing technology, is not itself a traffic-measurement protocol, and does not replace existing routing- or control-plane security mechanisms. Rather, it provides a verifiable interface and data model that higher-layer systems can use to reason about path trust and to trigger operational actions.</t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="design-principles">
      <name>Design Principles</name>
      <section anchor="general">
        <name>General</name>
        <t>To overcome these problems, we propose to design a distributed architecture for assuring the network operation integrity for mixed and hybrid cloud applications. Such a system should:</t>
        <ul spacing="normal">
          <li>
            <t>Have a modeling of the network infrastructure in two dimensions: one axis in parallel to the network paths and forwarding directions, and the other axis for the layers of protocols.</t>
          </li>
          <li>
            <t>Have enough knowledge on the complex dependency of software and protocols; not only the network packet-forwarding technologies but also surrounding areas such as addressing and DNS must be covered.</t>
          </li>
          <li>
            <t>Have explicit handling of tunneling and virtualization aspects, both on protocol level (e.g. VPNs, IP-IP, IPsec) and on infrastructure level (IaC, Network-as-a-Service, Wavelength Division Multiplexing, etc.)</t>
          </li>
          <li>
            <t>Consolidate operation information at each operator's level and consider their pre-determined operation principles for evaluating integrity.</t>
          </li>
          <li>
            <t>Address management-oriented risks of infrastructure management, including non-network aspects.</t>
          </li>
        </ul>
        <t>A possible implementation of such a system could leverage distributed network security coordination between operators and users of cloud and network infrastructure. Rather than adopting a "disclose all" approach, this design would maintain both flexibility and efficiency for multi-cloud applications.</t>
        <t>In particular, telemetry as defined in [RFC9232] can be utilized to clarify the state of monitored communications. By employing standardized telemetry mechanisms, it becomes possible to collect, aggregate, and share relevant operational data about network paths and security status without exposing sensitive internal details. This approach enables stakeholders to verify the integrity and security of communications across hybrid and multi-cloud environments, while respecting the confidentiality requirements of each operator.</t>
        <t>In particular, PCS can clarify the status of monitored communications by utilizing telemetry defined in [RFC9232]. By adopting standardized telemetry information, it is possible to collect, aggregate, and share relevant operational data related to network paths and security status without extending the specifications of existing networks. This allows for the verification of communication integrity and security in hybrid and multi-cloud environments without exposing sensitive internal details. This approach respects the confidentiality requirements of each operator while enabling stakeholders to verify communication integrity and security.</t>
      </section>
      <section anchor="system-capabilities">
        <name>System Capabilities</name>
        <t>The Secure Hybrid Network Monitoring system SHOULD:</t>
        <ul spacing="normal">
          <li>
            <t>Have the ability to state network security requirements from an infrastructure user to infrastructure providers. In a hybrid cloud or layered systems, it will include communications between operators of infrastructure/cloud systems.</t>
          </li>
          <li>
            <t>Have the ability to return status statement for the current provisional status against given requirements.</t>
          </li>
          <li>
            <t>Provide some choices on the transparency levels about the internals of the cloud service infrastructure.</t>
          </li>
          <li>
            <t>Have some traceability provisions for troubleshooting, if there are opacities in network status statement replies.</t>
          </li>
          <li>
            <t>Have enough consideration for various tunneling and virtualization technologies.</t>
          </li>
          <li>
            <t>Have a bidirectional interface to system-level security management systems, such as Continuous Diagnostics and Mitigations (CDM) dashboards.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <t>The PCS architecture is organized into three conceptual layers, shown in {#fig-pcs-layers}:</t>
