<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-opennhp-ace-nhp-01" category="info" submissionType="independent" number="1" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <link href="https://datatracker.ietf.org/doc/draft-opennhp-ace-nhp-01" rel="prev"/>
  <front>
    <title abbrev="NHP">Network infrastructure Hiding Protocol</title>
    <seriesInfo name="RFC" value="1"/>
    <author fullname="Benfeng Chen">
      <organization>OpenNHP</organization>
      <address>
        <email>benfeng@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="19"/>
    <area>Security</area>
    <workgroup>saag</workgroup>
    <keyword>zero trust</keyword>
    <keyword>session layer</keyword>
    <abstract>
      <?line 36?>

<t>The Network infrastructure Hiding Protocol (NHP) is a cryptography-based session-layer protocol designed to implement Zero Trust principles by rendering protected network resources invisible to unauthorized entities. By requiring authentication before connection and operating at OSI layers 5 , NHP conceals IP addresses, ports, and domains from exposure to reconnaissance and automated exploitation, effectively reducing the attack surface. This draft defines the architecture, message format, and workflow of the NHP protocol, outlines its security objectives, and provides guidance for integration into modern network infrastructures and Zero Trust deployments.</t>
      <?line 92?>

<t>title: "Network-Infrastructure Hiding Protocol (NHP)"
abbrev: "NHP"
docname: draft-opennhp-ace-nhp-01
category: informational
stream: independent
submissiontype: independent
number: 00
date: 2025-10-19
v: 1
area: "Security"
workgroup: "secdp"
keyword:</t>
      <ul spacing="normal">
        <li>
          <t>zero trust</t>
        </li>
        <li>
          <t>session layer</t>
        </li>
        <li>
          <t>network obfuscation
venue:
group: "saag"
type: "Independent Submission"
mail: "<eref target="mailto:saag@ietf.org">saag@ietf.org</eref>"
arch: "<eref target="https://mailarchive.ietf.org/arch/browse/secdp/">https://mailarchive.ietf.org/arch/browse/secdp/</eref>"
github: "OpenNHP/ietf-rfc-nhp"
latest: "<eref target="https://OpenNHP.github.io/ietf-rfc-nhp/draft-opennhp-ace-nhp.html">https://OpenNHP.github.io/ietf-rfc-nhp/draft-opennhp-ace-nhp.html</eref>"</t>
        </li>
      </ul>
      <t>author:</t>
      <ul spacing="normal">
        <li>
          <t>fullname: Benfeng Chen
organization: OpenNHP
email: <eref target="mailto:benfeng@gmail.com">benfeng@gmail.com</eref></t>
        </li>
      </ul>
      <t>normative:</t>
      <ul spacing="normal">
        <li>
          <t>RFC2119</t>
        </li>
        <li>
          <t>RFC8174</t>
        </li>
        <li>
          <t>RFC9000</t>
        </li>
        <li>
          <t>RFC8446</t>
        </li>
        <li>
          <t>RFC9180</t>
        </li>
        <li>
          <t>NoiseFramework</t>
        </li>
      </ul>
      <t>informative:</t>
      <ul spacing="normal">
        <li>
          <t>NIST.SP.800-207</t>
        </li>
        <li>
          <t>CSA.SDP.Spec2.0</t>
        </li>
        <li>
          <t>CSA.SDP.Architecture.3.0</t>
        </li>
        <li>
          <t>CSA.ZeroTrust.GuidingPrinciples</t>
        </li>
        <li>
          <t>CSA.AsymmetricCrypto.ZT</t>
        </li>
        <li>
          <t>OpenNHP.Readme</t>
        </li>
      </ul>
      <?line 142?>

<t>The Network-Infrastructure Hiding Protocol (NHP) is a cryptography-based session-layer protocol designed to operationalize Zero Trust principles by concealing protected network resources from unauthorized entities. NHP enforces authentication-before-connect access control, rendering IP addresses, ports, and domain names invisible to unauthorized users. This document defines the protocol architecture, cryptographic framework, message format, and workflow to enable independent implementation of NHP. It also provides guidance for integration with Software-Defined Perimeter (SDP), DNS, and Zero Trust policy engines.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://OpenNHP.github.io/ietf-rfc-nhp/draft-opennhp-ace-nhp.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-opennhp-ace-nhp/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:saag@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/saag/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/OpenNHP/ietf-rfc-nhp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>1. Introduction</name>
