<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-secure-routing-use-cases-03" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="Use Cases">The Use Cases for Secure Routing Path</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-secure-routing-use-cases-03"/>
    <author initials="" surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <author initials="B." surname="Yang" fullname="Bo Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>yangbo@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="16"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 36?>

<t>Current routing mechanism is based on the shortest path, which only take the link status and the path accessibility into consideration, without the security and trustworthiness of links and forwarding nodes. As security has become an important factor to the user. This paper proposes to add security factor in the routing process.</t>
      <t>With the frequent occurrence of security incidents, services security is an essential demand for the users. As there are many security devices in the ISP's network, this draft proposes secure routing mechanism. The purpose of secure routing is to converge security and routing to ensure the secure data transmission.</t>
      <t>The scope is transmission process security, while end-to-end security and application layer security are out of scope.</t>
    </abstract>
  </front>
  <middle>
    <?line 44?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the frequent occurrence of network security accidents, users' demand for network security is greatly increased; there is no doubt that security of services is required. The current security risk mainly comes from attacks, users need security services to ensure the continuity of business.</t>
      <t>In addition, users have higher requirements for data privacy and security, which includes both policy and business requirements. For example, customers in the financial industry need to perceive the routing path and determine which link their data is running on, whether it is forwarded by a trusted and secure router, and whether secure services are provided on the link. Whether the routing node is trustworthy can be evaluated by evaluating the routing node; The security of routing nodes can be determined by the security capabilities they possess.</t>
      <t>Some users build security centers by themselves, some buy third-party cloud security services, and some hope that ISPs can provide security services by secure routing. Secure routing provided by ISPs can be implemented which can forward traffic to security functions. With the development of programmable network (such as SDN) and SRv6 technology, the forwarding requirements of the application layer can be completed through routing programming; accessibility and security in the routing process can be processed synchronously to provide users with secure routing.</t>
      <t>Network functions are also updating and integrated security functions to cope with complex security environments, such as routers with anti-DDoS attack functions.</t>
    </section>
    <section anchor="analysis-of-security-requirements">
      <name>Analysis of security requirements</name>
      <t>From ISPs' perspective, the nodes' trustworthiness is different, it is necessary to provide routing policy from the security protection for the important users.</t>
      <t>For users, different users have different security requirements which depend on their services. For example, e-commerce and Internet companies focus on phishing prevention, anti-DDoS attacks and data security; Medical companies focus on data security and security isolation, and financial companies pay special attention to their data security.</t>
    </section>
    <section anchor="security-and-routing-convergence">
      <name>Security and routing convergence</name>
      <t>If security functions and network functions are highly integrated, security can be as available as network connection. Optimize existing routing protocols to obtain information about security functions in the network, secure routing can be implemented by combine security policy and routing policy. Figure1 describes the relationship between the Network Programming controller and network functions and security functions.</t>
      <t>In this draft, Nodes are used to represent network elements. What is Node with security function? There are two deployment methods.
1. The security function and routing function are independent, but they are deployed in one site, as show in Figure1-1; 
2. The security functions and routing functions are integrated, as show in Figure1-2.</t>
      <artwork><![CDATA[
                       +------------+
                       | Network    |
                       | Programming|
                       | Controller |
                       +------+-----+
                              |
        +---------------------+--------------------+
        |                                          |
        |                                          |
+-------+-------+     +----------------------------+--------+
|       |       |     |                            |        |
|   +---+---+   |     | +----------+           +---+---+    |
|   | Router|-----------| Security |-----------| Router|    |
|   +---+---+   |     | | Function |           +-------+    |
|       |       |     | +----------+                        |
|  +----+----+  |     |                                     |
|  |Security |  |     +-------------------------------------+
|  |Function |  |                      Node
|  +---------+  |
|               |
+---------------+
      Node

   Figure 1-1: Functions independent mode of Node
]]></artwork>
      <artwork><![CDATA[
                     +------------+
                     | Network    |
                     | Programming|
                     | Controller |
                     +------+-----+
                            |
      +---------------------+--------------------+
      |                                          |
+-------------------+                       +---------+
| Network function  |                       |  Router |
| Security function |                       +---------+
+-------------------+                         Node
     Node

    Figure 1-2: Functions integration mode of Node
]]></artwork>
    </section>
    <section anchor="secure-routing-use-cases">
      <name>Secure Routing Use Cases</name>
      <t>Two use cases are described below.</t>
      <ol spacing="normal" type="1"><li>
          <t>Routing policy ensure transmission security based on network node security appraisal;</t>
        </li>
        <li>
          <t>Differentiated security path to meet diverse service requirements.</t>
        </li>
      </ol>
      <section anchor="basic-path-for-secure-routing">
        <name>Basic path for secure routing</name>
        <t>This scenario occurs in the network. High security users require the link and forwarding node physical isolation, and through a specific link path. To satisfied this requirement, it is necessary for the network programming controller to collect the network node information.</t>
        <t>Network programming controller obtain the information of nodes and appraise the trustworthiness can improve nodes security awareness. Figure2 describes nodes security appraisement.</t>
        <artwork><![CDATA[
            +-------------+
            | Network     |
            | Programming |
            | Controller  |
            +-------------+
                   | appraise
                   | trustworthiness
    +--------------+---------------+
    ^              ^               ^
    |              |               |
    |              |               |
+---+----+     +---+---+      +----+---+
| Node1  |     | Node2 |      | Node3  |
+--------+     +-------+      +--------+

