<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-bgp-ls-security-capability-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="BGP-LS2C">the extensions of BGP-LS to carry security capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-bgp-ls-security-capability-00"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="07"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <t>The goal is to collect the security capabilities of nodes, which will be one of the factors to form the routing topology, and use the routing programming capabilities to form a secure routing path.</t>
      <t>The BGP-LS protocol is extended to carry the security capabilities of the node. The controller collects topology information, forms a topology path with security capabilities according to security requirements, and supports SRv6 path sending to execute node forwarding through programming.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The most important reason for using BGP-LS as the extended basic protocol is that BGP-LS shields the differences of other routing protocols, and the underlying routing protocol types do not need to be considered when transmitting security capabilities.</t>
      <t>RFC7752 standardized North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP, describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol, using a new BGP Network Layer Reachability Information (NLRI) encoding format.</t>
      <t>BGP-LS is a new way to collect network topology. The topology information discovered by the IGP protocol is summarized by the BGP protocol and sent to the upper controller. With the powerful routing and routing capabilities of the BGP protocol, there are three types of BGP-LS routes, which are used to carry node, link and route prefix information respectively. The three routes cooperate with each other to complete the transmission of topology information. The node routing function is to record the node information of the topology, the link routing function is to record the link information between two devices, and the address prefix routing function is to record the network segment information that the node can reach.</t>
      <t>The state information NLRI collected by BGP-LS is described in TLV (type/length/value triplet) format. Each link state described by NLRI can identify a node, link or prefix. Therefore, three types of NLRI are newly set in the standard, of which type 3 and 4 are used to distinguish the prefix of IPv4 and IPv6. There are only two types of NLRI attributes in the original BGP protocol: MP_ REACH_ NLRI, attribute type 14; MP_ UNREACH_ NLRI, attribute type 15.</t>
    </section>
    <section anchor="bgp-ls-node-type-carries-security-capability">
      <name>BGP-LS node type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
                   +----------+
          +--------+Controller+-----------+
          |        +----------+           |
    BGP-LS(Node)                          |
          |                               |
xxxxxxxx|xxxxxxxxx                        |
x         |      x                        |
x   +-----+-+    x                  +-----+-+
x   |Router |    x                  |Router |
x   +----+--+    x                  +-+---+-+
x        |       x                    |   |
x        |       x             +------+   |
x        |       x             |          |
x   +----+----+  x          +---+----+  +--+-----+ 
x   |Security |  x          |Security|  |Security|               
x   |Products |  x          |Products|  |Products|
x   +---------+  x          +--------+  +--------+
xxxxxxxxxxxxxxxxxx  
 
Figure1: Router and attached security products are used as node units
]]></artwork>
      </section>
      <section anchor="new-node-attribute-tlvs">
        <name>New Node Attribute TLVs</name>
        <t>The Local Node Descriptors TLV contains Node Descriptors for the node anchoring the local end of the link.  This is a mandatory TLV in all three types of NLRIs (node, link, and prefix).</t>
        <artwork><![CDATA[
0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |              Type             |             Length            |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     //              Node Descriptor Sub-TLVs (variable)            //
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

               Figure 2: Local Node Descriptors TLV Format
]]></artwork>
        <t>Node attribute TLVs are the TLVs that may be encoded in the BGP-LS attribute with a Node NLRI.  The following Node Attribute TLVs are defined:</t>
        <artwork><![CDATA[
   +-------------+----------------------+----------+
   |   TLV Code  | Description          |   Length | 
   |    Point    |                      |          | 
   +-------------+----------------------+----------+
   |     263     | Multi-Topology       | variable | 
   |             | Identifier           |          |                   
   |     1024    | Node Flag Bits       |        1 | 
   |     1025    | Opaque Node          | variable | 
   |             | Attribute            |          |                   
   |     1026    | Node Name            | variable | 
   |     1027    | IS-IS Area           | variable | 
   |             | Identifier           |          |                   
   |     1028    | IPv4 Router-ID of    |        4 | 
   |             | Local Node           |          |                   
   |     1029    | IPv6 Router-ID of    |       16 | 
   |             | Local Node           |          |                   
   +-------------+----------------------+----------+
              Table 3: Node Attribute TLVs
]]></artwork>
        <t>The security capability is transferred by adding the security capability attribute to the attributes of the local node.</t>
        <artwork><![CDATA[
   +-------------+----------------------+----------+
   |   TLV Code  | Description          |   Length | 
   |    Point    |                      |          | 
   +-------------+----------------------+----------+
   |     1030    | Node Security        | variable | 
   |             | Capability           |          | 
   +-------------+----------------------+----------+
              Table 4: New Node Attribute TLV
]]></artwork>
      </section>
      <section anchor="usage-of-new-attribute">
        <name>Usage of new attribute</name>
        <t>When programming the routing path, take the security capability requirement as one of the inputs. The description of the security capability requirement can be structured or one-dimensional matrix, which only needs to be consistent with the router's security capability description; There are many routing rules. After introducing security capability requirements, it is necessary to dynamically adjust the security capability as the position of routing rules according to the requirements. The main rule strategies are: &amp;#9312; Select the routing node that meets the security requirements as the forwarding node when the path is reachable; &amp;#9313; Select the shortest path when all the safety requirements are met; &amp;#9314; When the same path length and security requirements are met, select the path with small load for forwarding.</t>
      </section>
    </section>
    <section anchor="bgp-ls-link-type-carries-security-capability">
      <name>BGP-LS Link type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities-1">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
                   +----------+
          +--------+Controller+-----------+
          |        +----------+           |
          |                               |
          |                               |
xxxxxxxxxxxxxxxxxx                        |
x         |      x                        |
x   +-----+-+    x  BGP-LS(Link)    +-----+-+
x   |Router |----x------------------|Router |
x   +----+--+    x                  +-+---+-+
x        |       x                    |   |
x        |       x             +------+   |
x        |       x             |          |
x   +----+----+  x          +---+----+  +--+-----+ 
x   |Security |  x          |Security|  |Security|               
x   |Products |  x          |Products|  |Products|
x   +---------+  x          +--------+  +--------+
xxxxxxxxxxxxxxxxxx  

