<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-secure-routing-use-cases-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Use Cases">The Use Cases for Secure Routing</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-secure-routing-use-cases-02"/>
    <author initials="" surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <author initials="B." surname="Yang" fullname="Bo Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>yangbo@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="13"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <t>Current routing mechanism is based on the shortest path, which only take the link status and the path accessibility into consideration, without the security of links and forwarding nodes. As security has become an important factor to the user. This paper proposes to add security factor in the routing process.</t>
      <t>With the frequent occurrence of security incidents, services security is an essential demand for the users. As there are many security devices in the ISP's network, this draft proposes secure routing mechanism. The purpose of secure routing is to converge security and routing to ensure the secure data transmission.</t>
      <t>The scope is transmission process security, while end-to-end security and application layer security are out of scope.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>With the frequent occurrence of network security accidents, users' demand for network security is greatly increased; there is no doubt that security of services is required. The current security risk mainly comes from attacks, users need security services to ensure the continuity of business.</t>
      <t>Some users build security centers by themselves, some buy third-party cloud security services, and some hope that ISPs can provide security services by secure routing. Secure routing provided by ISPs can be implemented which can forward traffic to security functions. With the development of programmable network (such as SDN) and SRv6 technology, the forwarding requirements of the application layer can be completed through routing programming; accessibility and security in the routing process can be processed synchronously to provide users with secure routing.</t>
      <t>Network functions are also updating and integrated security functions to cope with complex security environments, such as routers with anti-DDoS attack functions.</t>
    </section>
    <section anchor="analysis-of-security-requirements">
      <name>Analysis of security requirements</name>
      <t>From ISPs' perspective, the nodes' trustworthiness is different, it is necessary to provide routing policy from the security protection for the important users.</t>
      <t>For users, different users have different security requirements which depend on their services. For example, e-commerce and Internet companies focus on phishing prevention, anti-DDoS attacks and data security; Medical companies focus on data security and security isolation, and so on.</t>
    </section>
    <section anchor="security-and-routing-convergence">
      <name>Security and routing convergence</name>
      <t>If security functions and network functions are highly integrated, security can be as available as network connection. Optimize existing routing protocols to obtain information about security functions in the network, secure routing can be implemented by combine security policy and routing policy. Figure1 describes the relationship between the Network Programming controller and network functions and security functions.</t>
      <t>In this draft, Nodes are used to represent network elements. What is Node with security function? There are two deployment methods.
1. The security function and routing function are independent, but they are deployed in one site, as show in Figure1-1; 
2. The security functions and routing functions are integrated, as show in Figure1-2.</t>
      <artwork><![CDATA[
                       +------------+
                       | Network    |
                       | Programming|
                       | Controller |
                       +------+-----+
                              |
        +---------------------+--------------------+
        |                                          |
        |                                          |
+-------+-------+     +----------------------------+--------+
|       |       |     |                            |        |
|   +---+---+   |     | +----------+           +---+---+    |
|   | Router|-----------| Security |-----------| Router|    |
|   +---+---+   |     | | Function |           +-------+    |
|       |       |     | +----------+                        |
|  +----+----+  |     |                                     |
|  |Security |  |     +-------------------------------------+
|  |Function |  |                      Node
|  +---------+  |
|               |
+---------------+
      Node

   Figure 1-1: Functions independent mode of Node
]]></artwork>
      <artwork><![CDATA[
                     +------------+
                     | Network    |
                     | Programming|
                     | Controller |
                     +------+-----+
                            |
      +---------------------+--------------------+
      |                                          |
+-------------------+                       +---------+
| Network function  |                       |  Router |
| Security function |                       +---------+
+-------------------+                         Node
     Node

