<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-nasr-architecture-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="NASR-Architecture">Network Attestation for Secure Routing (NASR) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-nasr-architecture-01"/>
    <author fullname="Chunchi Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <author fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr@sandelman.ca</email>
      </address>
    </author>
    <author fullname="Diego Lopez">
      <organization>Telefonica</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>SEC</area>
    <workgroup>NASR</workgroup>
    <keyword>NASR</keyword>
    <keyword>Secure Routing</keyword>
    <abstract>
      <?line 49?>

<t>This document provides an architecture overview of NASR entities, interactive procedures and messages.</t>
    </abstract>
  </front>
  <middle>
    <?line 53?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Endpoints typically perceives no information of the properties of the paths over which their traffic is carried, especially when the properties are security-related. Therefore, data security (confidentiality, integrity and authenticity) has been insofar primarily protected by traffic signing and encryption mechanisms. Endpoint cannot choose devices with specific properties to bear transmission.</t>
      <t>However, clients with high security and privacy requirements are not anymore satisfied with traffic signing and encryption mechanisms only; they now request information of the trustworthiness or security properties of the network paths over which the traffic is carried, preferably to choose the desired properties. For example, some clients may require their data to traverse through trusted devices and trusted links only, in order to avoid data being exposed to insecure devices, causing leakage.</t>
      <t>Remote Attestation Procedures (RATS) working group developed procedures to establish a level of confidence in the trustworthiness of a device or a system. RATS provide 1. objective, appraisable evidence of a device’s trust or security properties, and 2. verifiable integrity proof to the evidence (Attestation Result). Devices with integrity proof are expected to function correctly and deterministically, as anticipated.</t>
      <t>Following the same RATS philosophy and building on top of it, Network Attestation for Secure Routing （NASR) aims at a solution specifically designed for the routing use case. NASR aims to provide 1. objective, appraisable evidence of a routing path’s trust or security properties, 2. verifiable integrity proof in the path-level, and 3. verifiable proof that certain packets/flows traveled such paths.</t>
      <t>Altogether, the NASR goal is to 1. Allow clients to choose desired security attributes of his received network service, 2. Achieve dependable forwarding by routing on top of only devices that satisfies certain trust requirements, and 3. prove to the clients that certain packets or flows traversed a network path that has certain trust or security properties.</t>
      <t>This document introduces the architecture, entities, interactive procedures, and messages sent between the entities, so to achieve the NASR objective.</t>
    </section>
    <section anchor="usecases">
      <name>Use Cases</name>
      <t>Please refer to the use cases identified in <xref target="I-D.liu-nasr-requirements-01"/></t>
    </section>
    <section anchor="term">
      <name>Terminology</name>
      <t>Please refer to the terminologies identified in <xref target="I-D.richardson-nasr-terminology-01"/>. Terminology from RATS Architecture document <xref target="RFC9344"/> also applies.</t>
      <t>NASR will leverage RATS implementations and specifications, including but not limited to <xref target="I-D.ietf-rats-ar4si-06"/><xref target="I-D.ietf-rats-corim-04"/>.</t>
    </section>
    <section anchor="architectural-overview">
      <name>Architectural Overview</name>
      <section anchor="single-client-single-operator-an-oversimplification">
        <name>Single client - single operator (An Oversimplification)</name>
        <artwork><![CDATA[
     +---------------+
     |               |
     | Relying Party |
     |               |
     +-+---------^---+
Path   |         |
Request|         | Report
       |         |
     +-v---------+--+                          +-----------+
     |              |      Path Attestation    |           |
     | Orchestrator |       Result (PAR)       | Verifier  |
     |              <--------------------------+           |
     +-+------------+                          +------^----+
       |                                              |
       | Path                                         |  Path
       | Evidence                                     |  Evidence
       | (PE)                                         |  (PE)
     +-v------------+      +-------------+     +------+----+
     |              |      |             |     |           |
     |   Attester   +------>  Attester...+-----> Attester  |
     |              |      |             |     |           |
     +--------------+      +-------------+     +-----------+
                   Update with         Update with
                    AR/RE/PoT           AR/RE/PoT
]]></artwork>
        <t>Figure 1. NASR Architecture-- Oversimplified</t>
        <t>Fig. 1 is an oversimplification to ease understanding of the concept. In a single client - single operator scenario, a client (Relying Party) sends a Path Request containing his security or trustworthiness requirements of a leased line. The Orchestrator, run by the operator, would choose qualifying devices (Attesters) and send out an empty Path Evidence inquiry. The Attesters update the Path Evidence with its own Raw Evidence or Attestation Results one-by-one. The Verifier verifies the filled Path Evidence, produce a Path Attestation Result (PAR), and sends it back to the Relying Party. The Relying Party now have confidence over the trustworthiness of received network. After the end-to-end service is delivered, during service, Proof-of-Transits are also created by each Attester, being sent in-band accumulatively or out-of-band, to detect unexpected routing deviation.</t>