      <ul spacing="normal">
        <li>
          <t><strong>PCS Layer</strong> - Hosts PCS Servers and Clients, which exchange queries and responses regarding path characteristics. A PCS Server gathers data from one or more Telemetry Layer components, reconstructs path-level views, and evaluates them against applicable policies. PCS instances may also recursively query other PCS instances in adjacent administrative domains to obtain a broader or deeper view of the path.</t>
        </li>
        <li>
          <t><strong>Telemetry Layer</strong> - Provides standardized access to measurements and topology information, collected by Telemetry Collectors from the underlying network. Depending on operator policy and technical constraints, this may include performance metrics, topology summaries, or security-related status. PCS uses defined APIs to query this layer, allowing integration with existing protocols (e.g., NETCONF, gNMI, BGP-LS, SNMP).</t>
        </li>
        <li>
          <t><strong>Network Layer</strong> - Comprises the physical and virtual network elements such as routers, switches, links, VPN endpoints, and SDN-controlled domains. These elements generate raw operational data, which is exposed upward through the Telemetry Layer.</t>
        </li>
      </ul>
      <figure anchor="fig-pcs-layers">
        <name>Three-layer model for secure hybrid network monitoring</name>
        <artwork><![CDATA[
+-----------------------------------------------------------+
|                       PCS Layer                           |
|   [PCS Server]  <-->  [PCS Server]  <-->  [PCS ...]       |
|      (gathering / reconstruction / policy matching)       |
+-----------------------------------------------------------+
|                    Telemetry Layer                        |
|   [Collector]   [Normalizer]   [DB/Cache]   [Topology]    |
+-----------------------------------------------------------+
|                     Network Layer                         |
|   [Routers/Switches]  [Links]  [VPNs]  [SDN Domains]      |
+-----------------------------------------------------------+
]]></artwork>
      </figure>
      <section anchor="sec-pcs-recursion">
        <name>Recursive Composition of PCS</name>
        <t>PCS supports recursive composition, whereby a PCS Server MAY act as a client of other PCS Servers to obtain path-segment information across administrative boundaries.
This enables path characteristics to be gathered at multiple granularities: <strong>point-level</strong> (e.g., device, hop, facility) and <strong>plane-level</strong> (e.g., segment, domain, cloud region).
A recursive PCS deployment can therefore provide a coherent PathView even in deeply nested environments (e.g., VPN-over-VPN, SDN slices over WAN, multi-cloud overlays).</t>
        <section anchor="pcs-to-pcs-query-flow">
          <name>PCS-to-PCS Query Flow</name>
          <t>At a high level, a PCS Server receiving a client query proceeds as follows (non-normative):</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Scope decomposition:</strong> Partition the end-to-end path into one or more <strong>sub-scopes</strong> (e.g., by AS/domain, tunnel boundary, cloud region).</t>
            </li>
            <li>
              <t><strong>Local evidence collection:</strong> For sub-scopes under local administration, gather evidence from the Telemetry Layer and reconstruct local PathView fragments.</t>
            </li>
            <li>
              <t><strong>Federated queries:</strong> For external sub-scopes, issue <strong>PCS-to-PCS</strong> sub-queries to authoritative PCS Servers for those domains, specifying the requested properties, freshness, and privacy constraints.</t>
            </li>
            <li>
              <t><strong>Composition:</strong> Merge local and federated fragments into a single PathView, preserving provenance and confidence metadata.</t>
            </li>
            <li>
              <t><strong>Policy evaluation:</strong> Apply policy matching on the composed PathView and return the result to the client.</t>
            </li>
          </ol>
          <t>A simplified message sketch (non-normative):</t>
          <artwork><![CDATA[
Client -> PCS(Server-G): Query{target, required_properties, freshness, recursion_limit}
PCS(Server-G) -> PCS(Server-A): SubQuery{scope=A, required_properties..., freshness, trail}
PCS(Server-A) -> Telemetry(A): gather()
PCS(Server-G) <- PCS(Server-A): PathView{A}, evidence_refs, confidence
PCS(Server-G) -> PCS(Server-B): SubQuery{scope=B, ...}
PCS(Server-G) <- PCS(Server-B): PathView{B}, ...
