| Internet-Draft | CATS Security Considerations | December 2025 |
| Shi, et al. | Expires 20 June 2026 | [Page] |
- Workgroup:
- cats
- Internet-Draft:
- draft-wang-cats-security-considerations-03
- Published:
- Intended Status:
- Standards Track
- Expires:
Security Considerations for Computing-Aware Traffic Steering
Abstract
Computing-Aware Traffic Steering (CATS) inherits potential security vulnerabilities from the network, computing nodes as well as workflows of CATS. This document describes various threats and security concerns related to CATS and existing approaches to solve these threats.¶
Status of This Memo
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 20 June 2026.¶
Copyright Notice
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
1. Introduction
The CATS framework is an ingress-based overlay framework for the selection of the suitable service instance(s) from a set of instance candidates. By taking into account both networking and computing metrics, the CATS framework achieve a global of dispatching service demands over the various and available edge computing resources. However, ubiquitous distributed computing resources in CATS also pose challenges to security protection. The operators of CATS may not have complete control over the nodes and therefore guarantee the security and credibility of the computing nodes themselves. Moreover, there are great differences in the security capabilities provided by computing nodes in the network, which greatly improves the breadth and difficulty of security protection.¶
This document describes various threats and security concerns related to CATS and existing approaches to solve these threats.¶
1.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
2. Terminology
This document makes use of the following terms:¶
Computing-Aware Traffic Steering (CATS): A traffic engineering approach [RFC9522] that takes into account the dynamic nature of computing resources and network state to optimize service-specific traffic forwarding towards a given service instance. Various relevant metrics may be used to enforce such computing-aware traffic steering policies. [I-D.ldbc-cats-framework]¶
CATS Service ID (CS-ID): An identifier representing a service, which the clients use to access it.¶
Service: An offering provided by a service provider and which is delivered using one or more service functions [RFC7665].¶
CATS Service Metric Agent (C-SMA): An agent that is responsible for collecting service capabilities and status, and for reporting them to a CATS Path Selector (C-PS).¶
Service request: The request for a specific service instance.¶
3. Security Issues of The Computing Resources
The ubiquitous and flexible characterictics of computing resources and the frequent connections to the computing resources will lead to the following risks:¶
-
Unauthorized Access and Control¶
Attackers may exploit vulnerabilities in interfaces or APIs to gain unauthorized access, potentially hijacking computational resources or manipulating task execution.¶
-
Data Confidentiality Breaches¶
Sensitive data processed by computing resources (e.g., model parameters in ML workloads) could be intercepted during transmission or compromised through insecure memory handling.¶
-
Denial-of-Service (DoS) Threats¶
Malicious actors may flood computing resources with forged computation requests, degrading service availability or disrupting task scheduling.¶
To address these risks, CATS implementations COULD adopt the following safeguards:¶
4. Computing Path Selector Security Issues
The Computing Path Selector which is responsible for dynamically selecting optimal forwarding paths, faces the following threats:¶
-
Path Manipulation Attacks¶
Adversaries may forge or alter path metadata (e.g., node capabilities, network latency) to steer computation tasks toward compromised nodes.¶
-
Covert Channel Exploitation¶
Path selection patterns could be abused to leak sensitive information through timing analysis or topology fingerprinting.¶
-
Topology Poisoning¶
Injection of forged network topology data could degrade path selection efficiency or enable man-in-the-middle (MITM) attacks.¶
-
Decision Logic Corruption¶
Runtime modification of C-PS algorithms may lead to suboptimal or adversarial path selections.¶
-
Orchestrator Impersonation¶
Spoofed control-plane messages could trick CPS into accepting unauthorized path directives.¶
To mitigate these risks, CATS implementations COULD implement the following countermeasures:¶
5. Computing Service Announcement Security Issues
The announcement of computing services in distributed environments introduces several security risks that must be addressed to ensure system integrity, confidentiality, and availability. This section outlines key threats and proposed countermeasures.¶
-
Unauthorized Announcement Injection¶
Malicious actors may forge or manipulate service announcements to advertise rogue computing nodes, redirect traffic to compromised resources, or disrupt service discovery, which may lead to data exfiltration, computation tampering or denial of service.¶
-
Sensitive Information Exposure¶
