<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-secure-path-architecture-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="BGP-LS2C">the architecture for secure path</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-secure-path-architecture-00"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 34?>

<t>Some users need to choose nodes that meet security requirements to form secure paths and ensure that traffic can defend against dynamic attacks during path forwarding.</t>
      <t>In this architecture, there are four roles defined: attester, authorizer, controller and secfunction, the interaction of these four roles can achieve the selection of secure paths and security services. the purpose of this architecture is to secure the path, including node static security assessment, dynamic security defense, and path and service validation.</t>
    </abstract>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the early days, users' demand for the network was accessibility, but now their demand for security is becoming increasingly evident, how to implement secure paths has become a new research direction. To meet users' needs for secure path, at least the following three parts need to be included.</t>
      <t>1.Security of static nodes: the trustworthy of nodes in the routing path need to be evaluated; 
2.Routing path defense security: this requires the ability to resist attacks at the routing level, in terms of implementation, it is required that ISPs can match security defense capabilities during routing scheduling;
3.Secure path Validation: on the premise that a secure path has been formed, ensure that user traffic is indeed forwarded according to the pre-formed path.</t>
      <t>Therefore, this draft attempts to propose an architecture for secure path.</t>
    </section>
    <section anchor="secure-path-architecture">
      <name>Secure path architecture</name>
      <t>There are four roles in the secure path architecture, Attester can report the security information to the contoller through the authorizer, the authorizer is responsible for verifing the authenticity of the information. The controller matches the user's requirements based on the obtained information to form a secure routing path strategy, how to match user requirements is out of scope. Then forward data for users along secure paths and provide secure service capabilities. Finally, the authorizer verifies whether the forwarding path is consistent with the issued routing policy and whether the security capability is truly provided.</t>
      <artwork><![CDATA[
              +-----------+
    +---------+ Authorizer+---------+
    |         +-----------+         |
    |                               |
+---+------+                  +-----+------+
| Attester +------------------+ Controller |
+---+------+                  +-----+------+
    |                               |
    |          +------------+       |
    +----------+SecFunction +-------+
               +------------+
 
Figure 1: Basic secure path architecture
]]></artwork>
      <section anchor="components">
        <name>Components</name>
        <section anchor="attester">
          <name>Attester</name>
          <t>In Remote ATtestation procedureS (RATS), one peer (the "Attester") produces believable information about itself ("Evidence") to enable a remote peer (the "Relying Party") to decide whether or not to consider that Attester a trustworthy peer, but in secure path attester produces evidence of secure boot and information of usable security capabilities to enable the controller to select secure nodes to form routing paths.</t>
        </section>
        <section anchor="controller">
          <name>Controller</name>
          <t>The controller can obtain information from all nodes in the network, implement network programming to form forwarding path policies, and distribute the policies to the forwarding nodes.</t>
        </section>
        <section anchor="authorizer">
          <name>Authorizer</name>
          <t>As an vital third party, before the formation of path strategy, the authorizer's responsibility is to verify the authenticity of the attester's claim; After path policy execution or during the execution of routing policies, authorizer verifies if the path is executed as scheduled and the security capability is truly provided.</t>
        </section>
        <section anchor="secfunction">
          <name>Secfunction</name>
          <t>There are two functions for forming a secure path: one is to ensure the static security of the routing node by secure boot, and the other is to provide security capabilities to defend against dynamic attacks during the routing forwarding process. The secfunction include the security capabilities that the routing node itself can provide externally, the ability to security resource pool supported by virtualization, and the ability to provide specialized hardware security devices, such as IPS/firewall.</t>
        </section>
      </section>
      <section anchor="secure-path-operations">
        <name>Secure path Operations</name>
        <section anchor="indirect-model">
          <name>Indirect Model</name>
          <t>Indirect Model: the controller Obtains security function information through the attester node, and then send the security informations to authorizer, after verifying the authenticity of the information, the controller can obtain attestation result. After forming routing policy according to users' requirements, secure path policies can be distributed to routing nodes, the whole process can be seen in Figure2.</t>
          <artwork><![CDATA[
+------------+     +----------+               +-----------+   +------------+
|SecFunction |     | Attester |               | Authorizer|   | Controller |
+-----+------+     +-----+----+               +-----+-----+   +------+-----+
      |                  |                          |                |
      |               secure                        |                |
      |                boot                         |                |
      |                  |                          |                |
      +------------------>                          |                |
      | aware security   |                          |                |
      | capabilities     |                          |                |
      |                  +-------------------------->                |
      |                  |   security capabilities  |                |
      |                  | & trustworthiness claim  +---------------->
      |                  |                          |Attestation     |
      |                  |                          | Result         |
      |                  |                          |                |
      |                  |                                           |
      |                  <-------------------------------------------+
      |                  |  Secure path routing policy issurance     |