Client <- PCS(Server-G): Result{PathView{A-B}, policy_decision, trace, completeness}
]]></artwork>
        </section>
        <section anchor="stop-conditions-and-loop-prevention">
          <name>Stop Conditions and Loop Prevention</name>
          <t>To avoid unbounded recursion, a PCS Server MUST implement explicit stop conditions and loop prevention. The following mechanisms are RECOMMENDED:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Recursion limit:</strong> A request header <tt>recursion_limit</tt> (non-negative integer). Each PCS Server decrements it when forwarding sub-queries. If it reaches zero, further delegation MUST NOT occur; the server returns <tt>incomplete=true</tt> for unexplored scopes.</t>
            </li>
            <li>
              <t><strong>Visited set / trail:</strong> Each sub-query SHOULD carry an ordered <tt>trail</tt> including <tt>{request_id, caller_domain, scope}</tt>. A PCS Server MUST detect a cycle when its own domain/scope appears again and terminate delegation for that branch.</t>
            </li>
            <li>
              <t><strong>Scope contraction:</strong> A PCS Server SHOULD only delegate the <strong>minimal</strong> missing scope. Overlapping or redundant sub-queries SHOULD be coalesced to reduce fan-out.</t>
            </li>
            <li>
              <t><strong>Cache with freshness:</strong> Sub-query results MAY be cached with explicit <tt>issued_at</tt>/<tt>exp</tt> (or <tt>fresh-until</tt>) metadata. Reuse is allowed only if freshness requirements are met.</t>
            </li>
            <li>
              <t><strong>Cut failure semantics:</strong> When a sub-scope cannot be explored (timeout, policy denial, or recursion limit), the composed PathView MUST mark the segment as <tt>opaque</tt> and set <tt>completeness=partial</tt>.</t>
            </li>
          </ul>
        </section>
        <section anchor="security-trust-and-provenance-in-recursion">
          <name>Security, Trust, and Provenance in Recursion</name>
          <ul spacing="normal">
            <li>
              <t><strong>Authentication:</strong> PCS-to-PCS exchanges MUST be mutually authenticated (e.g., mTLS or equivalent).</t>
            </li>
            <li>
              <t><strong>Authorization and least disclosure:</strong> Responding servers MAY honor privacy constraints (e.g., return <strong>plane-level</strong> summaries instead of <strong>point-level</strong> details) while still signing the returned assertions.</t>
            </li>
            <li>
              <t><strong>Provenance:</strong> Each returned fragment SHOULD include a signed provenance block (issuer, scope, time, signature). When composing, the caller MUST preserve the chain of provenance for third-party verification.</t>
            </li>
            <li>
              <t><strong>Non-amplification:</strong> A PCS Server MUST NOT act as an open relay. Rate limits and request shaping SHOULD apply to delegated queries.</t>
            </li>
          </ul>
        </section>
        <section anchor="result-composition-and-conflict-handling">
          <name>Result Composition and Conflict Handling</name>
          <t>When multiple fragments overlap or disagree:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Priority rules:</strong> Prefer fragments issued by the authoritative domain for that scope. Otherwise, prefer newer and higher-confidence evidence.</t>
            </li>
            <li>
              <t><strong>Conflict marking:</strong> If conflicts remain, the composed PathView MUST annotate the affected elements with <tt>conflict=true</tt> and lower <tt>confidence</tt>.</t>
            </li>
            <li>
              <t><strong>Granularity reconciliation:</strong> Plane-level evidence MAY satisfy policies that require only aggregate properties; point-level evidence is required when policies demand specific node attributes.</t>
            </li>
          </ul>
        </section>
        <section anchor="example-fields-non-normative">
          <name>Example Fields (non-normative)</name>
          <t>A sub-query MAY include:</t>
          <t>{
"scope": {"domain":"AS65001", "segment":"vpn:1234"},
"required_properties": ["jurisdiction","operator","tunnel.integrity"],
"freshness": {"max_age":"300s"},
"recursion_limit": 2,
"privacy": {"granularity":"plane"},
"trail": [{"domain":"example.net","req":"abc123"}]
}</t>
          <t>A fragment response MAY include:</t>
          <t>{
"scope": {"domain":"AS65001"},
"path_view": {...},
"provenance": {"issuer":"pcs.as65001.net","issued_at":"2025-08-15T02:10Z","sig":"..."},
"completeness": "partial",
"confidence": 0.87
}</t>
        </section>
        <section anchor="non-goals">
          <name>Non-Goals</name>
          <t>Recursive PCS does <strong>not</strong> attempt to:
* control routing or steer traffic;
* force disclosure of internal topology beyond the responder's policy;
* guarantee global completeness in the presence of non-cooperating domains.</t>
          <ul empty="true">
            <li>
              <t><strong>Non-normative note:</strong> Recursive PCS enables operators to obtain <strong>point-level</strong> evidence where permitted, while still producing <strong>plane-level</strong> assertions when detailed disclosure is not available, thus delivering useful policy decisions even in deeply nested hybrid environments.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="roles-and-responsibilities">
      <name>Roles and Responsibilities</name>
      <t>This section defines the main roles in a PCS-enabled environment. The roles align with the three-layer model described in {#fig-pcs-layers}.</t>
      <ul spacing="normal">
        <li>