    Figure 1-2: Functions integration mode of Node
]]></artwork>
    </section>
    <section anchor="secure-routing-use-cases">
      <name>Secure Routing Use Cases</name>
      <t>Two use cases are described below.</t>
      <ol spacing="normal" type="1"><li>Routing policy ensure transmission security based on network node security appraisal;</li>
        <li>Differentiated security path to meet diverse service requirements.</li>
      </ol>
      <section anchor="basic-path-for-secure-routing">
        <name>Basic path for secure routing</name>
        <t>This scenario occurs in the network. High security users require the link and forwarding node physical isolation, and through a specific link path. To satisfied this requirement, it is necessary for the network programming controller to collect the network node information.</t>
        <t>Network programming controller obtain the information of nodes and appraise the trustworthiness can improve nodes security awareness. Figure2 describes nodes security appraisement.</t>
        <artwork><![CDATA[
            +-------------+
            | Network     |
            | Programming |
            | Controller  |
            +-------------+
                   | appraise
                   | trustworthiness
    +--------------+---------------+
    ^              ^               ^
    |              |               |
    |              |               |
+---+----+     +---+---+      +----+---+
| Node1  |     | Node2 |      | Node3  |
+--------+     +-------+      +--------+

Figure2 : Node security appraisement
]]></artwork>
        <t>Also, the trustworthiness of node is different, for Node3 with poor trustworthiness, important users will avoid Node3 for routing policy. Figure3 describes userA's link forwarding process avoids Node3,select path&lt;1,2,3,4&gt;.</t>
        <artwork><![CDATA[
          Ingress        
                                 
+--------+  1    +------+   5    +---------+  6  +-------+
| UserA  |------>| Node1|--------|  Node3  |-----| Node5 |
+--------+       +------+        +---------+     +-------+
                     |                |              |
                     |                |              |
                     | 2              |7             |8
                     |                |              |
                     |                |              |
                     v                |              |
                 +-------+    3   +-------+    4  +-------+
                 | Node2 |------->| Node4 |------>| Node6 |---->
                 +-------+        +-------+       +-------+  Egress
                                                  
            Figure3 : Link forwarding protection                                      
]]></artwork>
      </section>
      <section anchor="differentiated-service-for-secure-routing">
        <name>Differentiated service for secure routing.</name>
        <t>ISPs have built many security functions and security resource pools in the network, once the network node is attacked, it needs fast and efficient scheduling security function to mitigate. Users have clear requirements for their own security services.</t>
        <t>The types of users are different, and the corresponding security requirements are different. The security requirement is no longer simply divided into high, medium and low levels, but more specific. For example, in addition to considering low-latency connections, customers in the game industry should first consider anti-DDoS services for security requirements,therefore, ISPs are required to provide anti-DDoS security services. For financial customers, data security is the most important requirement, it is required that data cannot be tampered with, eavesdropped or copied, and so on.</t>
        <t>For customers with specific security requirements, ISPs need to transmit data at the security level expected by customers. For example, if the user needs anti-ddos and IPS services, the secure routing must pass through Node4 and Node5.</t>
        <t>When userA needs Anti-ddos services, the secure routing must pass through Node5, Figure4-1 shows the path&lt;1,5,6,10&gt; selected for UserA which require anti-ddos service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|------->|   Node3 |---->| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     |                |              |           V
                 +------+     3   +------+    4  +-------+   9 +------+
                 | Node2|---------| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-1 : User require anti-ddos service
]]></artwork>
        <t>When userA needs IPS services, the secure routing must pass through Node4, Figure4-2 shows the path&lt;1,5,7,4,9&gt; selected for UserA which require IPS service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|------->|   Node3 |-----| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     |                |              |           |
                 +------+     3   +---v--+    4  +-------+ 9   +------+
                 | Node2|---------| Node4|------>| Node6 |---->|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-2 : User require IPS service
]]></artwork>
        <t>When userA needs WAF services, the secure routing must pass through Node2, Figure4-3 shows the path&lt;1,2,11&gt; selected for UserA which require IPS service.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|--------|   Node3 |-----| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                |              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     V                |              |           |
                 +------+     3   +------+    4  +-------+ 9   +------+
                 | Node2|---------| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       ^
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-3 : User require WAF service
]]></artwork>
        <t>When userA needs IPS, WAF and Anti-ddos services, the secure routing must pass through Node4, Node2 and Node5, Figure4-4 shows the path&lt;1,2,3,7,6,10&gt; selected for UserA which require IPS, WAF and Anti-ddos services.</t>
        <artwork><![CDATA[
                                                 +----------+
+--------+  1    +------+   5    +---------+  6  | Node5    |
| UserA  |------>| Node1|--------|   Node3 |---->| Anti-ddos|----+
+--------+       +---+--+        +----+----+     +----------+    | 
         ingress     |                ^              |           |
                     |                |              |           |  
                     | 2              |7             |8          |10
                     |                |              |           |
                     |                |              |           |
                     V                |              |           V
                 +------+     3   +------+    4  +-------+ 9   +------+
                 | Node2|-------->| Node4|-------| Node6 |-----|Egress|--->
                 | WAF  |         | IPS  |       +-------+     +------+
                 +------+         +------+                       |
                     |                      11                   |
                     +-------------------------------------------+  