                    
                     Figure 2: Indirect Model
]]></artwork>
          <t>When the network node receives the routing policy, it enable the security functions, then all traffic forwarding will receive security services. During the data forwarding process or after the data forwarding is completed, security validation can be performed on the entire process, including verification of secure paths and verification of whether security services are provided, the final validation results will be given to the controller or present to users.</t>
          <artwork><![CDATA[
+------------+     +----------+           +-----------+       +------------+
|SecFunction |     | Attester |           | Authorizer|       | Controller |
+-----+------+     +-----+----+           +-----+-----+       +------+-----+
      |                  |                      |                    |
      <------------------+                      |                    |
      |enable SecFunction|                      |                    |
      |----------------->|                      |                    |
      |  ok       traffic forwarding            |                    |
      |                  |                      |                    |
      |                  +---------------------->                    |
      |                  |Secure path validation+--------------------+
      |                  |                      |  Validation Result |

        Figure 3: Path and security service validation Process
]]></artwork>
        </section>
        <section anchor="direct-model">
          <name>Direct Model</name>
          <t>Direct Model: If the security function has a public address, the security function proactively reports its own information to the authorizer, after verifying the authenticity of the information, the controller can obtain attestation result. After forming routing policy according to users' requirements, secure path policies can be distributed to secfunction, the whole process can be seen in Figure4.</t>
          <artwork><![CDATA[
+-----------+                  +----------+  +----------+
|SecFunction|                  |Authorizer|  |Controller|
+-----+-----+                  +----+-----+  +----+-----+
      |                             |             |
      |                             |             |
      +---------------------------->|             |
      |security capability report   |             |
      |         +--------+          +------------>|
      |         |Attester|          | attestation |
      |         +---+----+          |   result    |
      |             |                             |
      |<------------+<----------------------------+
      |             |  secure path routing        |
      |             |    policy issurance         |
      |             |                             |

             Figure 4: Direct Model
]]></artwork>
          <t>In the direct model the network node and secfuntion both receive the routing policy, then all traffic forwarding will receive security services. During the data forwarding process or after the data forwarding is completed, security validation can be performed on the entire process, including verification of secure paths and verification of whether security services are provided, the final validation results will be given to the controller or present to users.</t>
          <artwork><![CDATA[
+-----------+  +--------+      +----------+  +----------+
|SecFunction|  |Attester|      |Authorizer|  |Controller|
+-----+-----+  +----+---+      +----+-----+  +----+-----+
      |             |               |             |
      |             |               |             |
      |             +-------------->|             |
      |             |path validation|             |
      |             |               |             |
      |                             |             |
      +---------------------------->|             |
      |security service validation  +------------->
      |                             |validation   |
      |                             |result       |

