Minutes IETF122: nasr: Tue 02:30
minutes-122-nasr-202503180230-00
| Meeting Minutes | Network Attestation for Secured foRwarding (nasr) WG | |
|---|---|---|
| Date and time | 2025-03-18 02:30 | |
| Title | Minutes IETF122: nasr: Tue 02:30 | |
| State | Active | |
| Other versions | markdown | |
| Last updated | 2025-04-13 |
NASR BoF
March 18, 2025
Chairs: Nancy Cam-Winget, Luigi Iannone
Minute Taker: Antoine Fressancourt
Note: Similar points as reported in these minutes have been
discussed on the chat. The complete log can be found at HERE.
Note Well and Agenda Bashing
Change from presented agenda: decision to have open technical discussion
before charter discussion. Agenda agreed by the room.
Why are we here?
- Presentation of timeline of NASR related work. Collective effort to
reach this level of understanding.
Use Case & Problem Statement
Use cases (Diego Lopez)
- Presentation of reference use cases and their implications.
-
Leman Lake use case related to banking regulation constraints in
Switzerland:- Shortest path between Sion and Geneve goes through France, which
is not compliant - NASR would like to provide means to control that the followed
path goes through the longer path in Switzerland.
- Shortest path between Sion and Geneve goes through France, which
-
What is the interaction with end-to-end principle and encryption?
- NASR is complementary to end-to-end security, provides answer to
regulation requirements.
- NASR is complementary to end-to-end security, provides answer to
-
Why is not end-to-end protection sufficient and why should we care
about where the traffic goes through?- Operators and regulators have requirements for instance traffic
not leaving a country.
- Operators and regulators have requirements for instance traffic
-
Would be good to have actual concrete examples of existing
regulations. - Technical requirements are not very persuasive. Regulatory
requirements might be, but need to be clearly presented. - NASR being a possible way to address pervasive traffic monitoring
threats. -
Trusted Path work in RATS WG provides some guarantees of the path
taken in the network, but here there is a tighter scope, which is
what needs to be clarified. 3GPP may be an example who would benefit
of NASR. -
Level of Compliance - LoC: Customers to verify some properties.
-
Proof of transit does not imply that the packet didn't exit the
path. Maybe path compliance is not the right term to be used.- Better to avoid talking about path assurance since the term may
be even more misleading. - Path attestation goes beyond checking node identity, can attest
ingress / egress interfaces and links taken by packets.
- Better to avoid talking about path assurance since the term may
-
There is work about proof of transit that has been done in SFC, what
is needed to highlight what is not there (in routing, RATS, SFC PoT)
which NASR will provide.- NASR is the joint use of attestation techncology and proof of
transit.
- NASR is the joint use of attestation techncology and proof of
-
What about lawful interceptions?
- Trustworthiness as defined in RATS can attest that a router does
what is supposed to do, including lawful interception if it is
what it is supposed to do.
- Trustworthiness as defined in RATS can attest that a router does
-
Sensitive Data Routing and Healthcare IoT Routing use cases have
been just briefly presented in the sake of time.
Problem statement (Peter Liu)
-
Why NASR Now?
- Customers cannot control which geolocation the traffic transits
- Customers cannot request traffic traverse devices, links,
services that meet their certain security requirements
-
Goal to provide visibility and verifiability
- Built on top of RATS to provide accountable forwarding. Gap
between routing security and forwarding security. NASR
complementary with routing security
- Built on top of RATS to provide accountable forwarding. Gap
-
There is work from RATS, like RFC 9684, that can be used in NASR.
Why an independent effort? Why not putting this work in an existing
WG?- RATS is the building block to create path attestation, whose
usage is then verified with proof of transit. These two things
together look out of the scope of RATS. - NASR does not want to replace RFC 9684, but rather leverage it.
- RATS is the building block to create path attestation, whose
-
What is exactly the definition of a path in NASR? BGP session?
Tunnel? physical links?- A document in PANRG has a good definition of what a path is.
-
Trustworthiness and traffic engineering are already addressed in
different places, so what is new in NASR?- The possibility for the customers to verify that the traffic has
been engineered in the way they asked. How to do it is the gap
NASR wants to fill.
- The possibility for the customers to verify that the traffic has
-
Candidate solutions from problems exist in other venues (Routing
security / SFC)- True, but they do not address the combination (forwarding).
-
Proposed work may result in fragmentation of the Internet, including
and excluding poeople?- No. That is the wrong terminology to use. NASR is about path
complaint to a set of claims. Is a specific service in a limited
domain not a general service for the Internet.
- No. That is the wrong terminology to use. NASR is about path
-
Clarification of requirements whether the requirement is to detect
nodes along the path that do not support NASR?- No. Only have proof that traffic went through a set of nodes
that support NASR.
- No. Only have proof that traffic went through a set of nodes
-
Bringing the work to RATS would not work. RATS is already bloated
and bringing all this work there is not possible. -
PoT has cryptographic cost.
- Implementation on SRv6 shows that the cost is very limited.
-
Remark about the scope of implementation: Internet or limited
domain?- Is limited domain implemented at the operator level.
-
Architecture at a glimpse
-
Need to verify every configuration (binary / configuration files /
routers) in order to determine the properties of the path?- This is not how remote attestation works. There is no
configuration shared, the configuration is attested through
trusted third party. You share hash values that attest the the
property.
- This is not how remote attestation works. There is no
-
Why not doing this in the SFC WG?
- Piece can be done in other WG, but from a global perspective
wold be better to have a WG.
- Piece can be done in other WG, but from a global perspective
-
For reliability, what about having multiple paths? Can it be a
scalability issue?- We need to discuss about what is in scope and what can be done.
Charter Discussion (Luigi Iannone)
- Note that expected NASR work is complementary to E2E encryption
- Complementary to RATS
- Initial focus on limited domain
- Routing part out of scope
- Method to express claims inheriting from RATS
- Need to clarify the threat model
-
Clarifying question about confusion on use cases requirements,
whether or not to attest everything along a path.- Only attest the positive part, whether it passes through a node.
Cannot prove that it does not go through other nodes.
- Only attest the positive part, whether it passes through a node.
-
Remark from SCION: there is a problem and use case to address, SCION
proposes another solution to the problem. PoT has been evaluated as
an experimental extension. SCION is willing to open up NASR work
between domain to propose technical elements to the problem. - Remark about mismatch between presented use case (lac Leman) and the
proposed work, why cannot be solved with VPN?- VPN is not path-aware and GDPR is one example of regulation
about where data can or cannot go.
- VPN is not path-aware and GDPR is one example of regulation
Explore Consensus & Next Steps
Question? Yes / No / No Opinion
- Is the problem understood? 58 / 37 / 5
- Is the problem tractable? 47 / 52 / 10
- Is IETF right venue to solve the pb? 84 / 11 / 6
- Do you believe we should create a new WG to address the pb? 55 / 45
/ 7 -
Do you agree with the current proposed charter to form NASR as a WG?
34 / 57 / 14 -
AD suggested that NASR get as much work as possible in RATS before
attempting to form a WG because of lack of strong consensus.
Concerns about tractability need to be clarified (What can be
proved? Is RATS sufficient to verify attestation codes?) Also
important to answer the question who will implment this.