Figure 5: The peer node transmits the security capability through the link
]]></artwork>
        <t>The router and its attached security products are the basic units. When collecting status information, only some nodes can directly transmit the node status information to the controller through the BGP-LS protocol. Other nodes that do not directly transmit the node information need to transmit the node information to the direct node to achieve the transmission of security capability information. Therefore, for non direct nodes, It is required to report its own security capability information through the BGP-LS link state data packet.</t>
      </section>
      <section anchor="new-link-attribute-tlvs">
        <name>New Link Attribute TLVs</name>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+
     |  Protocol-ID  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                           Identifier                          |
     |                            (64 bits)                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //               Local Node Descriptors (variable)             //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //               Remote Node Descriptors (variable)            //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                  Link Descriptors (variable)                //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                      Figure 6: The Link NLRI Format
]]></artwork>
        <artwork><![CDATA[
   +-----------+---------------------+--------------+
   |  TLV Code | Description         |  IS-IS TLV   | 
   |   Point   |                     |   /Sub-TLV   | 
   +-----------+---------------------+--------------+
   |    1028   | IPv4 Router-ID of   |   134/---    | 
   |           | Local Node          |              |                  
   |    1029   | IPv6 Router-ID of   |   140/---    | 
   |           | Local Node          |              |                  
   |    1030   | IPv4 Router-ID of   |   134/---    | 
   |           | Remote Node         |              |                  
   |    1031   | IPv6 Router-ID of   |   140/---    | 
   |           | Remote Node         |              |                  
   |    1088   | Administrative      |     22/3     | 
   |           | group (color)       |              |                  
   |    1089   | Maximum link        |     22/9     | 
   |           | bandwidth           |              |                  
   |    1090   | Max. reservable     |    22/10     | 
   |           | link bandwidth      |              |                  
   |    1091   | Unreserved          |    22/11     | 
   |           | bandwidth           |              |                  
   |    1092   | TE Default Metric   |    22/18     | 
   |    1093   | Link Protection     |    22/20     | 
   |           | Type                |              |                  
   |    1094   | MPLS Protocol Mask  |     ---      | 
   |    1095   | IGP Metric          |     ---      | 
   |    1096   | Shared Risk Link    |     ---      | 
   |           | Group               |              |                  
   |    1097   | Opaque Link         |     ---      | 
   |           | Attribute           |              |                  
   |    1098   | Link Name           |     ---      | 
   +-----------+---------------------+--------------+

               Table 7: Link Attribute TLVs
]]></artwork>
        <t>The new attribute describes the link security capability and transmits the link security capability information through this attribute.</t>
        <artwork><![CDATA[
   +-----------+---------------------+--------------+
   |  TLV Code | Description         |  IS-IS TLV   | 
   |   Point   |                     |   /Sub-TLV   | 
   +-----------+---------------------+--------------+
   |    1099   | Link security info  |   ---        |
   +-----------+---------------------+--------------+

            Table 8: New Link Attribute TLVs
]]></artwork>
      </section>
      <section anchor="useage-of-new-attribute">
        <name>Useage of new attribute</name>
        <artwork><![CDATA[
+------+          +------+
|  A   |          |  B   |
+---+--+          +--+---+
    |SCicg A         |
    +--------------->|
    |       SCing B  |
    <----------------+
    |SCing <A,B>     |
    +---------------->
    |                |

