Internet DRAFT - draft-chen-secure-routing-use-cases

draft-chen-secure-routing-use-cases







Internet Engineering Task Force                                     Chen
Internet-Draft                                                     L. Su
Intended status: Informational                                   B. Yang
Expires: 19 May 2024                                        China Mobile
                                                        16 November 2023


                 The Use Cases for Secure Routing Path
                 draft-chen-secure-routing-use-cases-03

Abstract

   Current routing mechanism is based on the shortest path, which only
   take the link status and the path accessibility into consideration,
   without the security and trustworthiness of links and forwarding
   nodes.  As security has become an important factor to the user.  This
   paper proposes to add security factor in the routing process.

   With the frequent occurrence of security incidents, services security
   is an essential demand for the users.  As there are many security
   devices in the ISP's network, this draft proposes secure routing
   mechanism.  The purpose of secure routing is to converge security and
   routing to ensure the secure data transmission.

   The scope is transmission process security, while end-to-end security
   and application layer security are out of scope.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 19 May 2024.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.



Chen, et al.               Expires 19 May 2024                  [Page 1]

Internet-Draft                  Use Cases                  November 2023


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Analysis of security requirements . . . . . . . . . . . . . .   3
   3.  Security and routing convergence  . . . . . . . . . . . . . .   3
   4.  Secure Routing Use Cases  . . . . . . . . . . . . . . . . . .   4
     4.1.  Basic path for secure routing . . . . . . . . . . . . . .   5
     4.2.  Differentiated service for secure routing path. . . . . .   6
     4.3.  hybrid basic trust and security service . . . . . . . . .   8
       4.3.1.  Use case for cloud users  . . . . . . . . . . . . . .   9
       4.3.2.  Use case for 5G non-public network or 5G network
               slicing . . . . . . . . . . . . . . . . . . . . . . .   9
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   9
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .   9
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   9

1.  Introduction

   With the frequent occurrence of network security accidents, users'
   demand for network security is greatly increased; there is no doubt
   that security of services is required.  The current security risk
   mainly comes from attacks, users need security services to ensure the
   continuity of business.

   In addition, users have higher requirements for data privacy and
   security, which includes both policy and business requirements.  For
   example, customers in the financial industry need to perceive the
   routing path and determine which link their data is running on,
   whether it is forwarded by a trusted and secure router, and whether
   secure services are provided on the link.  Whether the routing node
   is trustworthy can be evaluated by evaluating the routing node; The
   security of routing nodes can be determined by the security
   capabilities they possess.

   Some users build security centers by themselves, some buy third-party
   cloud security services, and some hope that ISPs can provide security
   services by secure routing.  Secure routing provided by ISPs can be
   implemented which can forward traffic to security functions.  With
   the development of programmable network (such as SDN) and SRv6



Chen, et al.               Expires 19 May 2024                  [Page 2]

Internet-Draft                  Use Cases                  November 2023


   technology, the forwarding requirements of the application layer can
   be completed through routing programming; accessibility and security
   in the routing process can be processed synchronously to provide
   users with secure routing.

   Network functions are also updating and integrated security functions
   to cope with complex security environments, such as routers with
   anti-DDoS attack functions.

2.  Analysis of security requirements

   From ISPs' perspective, the nodes' trustworthiness is different, it
   is necessary to provide routing policy from the security protection
   for the important users.

   For users, different users have different security requirements which
   depend on their services.  For example, e-commerce and Internet
   companies focus on phishing prevention, anti-DDoS attacks and data
   security; Medical companies focus on data security and security
   isolation, and financial companies pay special attention to their
   data security.

3.  Security and routing convergence

   If security functions and network functions are highly integrated,
   security can be as available as network connection.  Optimize
   existing routing protocols to obtain information about security
   functions in the network, secure routing can be implemented by
   combine security policy and routing policy.  Figure1 describes the
   relationship between the Network Programming controller and network
   functions and security functions.

