<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 2.7.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-oiwa-secure-hybrid-network-01" category="info" submissionType="IETF">
  <front>
    <title abbrev="Securing hybrid network criteria and req.">Securing hybrid network - criteria and requirements</title>

    <author initials="Y." surname="OIWA" fullname="Yutaka OIWA">
      <organization>AIST Japan</organization>
      <address>
        <email>y.oiwa@aist.go.jp</email>
      </address>
    </author>

    <date year="2024" month="November" day="04"/>

    <area>General</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 62?>

<t>This document analyzes requirements for ensuring and monitoring
the security status of the network used under complex network environment
such as hybrid cloud or mixed cloud settings.</t>



    </abstract>



  </front>

  <middle>


<?line 68?>

<section anchor="introduction"><name>Introduction</name>

<t>Recently, virtualized resources such as cloud computing infrastructure
rapidly replace traditional types of network/computing environment
such as local servers or on-premise computer clusters.
In such kind of infrastructure, information of physical resources 
such as servers, local network, network routers, etc. are hidden from
users in trade with flexibility, service redundancy and costs as well.
Cryptographic communications such as TLS, IPsec etc. are typically used to
protect communication into/out of such systems from eavesdropping and
tampering.</t>

<t>However, there are many use cases where service still depends on the
security nature of underlying physical resources, instead of just
encrypting the communication:</t>

<t><list style="symbols">
  <t>Traffic analysis on encrypted communication may reveal partial information
of the payload;</t>
  <t>Juridical requirement (such as personal data protection) demands some specific property (such as governing laws, geological positions, operators) to be checked;</t>
  <t>Denial-of-service and several other attacks may not be prevented by encryption only.</t>
</list></t>

<t>For such high-security applications, we need some technical
infrastructure for continuously checking the properties and statuses
of underlying network and intermediate nodes.  In non-virtualized,
self-managed setting, tHere are several existing technologies
(e.g. NETCONF, path validation, etc.) for acquiring such statuses.
However, these are not enough for virtualized, multi-stake-holder setting of
modern cloud infrastructure.</t>

<t>This document gives a first-stage problem analysis for ensuring and
monitoring the security status of the network used under complex
network environment such as hybrid cloud or mixed cloud settings.  It
also proposes a brief, straw-man view on the enabling architecture for
possible monitoring systems.</t>

<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="background"><name>Background</name>

<section anchor="multi-cloud-and-hybrid-cloud-systems"><name>Multi-cloud and hybrid cloud systems</name>

<t>Concepts of multi-cloud and hybrid clouds are defined in ISO/IEC
5140:2024; in short, multi-cloud is a system where a single service is
implemented using two-or-more independently-operated cloud services.
Hybrid cloud system composes two or more computation environments
having different nature of operation, security level or other aspects,
at least one of which is typically a public cloud service.  Often,
subsystems on privately-operated cloud, on-premise, or edge networks
are connected with public cloud infrastructure by network
to construct a single hybrid cloud system.</t>

<t>Hybrid cloud systems are, in general, constructed when the security or
other provisions of public cloud systems are not sufficient for a part
of information or a subsystem component (if not, a simple public or
multi cloud environment is sufficient).  At the same time, there are
often a requirement where some benefits (scalability, costs,
resilience, maintainability etc.) of public cloud systems are
beneficial (if not, simple on-premise deployment is enough).
This mixed, seemingly conflicting requirements makes it difficult
to ensure the monitoring of security for the hybrid cloud systems.</t>

</section>
<section anchor="security-implications-of-hybrid-clouds"><name>Security implications of hybrid clouds</name>

<t>Multi-cloud and hybrid cloud systems require system-internal
communications flowing beyond the boundary of single cloud systems.
In a simplest case, it can be implemented using authenticated TLS or
HTTPS communications via public Internet infrastructure.  For
high-security systems, it is often implemented using dedicated
channels of communications, such as VPNs, private peering, or even a
dedicated optical fiber channels.  To maintain the security of whole
systems, monitoring integrity of such dedicated channels is mandatory.</t>