      <t>Since its inception in the 1970s, the TCP/IP networking model has prioritized openness and interoperability, laying the foundation for the modern Internet. However, this design philosophy also exposes systems to reconnaissance and attack.</t>
      <t>Today, the cyber threat landscape has been dramatically reshaped by the rise of AI-driven attacks, which bring unprecedented speed and scale to vulnerability discovery and exploitation. Automated tools continuously scan the global network space, identifying weaknesses in real-time. As a result, the Internet is evolving into a "Dark Forest," where <strong>visibility equates to vulnerability</strong>. In such an environment, any exposed service becomes an immediate target.</t>
      <t>The Zero Trust model, which mandates continuous verification and eliminates implicit trust, has emerged as a modern approach to cybersecurity. Within this context, the Network infrastructure Hiding Protocol (NHP) offers a new architectural element: authenticated-before-connect access at the session layer. Inspired by Cloud Security Alliance’s Single-Packet Authorization (SPA) and Software Defined Perimeter (SDP) technologies, NHP advances the concept further by using cryptographic protocols (e.g., Noise, ECC) to obfuscate infrastructure and enforce granular access control.</t>
      <t>This document outlines the motivations behind NHP, its design objectives, message structures, integration options, and security considerations for adoption within Zero Trust frameworks.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>2. Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>NHP: Network-Infrastructure Hiding Protocol
SPA: Single-Packet Authorization
SDP: Software-Defined Perimeter
ZTA: Zero Trust Architecture
ECC: Elliptic Curve Cryptography
AEAD: Authenticated Encryption with Associated Data
NAC: Network Access Control</t>
    </section>
    <section anchor="design-objectives">
      <name>3. Design Objectives</name>
      <t>The NHP protocol is designed to:</t>
      <ul spacing="normal">
        <li>
          <t>Eliminate unauthorized network visibility by enforcing authentication prior to session establishment.</t>
        </li>
        <li>
          <t>Operate at the OSI Session Layer, complementing existing TCP, UDP, and QUIC transports.</t>
        </li>
        <li>
          <t>Support decentralized trust using asymmetric cryptography and ephemeral key exchange.</t>
        </li>
        <li>
          <t>Enable fine-grained, context-based policy enforcement across heterogeneous environments.</t>
        </li>
        <li>
          <t>Integrate with existing Zero Trust controllers, SDP gateways, and identity systems.</t>
        </li>
      </ul>
      <?line 146?>

</section>
    <section anchor="introduction-1">
      <name>1. Introduction</name>
      <t>Since the 1970s, TCP/IP has provided universal connectivity but also exposed every reachable service to reconnaissance and attack. Modern AI-driven reconnaissance and exploitation tools can automatically identify and compromise exposed endpoints, turning Internet visibility into vulnerability. This document introduces the Network-Infrastructure Hiding Protocol (NHP), a session-layer mechanism that enforces authenticated-before-connect access, ensuring that only authorized clients can detect and reach protected resources.</t>
      <t>NHP builds upon foundational work in the Cloud Security Alliance’s Software-Defined Perimeter (SDP) and Single-Packet Authorization (SPA) frameworks, extending them with modern asymmetric cryptography and Noise Protocol-based mutual authentication. NHP replaces traditional perimeter visibility with a cryptographically controlled, context-aware trust fabric.</t>
    </section>
    <section anchor="terminology-and-conventions">
      <name>2. Terminology and Conventions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>NHP: Network-Infrastructure Hiding Protocol
