tbd BOF | M.H. Behringer |
Internet-Draft | M. Pritikin |
Intended status: Informational | S. Bjarnason |
Expires: November 10, 2014 | Cisco |
May 09, 2014 |
Autonomic Networking Use Case for Network Bootstrap
draft-behringer-autonomic-bootstrap-00
This document describes a use case for a specific autonomic functionality: Securely bootstrapping new devices into a network, without the need for pre-staging. The goal is to illustrate a requirement from network operators, and to illustrate how autonomic approaches can solve this use case.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 10, 2014.
Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
Autonomic Networking (AN) is a new way to manage network devices or functions, by making them self-managing. Rather than centralising all intelligence on a controller, the idea is to distribute intelligence across the network. The fundamental concepts of Autonomic Networking are described in [I-D.irtf-nmrg-autonomic-network-definitions]. A gap analysis for AN has been documented in [I-D.irtf-nmrg-an-gap-analysis].
This document describes a use case for a specific autonomic functionality: Securely bootstrapping new devices into a network, without the need for pre-staging. The goal is to illustrate a requirement from network operators, and to illustrate how autonomic approaches can solve this use case.
Bootstrapping in the context of this document refers to the process in which a new device joins a network in a secure way. A secure, zero-touch bootstrap process is defined here as a process without pre-staging, where the a new device can
It is required to bootstrap a device to make it securely manageable by a controller or network management system. There are networks where requirement [A] is a must, requirement [B] a should. In some networks both [A] and [B] are a must. In either case the behavior of a new device must be the same, to prevent possible downgrade attacks.
Today, there are two main ways to bootstrap a device:
In some networks it is not acceptable to not be able to authenticate new devices. Examples are:
For a secure, zero-touch device enrolment, a device must act "autonomically". It cannot rely on a central entity such as a controller or DHCP server, because the problem is exactly to establish trust with this controller in the first place. Therefore, in this use case an autonomic solution is absolutely required.
On the side of the new network element, an unskilled person should be able to connect the device following a simple cabling scheme, perhaps only supplying power to a wireless device. Once connected, the device must be powered on. There should be no need for any configuration tasks.
On the network side, the operator of the network must have full control over which element joins the network in which location. It must be possible to securely identify the new device, such that no other device can take its role. This can be achieved by validating unique device identifiers (UDI), for example serial numbers. While authorization of the UDI is required, it can be further automated, for example providing a white list of valid device UDIs. The actual process of enrolment and bootstrapping should be zero-touch for the operator.
Each device has self-knowledge about its own identity. This can be a unique device identifier such as a serial number. For a fully secure process, the device requires an IEEE 802.1AR [IDevID] credential.
A new device interacts only with a neighbouring domain device. All communications are link local, therefore the new device does not require a routable IP address. The neighbouring device acts as a proxy for the below information flows.
A new device exchanges data through the neighboring proxy with two entities:
Based on the above interactions with a network a device can decide locally whether or not to join a domain, and a domain can decide whether to enrol a device or not.
Intent is not required for this autonomic process.
The process can be monitored in several points:
Today, the task of bootstrapping a new device is either done through pre-staging or in an insecure way, where any device could join the domain. An autonomic approach allows the process to be secure, while still being zero-touch.
The document [I-D.pritikin-bootstrapping-keyinfrastructures] outlines a possible solution to the use case described here.
An autonomic approach can used to make a bootstrap process secure. As only link local addresses are used in the process, only nodes directly adjacent to a potentially malicious node can be attacked. Denial of service prevention must be applied on the proxy nodes. The other network elements must be secured according to general best practices, but require no specific security with regard to this approach.
This document requests no action by IANA.
This document has been written with the XML2RFC tool [RFC2629].
version 0: Initial version.
[RFC2629] | Rose, M.T., "Writing I-Ds and RFCs using XML", RFC 2629, June 1999. |
[RFC4949] | Shirey, R., "Internet Security Glossary, Version 2", RFC 4949, August 2007. |
[I-D.irtf-nmrg-autonomic-network-definitions] | Behringer, M., Pritikin, M., Bjarnason, S., Clemm, A., Carpenter, B., Jiang, S. and L. Ciavaglia, "Autonomic Networking - Definitions and Design Goals", Internet-Draft draft-irtf-nmrg-autonomic-network-definitions-00, December 2013. |
[I-D.irtf-nmrg-an-gap-analysis] | Behringer, M., Carpenter, B. and S. Jiang, "Gap Analysis for Autonomic Networking", Internet-Draft draft-irtf-nmrg-an-gap-analysis-00, April 2014. |
[I-D.pritikin-bootstrapping-keyinfrastructures] | Pritikin, M., Behringer, M. and S. Bjarnason, "Bootstrapping Key Infrastructures", Internet-Draft draft-pritikin-bootstrapping-keyinfrastructures-00, January 2014. |
[IDevID] | IEEE Standard, , "IEEE 802.1AR Secure Device Identifier", December 2009. |