<t>Furthermore, with IP-based software systems, there are lot more
dependency to ensure such secure communications.  In other words,
there are a lot more surfaces for attacks.  For example, if a DNS
recored is either tampered or misconfigured, a communication intended
to go through a secure channel might be routed to public channels.  If
there is a misconfiguration for routing, the traffic might go public.
Enumerating and collecting status of such dependency are undermined
currently.</t>

</section>
</section>
<section anchor="problem-statement"><name>Problem statement</name>

<t>There are a lot of technology already available and useful for
such purposes.</t>

<t><list style="symbols">
  <t>NASR activity (Network Attestation For Secure Routing)
provides capability for recording and monitoring the paths of
network packets forwarding.</t>
  <t>SAVNET (Source Address Validation in Intra-domain and Inter-domain
Networks) provides a way to ensure validity of incoming traffic and
possibly blocking any rogue packets.</t>
  <t>SRv6 provides a control of intended routes for individual IPv6
packets between networks.</t>
  <t>RPKI provides a control and trust anchors for the security
or inter-domain routing.</t>
</list></t>

<t>However, to ensure the security of the whole hybrid cloud
infrastructure, we still have to address the following aspects,
which seems to be lacking solutions currently.</t>

<section anchor="the-nature-of-multiple-operatorsstakeholders"><name>The nature of multiple operators/stakeholders</name>

<t>Hybrid cloud systems depends on a lot of resources which are not under
control of the application system operators.  Needless to say, public
clouds (both IaaS and SaaS) are operated by external service
providers.  They have their own policy for their operations, and they
have their own decisions for maintaining or replacing any of the
providing hardware/software resources, provided that their
service-level agreements (SLAs) is met.</t>

<t>This makes it non-satisfactory to expose information of all network
intermediate nodes to the final application operators.  First,
detailed information on design and implementation of the cloud
infrastructure is a confidential information and important properties of
the cloud providers.  Moreover, some extent of independence between
application operators (users or cloud infrastructure) and cloud
service providers are critical for maintaining cost effectiveness,
maintainability, security etc of the cloud services.</t>

</section>
<section anchor="determination-of-the-correct-states"><name>Determination of the "correct" states</name>

<t>In a small-scale, hand-crafted network, determining whether the
current running state of the network is intended or not is a
relatively simple question.  However, in the complex multi-cloud
systems, it is quite hard or even impossible problem to determine
that, even if we had been possible to know all the detail of
the running state of the whole global network.
To determine that, we also have to know about the design principle
and hidden assumption about the operation of each single network.</t>

</section>
<section anchor="shared-infrastructure-and-information-leakage"><name>Shared infrastructure and information leakage</name>

<t>The infrastructure of the cloud system is deeply shared among
several clients.  Although some information on the operational
status at cloud service side is required to check the reliability
of the user-side applications, exposing the raw operational
parameters to some client may reveal security-critical information
of other clients.  Before exposing the cloud-side status,
it must be cooked and filtered so that information only relevant
to a specific client is included.</t>

</section>
<section anchor="virtualized-infrastructure"><name>Virtualized infrastructure</name>

<t>Many cloud resources, not only computation nodes but also network
routers, switches, VPN endpoints, etc., are virtualized and provided
via infrastructure-as-code (IaC) systems.  Unlike physical routers
and switches, determination of virtual intermediate nodes in the
traffic path does not mean its physical locations, physical properties
and security natures.  (imagine how we can analyze results of
traceroute or ICMP ping via virtual private network.)</t>

<t>If there are any virtual nodes, physical properties of its underlying
infrastructure may have to be traced and checked to ensure security
and integrity.  This requires cooperation of virtual resource provider
or cloud providers and integration with their infrastructure
management systems.</t>

</section>
<section anchor="risks-beyond-network-layers"><name>Risks beyond network layers</name>

<t>Today, many network systems are managed via complex systems.  This
means any invasion to the IT-side assets of those management systems
will cause severe risks to the network layers.  These assets include
(and are not limited to) software asset management, software
vulnerability, ID managements, etc.</t>

<t>To correctly evaluate risks of the whole network operations, 
we must also care about the risks of these management systems as well.</t>

</section>
</section>
<section anchor="proposed-design"><name>Proposed design</name>

<section anchor="general"><name>General</name>

<t>To overcome these problems, we propose to design a distributed
architecture for assuring the network operation integrity for the
mixed and hybrid cloud applications.
Such a system should:</t>

