You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-liu-nasr-architecture.md
+19-12Lines changed: 19 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ submissionType: IETF
5
5
ipr: trust200902
6
6
lang: en
7
7
8
-
title: Network Attestation for Secure Routing (NASR) Architecture
8
+
title: Network Attestation for Secured foRwarding (NASR) Architecture
9
9
abbrev: NASR-Architecture
10
10
docname: draft-liu-nasr-architecture-latest
11
11
@@ -15,7 +15,7 @@ type: BOF
15
15
16
16
kw:
17
17
- NASR
18
-
- Secure Routing
18
+
- Secured Forwarding
19
19
20
20
author:
21
21
-
@@ -54,18 +54,26 @@ This document provides an architecture overview of NASR entities, interactive pr
54
54
55
55
# Introduction
56
56
57
-
Endpoints typically perceives no information of the properties of the paths over which their traffic is carried, especially when the properties are security-related. Therefore, data security (confidentiality, integrity and authenticity) has been insofar primarily protected by traffic signing and encryption mechanisms. Endpoint cannot choose devices with specific properties to bear transmission.
57
+
In the current network deployments, communicating entities implicitly rely on peer entities and use paths as determined by the control plane. These available path(s) are implicitly trusted. Communicating entities have very little information about the entities in the paths over which their traffic is carried, and have no available means to audit the entities and paths, beyond basic properties like latency, throughput, and congestion. However, increased demand in network security, privacy, and robustness makes tools for enabling visibility of the entities' security characteristics a necessity.
58
58
59
-
However, clients with high security and privacy requirements are not anymore satisfied with traffic signing and encryption mechanisms only; they now request information of the trustworthiness or security properties of the network paths over which the traffic is carried, preferably to choose the desired properties. For example, some clients may require their data to traverse through trusted devices and trusted links only, in order to avoid data being exposed to insecure devices, causing leakage.
59
+
Path-agnostic traffic signing and encryption has been the primary method to ensure data confidentiality, integrity and authenticity today. However, with the increasing amount of attacks, and vulnerabilities, new emerging threats are imposing requirements that go beyond the data security currently provided. Vulnerable factors include:
60
60
61
-
Remote Attestation Procedures (RATS) working group developed procedures to establish a level of confidence in the trustworthiness of a device or a system. RATS provide 1. objective, appraisable evidence of a device’s trust or security properties, and 2. verifiable integrity proof to the evidence (Attestation Result). Devices with integrity proof are expected to function correctly and deterministically, as anticipated.
61
+
- Unauthorized data duplication, caused by
62
+
- Routing detour to unintended devices or areas
63
+
- Insecure network devices or unauthorized root access
64
+
- Middlebox decryption/inspection
65
+
- Capture-now-decrypt-later attacks, caused by
66
+
- Exploitation of vulnerable cryptographic engineering
67
+
- Post-Quantum attacks
68
+
- Pattern or behavioral analysis, etc.
62
69
63
-
Following the same RATS philosophy and building on top of it, Network Attestation for Secure Routing (NASR) aims at a solution specifically designed for the routing use case. NASR aims to provide 1. objective, appraisable evidence of a routing path’s trust or security properties, 2. verifiable integrity proof in the path-level, and 3. verifiable proof that certain packets/flows traveled such paths.
70
+
With these additional security and privacy requirements, there is a need to provide enhanced or added services beyond the pure encryption-based data security; requiring better visibility of the security characteristics of the underlying network elements. Specifically, to satisfy the visibility of the network elements' security state, proof that data is traversed through network elements (devices, links and services) that satisfy security posture claims to avoid exposure of unqualified elements is needed.
64
71
65
-
Altogether, the NASR goal is to 1. Allow clients to choose desired security attributes of his received network service, 2. Achieve dependable forwarding by routing on top of only devices that satisfies certain trust requirements, and 3. prove to the clients that certain packets or flows traversed a network path that has certain trust or security properties.
72
+
The RATS (Remote ATtestation procedureS) working group has provided a framework and approaches to assess and establish the trustworthiness of a single device, hence offering an initial building block. However, a comprehensive framework that attests to a network -- meaning network-level elements' trustworthiness proofs and verification methods are lacking.
66
73
67
-
This document introduces the architecture, entities, interactive procedures, and messages sent between the entities, so to achieve the NASR objective.
74
+
The Network Attestation for Secured foRwarding (NASR) working group is chartered to address the challenges associated with proving state and characteristics of a network path are compliant to a set of claims, so as to achieve predictable and verifiable forwarding behavior. The work will build as much as possible on existing standards and implementations, focusing on combining them in a clear and coherent manner to address secured forwarding use cases such as those identified and described in the NASR use cases and requirements document.
68
75
76
+
This document introduces the architecture, entities, interactive procedures, and messages sent between the entities, so to achieve the NASR objective.
69
77
70
78
# Use Cases {#usecases}
71
79
@@ -107,9 +115,9 @@ Request| | Report
107
115
individual evidence individual evidence
108
116
(AR/RE/PoT) (AR/RE/PoT)
109
117
~~~
110
-
Figure 1. NASR Architecture-- Oversimplified
118
+
Figure 1. NASR Architecture-- Oversimplified (a data plane/BGP-LS example)
111
119
112
-
Fig. 1 is an oversimplification to ease understanding of the concept. In a single client - single operator scenario, a client (Relying Party) sends a Path Request containing his security or trustworthiness requirements of a leased line. The Orchestrator, run by the operator, would choose qualifying devices (Attesters) and send out an empty Path Evidence inquiry. The Attesters update the Path Evidence with its own Raw Evidence or Attestation Results one-by-one. The Verifier verifies the filled Path Evidence, produce a Path Attestation Result (PAR), and sends it back to the Relying Party. The Relying Party now have confidence over the trustworthiness of received network. After the end-to-end service is delivered, during service, Proof-of-Transits are also created by each Attester, being sent in-band accumulatively or out-of-band, to detect unexpected routing deviation.
120
+
Fig. 1 is an oversimplification to ease understanding of the concept. In a single client - single operator scenario, a client (Relying Party) sends a Path Request containing his security or trustworthiness requirements of a connectivity service. The Orchestrator, run by the operator, would choose qualifying devices (Attesters) and send out an empty Path Evidence inquiry (using data plane protocol like BGP-LS). The Attesters update the Path Evidence with its own Raw Evidence or Attestation Results one-by-one. The Verifier verifies the filled Path Evidence, produce a Path Attestation Result (PAR), and sends it back to the Relying Party. The Relying Party now have confidence over the trustworthiness of received network. After the end-to-end service is delivered, during service, Proof-of-Transits are also created by each Attester, being sent in-band accumulatively or out-of-band, to detect unexpected forwarding deviation.
113
121
114
122
Alternatively, the Path Evidence can be collected through management protocols like NETCONF/YANG. The orchestrator aggregates individual evidences of each attester device on the candidate path, then send the Path Evidence to the Path Verifier, who then produces a Path Attestation Result back to the Relying Party. When the attester devices are made by different vendors, multiple verifiers may be needed.
115
123
@@ -141,9 +149,8 @@ Alternatively, the Path Evidence can be collected through management protocols l
141
149
| | | | | |
142
150
+-----------+ +-----------+ +-----------+
143
151
~~~
144
-
Figure 1.1. NASR Architecture-- Oversimplified
152
+
Figure 1.1. NASR Architecture-- Oversimplified (a management plane/YANG example)
145
153
146
-
This process is repeated periodically to continuously assure compliance.
0 commit comments