   In this draft, Nodes are used to represent network elements.  What is
   Node with security function?  There are two deployment methods. 1.
   The security function and routing function are independent, but they
   are deployed in one site, as show in Figure1-1; 2.  The security
   functions and routing functions are integrated, as show in Figure1-2.














Chen, et al.               Expires 19 May 2024                  [Page 3]

Internet-Draft                  Use Cases                  November 2023


                          +------------+
                          | Network    |
                          | Programming|
                          | Controller |
                          +------+-----+
                                 |
           +---------------------+--------------------+
           |                                          |
           |                                          |
   +-------+-------+     +----------------------------+--------+
   |       |       |     |                            |        |
   |   +---+---+   |     | +----------+           +---+---+    |
   |   | Router|-----------| Security |-----------| Router|    |
   |   +---+---+   |     | | Function |           +-------+    |
   |       |       |     | +----------+                        |
   |  +----+----+  |     |                                     |
   |  |Security |  |     +-------------------------------------+
   |  |Function |  |                      Node
   |  +---------+  |
   |               |
   +---------------+
         Node

      Figure 1-1: Functions independent mode of Node

                        +------------+
                        | Network    |
                        | Programming|
                        | Controller |
                        +------+-----+
                               |
         +---------------------+--------------------+
         |                                          |
   +-------------------+                       +---------+
   | Network function  |                       |  Router |
   | Security function |                       +---------+
   +-------------------+                         Node
        Node

       Figure 1-2: Functions integration mode of Node

4.  Secure Routing Use Cases

   Two use cases are described below.

   1.  Routing policy ensure transmission security based on network node
       security appraisal;




Chen, et al.               Expires 19 May 2024                  [Page 4]

Internet-Draft                  Use Cases                  November 2023


   2.  Differentiated security path to meet diverse service
       requirements.

4.1.  Basic path for secure routing

   This scenario occurs in the network.  High security users require the
   link and forwarding node physical isolation, and through a specific
   link path.  To satisfied this requirement, it is necessary for the
   network programming controller to collect the network node
   information.

   Network programming controller obtain the information of nodes and
   appraise the trustworthiness can improve nodes security awareness.
   Figure2 describes nodes security appraisement.

               +-------------+
               | Network     |
               | Programming |
               | Controller  |
               +-------------+
                      | appraise
                      | trustworthiness
       +--------------+---------------+
       ^              ^               ^
       |              |               |
       |              |               |
   +---+----+     +---+---+      +----+---+
   | Node1  |     | Node2 |      | Node3  |
   +--------+     +-------+      +--------+

   Figure2 : Node security appraisement

   Also, the trustworthiness of node is different, for Node3 with poor
   trustworthiness, important users will avoid Node3 for routing policy.
   Figure3 describes userA's link forwarding process avoids Node3,select
   path<1,2,3,4>.















Chen, et al.               Expires 19 May 2024                  [Page 5]

Internet-Draft                  Use Cases                  November 2023


             Ingress

   +--------+  1    +------+   5    +---------+  6  +-------+
   | UserA  |------>| Node1|--------|  Node3  |-----| Node5 |
   +--------+       +------+        +---------+     +-------+
                        |                |              |
                        |                |              |
                        | 2              |7             |8
                        |                |              |
                        |                |              |
                        v                |              |
                    +-------+    3   +-------+    4  +-------+
                    | Node2 |------->| Node4 |------>| Node6 |---->
                    +-------+        +-------+       +-------+  Egress

               Figure3 : Link forwarding protection

4.2.  Differentiated service for secure routing path.

   ISPs have built many security functions and security resource pools
   in the network, once the network node is attacked, it needs fast and
   efficient scheduling security function to mitigate.  Users have clear
   requirements for their own security services.

   The types of users are different, and the corresponding security
   requirements are different.  The security requirement is no longer
   simply divided into high, medium and low levels, but more specific.
   For example, in addition to considering low-latency connections,
   customers in the game industry should first consider anti-DDoS
   services for security requirements,therefore, ISPs are required to
   provide anti-DDoS security services.  For financial customers, data
   security is the most important requirement, it is required that data
   cannot be tampered with, eavesdropped or copied, and so on.