        <t>This process is repeated periodically to continuously assure compliance.</t>
      </section>
      <section anchor="multi-client-multi-operator">
        <name>Multi Client - Multi Operator</name>
        <artwork><![CDATA[
+------------------------------------+
|                                    |
| Client X                           |
|             Path    +-----------+  |
| +----------+Evidence| Relying   |  |
| | Attester |<-------+ Party     |  |
| +--+-------+        +---^--+----+  |
+----+--------------------+--+-------+          +-------------+
     | Update       Answer|  | Path             |             |
     | Path         Report|  | Request          |             |
     | Evidence           |  |                  |  Vendors    |
+----+--------------------+--+-----------+      |             |
|    |                    |  |           |      |             |
|    |                    |  | Operator 1|      |             |
|    |                    |  |           |      |             |
| +--v--------+  RE   +---+--v--------+  |  RE  |+-----------+|
| |           +------->               +--+------>| Verifier  ||
| | Attester  |       | Orchestrator  |  |      || Vendor A  ||
| | Vendor A  <-------+               <--+------++           ||
| +--+--------+  AR   +------+--------+  |  AR  |+-----------+|
+----+-----------------------+-----------+      |             |
     | Update                | Intra            |             |
     | Path                  | ISP              |             |
     | Evidence              | API              |             |
+----+-----------------------+-----------+      |             |
|    |                       |           |      |             |
|    |                       | Operator 2|      |             |
|    |                       |           |      |             |
| +--v--------+  RE   +------v--------+  |  RE  |+-----------+|
| |           +------->               +--+------>| Verifier  ||
| | Attester  |       | Orchestrator  |  |      || Vendor B  ||
| | Vendor B  <-------+               <--+------++           ||
| +--+--------+  AR   +---^-----------+  |  AR  |+-----------+|
+----+--------------------+--------------+      |             |
     | Update             |   Path              |             |
     | Path               |   Attestation       |  ...        |
     | Evidence           |   Result (PAR)      |             |
+----+--------------------+----------+          |             |
|    |        Path        |          |          +-------------+
| +--v-------+Evidence+---+-------+  |
| | Attester +--------> Relying   |  |
| +----------+        | Party     |  |
|                     +-----------+  |
|  Client Y                          |
+------------------------------------+
]]></artwork>
        <t>Figure 2. NASR Architecture</t>
        <t>In a more generalized scenario, due to geographic distances, a single operator cannot span across a long distance to deliver an end-to-end service-- multiple operators collaborate to deliver it. The Customer A would send the Path Request to the Operator nearest to him (Operator 1). Operator 1 pass down the Path Request to the collaborating operators, through an intra-ISP API. Operators of different domains choose qualifying devices to altogether orchestrate the path.</t>
        <t>Relying Party (customer) then sends the Path Evidence inquiry to check and attest to this path. Following the same procedure, the client of other side would return the Path Attestation Result back, through the operators. The Operator 1 would send back a comprehensive answer/report to the Client.</t>
        <t>Also, the operators may have heterogeneous network devices from different vendors. Since vendors provide Verifier software/hardware and Reference Values, Verifiers can be deployed either outside the operators (Fig 2) or inside of the operators (Fig 3).</t>
        <artwork><![CDATA[
+---------------------------------+
|                                 |
| Client X                        |
|             Path +-----------+  |
| +----------+Evid.| Relying   |  |
| | Attester |<----+ Party     |  |
| +--+-------+     +---^--+----+  |
+----+-----------------+--+-------+
     | Update    Answer|  | Path
     | Path      Report|  | Request               +-------------+
     | Evidence        |  |                       |  Vendors    |
+----+-----------------+--+-------------------+   |             |
|    |                 |  |                   |   |             |
|    |                 |  |   Operator 1      |   |             |
|    |                 |  |        +--------+ |   |             |
| +--v--------+ RE +---+--v---+ RE |Verifier| |   |+-----------+|
| |           +---->          +----> of     | |   || Verifier  ||
| | Attester  |    | Orches-  |    |Vendor  <-+---++ Owner     ||
| | Vendor A  <----+  trator  <----| A      | |   || Vendor A  ||
| +--+--------+ AR +------+---+ AR +--------+ |   |+-----------+|
+----+--------------------+-------------------+   |             |
     | Update             | Intra         Verifier              |
     | Path               | ISP           Software/Hardware     |
     | Evidence           | API           Reference Value       |
+----+--------------------+-------------------+   |             |
|    |                    |                   |   |             |
|    |                    |   Operator 2      |   |             |
|    |                    |        +--------+ |   |             |