SPA: Single-Packet Authorization
SDP: Software-Defined Perimeter
ZTA: Zero Trust Architecture
ECC: Elliptic Curve Cryptography
AEAD: Authenticated Encryption with Associated Data
NAC: Network Access Control</t>
    </section>
    <section anchor="design-objectives-1">
      <name>3. Design Objectives</name>
      <t>The NHP protocol is designed to:</t>
      <ul spacing="normal">
        <li>
          <t>Eliminate unauthorized network visibility by enforcing authentication prior to session establishment.</t>
        </li>
        <li>
          <t>Operate at the OSI Session Layer, complementing existing TCP, UDP, and QUIC transports.</t>
        </li>
        <li>
          <t>Support decentralized trust using asymmetric cryptography and ephemeral key exchange.</t>
        </li>
        <li>
          <t>Enable fine-grained, context-based policy enforcement across heterogeneous environments.</t>
        </li>
        <li>
          <t>Integrate with existing Zero Trust controllers, SDP gateways, and identity systems.</t>
        </li>
      </ul>
    </section>
    <section anchor="architectural-overview">
      <name>4. Architectural Overview</name>
      <t>NHP operates as a distributed session-layer protocol that enforces authentication-before-connect access between clients and protected resources. The architecture includes three primary components:</t>
      <ul spacing="normal">
        <li>
          <t><strong>NHP-Agent</strong> – a client-side process or SDK that initiates communication with the protected network by generating and sending an NHP-KNK message to the NHP-Server. It performs cryptographic key exchange and authentication using Noise-based handshakes.</t>
        </li>
        <li>
          <t><strong>NHP-Server</strong> – the core control-plane service that receives and validates NHP-KNK messages, authenticates the NHP-Agent, and determines access decisions. The NHP-Server interfaces with external <strong>Authorization Service Providers (ASP)</strong> or IAM systems to evaluate identity, context, and policy. It also manages communication with NHP-AC components, instructing them to open or close access paths. Functionally, the NHP-Server maps to the <strong>Policy Administrator</strong> role defined in <strong>NIST SP 800-207 Zero Trust Architecture</strong>, responsible for policy evaluation and decision-making.</t>
        </li>
        <li>
          <t><strong>NHP-AC (Access Controller)</strong> – the enforcement component residing logically or physically near protected resources. Upon receiving an NHP-AOP command from the NHP-Server, the NHP-AC updates its access control tables, temporarily allowing the NHP-Agent to reach the protected resource. It automatically reverts to the default-deny state when the session expires. The NHP-AC corresponds to the <strong>Policy Enforcement Point (PEP)</strong> in NIST SP 800-207 terminology.</t>
        </li>
      </ul>
      <t>In this model, authentication, authorization, and access enforcement are strictly decoupled. The NHP-Agent never directly accesses the NHP-AC without prior validation by the NHP-Server. This structure supports horizontal scalability and allows multiple NHP-Servers and NHP-ACs to operate in cluster configurations for redundancy and high availability.</t>
      <section anchor="component-interactions-and-deployment-models">
        <name>4.1 Component Interactions and Deployment Models</name>
        <t>NHP components can be deployed in different configurations depending on the size and topology of the protected network:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Standalone Deployment:</strong> For small environments or testing scenarios, the NHP-Server and NHP-AC can coexist on the same host. This configuration simplifies setup while maintaining full protocol compliance.</t>
          </li>
          <li>
            <t><strong>Clustered Deployment:</strong> In enterprise or cloud environments, multiple NHP-Servers can be deployed in a load-balanced cluster. Each server manages a pool of NHP-AC instances distributed across data centers or network segments. The NHP-Agent dynamically discovers the nearest NHP-Server through DNS or bootstrap configuration.</t>
