Internet-Draft | nasr-names | May 2024 |
Richardson & Liu | Expires 21 November 2024 | [Page] |
This document collects terminology and use cases for Secured Routing.¶
This note is to be removed before publishing as an RFC.¶
Status information for this document may be found at https://datatracker.ietf.org/doc/draft-richardson-nasr-terminology/.¶
Discussion of this document takes place on the nasr Working Group mailing list (mailto:[email protected]), which is archived at https://mailarchive.ietf.org/arch/browse/nasr/. Subscribe at https://www.ietf.org/mailman/listinfo/nasr/.¶
Source for this draft and an issue tracker can be found at https://github.com/mcr/nasr-terminology.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 21 November 2024.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
This document collects terminology in use for various secured routing efforts.¶
In addition, it may collect use cases that explain the terminology.¶
This documents is not intended to ever be published.¶
Although this document is not an IETF Standards Track publication, it adopts the conventions for normative language to provide clarity of instructions to the implementer. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Mechanisms and operational strategies such as RPKI and BGPSEC implemented to enhance the trustworthiness and robustness of BGP operations, including route origin authentication, AS path integrity validation and other approaches against prefix hijacking and route leaks.¶
Achieving correct reachability within and across networks by ensuring authentic and truthful distribution of routing information.¶
Protect data security by ensuring data transits on trusted devices, trusted operating environments or trusted services.¶
an examination of control plane messages to validate that the planned route is correct.¶
Secure and verifiable logs or evidence of a packet's transit path in the data plane.¶
a verification of proof-of-transit against control plane information to validate if the packet was forwarded according to control plane path.¶
unsure¶
(such as RPKI) concerns itself with the authenticity of route announcements rather than the trustworthiness of the network operating environment.¶
The following network diagram will be used to explain many aspects of the NASR problem statement.¶
In this diagram there are two ISPs, ISP-A and ISP-B.¶
Each ISP has a number of routers, uniquely numbered A-R1..A-R5, and B-R6..B-R9. In the descriptions that follow the labels for each router do not repeat the ISP number (A- and B-) when there is no confusion.¶
The routers are connected together with a number of links. ISPs A and B interconnected via A-R3<->B-R9, A-R2<->B-R8, and A-R5<->B-R8.¶
Routers R1,R2,R4,R5, and R6,R7,R8 are within a geographical region labelled "Country S"¶
There are two terminal customers labelled C1 and C2. They could be two locations of the same entity, or two entities that need assured communications between them. The customer C1 has dual transit connections to R1 and R4. The customer C2 has dual transit connections to R6 and R7.¶
There a number of possible paths between C1 and C2, for instance:¶
C1,R1,R3,R9,R6,C2.¶
C1,R1,R3,R9,R8,C2.¶
C1,R1,R4,R2,R8,R7,C2¶
C1,R1,R4,R5,R8,R7,C2¶
C1,R4,R2,R8,R7,C2¶
C1,R4,R2,R3,R9,R8,C2¶
C1,R4,R2,R3,R9,R6,C2¶
C1,R4,R5,R8,R7,C2¶
C1,R4,R2,R3,R9,R6,C2¶
C1,R4,R2,R3,R9,R8,C2¶
Of these paths 2,6,7,9 and 10 go through routers R3 and R9, which are not within the "Country S" geography.¶
The purpose of NASR is to provide control plane constraint on acceptable paths between C1 and C2, and then to provide a Proof of Transit that one of the acceptable paths was in fact used.¶
Just words, no protocols in this document.¶
This document makes no requests to IANA.¶
Hello.¶