           Figure4-4 : User require WAF IPS and Anti-ddos services
]]></artwork>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>







  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1b328buRF+N+D/gUAe0sK7giU7ucYp3DpxgrropUGcu6Av
KahdSiK8u9wjuXLUqv3bO8Nfy12tZNkJcMk1ykO0XHJmyJn5+HEop2l6eKA0
rfJ/0kJU7Ixo2bDDA15L81XpyfHxs+PJ4UFG9Rnh1UyQR+TlgmU3MK6Zllwp
Liq9qmHo1av3rw8PqGT0jFyzrJFcrw4PbufwptJMVkyTV9WcV4xJXs3Je6pu
yGshM9B3eJCLrKIlSMklnek0W7AqVSiEpVI0GgakjWJpRhVTKRp0eKC5LmDA
+wUjPylGXuIrMhPSKmfknR0HJk2nki3P2l6HBwWtwC5WHR7c3J4dHhCSBiPT
S7TAtt2w1a2QOah7RHKqQdvkeDJJj0/S8QlJU9NGOGjlRcFyWB9CGy1KqnlG
i2JFpivyqSwmcpYRPiOV0GTOl6gVui2EBM0pDFJnuKQVqrRr8CPjBS6RbxVy
jl14RcmPYsoLho0ZLO8ZecH4X80koUE0lZYr1xNbWEl5cUZwMUsr8s8ZviuN
kFEmSjTA6vwbJ9fNF1CmmoJv1/JCkH9QK+Ez9axAzFRsagJd4Bg6VVrSTOPz
y0ZKVmni4oiULFvQiqsSPTeFeMiJqIiGMFLgE82UJjXVi4TcLni2gHfgSE1v
mOkCi3hDIGN0owikjWnD3oRmGYNkAENgCuBULcD2SvGcSQgHUYE4Dj5vtNXk
8oOImRFphUHw3lKZo5GVyJkakQvVdl1QMJfBJBl0JryswVgK85rBPCHqQSFK
hiyRI0gKmFtNayZJLUUtMDWgA83zVp4bx+3c/epAd5zICFfuA1hsXs4k+6XB
NRRZZlYzY2h5EMWrDCZaaZVAm1xykBC9xMkRkAkdOC1IDh60kw0G25nCE6Qt
AAiBDqtWQM6sRGfp1fXbx4pApkJq3iTQBAoMarRTtcix6fGRQYu6kdgtzKDt
yM0qgd+WTM4jL6G9vg90YJXCUcGRDIGAAmDSSjlINOuHylQmaoMR8Vu/ykGD
CbaCgeQ81SKF/7rKaV0XgCkYSKSgK3Br+xrUY1jhbFDXyOdAyfO8MOD6CMFN
irzJUMA+nnWrG2nJgoeNwx7HbtzoDdOdwz6gCxMa8A2S7LnzL7yrBMlFM8VU
oLqTCyF6oBdaxiXLrdMyl8Wht+SwfwAWYHpiUgAKS1ESqjXNbryZYBqLljKI
7zoRHA6ubZwN00bBJuVS4BrTzYqaNryIZGUMNwyFGA8ySsWKJcP4xwHTBhu5
zNOaSuxbiGbAjMT41oxYYJSY5YDwViSjJkaWsOYD1k9XvcAd+T0vymIcm2PX
IHDKEDUKVqLluYM3fOFwB0N0NuMZrk6LEk1logZSNAQNJCQrRF2auJmhsrmk