| +--v--------+ RE +------v---+ RE |Verifier| |   |+-----------+|
| |           +---->          +----> of     | |   || Verifier  ||
| | Attester  |    | Orches-  |    |Vendor  <-+---++ Owner     ||
| | Vendor B  <----+  trator  <----| B      | |   || Vendor B  ||
| +--+--------+ AR +---^------+ AR +--------+ |   |+-----------+|
+----+-----------------+----------------------+   |             |
     | Update          |  Path                    | ...         |
     | Path            |  Attestation             +-------------+
     | Evidence        |  Result (PAR)
+----+-----------------+----------+
|    |        Path     |          |
| +--v-------+Evid.+---+-------+  |
| | Attester +-----> Relying   |  |
| +----------+     | Party     |  |
|                  +-----------+  |
|  Client Y                       |
+---------------------------------+
]]></artwork>
        <t>Figure 3. Verifier deployed in operators</t>
      </section>
    </section>
    <section anchor="roles">
      <name>Roles</name>
      <t>The existing roles from RATS Architecture document <xref target="RFC9344"/> applies.</t>
      <ul spacing="normal">
        <li>
          <t>Attester: The definition in <xref target="RFC9344"/> applies. Additionally, it can be performed by either a physical device or a virtual function. The Attester can update Path Evidence with his Attestation Result/Raw Evidence/Proof of Transit.  </t>
          <ul spacing="normal">
            <li>
              <t>Produces: (updated) Path Evidence</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Relying Party: The definition in <xref target="RFC9344"/> applies. Additionally, it creates Path Request to the Orchestrator, and receive Reports from Orchestrator as an auditable result, comparing the actually received network service versus the requested PR attributes.  </t>
          <ul spacing="normal">
            <li>
              <t>Produces: Path Request</t>
            </li>
            <li>
              <t>Consumes: Report</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>In the case where an Attester is deployed in the customer premises, the Relying Party could also start the unfilled Path Evidence inquiry at his side.</t>
      <t>New role(s) are defined below.</t>
      <ul spacing="normal">
        <li>
          <t>Orchestrator: A role performed by an entity (typically a controller or a special device) that performs two functions: path orchestration and path attestation. The input and output of different functions are different.  </t>
          <ul spacing="normal">
            <li>
              <t>Path Orchestration: The Orchestrator receives a Path Request from the Relying Party. After path computation/orchestration, he creates configurations to be distributed to the Attesters/devices.      </t>
              <ul spacing="normal">
                <li>
                  <t>Consumes: Path Request</t>
                </li>
                <li>
                  <t>Produces: Configurations</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Path Attestation: The Orchestrator receives a Path Request from the Relying Party, send unfilled Path Evidence (PE) inquiry to Attesters, collects Path Attestation Result (PAR) from the Verifier, and send PAR back to the Relying Party.      </t>
              <ul spacing="normal">
                <li>
                  <t>Consumes: Path Request, Path Attestation Result</t>
                </li>
                <li>
                  <t>Produces: (unfilled) Path Evidence</t>
                </li>
              </ul>
            </li>
          </ul>
        </li>
        <li>
          <t>Verifier: A role performed by an entity that appraises the validity of filled Path Evidence about a set of Attesters and produces Path Attestation Results to be used by an Orchestrator.  </t>
          <ul spacing="normal">
            <li>
              <t>Consumes: (filled) Path Evidence</t>
            </li>
            <li>
              <t>Produces: Path Attestation Results</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="messages">
      <name>Conceptual Messages</name>
      <t>The existing artifacts from RATS Architecture document <xref target="RFC9344"/> applies. New conceptual message(s) are defined here.</t>
      <ul spacing="normal">
        <li>
          <t>Path Request: A set of claims, describing the properties of a network path that a Relying Party requested.  </t>
          <ul spacing="normal">
            <li>
              <t>Consumed By: Orchestrator</t>
            </li>
            <li>
              <t>Produced By: Relying Party</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Path Attestation Result: The output generated by a Verifier, including information about a set of Attesters, where the Verifier vouches for the validity of the results.  </t>
          <ul spacing="normal">
            <li>
              <t>Consumed By: Relying Party</t>
            </li>
            <li>
              <t>Produced By: Verifier</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Path Evidence: The output generated by the Orchestrator and a set of Attesters, to be appraised by a Verifier. Path Evidence may include each Attester's raw Evidence <xref target="RFC9344"/>, Attestation Results, Proof-of-Transit, or other proof suggesting correctness of functioning of each Attester.  </t>
          <ul spacing="normal">
            <li>
              <t>Consumed By: Verifier</t>
            </li>
            <li>
              <t>Created By: Orchestrator</t>
            </li>
            <li>
              <t>Updated By: Attester(s)</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Report: An auditable result that compares the actually received network service versus the requested PR attributes.  </t>
          <ul spacing="normal">
            <li>
              <t>Created By: Orchestrator</t>
