Markdown Version | Session Recording
Session Date/Time: 25 Jul 2024 16:30
nasr
Summary
This was a non-working group forming BoF session on network attestations for secure routing. The session covered use cases from operators (China Mobile, China Unicom), explored existing technologies like RATS and proof-of-transit, and discussed architectural considerations for inter-domain trust. The goal was to assess community interest and understanding of the problem before considering forming a working group. A key theme was validating path properties beyond basic routing protocol security.
Key Discussion Points
- Problem Statement: Traditional routing security focuses on route announcement, not hop-by-hop forwarding assurance. VPNs and TLS alone are insufficient due to potential vulnerabilities and the lack of trust in intermediate network elements.
- Use Cases:
- Data leakage prevention during wide-area transmission (e.g., campus to data center).
- Orchestrated connectivity meeting client requirements for trustworthiness or security properties.
- Routing auditing to prove traffic traversed specific, trusted elements in a defined order.
- Secure AI inference with proper data governance
- Bank data compliance with in-country routing
- Existing Technologies:
- RATS (Remote Attestation Procedures): Used for device trustworthiness attestation (claims, evidence, verification). Key to establishing node and link integrity.
- Proof-of-Transit: Validates path behavior at the data plane, often using techniques like Shamir sharing secrets. Can verify traversal order.
- SRv6: Used for pass computation and orchestration
- **Anima ACP: ** Possible profile with per hop link encryption
- Multi-Domain Challenges: Key issue is exchanging relevant material (golden values for attestation, shared secrets for proof-of-transit) between domains. Need to address trust boundaries and business relationships.
- Architectural Considerations: Different approaches exist:
- Orchestrator interactions with routing platforms (potential use of I2RS/RESTCONF).
- Verification within a single operator vs. end-to-end across multiple operators.
- Granularity of verification: per-packet vs. periodic sampling using IOM.
- Concerns:
- Brittleness and fragility of solutions (reliance on static networks, potential impact of adding new nodes).
- Cost and complexity of deploying and maintaining the system.
- Potential for abuse (making it easier for malicious actors to control routing).
- Impact on network management by network operators
- Need for Clearer Scoping: The community called for a more simplified single use case description to illustrate specific technology application and deployment. There were also calls to ensure this proposed work does not depend on proof of transit
Decisions and Action Items
- Action Item: Peter will consolidate and categorize the use cases presented.
- Action Item: Presenters to provide more detailed explanations of their architectures, clearly articulating dependencies and potential gaps.
Next Steps
- Continue discussions on the mailing list.
- Evaluate the problem statement and community interest.
- Determine if the topic is suitable for a formal working group.
- Scope problem with clear use case, and avoid being too general. Also ensure this scope does not hinge on proof of transit.