<t><list style="symbols">
  <t>Have a modeling of the network infrastructure in two dimensions:
one axis in parallel to the network paths and forwarding
directions, and the other axis for the layers of protocols.</t>
  <t>Have enough knowledge on the complex dependency of software and
protocols; not only the network packet-forwarding technologies but
also surrounding areas such as addressing and DNS must be covered.</t>
  <t>Have explicit handling of tunneling and virtualization aspects,
both on protocol level (e.g. VPNs, IPIP, IPSec) and on
infrastructure level (IaC, Network-as-a-Service, Wavelength
Division Multiplexing, etc.)</t>
  <t>Consolidate operation information at each operator's level
and consider their pre-determined operation principles for
evaluating integrity.</t>
  <t>Address management-oriented risks of the infrastructure
managements, including non-network aspects.</t>
</list></t>

<t>Possible implementation of such a system might be
distributed systems of network security coordinations
between operators and users of cloud and network infrastructure.
Instead of the "disclose all" approach, 
such a design might keep both flexibility and efficiency of
the multi-cloud applications.</t>

<t>In particular, such a system will:</t>

<t><list style="symbols">
  <t>Have ability to state network security requirements
from an infrastructure user to infrastructure providers.
In a hybrid cloud or layered systems, it will include
communications between operators of infrastructure/cloud systems.</t>
  <t>Have ability to return assertions for the current provisional
status against given requirements.</t>
  <t>Provide some choices on the transparency levels about the
internals of cloud-service infrastructure.</t>
  <t>Have some traceability provisions for trouble shooting, 
if there are opacities in network status assertion replies.</t>
  <t>Have enough considerations on various tunneling and virtualization
technologies.</t>
  <t>Have a bidirectional interface to system-level security management
systems, such as Continuous Diagnostics and Mitigations (CDM)
dashboards.</t>
</list></t>

</section>
</section>
<section anchor="path-characteritics-service"><name>Path Characteritics Service</name>

<t>A service called "Path Characteristics Service" (PCS) provides a
endpoint for requesting/answering assertions for the "characteristics"
of the network paths.  Typically it is deployed on each network
operators or connectivity providers, and answering the real-time
assertion of the network status for their contracted clients.</t>

<t>In the complex commercial networking, network operators provide
connectivity not only for the Internet but also for other providers'
dedicated services, such as public and private clouds.  Also, their
provided connectivity may utilize tunneling technology upon 
networks provided by other operators.
For such multi-stakeholder settings, PCS will gather information from
the PCSs of the other providers and returns the summary information to
the clients.</t>

<t>(TBA: figures: see IETF 120 NARS BoF presentation)</t>

<t>The rest of this section will provide a unconsolidated list of
requirements for the functionality of PCS.</t>

<section anchor="identification-and-authentication"><name>Identification and Authentication</name>

<t><list style="symbols">
  <t>The PCS service will be access-controlled and confidentiality-protected.</t>
  <t>The service will be authenticated e.g. by OAuth or similar strong
authentication mechanisms.</t>
  <t>The identity of the authentication will be associated with a single
connectivity or network access channel.  Some examples of the single
connectivity are:
  <list style="symbols">
      <t>Physical (layer-1) leased line,</t>
      <t>A layer-2 plane (e.g. VLAN or VXLAN) on a single layer-1 network,</t>
      <t>A virtual private network tunnel.</t>
    </list></t>
</list></t>

<t>TBD: if there are multiple connectivity channel on single business contracts,
multiple IDs might be associated with a single authentication.</t>

</section>
<section anchor="subscriptions-for-assertions"><name>Subscriptions for assertions</name>

<t><list style="symbols">
  <t>The protocols used by PCS will have a kind of subscription
mechanisms: Clients will register a query, and will receive
assertions for the query continuously or periodically.</t>
  <t>For periodical polling, the intervals of assertions have to be
customizable.</t>
</list></t>

</section>
<section anchor="queries"><name>Queries</name>

<t><list style="symbols">
  <t>A query will be a set of assertion requests.</t>
  <t>Each assertion request will contain a destination and a list of desired connectivity properties on the communication path to the specified destination.</t>
  <t>A destination is a subset of the Internet, specified as an AS, a subset of IP addresses, or a DNS name.</t>
  <t>Providers of PCS are not required to support all types of queries, and may pose their own limitations onto it.  However, they has to make negative responses for any queries they do not support.</t>
</list></t>