ZUmnEME+Fn6nGpAOkHV9+eb3Zp7X75ZPiYZUrEQh5qvExl8Lec7fKFWhWHy9
GfduIuBxmAlOQy9g0vNFPHVjDXx/3kNlGqfVMO55+e4Rg2dVZaCiEo3CjUAE
v9ioQFTvewMD541bh7B+JlFpoQRpaoAL1In2wE7BwF4dh2k7xqARRIbRYuf8
qe3HqiUHy0qHvG7B0YpgGWwQPL28FNcuMSJ/WmS4qGixUlx18Dx2BXZ7jZmF
cfSYwJaiagYilsx60OxUjy1bhBlD2GPyYALnfDZjmLQJ4drkPcM1pbKzjMEB
Ajy9sknc2SKho2bG5rBntJuf3T2MjfDOPCWtYuejBV2yqHFwmi4dclYj+FpC
wGXIuRFSVcI+UXRBQoCJirJkQF6NEwPBRRfBTmOIaAYUAaEe9qeFjTBIm8py
gb5b7P5vdhFv3XOggTnyyCGhnZ69uFaioF4Logv0HxHr7OuhDc1vd5Vl4lez
oUDEAdVgSC/4fGFw3sdxEmGkTSYISroE1mYAgoa9GzVX1rMj8vda85L/C7bA
T1wZu6LM1CIThckGMdUA+eYkIkuLC3SK29+AzS7DA1PobfYDkDg1W8kUIjgK
PxuX8YrZJggJPgeBYwgalUk+ZcoiCrPrD16vQYG+Zcwa4iHhbYtQZuuRAk4P
ctsSV0PAYCL+qorIT0LeYCIalzSIW7BYkkHMIe0KcpmdKoI57jUwGEdFIBZr
+RNuvI6RwXDMjUKsDOqXDLhsjmaM7fa8MbizYG0jEoDKJpkBhqklxJbGWAX2
ICXQB1xDrkHAADG/xUa34On4OQT0ZItmNahaOd1tlA7IndhE+S988Kgx+DlK
o8/R1m7r4G582NEtioZd3V62gbK9m7Pt6A7bvNC2Q2dS7ewGG9tR693yt+i6
36ijni1HO+ztmw2memXd/3eaEF6u7fAjJ/IoGh7pP4qGxl398LUpRDC5jixc
t0jcbXZd79C+Jq99Qq172tOe9qG5bzG+v/JrJ/HIddxj6XrD1+0s/cCdjotj
DEfEs9yiF+GrNdXPKZp8ZFFfd4hkK8Q8WSQgADFnYZFVDFmkRMAEsmQHWajY
CRl7AcZecLEXWOwFFfcBiiDjISDxsGTviNrS/ShW1i5f2Gq2qoZ2m2Y2TK43
dq5tAzsa72Oqj7Doq30I0TbpRpvdpNCW4WgLXC5UOePi5uHBe9itgQQQUy51
W6ulKMBx4Oh2a/gDbN3vuuTbn4njUkXYX0OpzJMJZP4RCa1rSbmixXOzNV96
us27ZxtTLANuUjKgyzmcIqRinmV3CLk9nzwiL6iCI6kZhvS/S+JslQVojILj
OJVc2DpGn/uNyF+ApbZG2GOB09bW9QZqcEDf4XSELLzHq/2xE2g4HIc4HpuN
DDQUiAmcoKGzmnFzQm2rGeXgccifa/zK1sMM0ZwG4VumO72NnREjtiTmzW5Z
jkib01REprH2Y3mkrTqhS+0K9Q94mS1CwinOnQGjUIAVZKaE4iJ8ElHkfl+n
AxdmNIyk3VTroVUHOPt41wHMzZcRUPZf7tQZBHjjt7zuLZnt1QOOLZvSx66s