Figure 9: Assosiation security capability interaction
]]></artwork>
        <t>The Assosiation security capability depends on the security capability enabled by the node. As a node directly connected to the controller, node B first interacts with the enabled security capability information of the opposite end in a two-way manner, and then the opposite end initiates the transmission of the assosiation security capability information.</t>
        <t>The decision of assosiation security capability can be divided into two situations: one is under the same security domain, and the other is under different security domains. 
1. The decision rules for link security capabilities under different security domains are as follows: SCing represents the enabled security capabilities of a node.
Example: SCing A=[1,0,0,1,0,......]&amp;#65292;SCing B=[1,1,0,1,0,......]&amp;#65292;SCing Assosiation&lt;A,B&gt; = SCing A &amp;&amp; SCing B</t>
        <t>When the link passes through more than two nodes, it is necessary to logically and operate the security capabilities of all nodes in the path to obtain the link security capabilities.</t>
        <ol spacing="normal" type="1"><li>The decision rules of assosiation security capability in the same security domain are as follows: SCing indicates the security capability of a node that has been enabled.
Example: SCing A=[1,0,0,1,0,......]&amp;#65292;SCing B=[1,1,0,1,0,......]&amp;#65292;SCing Assosiation&lt;A,B&gt; = SCing A || SCing B</li>
        </ol>
        <t>When the link passes through more than two nodes, it is necessary to logically or operate the security capabilities of all nodes in the path to obtain the link security capabilities.</t>
      </section>
    </section>
    <section anchor="bgp-ls-prefix-type-carries-security-capability">
      <name>BGP-LS Prefix type carries security capability</name>
      <section anchor="collection-model-of-security-capabilities-2">
        <name>Collection model of security capabilities</name>
        <artwork><![CDATA[
      +----------+                  +----------+
      +Controller+                  +Controller+  
      +----------+                  +----------+ 
          |                               |
          | AS 100                        |
xxxxxxxxxxxxxxxxxx                        |AS 200
x         |      x                 xxxxxxx|xxxxxxxx
x   +-----+-+    x  BGP-LS(Prefix) x  +-----+-+   x
x   |RouterA|----x-----------------x--|RouterE|   x
x   +----+--+    x                 x  +-+---+-+   x
x        |       x       xxxxxxxxxxx  |   |       x
x        |       x       x     +------+   |       x
x        |       x       x     |          |       x
x   +----+--+    x       x  +---+--+  +--+---+    x
x   |Router |    x       x  |Router|--|Router|    x            
x   +-------+    x       x  +------+  +------+    x
xxxxxxxxxxxxxxxxxx       xxxxxxxxxxxxxxxxxxxxxxxxxx

Figure 10: Security capability is transferred between ASs through Prefix
]]></artwork>
        <t>The router and its attached security products are the basic units. When collecting the status information, only some nodes can directly transmit the node status information to the controller through the BGP-LS protocol. Other nodes that do not directly transmit the node information need to transmit the node information to the directly connected node to achieve the transmission of security capability information. In the figure, nodes A and E are direct connected nodes, which are connected to their respective controllers. Nodes A and E are responsible for collecting the security capabilities of other nodes in their respective fields.</t>
      </section>
      <section anchor="new-link-attribute-tlvs-1">
        <name>New Link Attribute TLVs</name>
        <t>The IPv4 and IPv6 Prefix NLRIs (NLRI Type = 3 and Type = 4) use the same format, as shown in the following figure.</t>
        <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+
     |  Protocol-ID  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                           Identifier                          |
     |                            (64 bits)                          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //              Local Node Descriptors (variable)              //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                Prefix Descriptors (variable)                //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

            Figure 11: The IPv4/IPv6 Topology Prefix NLRI Format
]]></artwork>
        <artwork><![CDATA[
   +---------------+----------------------+----------+
   |    TLV Code   | Description          |   Length | 
   |     Point     |                      |          |                 
   +---------------+----------------------+----------+
   |      1152     | IGP Flags            |        1 | 
   |      1153     | IGP Route Tag        |      4*n | 
   |      1154     | IGP Extended Route   |      8*n | 
   |               | Tag                  |          |                 
   |      1155     | Prefix Metric        |        4 |     
   |      1156     | OSPF Forwarding      |        4 |       
   |               | Address              |          |                 
   |      1157     | Opaque Prefix        | variable |  
   |               | Attribute            |          |                 
   +---------------+----------------------+----------+
           Table 12: Prefix Attribute TLVs
]]></artwork>
        <t>An AS has at least one super direct connection node, which has the security capability information of all nodes under the AS. By adding new attributes to Prefix, the security capabilities of the entire AS can be transferred.</t>
        <artwork><![CDATA[
   +---------------+--------------------------+----------+
   |    TLV Code   | Description              |   Length | 
   |     Point     |                          |          |                 
   +---------------+--------------------------+----------+
   |      1158     | AS security capabilities | variable | 
   +---------------+--------------------------+----------+
]]></artwork>
        <t>AS Security capabilities means the security capability information of all nodes under the AS, that is, the security capability information of all nodes is spliced, such as {[IP address (A)+node security capability], [IP address (B)+node security capability]...}.</t>
      </section>
      <section anchor="usage-of-new-attribute-1">
        <name>Usage of new attribute</name>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>







  </back>
  <!-- ##markdown-source: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-->

</rfc>
