<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-secure-routing-use-cases-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Use Cases">The Use Cases for Secure Routing</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-secure-routing-use-cases-00"/>
    <author initials="" surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="06"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <t>Traditional path selection conditions include the shortest path, the lowest delay, and the least jitter, this paper proposes to add a new factor: security, which determines the forwarding path from security dimension.</t>
      <t>The frequent occurrence of security incidents, users' demand for security services is increasingly strong. As there are many security devices in the ISP's network, this draft proposes secure routing, the purpose of secure routing is to converge security and routing to ensure the security of the transmission process.</t>
      <t>The scope is transmission process security, end-to-end security and processing security are out of scope.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>With the frequent occurrence of network security events, users' demand for network security is increasingly strong, there is no doubt that multi-level security is needed to ensure the security of users. The current security risk mainly comes from attacks, users need security services to ensure the normal use of business.</t>
      <t>Some companies build security centers by themselves, some buy third-party cloud security services, and some hope that ISPs can provide security services by secure routing. Security routing provided by ISPs can be implemented which can guide traffic through security devices. With the development of programmable network and SRv6 technology, the forwarding requirements of the upper layer can be completed through routing programming; Accessibility and security in the routing process can be processed synchronously to provide users with secure routing.</t>
      <t>In addition to special security equipment, network devices are also updating and integrated security functions to cope with complex security environments, such as routers with anti DDoS attack functions, the switch has detection (IDS) function and firewall function.</t>
    </section>
    <section anchor="analysis-of-security-requirements">
      <name>Analysis of security requirements</name>
      <t>For ISPs, the user's credibility is different, it is necessary to strategy path from the security protection of the basic network.</t>
      <t>For users, different users have different security requirements which depend on their business. For example, e-commerce and Internet companies focus on phishing prevention, anti-DDoS attacks, and data security; Medical companies focus on data security and security isolation, and so on. In a word, users have differentiated security requirements.</t>
    </section>
    <section anchor="security-and-network-convergence">
      <name>Security and network convergence</name>
      <t>If security functions and network functions are highly integrated, security can be as flexible as network connection. Optimize existing routing protocols to obtain information about security devices in the network, security routing can be realized by taking into account the security policy when routing strategy. The following figure describes the relationship between the controller and network devices and security devices.</t>
      <artwork><![CDATA[
                 +-----------+
                 |    IP     |
                 |programming|
                 | controller|
                 +-----x-----+
                       x
                       x
     xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
     x                                  x
     x            +---------+           x
 +---x----+       |security |       +---x----+
 | router +-------+ device  +-------+ router |
 +---+----+       +---------+       +--------+
     |
+----+----+
|security |
| device  |
+---------+

Figure 1: Secure routing model
]]></artwork>
    </section>
    <section anchor="secure-routing-use-cases">
      <name>Secure Routing Use Cases</name>
      <t>Two use cases are described below.</t>
      <ol spacing="normal" type="1"><li>Strategy routing path ensure basic network security, and network node security evaluation ensures the security of the transmission node itself;</li>
        <li>Differentiated security path to meet user requirements.</li>
      </ol>
      <section anchor="basic-path-for-secure-routing">
        <name>Basic path for secure routing</name>
        <t>This scenario occurs in the 5G network vertical industry. The power industry slicing requires physical isolation, that is, running on an independent physical machine. To achieve this requirement, it is necessary to collect the network node information to the controller. When it is time to provide services for power slicing, just obtain information from the controller, and then strategy secure routing.</t>
        <t>For security, obtain the information of nodes and appraise the trustworthiness can help improve basic nodes security awareness, the draft draft-voit-rats-trustworthy-path-routing focus on this field.</t>
        <artwork><![CDATA[
            +-------------+
            |  Controller |
            +------+------+
           appraise|trustworthiness
    +--------------+---------------+
    |              |               |
+---+----+     +---+---+      +----+---+
| Node1  +-----+ Node2 +------+ Node3  |
+--------+     +-------+      +--------+

Figure 2: Node security appraisement
]]></artwork>
        <t>Also, the credibility of users is differentiated, for users with poor credibility or potential attack behaviors, avoid critical nodes when forming routing paths. As shown in the figure, user A with poor credibility, key node3 will be avoided when forming a path&lt;1,2,3,4&gt; for user A.</t>
        <artwork><![CDATA[
                  Ingress
                                 +---------+
+--------+  1    +------+   5    |   Key   |  6  +------+
| User A +------>| Node1+-------->  Node3  +-----+ Node5|
+--------+       +---+--+        +----+----+     +---+--+
                     |                |              |
                     |                |              |
                     | 2              |7             |8
                     |                |              |
                     |                |              |
                     |                |              |
                 +---+--+     3   +---v--+    4  +---+--+
                 | Node2+---------+ Node4+-------> Node6+---->
                 +------+         +------+       +------+
                                                  Egress

            Figure 3: Key network node protection                                      
]]></artwork>
      </section>
      <section anchor="differentiated-service-for-secure-routing">
        <name>Differentiated service for secure routing.</name>
        <t>ISPs have built many security devices and security resource pools in the basic network, once the network node is attacked, it needs fast and efficient scheduling security function to mitigate. Users have clear requirements for their own security services.</t>
        <t>For ToB users, the types of users are different, and the corresponding security requirements are different. The security requirement is no longer simply divided into high, medium and low levels, but more specific. For example, in addition to considering low-latency connections, customers in the game industry should first consider anti-DDoS services for security requirements,therefore, ISPs are required to provide anti-DDoS security services. For financial customers, data security is the most important, it is required that data cannot be tampered with, eavesdropped or copied, and so on.</t>
        <t>For customers with specific security requirements, ISPs need to transmit data at the security level expected by customers. For example, if the user needs anti-D and IPS services, the secure routing is path&lt;1,5,7,4&gt;. If the user need WAF service, the secure routing is path&lt;1,2,3,4&gt;.</t>
        <artwork><![CDATA[
                  Ingress
                                 +---------+
+--------+  1    +------+   5    | Node3   |  6  +------+
| User A +------>| Node1+-------->Anti-ddos+-----+ Node5|
+--------+       +---+--+        +----+----+     +---+--+
                     |                |              |
                     |                |              |
                     | 2              |7             |8
                     |                |              |
                     |                |              |
                     |                |              |
                 +---+--+     3   +---v--+    4  +---+--+
                 | Node2+---------+ Node4+-------> Node6+---->
                 | WAF  |         | IPS  |       +------+
                 +------+         +------+        Egress

           Figure 4: User require anti-ddos and IPS service
]]></artwork>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>







  </back>
  <!-- ##markdown-source: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-->

</rfc>