  Figure 5: Path and security service validation Process
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <?line 194?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1aW2/juBV+D5D/QEyAzix8aSazfainGDQ7lyLFTjeYBO1j
QUt0TEQSXZKyx1u3v73f4UWiZDkX7yxQFHVeYoo8N57znY+UJ5PJ6YmxvMr/
zgtViRmzuhanJ3Kl3b/GXpyf//784vQk43bGZLVQ7Iy9X4rsHuvqeSmNkaqy
2xWWXn28/XR6wrXgM3YjslpLuz092dzhSWWFroRlH6s7WQmhZXXHbrm5Z5+U
zqDv9CRXWcVLSMk1X9hJthTVxJAQMVlxu5xwnS2lFZmlkfNzWmKlLcjipWDp
U7ZQmvmljJYy2DSfa7GesR/+dD358ebi/elJwSvYJarTk/vN7PSEsUlj5OQD
WeDH7sV2o3QO/89Yzi20XZxfvJm8Pp9cvGGTiRtj0rCFLAqRIz6M11aV3MqM
F8WWzbfsa1lc6EXG5IJVyrI7uSatmLZUGponTCvyQuTSwu4zpkWp1iJO99vB
INnMKO4VffGB+ixkQXGMo0rf0RRZcfZZzWXh1mXYA/gt5J8x1Q2ourJ6G2bS
iCi5LGaMIl56kX/M6FnphEwzVZKVXuePkt3U30CZqQu5r8X/TRBXPjdW88zS
9xtVClYboQ1D6uTMKtiqlBEIUC4M9p9bVgpklwlJhxj+o5YIpKisofnIiDJN
CcOQ8dh9QwNuPbQtFjJjGa9YLhYCj/kdR9Qty7ewEo+4tTy7NyyvXfq61ILg
Ddc5vk/J1KsK0pAOaTqOKUE1pShlZq3dfhtSgkrIZyRWGGTemPmckD/T/xmK
ChMLoZ2psH1RV5lFrTl5yAcs4W6AqQUNmY548oPDCLEWbr4RhWhm70WiCRyi
vJaZMFO3aFXrFcXZKei5RVmPyAZRbjbEjWFYVtQUELc7DNiCWmgVcGOEMbQx
4yawzUMXeIOIkU0uvt44ZxNb80Ki3uDDNKZJKfO8cPBxRuWrVV47J5u9EExw
jTrM+daMfRK9hJqS5BJM0AyUPGr8nm04PMzgvJFISdgzZvPawo0NTZM6XdeY
jCjMBZKXHIbrwD6Df6FRrGXuvFzSesVkuSpcQnajv+RBABIElmyQukZQnFmO
BHbOTNmt8vkd7KcqMH2UQ9AsK6DeOqcWyB21IavsUguaom1bP3MR9knkU0bB
ej2NgO3yw2+aKy+Pr64VIEp26Sb4wpM+wlrVtimIRIPAhtXAx/wtVFxMv6TT
wk43cZz5BAt1azym+10gaRiScCxWILcdxQWSvBg7c4QuDRnYRJv7kpGWteJz
X/JXN9e+TgDXiHc/C/Fo5U2Qoin6qNIALfOasPLt6ckbH7zQbf7apOmMKR+h
FaBImoA0vNOb/P6LykGUyMcdUKL9bpBJUsBzCm8AHfyHdFUOfShIQdPES3Li
XaHcEvxg0CERpLgG62CnXHl4XGnl6pww44FGOvWFljqbTm909aEu5Ik5sG7M
LgMEut3QYoU8a1e4KqvIKRfU6CkBpMdHJLiq75Y+ZxII7X73+29WqkJ5F963
NYjIwteIn4qEkVkoAo+yjV5UYdAaYNllTUhV2qiXptt25txgF0IGqLnlBPd9
T1xjajKiU0nUAK242zYI4tPU5URHERzDOle3mVoJZ2gVk4QYCnfO+g5KLO9u
vwEgAwiv4oMIuWkJTNkntGuQmr3I+jAiFJuloF4XACh2Ru8OrMwo9thnYOBG
Wr9h4I81wtJ4rgqZbZ1JqbAmERqDHPIClYC0wfbcpee/8SGekX5Gk/Yz8g/b
oRG7bDwZ9afthmU0o7v+tOEPptH6UX95T/qo0b1rSyJV3Oh/36bhs2U/0eDe