          <t><strong>Network Operator / Domain Owner</strong> - Responsible for the physical and virtual network infrastructure. They control the disclosure policy for topology and telemetry data, and may operate or delegate the Telemetry Layer components. They are the authoritative source of truth for the properties of network elements within their administrative domain.</t>
        </li>
        <li>
          <t><strong>Telemetry Collector / Aggregator</strong> - Operates within the Telemetry Layer to gather and normalize data from network devices and services. Collectors may use standardized protocols (e.g., NETCONF, gNMI, BGP-LS, SNMP) or vendor-specific mechanisms. Aggregators combine data from multiple collectors or domains, and may provide cached or summarized information to PCS Servers.</t>
        </li>
        <li>
          <t><strong>PCS Server</strong> - Hosts the PCS functionality, including querying the Telemetry Layer, reconstructing path-level characteristics, and applying policy matching. A PCS Server may recursively query other PCS Servers in adjacent domains to extend its view beyond local telemetry.</t>
        </li>
        <li>
          <t><strong>PCS Client</strong> - An application or system component that requests path characteristics from a PCS Server. Clients may use the information to make operational or security decisions, such as selecting a compliant path or avoiding a path with undesirable properties.</t>
        </li>
      </ul>
    </section>
    <section anchor="pcs-main-functions">
      <name>PCS Main Functions</name>
      <t>The PCS Layer provides three main functional stages when processing a path characteristics query:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Gathering</strong> - Collects relevant evidence from the Telemetry Layer and, where applicable, from other PCS Servers via recursive queries. Evidence may include metrics, topology fragments, operational status, and security-relevant events. Data sources can be heterogeneous and may vary in freshness and granularity.</t>
        </li>
        <li>
          <t><strong>Reconstruction</strong> - Builds an end-to-end "PathView" from the gathered evidence. Reconstruction may operate at different levels of abstraction:
          </t>
          <ul spacing="normal">
            <li>
              <t><strong>Point-level view</strong> - Characteristics for each individual network element (e.g., router, link).</t>
            </li>
            <li>
              <t><strong>Domain-level view</strong> - Aggregated characteristics for an entire administrative domain or SDN segment.
The reconstruction process resolves conflicts, fills gaps using partial data, and ensures that the resulting PathView is internally consistent.</t>
            </li>
          </ul>
        </li>
        <li>
          <t><strong>Policy Matching</strong> - Compares the reconstructed PathView against a set of predefined policies provided by the PCS Client. Policies may include security requirements (e.g., encryption in transit, jurisdiction constraints), performance thresholds (e.g., maximum latency), or operational constraints (e.g., avoiding specific domains). The PCS Server returns a compliance result, possibly with annotations explaining non-compliance or uncertainty.</t>
        </li>
      </ul>
    </section>
    <section anchor="path-characteristics-service-pcs">
      <name>Path Characteristics Service (PCS)</name>
      <t>The Path Characteristics Service (PCS) provides an authenticated and access-controlled endpoint for requesting and receiving status statements regarding the characteristics of network paths. PCS is typically operated by network operators or connectivity providers, or it may also be offered by third-party service providers or cloud operators. It answers queries about the real-time or recent status of network paths to authenticated clients.</t>
      <t>In multi-stakeholder environments, such as hybrid or multi-cloud deployments, a PCS Server may query other PCS Servers operated by different providers. This recursive gathering enables a PCS to return aggregated and policy-filtered status information to the requesting client.</t>
      <section anchor="identification-and-authentication">
        <name>Identification and Authentication</name>
        <ul spacing="normal">
          <li>
            <t>PCS endpoints MUST be access-controlled and confidentiality-protected using secure protocols (e.g., TLS 1.3 or later).</t>
          </li>
          <li>
            <t>Clients MUST be strongly authenticated, for example via OAuth 2.1, mutual TLS (mTLS), or OpenID Connect.</t>
          </li>
          <li>
            <t>Authentication credentials SHOULD be bound to a specific connectivity channel, such as:
            </t>
            <ul spacing="normal">
              <li>
                <t>Physical (layer-1) leased lines,</t>
              </li>
              <li>
                <t>Layer-2 segments (e.g., VLAN, VXLAN),</t>
              </li>
              <li>
                <t>Virtual private network (VPN) tunnels,</t>
              </li>
              <li>
                <t>SD-WAN overlay paths.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If multiple connectivity channels exist under a single business contract, multiple identifiers may be associated with a single authentication session (TBD: operational policy).</t>
          </li>
        </ul>
      </section>
      <section anchor="subscription-for-status-statements">
        <name>Subscription for Status Statements</name>
        <t>PCS protocols SHOULD support both:
* <strong>Streaming (push)</strong> - Clients subscribe to a query and receive updates when relevant changes occur.