</section>
<section anchor="connectivity-properties"><name>Connectivity Properties</name>

<t><list style="symbols">
  <t>List of desired connectivity properties declares what kind network nodes (both network nodes and edges) the communication packets will be allowed to flow over.</t>
</list></t>

<section anchor="properties-for-nodes"><name>Properties for nodes</name>

<t>Possible property requests for a network node will include at least:</t>

<t><list style="symbols">
  <t>operator</t>
  <t>geo-location</t>
  <t>supplier</t>
  <t>model</t>
  <t>hardware ID</t>
  <t>the name and version of the running software</t>
  <t>the security status of the node</t>
  <t>the security status of the operator</t>
  <t>required assurance level (see below)</t>
</list></t>

</section>
<section anchor="properties-for-edges"><name>Properties for edges</name>

<t>Network edges may be categorized into:</t>

<t><list style="symbols">
  <t>A physical network edge</t>
  <t>A network tunnel</t>
  <t>A software-defined network</t>
</list></t>

<t>Possible property requests for a physical network edge will include at least:</t>

<t><list style="symbols">
  <t>operator</t>
  <t>geo-location</t>
  <t>the protocol type of the physical network</t>
  <t>the security status of the operator</t>
  <t>required assurance level (see below)</t>
</list></t>

<t>Possible property requests for a network tunnel will include at least:</t>

<t><list style="symbols">
  <t>operator</t>
  <t>geo-location</t>
  <t>(nested) path property request for the underlying network</t>
  <t>the identification of the tunnel</t>
  <t>the protocol type</t>
  <t>the strength of the integrity/confidentiality protection</t>
  <t>the security status of the tunnel</t>
  <t>the name and version of the software realizing the tunnel</t>
  <t>the security status of the operator</t>
  <t>required assurance level (see below)</t>
</list></t>

<t>Possible property requests for a software-defined network will include at least:</t>

<t><list style="symbols">
  <t>operator</t>
  <t>geo-location</t>
  <t>(nested) path property request for the underlying network</t>
  <t>the name and version of the software realizing the network</t>
  <t>the security status of the network-defining software</t>
  <t>the security status of the operator</t>
  <t>required assurance level (see below)</t>
</list></t>

</section>
</section>
<section anchor="assertions-and-assurance-levels"><name>Assertions and assurance levels</name>

<t>An assertion, which is a response to the query, will contain either an evidence or an guarantee of the required network properties.
There will be several types of assurance levels or types of the assertions to be returned.
Every response will be signed by the PCS with the identification of the PCS software.</t>

<section anchor="traced-present-assertions"><name>Traced present assertions</name>

<t>For traced assertions, the query will typically contain a requirement for specific node suppliers and types.
The answer will contain a recorded trace of the path, signed with each traversed network nodes with their identifications.  The information will ensure that the property is satisfied only at the present time.</t>

<t>This type of assertion will require dedicated support for packet traces in every network nodes.</t>

</section>
<section anchor="transparent-present-assertions"><name>Transparent present assertions</name>

<t>For transparent assertions, the response will contain a list of traversed nodes and edges with their properties (as requested in the query).
If the query contains requirements for networks operated by third parties (i.e. involving a cascaded queries to other PCSs), the assertion will contain sub-assertions received from the third parties.
The information will ensure that the property is satisfied only at the present time.</t>

</section>
<section anchor="traceable-opaque-present-assertions"><name>Traceable opaque present assertions</name>

<t>For traceable opaque assertions, the response will contain an opaque ID for the response.  That ID has to be corresponding to the trace informations which can be used by operators to identify the records for trouble-shooting in the future time.
The information will ensure that the property is satisfied only at the present time.</t>

</section>
<section anchor="opaque-present-assertions"><name>Opaque present assertions</name>

<t>For opaque assertions, the response will contain just a positive or negative answer to the query.
The information will ensure that the property is satisfied only at the present time.</t>

</section>
<section anchor="traceable-opaque-future-assertions"><name>Traceable opaque future assertions</name>