Figure2 : Node security appraisement
]]></artwork>
        <t>Also, the trustworthiness of node is different, for Node3 with poor trustworthiness, important users will avoid Node3 for routing policy. Figure3 describes userA's link forwarding process avoids Node3,select path&lt;1,2,3,4&gt;.</t>
        <artwork><![CDATA[
          Ingress        
                                 
+--------+  1    +------+   5    +---------+  6  +-------+
| UserA  |------>| Node1|--------|  Node3  |-----| Node5 |
+--------+       +------+        +---------+     +-------+
                     |                |              |
                     |                |              |
                     | 2              |7             |8
                     |                |              |
                     |                |              |
                     v                |              |
                 +-------+    3   +-------+    4  +-------+
                 | Node2 |------->| Node4 |------>| Node6 |---->
                 +-------+        +-------+       +-------+  Egress
                                                  
            Figure3 : Link forwarding protection                                      
]]></artwork>
      </section>
      <section anchor="differentiated-service-for-secure-routing-path">
        <name>Differentiated service for secure routing path.</name>
        <t>ISPs have built many security functions and security resource pools in the network, once the network node is attacked, it needs fast and efficient scheduling security function to mitigate. Users have clear requirements for their own security services.</t>
        <t>The types of users are different, and the corresponding security requirements are different. The security requirement is no longer simply divided into high, medium and low levels, but more specific. For example, in addition to considering low-latency connections, customers in the game industry should first consider anti-DDoS services for security requirements,therefore, ISPs are required to provide anti-DDoS security services. For financial customers, data security is the most important requirement, it is required that data cannot be tampered with, eavesdropped or copied, and so on.</t>
        <t>For customers with specific security requirements, ISPs need to transmit data at the security level expected by customers. For example, if the user needs anti-ddos and IPS services, the secure routing must pass through Node4 and Node5.</t>
        <t>When userA needs Anti-ddos services, the secure routing must pass through Node5, Figure4-1 shows the path&lt;1,5,6,10&gt; selected for UserA which require anti-ddos service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|------->|   Node3 |---->| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     |                |              |           V
                 +------+     3   +------+    4  +-------+   9 +------+
                 | Node2|---------| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-1 : User require anti-ddos service
]]></artwork>
        <t>When userA needs IPS services, the secure routing must pass through Node4, Figure4-2 shows the path&lt;1,5,7,4,9&gt; selected for UserA which require IPS service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|------->|   Node3 |-----| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     |                |              |           |
                 +------+     3   +---v--+    4  +-------+ 9   +------+
                 | Node2|---------| Node4|------>| Node6 |---->|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-2 : User require IPS service
]]></artwork>
        <t>When userA needs WAF services, the secure routing must pass through Node2, Figure4-3 shows the path&lt;1,2,11&gt; selected for UserA which require IPS service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|--------|   Node3 |-----| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     V                |              |           |
                 +------+     3   +------+    4  +-------+ 9   +------+
                 | Node2|---------| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       ^
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-3 : User require WAF service
]]></artwork>
        <t>When userA needs IPS, WAF and Anti-ddos services, the secure routing must pass through Node4, Node2 and Node5, Figure4-4 shows the path&lt;1,2,3,7,6,10&gt; selected for UserA which require IPS, WAF and Anti-ddos services.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|--------|   Node3 |---->| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                ^              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     V                |              |           V
                 +------+     3   +------+    4  +-------+ 9   +------+
                 | Node2|-------->| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-4 : User require WAF IPS and Anti-ddos services
]]></artwork>
      </section>
      <section anchor="hybrid-basic-trust-and-security-service">
        <name>hybrid basic trust and security service</name>
        <t>Usually, users' needs are mixed, requiring both trusted paths and providing security services on the routing path.</t>
        <section anchor="use-case-for-cloud-users">
          <name>Use case for cloud users</name>
          <t>Most ISPs provide cloud services, and users host data on the cloud, requiring frequent interaction and operation with the cloud. As sensitive user data store in the cloud, users need high level security protection for the routing link to access to sensitive user data.</t>
        </section>
        <section anchor="use-case-for-5g-non-public-network-or-5g-network-slicing">
          <name>Use case for 5G  non-public network or 5G network slicing</name>
          <t>NPN or 5G slicing vertical users such as bank, stock exchange, electric power company have requirements on the turstworthiness and anti-attack abilities of the link, they need the ISPs to construct a trusted routing link which meet the customer’s security requirement.</t>
        </section>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <?line 292?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