* <strong>Polling (pull)</strong> - Clients periodically retrieve the current status, with configurable intervals.</t>
        <t>Subscription parameters (e.g., polling interval, event triggers, maximum update rate) SHOULD be negotiable between the PCS Client and PCS Server.</t>
      </section>
    </section>
    <section anchor="pcs-query">
      <name>PCS Query</name>
      <t>A PCS Query is the primary mechanism by which a PCS Client requests path characteristics information from a PCS Server.</t>
      <t>A query typically includes:
- <strong>Target Path</strong> - The path or set of candidate paths for which characteristics are requested, identified by endpoints, AS-paths, or other topology identifiers.
- <strong>Requested Characteristics</strong> - Specific metrics or properties to be returned (e.g., jurisdiction, encryption status, latency).
- <strong>Policy Set (optional)</strong> - Policies to be applied for Policy Matching, expressed in a structured form understood by the PCS Server.
- <strong>Query Constraints</strong> - Optional parameters such as maximum acceptable data age, recursion depth, or partial data acceptance.</t>
      <t>The PCS Server processes the query by:
1. Gathering evidence from the Telemetry Layer and, if necessary, from other PCS Servers.
2. Reconstructing the PathView from the gathered data.
3. Performing Policy Matching if a policy set is provided.</t>
      <t>The server returns a <strong>PCS Response</strong> that may contain:
- The reconstructed PathView (point-level and/or domain-level view).
- Policy Matching results (pass/fail/unknown) for each policy.
- Metadata such as data age, sources used, and recursion depth reached.</t>
      <t>Depending on deployment and query complexity, PCS queries may be handled synchronously or asynchronously. In the asynchronous case, the initial response includes a job identifier that can be used to retrieve results later.</t>
      <t>Access to PCS Query endpoints MUST be subject to authentication and authorization controls, and responses MAY apply redaction or aggregation according to the policies of the Network Operator or Domain Owner.</t>
      <section anchor="connectivity-properties">
        <name>Connectivity Properties</name>
        <ul spacing="normal">
          <li>
            <t>List of desired connectivity properties declares what kind of network nodes (both network nodes and edges) the communication packets will be allowed to flow over.</t>
          </li>
        </ul>
      </section>
      <section anchor="properties-for-nodes">
        <name>Properties for nodes</name>
        <t>Possible property requests for a network node will include at least:</t>
        <ul spacing="normal">
          <li>
            <t>operator</t>
          </li>
          <li>
            <t>geo-location</t>
          </li>
          <li>
            <t>supplier</t>
          </li>
          <li>
            <t>model</t>
          </li>
          <li>
            <t>hardware ID</t>
          </li>
          <li>
            <t>the name and version of the running software</t>
          </li>
          <li>
            <t>the security status of the node</t>
          </li>
          <li>
            <t>the security status of the operator</t>
          </li>
          <li>
            <t>required assurance level (see below)</t>
          </li>
        </ul>
      </section>
      <section anchor="properties-for-edges">
        <name>Properties for edges</name>
        <t>Network edges may be categorized into:</t>
        <ul spacing="normal">
          <li>
            <t>A physical network edge</t>
          </li>
          <li>
            <t>A network tunnel</t>
          </li>
          <li>
            <t>A software-defined network</t>
          </li>
        </ul>
        <t>Possible property requests for a physical network edge will include at least:</t>
        <ul spacing="normal">
          <li>
            <t>operator</t>
          </li>
          <li>
            <t>geo-location</t>
          </li>
          <li>
            <t>the protocol type of the physical network</t>
          </li>
          <li>
            <t>the security status of the operator</t>
          </li>
          <li>
            <t>required assurance level (see below)</t>
          </li>
        </ul>
        <t>Possible property requests for a network tunnel will include at least:</t>
        <ul spacing="normal">
          <li>
            <t>operator</t>
          </li>
          <li>
            <t>geo-location</t>
          </li>
          <li>
            <t>(nested) path property request for the underlying network</t>
          </li>
          <li>
            <t>the identification of the tunnel</t>
          </li>
          <li>
            <t>the protocol type</t>
          </li>
          <li>
            <t>the strength of the integrity/confidentiality protection</t>
          </li>
          <li>
            <t>the security status of the tunnel</t>
          </li>
          <li>
            <t>the name and version of the software realizing the tunnel</t>
          </li>
          <li>
            <t>the security status of the operator</t>
          </li>
          <li>
            <t>required assurance level (see below)</t>
          </li>
        </ul>
        <t>Possible property requests for a software-defined network will include at least:</t>
