<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-idr-bgp-ls-security-capability-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="BGP-LS2C">the extensions of BGP-LS to carry security capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-idr-bgp-ls-security-capability-01"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2023" month="August" day="11"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 34?>

<t>The goal is to collect the security capabilities of nodes, which will be one of the factors to form the routing topology, and use the routing programming capabilities to form a secure routing path.</t>
      <t>The BGP-LS protocol is extended to carry the security capabilities of the node. The controller collects topology information, forms a topology path with security capabilities according to security requirements, and supports SRv6 path sending to execute node forwarding through programming.</t>
    </abstract>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>SRv6 (Segment Routing IPv6, IPv6 segment routing) is based on source routing and centralized routing. It can realize network intelligent programming and select forwarding paths according to customer needs. At present, there is a lack of effective technical means to inject security factors into the process of collecting network topology and centralized routing to achieve safe routing path forwarding.</t>
      <t>The most important reason for using BGP-LS as the extended basic protocol is that BGP-LS shields the differences of other routing protocols, and the underlying routing protocol types do not need to be considered when transmitting security capabilities.</t>
      <t>RFC7752 standardized North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP, describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol, using a new BGP Network Layer Reachability Information (NLRI) encoding format.</t>
      <t>BGP-LS is a new way to collect network topology. The topology information discovered by the IGP protocol is summarized by the BGP protocol and sent to the upper controller. With the powerful routing and routing capabilities of the BGP protocol, there are three types of BGP-LS routes, which are used to carry node, link and route prefix information respectively. The three routes cooperate with each other to complete the transmission of topology information. The node routing function is to record the node information of the topology, the link routing function is to record the link information between two devices, and the address prefix routing function is to record the network segment information that the node can reach.</t>
      <t>The state information NLRI collected by BGP-LS is described in TLV (type/length/value triplet) format. Each link state described by NLRI can identify a node, link or prefix. Therefore, three types of NLRI are newly set in the standard, of which type 3 and 4 are used to distinguish the prefix of IPv4 and IPv6. There are only two types of NLRI attributes in the original BGP protocol: MP_ REACH_ NLRI, attribute type 14; MP_ UNREACH_ NLRI, attribute type 15.</t>
    </section>
    <section anchor="bgp-ls-node-type-carries-security-capability">
      <name>BGP-LS node type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
                   +----------+
          +--------+Controller+-----------+
          |        +----------+           |
    BGP-LS(Node)                          |
          |                               |
xxxxxxxx|xxxxxxxxx                        |
x         |      x                        |
x   +-----+-+    x                  +-----+-+
x   |Router |    x                  |Router |
x   +----+--+    x                  +-+---+-+
x        |       x                    |   |
x        |       x             +------+   |
x        |       x             |          |
x   +----+----+  x          +---+----+  +--+-----+ 
x   |Security |  x          |Security|  |Security|               
x   |Products |  x          |Products|  |Products|
x   +---------+  x          +--------+  +--------+
xxxxxxxxxxxxxxxxxx  
 
Figure 1: Router and attached security products are used as node units
]]></artwork>
      </section>
      <section anchor="new-node-attribute-tlvs">
        <name>New Node Attribute TLVs</name>
        <t>The Local Node Descriptors TLV contains Node Descriptors for the node anchoring the local end of the link.  This is a mandatory TLV in all three types of NLRIs (node, link, and prefix).</t>
        <artwork><![CDATA[
0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |              Type             |             Length            |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     //              Node Descriptor Sub-TLVs (variable)            //
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

