<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-secure-routing-use-cases-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Use Cases">The Use Cases for Secure Routing</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-secure-routing-use-cases-01"/>
    <author initials="" surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <author initials="B." surname="Yang" fullname="Bo Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>yangbo@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="09"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <t>Current routing mechanism based on the shortest path, only the path accessibility is considered, but the security of links and forwarding nodes is not considered. As security has become an important factor in the service layer. this paper proposes to add a new factor: security.</t>
      <t>The frequent occurrence of security incidents, users' demand for security services is essential. As there are many security devices in the ISP's network, this draft proposes secure routing, the purpose of secure routing is to converge security and routing to ensure the security of the transmission process.</t>
      <t>The scope is transmission process security, while end-to-end security and application layer security are out of scope.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>With the frequent occurrence of network security accidents, users' demand for network security is greatly increased, there is no doubt that security of services is required. The current security risk mainly comes from attacks, users need security services to ensure the continuity of business.</t>
      <t>Some users build security centers by themselves, some buy third-party cloud security services, and some hope that ISPs can provide security services by secure routing. Secure routing provided by ISPs can be implemented which can forward traffic to security functions. With the development of programmable network (such as SDN) and SRv6 technology, the forwarding requirements of the application layer can be completed through routing programming; accessibility and security in the routing process can be processed synchronously to provide users with secure routing.</t>
      <t>Network functions are also updating and integrated security functions to cope with complex security environments, such as routers with anti-DDoS attack functions.</t>
    </section>
    <section anchor="analysis-of-security-requirements">
      <name>Analysis of security requirements</name>
      <t>From ISPs' perspect, the nodes' trustworthiness is different, it is necessary to provide routing policy from the security protection for the important users.</t>
      <t>For users, different users have different security requirements which depend on their services. For example, e-commerce and Internet companies focus on phishing prevention, anti-DDoS attacks and data security; Medical companies focus on data security and security isolation, and so on.</t>
    </section>
    <section anchor="security-and-routing-convergence">
      <name>Security and routing convergence</name>
      <t>If security functions and network functions are highly integrated, security can be as available as network connection. Optimize existing routing protocols to obtain information about security functions in the network, secure routing can be implemented by combine security policy and routing policy. Figure1 describes the relationship between the Network Programming controller and network functions and security functions.</t>
      <t>In this draft, Nodes are used to represent network elements. What is Node with security function? There are two deployment methods.
1. The security function and routing function are independent, but they are deployed in one site, as show in Figure1-1; 
2. The security functions and routing functions are integrated, as show in Figure1-2.</t>
      <artwork><![CDATA[
                       +------------+
                       | Network    |
                       | Programming|
                       | Controller |
                       +------+-----+
                              |
        +---------------------+--------------------+
        |                                          |
        |                                          |
+-------+-------+     +----------------------------+--------+
|       |       |     |                            |        |
|   +---+---+   |     | +----------+           +---+---+    |
|   | Route +---+-----+-+ Security +-----------+ Route |    |
|   +---+---+   |     | | Function |           +-------+    |
|       |       |     | +----------+                        |
|  +----+----+  |     |                                     |
|  |Security |  |     +-------------------------------------+
|  |Function |  |                      Node
|  +---------+  |
|               |
+---------------+
      Node

   Figure 1-1: Functions independent mode of Node
]]></artwork>
      <artwork><![CDATA[
                     +------------+
                     | Network    |
                     | Programming|
                     | Controller |
                     +------+-----+
                            |
      +---------------------+--------------------+
      |                                          |
+-----+-------------+                       +----+----+
| Network function  |                       |  Route  |
| Security function |                       +---------+
+-------------------+                         Node
     Node