        <ul spacing="normal">
          <li>
            <t>operator</t>
          </li>
          <li>
            <t>geo-location</t>
          </li>
          <li>
            <t>(nested) path property request for the underlying network</t>
          </li>
          <li>
            <t>the name and version of the software realizing the network</t>
          </li>
          <li>
            <t>the security status of the network-defining software</t>
          </li>
          <li>
            <t>the security status of the operator</t>
          </li>
          <li>
            <t>required assurance level (see below)</t>
          </li>
        </ul>
      </section>
      <section anchor="status-statement-and-assurance-levels">
        <name>Status statement and assurance levels</name>
        <t>A status statement, which is a response to the query, will contain either evidence or a guarantee of the required network properties. There will be several types of assurance levels or types of status statement to be returned.</t>
        <section anchor="traced-present-status-statement">
          <name>Traced present status statement</name>
          <t>For traced status statement, the query will typically contain a requirement for specific node suppliers and types. The answer will contain a recorded trace of the path, signed with each traversed network nodes with their identifications. The information will ensure that the property is satisfied only at the present time.
This type of status statement will require dedicated support for packet traces in every network node.</t>
        </section>
        <section anchor="transparent-present-status-statement">
          <name>Transparent present status statement</name>
          <t>For transparent status statement, the response will contain a list of traversed nodes and edges with their properties (as requested in the query). If the query contains requirements for networks operated by third parties (i.e. involving cascaded queries to other PCSs), the status statement will contain sub-status statement received from the third parties. The information will ensure that the property is satisfied only at the present time.</t>
        </section>
        <section anchor="traceable-opaque-present-status-statement">
          <name>Traceable opaque present status statement</name>
          <t>For traceable opaque status statement, the response will contain an opaque ID for the response. That ID has to correspond to the trace information which can be used by operators to identify the records for troubleshooting in the future. The information will ensure that the property is satisfied only at the present time.</t>
        </section>
        <section anchor="opaque-present-status-statement">
          <name>Opaque present status statement</name>
          <t>For opaque status statement, the response will contain just a positive or negative answer to the question. The information will ensure that the property is satisfied only at the present time.</t>
        </section>
        <section anchor="traceable-opaque-future-status-statement">
          <name>Traceable opaque future status statement</name>
          <t>For traceable opaque future status statement, the response will contain an opaque ID for the response. That ID has to correspond to the trace information which can be used by operators to identify the records for troubleshooting in the future. The information will ensure that the network is controlled in the way that the required property is kept satisfied, even when dynamic routing has been changed.</t>
        </section>
        <section anchor="opaque-future-status-statement">
          <name>Opaque future status statement</name>
          <t>For opaque status statement, the response will contain just a positive or negative answer to the query. The information will ensure that the network is controlled in the way that the required property is kept satisfied, even when dynamic routing has been changed.</t>
        </section>
      </section>
      <section anchor="things-to-be-considered">
        <name>Things to be considered:</name>
        <ul spacing="normal">
          <li>
            <t>How to measure the security level of operators  </t>
            <ul spacing="normal">
              <li>
                <t>Standards or de-facto standards for status sharing with security dashboards</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Details on specifications for real-world properties such as operators, suppliers, models, and geo-locations</t>
          </li>
          <li>
            <t>How to integrate and monitor application-level dynamic routing (e.g. DNS)</t>
          </li>
          <li>
            <t>Possible more-detailed specifications for network topology requirements</t>
          </li>
          <li>
            <t>Possible integration with RPKI and other global-level managements</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use cases</name>
      <t>Secure Hybrid Network Monitoring with PCS will be shown with specific examples using several use cases.</t>
      <section anchor="case-1-data-residency-sovereignty-compliance">
        <name>Case 1: Data Residency / Sovereignty Compliance</name>
        <t>Certain applications must ensure that communication paths remain entirely within a given legal jurisdiction.