   For customers with specific security requirements, ISPs need to
   transmit data at the security level expected by customers.  For
   example, if the user needs anti-ddos and IPS services, the secure
   routing must pass through Node4 and Node5.

   When userA needs Anti-ddos services, the secure routing must pass
   through Node5, Figure4-1 shows the path<1,5,6,10> selected for UserA
   which require anti-ddos service.









Chen, et al.               Expires 19 May 2024                  [Page 6]

Internet-Draft                  Use Cases                  November 2023


                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|------->|   Node3 |---->| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    |
         ingress     |                |              |           |
                     |                |              |           |
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     |                |              |           V
                 +------+     3   +------+    4  +-------+   9 +------+
                 | Node2|---------| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+

           Figure4-1 : User require anti-ddos service

   When userA needs IPS services, the secure routing must pass through
   Node4, Figure4-2 shows the path<1,5,7,4,9> selected for UserA which
   require IPS service.

                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|------->|   Node3 |-----| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    |
         ingress     |                |              |           |
                     |                |              |           |
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     |                |              |           |
                 +------+     3   +---v--+    4  +-------+ 9   +------+
                 | Node2|---------| Node4|------>| Node6 |---->|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+

           Figure4-2 : User require IPS service

   When userA needs WAF services, the secure routing must pass through
   Node2, Figure4-3 shows the path<1,2,11> selected for UserA which
   require IPS service.






Chen, et al.               Expires 19 May 2024                  [Page 7]

Internet-Draft                  Use Cases                  November 2023


                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|--------|   Node3 |-----| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    |
         ingress     |                |              |           |
                     |                |              |           |
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     V                |              |           |
                 +------+     3   +------+    4  +-------+ 9   +------+
                 | Node2|---------| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       ^
                     |                      11                   |
                     +-------------------------------------------+

           Figure4-3 : User require WAF service

   When userA needs IPS, WAF and Anti-ddos services, the secure routing
   must pass through Node4, Node2 and Node5, Figure4-4 shows the
   path<1,2,3,7,6,10> selected for UserA which require IPS, WAF and
   Anti-ddos services.

                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|--------|   Node3 |---->| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    |
         ingress     |                ^              |           |
                     |                |              |           |
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     V                |              |           V
                 +------+     3   +------+    4  +-------+ 9   +------+
                 | Node2|-------->| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+

           Figure4-4 : User require WAF IPS and Anti-ddos services

4.3.  hybrid basic trust and security service

   Usually, users' needs are mixed, requiring both trusted paths and
   providing security services on the routing path.




Chen, et al.               Expires 19 May 2024                  [Page 8]

Internet-Draft                  Use Cases                  November 2023


4.3.1.  Use case for cloud users

   Most ISPs provide cloud services, and users host data on the cloud,
   requiring frequent interaction and operation with the cloud.  As
   sensitive user data store in the cloud, users need high level
   security protection for the routing link to access to sensitive user
   data.

4.3.2.  Use case for 5G non-public network or 5G network slicing

   NPN or 5G slicing vertical users such as bank, stock exchange,
   electric power company have requirements on the turstworthiness and
   anti-attack abilities of the link, they need the ISPs to construct a
   trusted routing link which meet the customer’s security requirement.

5.  IANA Considerations

   This memo includes no request to IANA.

6.  Security Considerations

   TBD

Authors' Addresses

   Meiling Chen
   China Mobile
   BeiJing
   China
   Email: chenmeiling@chinamobile.com


   Li Su
   China Mobile
   BeiJing
   China
   Email: suli@chinamobile.com


   Bo Yang
   China Mobile
   BeiJing
   China
   Email: yangbo@chinamobile.com







Chen, et al.               Expires 19 May 2024                  [Page 9]