            </li>
            <li>
              <t>Consumed By: Relying Party</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="orchestration">
      <name>Orchestration</name>
      <t>The orchestration process collects client's path requests and output configurations. The Orchestrator/Controller then distribute them to the attester/device using NETCONF/YANG or other control plane protocols. In the first case, a new YANG module needs to be defined.</t>
      <artwork><![CDATA[
               +------------------------+
               |                        |
Path Request   |Orchestrator/Controller |
-------------->|                        |
               +----------+-------------+
                          |
                          |Path and Security Configuration
                          |(YANG/NETCONF)
                          |
                    +-----v------------+
                    | Attester/Device  |
                    +------------------+

]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9344">
        <front>
          <title>CCNinfo: Discovering Content and Network Information in Content-Centric Networks</title>
          <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
          <author fullname="A. Ooka" initials="A." surname="Ooka"/>
          <author fullname="X. Shao" initials="X." surname="Shao"/>
          <date month="February" year="2023"/>
          <abstract>
            <t>This document describes a mechanism named "CCNinfo" that discovers information about the network topology and in-network cache in Content-Centric Networks (CCNs). CCNinfo investigates 1) the CCN routing path information per name prefix, 2) the Round-Trip Time (RTT) between the content forwarder and the consumer, and 3) the states of in-network cache per name prefix. CCNinfo is useful to understand and debug the behavior of testbed networks and other experimental deployments of CCN systems.</t>
            <t>This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG). This document represents the consensus view of ICNRG and has been reviewed extensively by several members of the ICN community and the RG. The authors and RG chairs approve of the contents. The document is sponsored under the IRTF, is not issued by the IETF, and is not an IETF standard. This is an experimental protocol and the specification may change in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9344"/>
        <seriesInfo name="DOI" value="10.17487/RFC9344"/>
      </reference>
      <reference anchor="I-D.liu-nasr-requirements-01">
        <front>
          <title>NASR Use Case and Requirements</title>
          <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Luigi Iannone" initials="L." surname="Iannone">
            <organization>Huawei</organization>
          </author>
          <author fullname="Diego Lopez" initials="D." surname="Lopez">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Antonio Pastor" initials="A." surname="Pastor">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Meiling Chen" initials="M." surname="Chen">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Li Su" initials="L." surname="Su">
            <organization>China Mobile</organization>
          </author>
          <date day="3" month="March" year="2024"/>
          <abstract>
            <t>   This document describes the use cases and requirements that guide the
   specification of a Network Attestation for Secure Routing framework
   (NASR).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-nasr-requirements-01"/>
      </reference>
      <reference anchor="I-D.richardson-nasr-terminology-01">
        <front>
          <title>Terminology and Use cases for Secured Routing Infrastructure</title>
          <author fullname="Michael Richardson" initials="M." surname="Richardson">
            <organization>Sandelman Software Works</organization>
          </author>
          <author fullname="Peter Chunchi Liu" initials="P. C." surname="Liu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="20" month="May" year="2024"/>
          <abstract>
            <t>   This document collects terminology and use cases for Secured Routing.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-richardson-nasr-terminology-01"/>
      </reference>
      <reference anchor="I-D.ietf-rats-ar4si-06">
        <front>
          <title>Attestation Results for Secure Interactions</title>
          <author fullname="Eric Voit" initials="E." surname="Voit">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
            <organization>MIT</organization>
          </author>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>Linaro</organization>
          </author>
          <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
            <organization>Intel</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-06"/>
      </reference>
      <reference anchor="I-D.ietf-rats-corim-04">
        <front>
          <title>Concise Reference Integrity Manifest</title>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>arm</organization>
          </author>
          <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
            <organization>arm</organization>
          </author>
          <author fullname="Ned Smith" initials="N." surname="Smith">
            <organization>Intel</organization>
          </author>
          <author fullname="Wei Pan" initials="W." surname="Pan">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies the information elements for representing Endorsements and
   Reference Values in CBOR format.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-04"/>
      </reference>
    </references>
    <?line 320?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We sincerely thank contribution from NASR mailing list.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