3iP5aHv1kGpgz9uvlycZEbsKNCZiARZowX/jlg3g48TLtI8nXSzvMrZYppsv
nN1dlJzZ48hgcLTod1EokQzGpIveXvEBs8vaZc45tcBs645M+iUF6FoUcGoV
PHdjUcrwAfAkim4cfPFYWSyIsMSXl4xEe+o6SRQzuYyQ8cdxMklOktPzwRy4
quYSR7vPXcTedInXfxwtOTrgSccF2PQ08hB6+SecB/Hs9Ny5PZDVNQmeds/4
+GTA7x29ZEMv6egdnMrGdtyP5y8+btJr+KH7+IevxNDlA8Z10vCk33C62xsh
29NOWJz2wuSpfT6/S/1QQ/T8ysT8HrG+8emO8UmKd5wbSekri3vK9RAEvGSD
4FgKs8lRbK0Gi/CmDonXCLp3w7Wl3APzFw3WGAGyis16lsDLmk0ioFxNEWsc
XJsbEEVmVGkjnGGFn5syaLZgeWMumjerN8jQuOZzmNvIgIGzPisYld3CqSMv
HDjFbUQXQ+XU34ThrwQMRFuANay0BWl/mZoJCdOuRZV3DOto7AztVYGiju6q
qRDVHC/MsNC3QsppLkbMDS3WLhOgojlvSmMBUGNS4O2GsqWpUoAqT/B6NWC8
7c9z7pfL3/ai2SAmBbLIqmwVFTlBZga7jihZS1DntDQVMWgHHqgWoimAg3Kp
dBAYFYvDDVCIsv7aJOaSDV6DgSbmcK38TVpcdo+F9j1m5jnjFa0yvLANRie9
ujO3Bc9SgLXt/jnAdFsDsOpohAB9xN9DTCEuYD0ZvsTdOSEMwkzlUtQ1njYk
3n9wU64LxWxf7W8X09YvPQ8fXhi7HOY+EK/K7RHHGUN7t/ImBMDTeNHhysJe
Vz8IZuES22WaWdg8FzaXr962XkviG+NwN92Y3xsoFU4UFlJxsNlTLZv/sGCV
JRdOzUVQ8wDxTxKHiqfp2BRBVfghAxCRJ8nTZHx8Tiw9YfaO1xICe0niD060
b8OI3F0/3f6J61IP4C+egxBX/9lNYc5xs7QcZu2ew5KuB0wIFh71d68ecY6H
rOOtiEck7s4tP/7+UNrQ/f5gthN9Hx9/CVu+Ehk/b+cn1psnvYbTLl15Fl5u
p0ptdddRpXXn8amnz5brrLewpjX5cPE6Nn5tcCU0DNbGh6zqU/HNhp7ifZfZ
fsbje8jYrxIc7PMlM/dp4cv8rk9ux6SWtG1g6EPBuUXPyRB6/pCcJs/2gM9I
/ZbKx16fXxU20++w6Rr+X2Bzx6myC5vLIdh8RnYC1B2w2TtgfofN3Z/tsDnp
w2aERTsAE9fzAYA5aQHzZBMwJ8l4/BtFy/Q7Wro3vyW0/PkzZexPMj8PLb8R
kvnxq0fLkz5aRji4m14mpiue5T/rvH6auMprqAq0iHo6hKgnQEL3PMTfYeU3
i7W/8oG+d2P3HWsfJuM+WPt5B/p7Yu35N4m1Xz8zPR3CWlycYXjq/ibm6uLN
Bd7qt392pci/H2Hrf8IvRUpWCvyrlKLJza8RjCL8oy8tzHhbb+38WnpDon9j
pb64tCNgXmRK8U8j7b//AS7dM9teOQAA

-->

</rfc>
