<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-secure-routing-requirements-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="Requirements">The Requirements for Secure Routing Path</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-secure-routing-requirements-02"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="16"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 32?>

<t>Both ISPs and users have put forward requirements for secure routing, the scenarios are analyzed in the draft <eref target="https://datatracker.ietf.org/doc/draft-chen-secure-routing-use-cases/">draft-chen-secure-routing-use-cases</eref>. This draft analyzes the functions required to implement secure routing.</t>
      <t>Attack detection and users security requirements translateion are out of scope.</t>
    </abstract>
  </front>
  <middle>
    <?line 38?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Starting from the requirements of network operators and users, it is necessary to take the security attribute as the key factor to select the route and transmission path to measure the link transmission security. To achieve this goal, the following contents  need to be studied.</t>
      <ol spacing="normal" type="1"><li>
          <t>Static node security, by appraising the trustworthiness, then it can be determined whether the node is secure and whether the node has security abilities;</t>
        </li>
        <li>
          <t>Dynamic Security, by path scheduling, then it can be determined whether the path is secure and whether the path have the abilities to anti-cyberattack;</t>
        </li>
        <li>
          <t>Close-loop validation, by path validation, then it can check whether the selected path and the executed path are consistent;</t>
        </li>
      </ol>
      <t>Implementing a secure routing path will involve multiple protocols:</t>
      <ol spacing="normal" type="1"><li>
          <t>Expression of node security capability and trustworthiness, by YANG Model;</t>
        </li>
        <li>
          <t>Collect node trust and security factors, and advertise through extending the BGP protocol;</t>
        </li>
        <li>
          <t>Collect available status information of security devices and resources through network nodes, such as extending BGP-LS;</t>
        </li>
        <li>
          <t>Collect JSON messages carrying security resource information through the Restful;</t>
        </li>
        <li>
          <t>Distribute security policy configuration through the Netconf;</t>
        </li>
        <li>
          <t>Distribute traffic forwarding paths through programming, such as SRv6;</t>
        </li>
        <li>
          <t>Perform consistency verification on paths and security services, such as extending the SFC.</t>
        </li>
      </ol>
      <artwork><![CDATA[
                             +-------------------+
                             |Network Programming|
         ------------------->|Controller AND     |
                             |Secure Routing     |
                             +---------+---------+
                                       |
                                       |
                                       |
       +----------------------+--------+---------------+--------------+
       |                      |                        |              |
       |                      |                        |              |
3.Distribute routing policy   |        2.collect node information     |
  with security policy        |          include security capability  |
       |                      |                        |              |
   +---+----+              +--+---+                 +--+---+          |
   |Ingress |              |Node2 |                 |Node1 |       +--+--+
   |Node    |              |IPS   |                 |WAF   |       |Node2|
   +--------+              +------+                 +------+       +-----+
                                       1.YANG Model: expression of
                                         Node security information
                                       
]]></artwork>
    </section>
    <section anchor="requirements-for-secure-routing-path">
      <name>Requirements for Secure Routing Path</name>
      <section anchor="appraise-node-trustworthiness">
        <name>Appraise node trustworthiness</name>
        <t>Evaluate routing nodes, such as whether they are secure boot and the security level of the nodes. By Performing static security assessment on routing nodes, can provide a foundation for forming trusted or secure paths. In another draft, the concept of trusted path routing in <eref target="https://datatracker.ietf.org/doc/draft-voit-rats-trustworthy-path-routing/">draft-voit-rats-trustworthy-path-routing</eref> was mentioned, which addresses the issue of security evaluation for node self initiation.</t>
      </section>
      <section anchor="expression-of-security-capability">
        <name>Expression of security capability</name>
        <t>YANG model is used to describe the security capability of nodes, such as security service type and remaining capacity.</t>
      </section>
      <section anchor="node-security-capability-collection-protocol">
        <name>Node security capability collection protocol</name>
        <t>Collect the security capabilities of all nodes in the network, one solution is through BGP-LS, <eref target="https://datatracker.ietf.org/doc/draft-chen-idr-bgp-ls-security-capability/">draft-chen-idr-bgp-ls-security-capability</eref> extend BGP-LS to carry security capability information.</t>
      </section>
      <section anchor="distribution-of-security-policy">
        <name>Distribution of security policy</name>
        <t>Security policies can be distributed through extended SRv6 SRH.</t>
      </section>
      <section anchor="secure-path-validation">
        <name>Secure path validation</name>
        <t>Perform consistency verification on paths and security services, At present, this <eref target="https://datatracker.ietf.org/doc/draft-liu-on-network-path-validation/">draft-liu-on-network-path-validation</eref> provides ideas for path validation.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <?line 115?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