Service announcements containing unencrypted metadata (e.g., topology details, capability descriptors) may reveal sensitive infrastructure or operational patterns, which may lead to attack surface expansion for targeted exploits or reconnaissance.¶
-
Replay/Reuse of Legacy Announcements¶
Replayed announcements of deprecated services could lead to resource misallocation or dependency on outdated/insecure compute nodes.¶
-
DoS Through Announcement Flooding¶
Flooding the control plane with excessive or malformed announcements may lead to system resources exhausted.¶
-
Identity Spoofing¶
Impersonation of legitimate service providers through forged identity claims in announcements.¶
To address these risks, CATS implementations COULD adopt the following mitigation measures:¶
-
Cryptographic Integrity Protection¶
-
Metadata Minimization & Encryption¶
-
Anti-Replay Mechanisms¶
-
Timestamp/nonce could be used in announcements with strict freshness validation.¶
-
-
Rate Limiting & Prioritization¶
-
Identity Verification¶
-
The announcement from the computing devices could be binded to DIDs (Decentralized Identifiers) or VCs (Verifiable Credentials) for cryptographic identity proof.¶
-
6. Metrics Distribution Security Issues
Metrics distribution mechanisms in CATS are critical for performance optimization and resource coordination. However, they introduce specific security challenges that must be mitigated to prevent misuse or systemic compromise. This section identifies key threats and proposes countermeasures.¶
-
Tampering with Metric Data¶
Adversaries may alter metrics (e.g., latency, throughput, resource utilization) during transmission to mislead the decision-making of control plane, triggering suboptimal traffic placement or resource allocation and leading to degraded service performance.¶
-
Eavesdropping on Sensitive Metrics¶
Unauthorized interception of metrics may cause the eavesdropping on sensitive operational details (e.g., geo-location patterns, infrastructure capacity), which will lead to the exposure of business-critical intelligence or user behavior profiling.¶
-
Forged Metric Sources¶
Spoofing of metric publishers to inject false data or impersonate trusted entities (e.g., fake "low-load" signals to attract traffic).¶
-
Privacy Violations via Aggregation¶
The statistical analysis of aggregated metrics may produce inference of sensitive information (e.g., user activity, infrastructure weaknesses) which may result in privacy violation.¶
To address these risks, CATS implementations COULD adopt the following safeguards:¶
8. Security Considerations
The security considerations of CATS are presented throughout this document. .¶
9. IANA Considerations
This document has no IANA actions.¶
10. References
10.1. Normative References
- [RFC8174]
- Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.
- [RFC8446]
- Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10.17487/RFC8446, , <https://www.rfc-editor.org/info/rfc8446>.
- [RFC9052]
- Schaad, J., "CBOR Object Signing and Encryption (COSE): Structures and Process", STD 96, RFC 9052, DOI 10.17487/RFC9052, , <https://www.rfc-editor.org/info/rfc9052>.
- [RFC7950]
- Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", RFC 7950, DOI 10.17487/RFC7950, , <https://www.rfc-editor.org/info/rfc7950>.
- [RFC8205]
- Lepinski, M., Ed. and K. Sriram, Ed., "BGPsec Protocol Specification", RFC 8205, DOI 10.17487/RFC8205, , <https://www.rfc-editor.org/info/rfc8205>.
- [RFC9449]
- Fett, D., Campbell, B., Bradley, J., Lodderstedt, T., Jones, M., and D. Waite, "OAuth 2.0 Demonstrating Proof of Possession (DPoP)", RFC 9449, DOI 10.17487/RFC9449, , <https://www.rfc-editor.org/info/rfc9449>.
- [RFC2119]
- Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
10.2. Informative References
- [I-D.ldbc-cats-framework]
- Li, C., Du, Z., Boucadair, M., Contreras, L. M., and J. Drake, "A Framework for Computing-Aware Traffic Steering (CATS)", Work in Progress, Internet-Draft, draft-ldbc-cats-framework-06, , <https://datatracker.ietf.org/doc/html/draft-ldbc-cats-framework-06>.
- [RFC7665]
- Halpern, J., Ed. and C. Pignataro, Ed., "Service Function Chaining (SFC) Architecture", RFC 7665, DOI 10.17487/RFC7665, , <https://www.rfc-editor.org/info/rfc7665>.
- [RFC9019]
- Moran, B., Tschofenig, H., Brown, D., and M. Meriac, "A Firmware Update Architecture for Internet of Things", RFC 9019, DOI 10.17487/RFC9019, , <https://www.rfc-editor.org/info/rfc9019>.
- [RFC2904]
- Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., Gross, G., de Bruijn, B., de Laat, C., Holdrege, M., and D. Spence, "AAA Authorization Framework", RFC 2904, DOI 10.17487/RFC2904, , <https://www.rfc-editor.org/info/rfc2904>.
- [RFC9334]
- Birkholz, H., Thaler, D., Richardson, M., Smith, N., and W. Pan, "Remote ATtestation procedureS (RATS) Architecture", RFC 9334, DOI 10.17487/RFC9334, , <https://www.rfc-editor.org/info/rfc9334>.
- [RFC6480]
- Lepinski, M. and S. Kent, "An Infrastructure to Support Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480, , <https://www.rfc-editor.org/info/rfc6480>.
- [RFC9522]
- Farrel, A., Ed., "Overview and Principles of Internet Traffic Engineering", RFC 9522, DOI 10.17487/RFC9522, , <https://www.rfc-editor.org/info/rfc9522>.