tFHXgM605NkI4PApEJVmfNTfkJ40PD49+STvKPNegz+ihWYH0SJuMZAIBxFV
oqCpCvzAWRM3+g5KwL6ATYOiX97SsC875EsG8Nbihr36cnl7890YVQpNOJaw
V5RtL6KQF9/RZHAKQSBdgExxgo60hvmcak9a8KsFe/Xio+v6mcBKVKyo3Hzu
OL3tqPgiii0l/DX68tbPzkVGJRjzHiXrDgDK103uSgFNockM3unKJNsTFsBt
J3hxfuOKCEYmVHCuoIqqLvUNj2vjPNivPyr31kPbhUbHC4lvRvGBqAe8S2HO
TOPOtTkdGkkqkRqDx9COhQutAJ9F0SUkgdCNE84VOR5icKd5WYaW6czpI5XD
IPjnaWgOxNIScQ0kNzyMbShZ7Gxo3GlRhUYuCWbZWlpeUBPWuSNkxDBdZ46i
2sD3WkAXcV8mrawFQ+WBeHuwm8VMwPKs4LJ8yy4XLjEar0Fbv2LHvBE6kh5H
o9vxRRetfaQGuoFcNMcCss9LINJiIn2iL1X+TISn4N60x6Eu68Aus/jEU2SK
KtnaoV0zV/EypLCJJ5j+YSXELbrrDjTzbVoz48YB5YpWRj7VdtOhsnnaCTPV
nSYp4ZcxnpAkB8NI6Q/EU8aj8p5LAb2oxqLl4ivdhSTdvuXiySHbgONlVBOq
wIl+RbwNW4oIraW2NXjwz4F+xyAlYpoYrQB7NBUrl/Bww7VIubg7jo4hHtwH
mXN1ffPbBajPBraFdOgQ0p9WOBa73Y+5clX5kxT7DF8LfzJMR2Z99PrJ4Yxp
jUgCnJC3lHVGiKVwNt4SDPezO5HgEiHlq9wVo6/hJ5LScd/2BCe9Ud5YbFVd
2Gmo91gSfdKVHibCUTMlmuNOW2mAkFTitNfipDv/pQlmvJmbJU4DMXvjMkNn
H1jr2/9FwuEGGMeoPzDMKEYDDGOXEhPPaxKS1edDuwS+d+77PuPqca5kaNi2
Ud+2UZccDXCyB2ja3qPdITlh036xHM8RvoGcI/0aIMLvjpGzY7yLMUfHuQOt
g5OfJmfvM+DqQZcfi/NwI3jufv0m4Zo4x5rAIAZMfXfkvl8mcPUUvw7JAeMn
rHuiXw/I6Q8cJ2d/7gNy/nB43/c+j+BG2hN7OE9Hbs2J/wd79o5n7jM8GoCa
Xcz2Gms8l/2NWl96sepIBmYKuQ73JV2L3PVccpLYa7y+gVSO6cfrsIQQbSTG
g/yhq+wPLZ2KtyE9LkVk17ffoUnu6oKOEpYu6BoF7X10bGbgHuHyLVz7UOvW
Tc9LL8c9S874wSv5/oR4LNzzz/HeyJB9p13QRU1qn+//xkcKhrqXUOlNWmht
ik6JwtCJKXKAozry0G3J8R2534392LEdud+NE9uO7siDw02lD5T1wD3N43J2
oUaSwB1lz27PnHfHyWFM3YfBgbJ8jpwnKT5CzoFOOkgcHrQnxdO2sAbFH5c/
7WuD2ME6yBxg982MXbfvxbpIkBb8tUec9LLsjH3onYM+dE5BV4th8HWvKDhb
1fOCjqh5rh2UDc8FDtFLybUotuEi39DxkqlNNXSJ/z97/Nl7X/uEw8/3B6D2
4J1ufDrq5N7uYXjYdbB016JoD0QPaR11tD6OmAeT/6Fye3zRAxR5D85aTUO3
TOF90xPMa3QmsRl19e4v2sWWlojfdbLzgKZ+46KnuuG2B6L3SCybRZ2WNHqQ
dx7Y3B3r1EMspsPRa74N0tBf4lOPqQao/H7WA7wIheGHAYG8lvRwn662P7pw
ezRX5GOgmEMM9v/89L+Ln472y/UZoNkv2meAZgOLqdZngOb+VVQv27/Zoh6E
HgTN7nCPAf165vU/v04jGOBOPZEPXWikslMJT/ZJp5cVAcoCfv3uaKrHri7/
cknnI/fWMFw2//OMRv/lX5cAMUpRqvjGwADzHNcRxhUWzfS/C2p+70HK9yTG
J17qDx/a3+/NOf1A1P/9ByKnDFxkKgAA

-->

</rfc>