<t>For traceable opaque future assertions, the response will contain an opaque ID for the response.  That ID has to be corresponding to the trace informations which can be used by operators to identify the records for trouble-shooting in the future time.
The information will ensure that the network is controlled in the way that the require property is kept satisfied, even when dynamic routing has been changed.</t>

</section>
<section anchor="opaque-future-assertions"><name>Opaque future assertions</name>

<t>For opaque assertions, the response will contain just a positive or negative answer to the query.
The information will ensure that the network is controlled in the way that the require property is kept satisfied, even when dynamic routing has been changed.</t>

</section>
</section>
<section anchor="things-to-be-considered"><name>Things to be considered:</name>

<t><list style="symbols">
  <t>How to assert security level of operators
  <list style="symbols">
      <t>Standards or de-facto standards for status sharing with security dashboards</t>
    </list></t>
  <t>Details on speficificaton for real-world properties such as operators, suppliers, models and geo-locations</t>
  <t>How to integrate and monitor application-level dynamic routing (e.g. DNS)</t>
  <t>Possible more-detailed specification for network topology requirements</t>
  <t>More detailed integration with other NASR activities</t>
  <t>Possible integration with RPKI and other global-level managements</t>
</list></t>

</section>
</section>
<section anchor="some-examples"><name>Some examples</name>

<t>The following is an informal example of the possible query to the PCS operated by operator A.</t>

<figure><artwork><![CDATA[
                       Internet
                           |
+------+    +-----------------+    +-----------------+
| User |----| Operator A (FR) |    | Operator C (DE) |
+------+    | 192.0.2.64/28   |    | 198.51.100.4/30 |
            +-----------------+    +-----------------+
                    |                           |
                    `===== IPIP VPN tunnel ====='
                      via some network operator in EU

Note: Areas FR, DE, and EU are just chosen as examples
for nested areas.
]]></artwork></figure>

<t><list style="symbols">
  <t>The path to 192.0.2.64/28 (on operator A) will be composed of:
  <list style="symbols">
      <t>Network nodes
      <list style="symbols">
          <t>within FR geo-locations,</t>
          <t>operated by operator A,</t>
          <t>assured for future with traceable records (by operator A).</t>
        </list></t>
      <t>Software-defined network edges
      <list style="symbols">
          <t>within FR geo-locations,</t>
          <t>operated by operator A,</t>
          <t>assured for future with traceable records (by operator A).</t>
        </list></t>
    </list></t>
  <t>The path to 198.51.100.4/30 (on operator C) will be composed of:
  <list style="symbols">
      <t>Network nodes
      <list style="symbols">
          <t>within FR geo-locations,</t>
          <t>operated by operator A,</t>
          <t>assured for future with traceable records (by operator A).</t>
        </list></t>
      <t>Network edges
      <list style="symbols">
          <t>within FR geo-locations,</t>
          <t>operated by operator A,</t>
          <t>assured for future with traceable records (by operator A).</t>
        </list></t>
      <t>VPN connection
      <list style="symbols">
          <t>using IPIP transport,</t>
          <t>with strong encryption (details TBD),</t>
          <t>operated by operator A,</t>
          <t>assured for future with traceable record (by operator A),</t>
          <t>going through underlying network:
          <list style="symbols">
              <t>Network nodes:
              <list style="symbols">
                  <t>within EU geo-locations.</t>
                  <t>opaquely assured for the present status (by some operator trusted by A).</t>
                </list></t>
              <t>Network edges:
              <list style="symbols">
                  <t>within EU geo-locations.</t>
                  <t>opaquely assured for the present status (by some operator trusted by A).</t>
                </list></t>
            </list></t>
        </list></t>
      <t>Software-defined network
      <list style="symbols">
          <t>within DE geo-locations,</t>
          <t>operated by operator C,</t>
          <t>opaquely assured for the present status (by operator C).</t>
        </list></t>
    </list></t>
</list></t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Security <bcp14>SHALL</bcp14> be deeply considered and discussed during the ongoing
standardization process.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>




<?line 534?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This work is supported by NEDO grants P23013 from the Net Energy and
Industrial Technology Development Organization.</t>

<!--  LocalWords:  traceability
 -->

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