               Figure 2: Local Node Descriptors TLV Format
]]></artwork>
        <t>Node attribute TLVs are the TLVs that may be encoded in the BGP-LS attribute with a Node NLRI.  The following Node Attribute TLVs are defined:</t>
        <artwork><![CDATA[
   +-------------+----------------------+----------+
   |   TLV Code  | Description          |   Length | 
   |    Point    |                      |          | 
   +-------------+----------------------+----------+
   |     263     | Multi-Topology       | variable | 
   |             | Identifier           |          |                   
   |     1024    | Node Flag Bits       |        1 | 
   |     1025    | Opaque Node          | variable | 
   |             | Attribute            |          |                   
   |     1026    | Node Name            | variable | 
   |     1027    | IS-IS Area           | variable | 
   |             | Identifier           |          |                   
   |     1028    | IPv4 Router-ID of    |        4 | 
   |             | Local Node           |          |                   
   |     1029    | IPv6 Router-ID of    |       16 | 
   |             | Local Node           |          |                   
   +-------------+----------------------+----------+
              Table 3: Node Attribute TLVs
]]></artwork>
        <t>The security capability is transferred by adding the security capability attribute to the attributes of the local node.</t>
        <artwork><![CDATA[
   +-------------+----------------------+----------+
   |   TLV Code  | Description          |   Length | 
   |    Point    |                      |          | 
   +-------------+----------------------+----------+
   |     TBD1    | Node Security        | variable | 
   |             | Capability           |          | 
   +-------------+----------------------+----------+
              Table 4: New Node Attribute TLV
]]></artwork>
      </section>
      <section anchor="usage-of-new-attribute">
        <name>Usage of new attribute</name>
        <t>When programming the routing path, take the security capability requirement as one of the inputs. The description of the security capability requirement can be structured or one-dimensional matrix, which only needs to be consistent with the router's security capability description; There are many routing rules. After introducing security capability requirements, it is necessary to dynamically adjust the security capability as the position of routing rules according to the requirements. The main rule strategies are: ① Select the routing node that meets the security requirements as the forwarding node when the path is reachable; ② Select the shortest path when all the safety requirements are met; ③ When the same path length and security requirements are met, select the path with small load for forwarding.</t>
      </section>
    </section>
    <section anchor="bgp-ls-link-type-carries-security-capability">
      <name>BGP-LS Link type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities-1">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
                   +----------+
          +--------+Controller+-----------+
          |        +----------+           |
          |                               |
          |                               |
xxxxxxxxxxxxxxxxxx                        |
x         |      x                        |
x   +-----+-+    x  BGP-LS(Link)    +-----+-+
x   |Router |----x------------------|Router |
x   +----+--+    x                  +-+---+-+
x        |       x                    |   |
x        |       x             +------+   |
x        |       x             |          |
x   +----+----+  x          +---+----+  +--+-----+ 
x   |Security |  x          |Security|  |Security|               
x   |Products |  x          |Products|  |Products|
x   +---------+  x          +--------+  +--------+
xxxxxxxxxxxxxxxxxx  

Figure 5: The peer node transmits the security capability through the link
]]></artwork>
        <t>The router and its attached security products are the basic units. When collecting status information, only some nodes can directly transmit the node status information to the controller through the BGP-LS protocol. Other nodes that do not directly transmit the node information need to transmit the node information to the direct node to achieve the transmission of security capability information. Therefore, for non direct nodes, It is required to report its own security capability information through the BGP-LS link state data packet.</t>
      </section>
      <section anchor="new-link-attribute-tlvs">
        <name>New Link Attribute TLVs</name>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+
     |  Protocol-ID  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                           Identifier                          |
     |                            (64 bits)                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //               Local Node Descriptors (variable)             //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //               Remote Node Descriptors (variable)            //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                  Link Descriptors (variable)                //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                      Figure 6: The Link NLRI Format
]]></artwork>
        <artwork><![CDATA[
   +-----------+---------------------+--------------+
   |  TLV Code | Description         |  IS-IS TLV   | 
   |   Point   |                     |   /Sub-TLV   | 
   +-----------+---------------------+--------------+
   |    1028   | IPv4 Router-ID of   |   134/---    | 
   |           | Local Node          |              |                  
   |    1029   | IPv6 Router-ID of   |   140/---    | 
   |           | Local Node          |              |                  
   |    1030   | IPv4 Router-ID of   |   134/---    | 
   |           | Remote Node         |              |                  
   |    1031   | IPv6 Router-ID of   |   140/---    | 
   |           | Remote Node         |              |                  
   |    1088   | Administrative      |     22/3     | 
   |           | group (color)       |              |                  
   |    1089   | Maximum link        |     22/9     | 
   |           | bandwidth           |              |                  
   |    1090   | Max. reservable     |    22/10     | 
   |           | link bandwidth      |              |                  
   |    1091   | Unreserved          |    22/11     | 
   |           | bandwidth           |              |                  
   |    1092   | TE Default Metric   |    22/18     | 
   |    1093   | Link Protection     |    22/20     | 
   |           | Type                |              |                  
   |    1094   | MPLS Protocol Mask  |     ---      | 
   |    1095   | IGP Metric          |     ---      | 
   |    1096   | Shared Risk Link    |     ---      | 
   |           | Group               |              |                  
   |    1097   | Opaque Link         |     ---      | 
   |           | Attribute           |              |                  
   |    1098   | Link Name           |     ---      | 
   +-----------+---------------------+--------------+

               Table 7: Link Attribute TLVs
]]></artwork>
        <t>The new attribute describes the link security capability and transmits the link security capability information through this attribute.</t>
        <artwork><![CDATA[
   +-----------+---------------------+--------------+
   |  TLV Code | Description         |  IS-IS TLV   | 
   |   Point   |                     |   /Sub-TLV   | 
   +-----------+---------------------+--------------+
   |    TBD2   | Link security info  |   ---        |
   +-----------+---------------------+--------------+

            Table 8: New Link Attribute TLVs
]]></artwork>
      </section>
      <section anchor="useage-of-new-attribute">
        <name>Useage of new attribute</name>
        <artwork><![CDATA[
+------+          +------+
|  A   |          |  B   |
+---+--+          +--+---+
    |SCicg A         |
    +--------------->|
    |       SCing B  |
    <----------------+
    |SCing <A,B>     |
    +---------------->
    |                |