          </li>
          <li>
            <t><strong>Edge AC Deployment:</strong> Edge nodes (e.g., gateways, routers, or micro-segmentation agents) can host lightweight NHP-AC components. These edge ACs enforce fine-grained policies close to workloads, improving latency and fault isolation.</t>
          </li>
          <li>
            <t><strong>Multi-Tenant Deployment:</strong> In service-provider or multi-cloud environments, each tenant can operate an independent NHP-Server while sharing an underlying AC infrastructure. The NHP protocol’s namespace isolation ensures complete tenant separation through identity-scoped keys and per-tenant policy databases.</t>
          </li>
        </ul>
        <t>This modular architecture provides flexibility for diverse Zero Trust environments—from on-premises datacenters to global cloud infrastructures—while maintaining the core NHP principles of invisibility, least privilege, and continuous verification.</t>
      </section>
    </section>
    <section anchor="protocol-workflow">
      <name>5. Protocol Workflow</name>
      <section anchor="control-plane-vs-data-plane">
        <name>5.1 Control Plane vs Data Plane</name>
        <t>The <strong>Control Plane</strong> carries cryptographic authentication and authorization information among NHP-Agent, NHP-Server, NHP-AC, and optional external <strong>Authorization Service Providers (ASP)</strong>. The <strong>Data Plane</strong> carries application data between the resource requester (NHP-Agent host) and the protected resource, but only after NHP-AC explicitly authorizes access. This strict separation enforces the <em>authenticate-before-connect</em> principle.</t>
      </section>
      <section anchor="nhp-workflow-steps">
        <name>5.2 NHP Workflow Steps</name>
        <ol spacing="normal" type="1"><li>
            <t>NHP-Agent sends <strong>NHP-KNK</strong> to <strong>NHP-Server</strong>.</t>
          </li>
          <li>
            <t>NHP-Server validates and queries <strong>ASP</strong>.</t>
          </li>
          <li>
            <t>ASP returns authorization decision.</t>
          </li>
          <li>
            <t>NHP-Server sends <strong>NHP-AOP</strong> to <strong>NHP-AC</strong>.</t>
          </li>
          <li>
            <t>NHP-AC enforces and replies with <strong>NHP-ART</strong>.</t>
          </li>
          <li>
            <t>NHP-Server sends <strong>NHP-ACK/AOP</strong> to <strong>NHP-Agent</strong>.</t>
          </li>
          <li>
            <t>NHP-Agent connects using <strong>NHP-ACC</strong>.</t>
          </li>
          <li>
            <t>NHP-Server and NHP-AC maintain <strong>Keepalive/Logs</strong>.</t>
          </li>
          <li>
            <t>Logs uploaded for compliance and auditing.</t>
          </li>
        </ol>
      </section>
      <section anchor="sequence-diagram">
        <name>5.3 Sequence Diagram</name>
        <t><tt>
NHP-Agent           NHP-Server            NHP-AC             ASP / IAM
 |--- NHP-KNK ---&gt;   |                     |                   |
 |                   |-- Auth Query ------------------------&gt;  |
 |                   |&lt;-- Auth Result -----------------------  |
 |                   |-- NHP-AOP (open-door) --&gt;|             |
 |                   |&lt;-- NHP-ART (result) -----|             |
 |&lt;-- NHP-ACK/AOP --|                     |                   |
 |--- NHP-ACC ----------------------------&gt;|                   |
 |&lt;============ Data Access Session ==============&gt;|           |
 |                   |-- NHP-LOG / LAK ---------&gt;|             |
</tt></t>
      </section>
    </section>
    <section anchor="cryptographic-framework">
      <name>6. Cryptographic Framework</name>
      <t>NHP employs the <strong>Noise Protocol Framework</strong> using the <strong>XX</strong> handshake pattern by default for full forward secrecy and identity protection, or <strong>K</strong> pattern for performance-optimized one-way initiation. Recommended primitives:</t>
      <ul spacing="normal">
        <li>
          <t>DH function: Curve25519</t>
        </li>
        <li>
          <t>Cipher: ChaCha20-Poly1305</t>
        </li>
        <li>