For example, a financial institution may require that all customer data traffic remains within Japan or the EU, avoiding any transit through networks located in other countries.
PCS can verify this by reconstructing the network path and confirming that all intermediate hops are located within the allowed jurisdictions.
If a violation is detected (e.g., a hop located outside the allowed set), the PCS Client can take preventive actions such as rejecting the path or raising an alert.</t>
        <t><strong>PCS role:</strong>
* Gather geolocation and jurisdiction information for each hop in the path from telemetry sources.
* Reconstruct the complete PathView with jurisdictional annotations.
* Apply policy matching to ensure 'jurisdiction' {allowed jurisdictions}`.</t>
      </section>
      <section anchor="case-2-critical-infrastructure-operator-validation">
        <name>Case 2: Critical Infrastructure Operator Validation</name>
        <t>Some sectors, such as healthcare or energy, require that only approved network operators be involved in the transport of sensitive data.
For example, a healthcare information system may require that all intermediate networks along a path are operated by organizations on a predefined whitelist.
PCS can validate this by retrieving operator identifiers for each path segment and checking them against the policy.</t>
        <t><strong>PCS role:</strong>
* Obtain operator identifiers and relevant cryptographic assertions from telemetry sources (e.g., RPKI, operator registries).
* Reconstruct the PathView including operator information for each segment.
* Apply policy matching to ensure 'operator' {approved operators}`.</t>
      </section>
      <section anchor="case-3-incident-forensics-and-audit">
        <name>Case 3: Incident Forensics and Audit</name>
        <t>When a security incident occurs, operators may need to reconstruct and verify the exact network path taken by affected communications at the time of the incident.
For example, during an investigation, a signed PathView from PCS can be used as part of an evidence package to demonstrate which networks were traversed and whether the path changed unexpectedly.
This can also support regulatory audits that require verifiable historical path data.</t>
        <t><strong>PCS role:</strong>
* Store PathViews with associated evidence, cryptographic signatures, and timestamps.
* Provide mechanisms for retrieving historical PathViews for a given time window.
* Allow independent verification of historical evidence using signatures and trust anchors.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The proposed "Secure Hybrid Network Monitoring - Path Characteristics Service" itself introduces several security considerations that have to be addressed:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Information Disclosure</strong>: The system must carefully balance the need for security monitoring with the protection of sensitive infrastructure information.</t>
        </li>
        <li>
          <t><strong>Trust Model</strong>: Clear trust relationships must be established between different stakeholders in the hybrid cloud environment.</t>
        </li>
        <li>
          <t><strong>Authentication and Authorization</strong>: Proper mechanisms must be in place to ensure only authorized entities can access monitoring information.</t>
        </li>
        <li>
          <t><strong>Integrity Protection</strong>: The monitoring data itself must be protected from tampering or manipulation.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Currently, we assume that IANA actions are not necessary, but we plan to make corrections as necessary.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ISO-IEC-5140">
          <front>
            <title>Information technology - Cloud computing - Multi-cloud and hybrid cloud vocabulary</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="ISO/IEC" value="5140:2024"/>
        </reference>
        <reference anchor="I-D.oiwa-secure-hybrid-network">
          <front>
            <title>Securing hybrid network - criteria and requirements</title>
            <author fullname="Yutaka Oiwa" initials="Y." surname="Oiwa">
              <organization>AIST Japan</organization>
            </author>
            <date day="4" month="November" year="2024"/>
            <abstract>
              <t>   This document analyzes requirements for ensuring and monitoring the
   security status of the network used under complex network environment
   such as hybrid cloud or mixed cloud settings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-oiwa-secure-hybrid-network-01"/>
        </reference>
      </references>
    </references>
    <?line 495?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work is based on results obtained from a project JPNP23013 commissioned by the New Energy and Industrial Technology Development
Organization (NEDO).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