    Figure 1-2: Functions integration mode of Node
]]></artwork>
    </section>
    <section anchor="secure-routing-use-cases">
      <name>Secure Routing Use Cases</name>
      <t>Two use cases are described below.</t>
      <ol spacing="normal" type="1"><li>Routing policy ensure transmission security based on network node security appraisal;</li>
        <li>Differentiated security path to meet diverse service requirements.</li>
      </ol>
      <section anchor="basic-path-for-secure-routing">
        <name>Basic path for secure routing</name>
        <t>This scenario occurs in the network. High security users require the link and forwarding node physical isolation, and through a specific link path. To satisfied this requirement, it is necessary for the network programming controller to collect the network node information.</t>
        <t>Network programming controller obtain the information of nodes and appraise the trustworthiness can improve nodes security awareness. Figure2 describes nodes security appraisement.</t>
        <artwork><![CDATA[
            +-------------+
            | Network     |
            | Programming |
            | Controller  |
            +-------------+
                   | appraise
                   | trustworthiness
    +--------------+---------------+
    ^              ^               ^
    |              |               |
    |              |               |
+---+----+     +---+---+      +----+---+
| Node1  |     | Node2 |      | Node3  |
+--------+     +-------+      +--------+

Figure2 : Node security appraisement
]]></artwork>
        <t>Also, the trustworthiness of node is different, for Node3 with poor trustworthiness, important users will avoid Node3 for routing policy. Figure3 describes userA's link forwarding process avoids Node3,select path&lt;1,2,3,4&gt;.</t>
        <artwork><![CDATA[
          Ingress        
                                 
+--------+  1    +------+   5    +---------+  6  +-------+
| UserA  |------>| Node1|--------|  Node3  |-----| Node5 |
+--------+       +------+        +---------+     +-------+
                     |                |              |
                     |                |              |
                     | 2              |7             |8
                     |                |              |
                     |                |              |
                     v                |              |
                 +-------+    3   +-------+    4  +-------+
                 | Node2 |------->| Node4 |------>| Node6 |---->
                 +-------+        +-------+       +-------+  Egress
                                                  
            Figure3 : Link forwarding protection                                      
]]></artwork>
      </section>
      <section anchor="differentiated-service-for-secure-routing">
        <name>Differentiated service for secure routing.</name>
        <t>ISPs have built many security functions and security resource pools in the network, once the network node is attacked, it needs fast and efficient scheduling security function to mitigate. Users have clear requirements for their own security services.</t>
        <t>The types of users are different, and the corresponding security requirements are different. The security requirement is no longer simply divided into high, medium and low levels, but more specific. For example, in addition to considering low-latency connections, customers in the game industry should first consider anti-DDoS services for security requirements,therefore, ISPs are required to provide anti-DDoS security services. For financial customers, data security is the most important requirement, it is required that data cannot be tampered with, eavesdropped or copied, and so on.</t>
        <t>For customers with specific security requirements, ISPs need to transmit data at the security level expected by customers. For example, if the user needs anti-ddos and IPS services, the secure routing must pass through Node4 and Node5.</t>
        <t>When userA needs Anti-ddos services, the secure routing must pass through Node5, Figure4-1 shows the path&lt;1,5,6,10&gt; selected for UserA which require anti-ddos service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|------->|   Node3 |---->| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     |                |              |           V
                 +------+     3   +------+    4  +-------+   9 +------+
                 | Node2|---------| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-1 : User require anti-ddos service
]]></artwork>
        <t>When userA needs IPS services, the secure routing must pass through Node4, Figure4-2 shows the path&lt;1,5,7,4,9&gt; selected for UserA which require IPS service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|------->|   Node3 |-----| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     |                |              |           |
                 +------+     3   +---v--+    4  +-------+ 9   +------+
                 | Node2|---------| Node4|------>| Node6 |---->|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-2 : User require IPS service
]]></artwork>
        <t>When userA needs WAF services, the secure routing must pass through Node2, Figure4-3 shows the path&lt;1,2,11&gt; selected for UserA which require IPS service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|--------|   Node3 |-----| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     V                |              |           |
                 +------+     3   +------+    4  +-------+ 9   +------+
                 | Node2|---------| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       ^
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-3 : User require WAF service
]]></artwork>
        <t>When userA needs IPS, WAF and Anti-ddos services, the secure routing must pass through Node4, Node2 and Node5, Figure4-4 shows the path&lt;1,2,3,7,6,10&gt; selected for UserA which require IPS, WAF and Anti-ddos services.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|--------|   Node3 |---->| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                ^              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     V                |              |           V
                 +------+     3   +------+    4  +-------+ 9   +------+
                 | Node2|-------->| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-4 : User require WAF IPS and Anti-ddos services
]]></artwork>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>







  </back>
  <!-- ##markdown-source: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-->

</rfc>