Figure 9: Assosiation security capability interaction
]]></artwork>
        <t>The Assosiation security capability depends on the security capability enabled by the node. As a node directly connected to the controller, node B first interacts with the enabled security capability information of the opposite end in a two-way manner, and then the opposite end initiates the transmission of the assosiation security capability information.</t>
        <t>The decision of assosiation security capability can be divided into two situations: one is under the same security domain, and the other is under different security domains. 
1. The decision rules for link security capabilities under different security domains are as follows: SCing represents the enabled security capabilities of a node.
Example: SCing A=[1,0,0,1,0,……]，SCing B=[1,1,0,1,0,……]，SCing Assosiation&lt;A,B&gt; = SCing A &amp;&amp; SCing B</t>
        <t>When the link passes through more than two nodes, it is necessary to logically and operate the security capabilities of all nodes in the path to obtain the link security capabilities.</t>
        <ol spacing="normal" type="1"><li>The decision rules of assosiation security capability in the same security domain are as follows: SCing indicates the security capability of a node that has been enabled.
Example: SCing A=[1,0,0,1,0,……]，SCing B=[1,1,0,1,0,……]，SCing Assosiation&lt;A,B&gt; = SCing A || SCing B</li>
        </ol>
        <t>When the link passes through more than two nodes, it is necessary to logically or operate the security capabilities of all nodes in the path to obtain the link security capabilities.</t>
      </section>
    </section>
    <section anchor="bgp-ls-prefix-type-carries-security-capability">
      <name>BGP-LS Prefix type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities-2">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
      +----------+                  +----------+
      +Controller+                  +Controller+  
      +----------+                  +----------+ 
          |                               |
          | AS 100                        |
xxxxxxxxxxxxxxxxxx                        |AS 200
x         |      x                 xxxxxxx|xxxxxxxx
x   +-----+-+    x  BGP-LS(Prefix) x  +-----+-+   x
x   |RouterA|----x-----------------x--|RouterE|   x
x   +----+--+    x                 x  +-+---+-+   x
x        |       x       xxxxxxxxxxx  |   |       x
x        |       x       x     +------+   |       x
x        |       x       x     |          |       x
x   +----+--+    x       x  +---+--+  +--+---+    x
x   |Router |    x       x  |Router|--|Router|    x            
x   +-------+    x       x  +------+  +------+    x
xxxxxxxxxxxxxxxxxx       xxxxxxxxxxxxxxxxxxxxxxxxxx

Figure 10: Security capability is transferred between ASs through Prefix
]]></artwork>
        <t>The router and its attached security products are the basic units. When collecting the status information, only some nodes can directly transmit the node status information to the controller through the BGP-LS protocol. Other nodes that do not directly transmit the node information need to transmit the node information to the directly connected node to achieve the transmission of security capability information. In the figure, nodes A and E are direct connected nodes, which are connected to their respective controllers. Nodes A and E are responsible for collecting the security capabilities of other nodes in their respective fields.</t>
      </section>
      <section anchor="new-link-attribute-tlvs-1">
        <name>New Link Attribute TLVs</name>
        <t>The IPv4 and IPv6 Prefix NLRIs (NLRI Type = 3 and Type = 4) use the same format, as shown in the following figure.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+
     |  Protocol-ID  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                           Identifier                          |
     |                            (64 bits)                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //              Local Node Descriptors (variable)              //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                Prefix Descriptors (variable)                //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

            Figure 11: The IPv4/IPv6 Topology Prefix NLRI Format
]]></artwork>
        <artwork><![CDATA[
   +---------------+----------------------+----------+
   |    TLV Code   | Description          |   Length | 
   |     Point     |                      |          |                 
   +---------------+----------------------+----------+
   |      1152     | IGP Flags            |        1 | 
   |      1153     | IGP Route Tag        |      4*n | 
   |      1154     | IGP Extended Route   |      8*n | 
   |               | Tag                  |          |                 
   |      1155     | Prefix Metric        |        4 |     
   |      1156     | OSPF Forwarding      |        4 |       
   |               | Address              |          |                 
   |      1157     | Opaque Prefix        | variable |  
   |               | Attribute            |          |                 
   +---------------+----------------------+----------+
           Table 12: Prefix Attribute TLVs
]]></artwork>
        <t>An AS has at least one super direct connection node, which has the security capability information of all nodes under the AS. By adding new attributes to Prefix, the security capabilities of the entire AS can be transferred.</t>
        <artwork><![CDATA[
   +---------------+--------------------------+----------+
   |    TLV Code   | Description              |   Length | 
   |     Point     |                          |          |                 
   +---------------+--------------------------+----------+
   |      TBD3     | AS security capabilities | variable | 
   +---------------+--------------------------+----------+
             Table 13: New Prefix Attribute TLVs
]]></artwork>
        <t>AS Security capabilities means the security capability information of all nodes under the AS, that is, the security capability information of all nodes is spliced, such as {[IP address (A)+node security capability], [IP address (B)+node security capability]...}.</t>
      </section>
      <section anchor="usage-of-new-attribute-1">
        <name>Usage of new attribute</name>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <?line 364?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