          <t>Hash: SHA-256</t>
        </li>
        <li>
          <t>Key Derivation: HKDF</t>
        </li>
      </ul>
    </section>
    <section anchor="message-structure">
      <name>7. Message Structure</name>
      <table>
        <thead>
          <tr>
            <th align="left">Field</th>
            <th align="left">Size</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Version</td>
            <td align="left">1 byte</td>
            <td align="left">Protocol version (0x01)</td>
          </tr>
          <tr>
            <td align="left">Type</td>
            <td align="left">1 byte</td>
            <td align="left">Message type code</td>
          </tr>
          <tr>
            <td align="left">Flags</td>
            <td align="left">1 byte</td>
            <td align="left">Control flags</td>
          </tr>
          <tr>
            <td align="left">Nonce</td>
            <td align="left">12 bytes</td>
            <td align="left">AEAD nonce for replay protection</td>
          </tr>
          <tr>
            <td align="left">Timestamp</td>
            <td align="left">8 bytes</td>
            <td align="left">UNIX epoch time (ms)</td>
          </tr>
          <tr>
            <td align="left">Payload Length</td>
            <td align="left">2 bytes</td>
            <td align="left">Encrypted payload length</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>8. Security Considerations</name>
      <t>NHP ensures infrastructure invisibility by encrypting all handshake traffic and performing mutual authentication before connection establishment. Implementations <bcp14>MUST</bcp14> use strong ECC keys, prevent replay, and maintain session expiration enforcement.</t>
    </section>
    <section anchor="iana-considerations">
      <name>9. IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="reference-implementation">
      <name>10. Reference Implementation</name>
      <t>An open-source reference implementation of NHP is available at:
<strong><eref target="https://github.com/OpenNHP/opennhp">https://github.com/OpenNHP/opennhp</eref></strong></t>
    </section>
    <section anchor="acknowledgments">
      <name>11. Acknowledgments</name>
      <t>This work extends concepts from the Cloud Security Alliance SDP WG and integrates guidance from NIST SP 800-207 and CSA Zero Trust research.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 290?>

<section anchor="normative-references">
      <name>Normative References</name>
      <t><xref target="RFC2119"/> Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels”, 1997.
<xref target="RFC8174"/> Leiba, B., “Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words”, 2017.
[NoiseFramework] Perrin, T., “The Noise Protocol Framework”, 2018.</t>
    </section>
    <section anchor="informative-references">
      <name>Informative References</name>
      <t>[NIST.SP.800-207] Rose, S., Borchert, O., Mitchell, S., and Connelly, S., “Zero Trust Architecture”, 2020.
[CSA.SDP.Spec2.0] CSA, “Software Defined Perimeter Specification v1.0”, 2021.
[CSA.SDP.Architecture.3.0] CSA, “SDP Architecture Guide v3.0”, 2025.
[CSA.ZeroTrust.GuidingPrinciples] CSA, “Zero Trust Guiding Principles”, 2024.
[CSA.AsymmetricCrypto.ZT] CSA, “Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives”, 2024.
[OpenNHP.Readme] Chen, B., “OpenNHP: Open Source Zero Trust Security Toolkit”, GitHub, 2025.</t>
    </section>
    <section anchor="iana-considerations-1">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <?line 312?>

</section>
    <section numbered="false" anchor="acknowledgments-1">
      <name>Acknowledgments</name>
      <t>This work builds upon foundational research from the <eref target="https://cloudsecurityalliance.org/">Cloud Security Alliance (CSA)</eref> and benefits from the collaborative support of the <eref target="https://www.ccf.org.cn/en/">China Computer Federation (CCF)</eref>. The authors would also like to thank the <eref target="https://github.com/OpenNHP/opennhp">OpenNHP</eref> open source community for their contributions, testing, and feedback on early implementations of the Network infrastructure Hiding Protocol (NHP).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
