Internet DRAFT - draft-chattopadhyay-sdnrg-multi-party-sdn-trust
draft-chattopadhyay-sdnrg-multi-party-sdn-trust
SDNRG Saurabh Chattopadhyay
Internet-Draft HCL Technologies
Intended status: Informational Kaushik Datta
Expires: March 21, 2017 HCL Technologies
September 21, 2016
Multi-party Multi-Domain Trust Architecture Recommendations for SDN
Deployment in Carrier Network
draft-chattopadhyay-sdnrg-multi-party-sdn-trust-03
Abstract
This draft analyzes the complexities involved in setting up the
certification infrastructure for multi-tenant, multi-domain SDN
adopted network environment. There are certain architectural options
available to address these complexities, and the same have been
consolidated and analyzed in the draft. However, there are certain
implementation level challenges that create difficulties to
operationalize these options. And these challenges have been
recognized in the draft and further translated into requirements for
setting up an operational framework suitable for managing certificate
chains for SDN integrated environment. Finally, a next level of
assessment has been carried out to consolidate contemporary work
happening in different Work Groups and their likely coverage over
identified operational framework requirements.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on March 21, 2017.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Chattopadhyay, et al. Expires March 21, 2017 [Page 1]
Internet Draft Multi-Party SDN Trust Architecture September 2016
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Document Outline . . . . . . . . . . . . . . . . . . . . . 3
2. Basics Terminologies . . . . . . . . . . . . . . . . . . . . . 3
2.1. Basic PKI Terminologies . . . . . . . . . . . . . . . . . 3
2.2. Basic SDN Terminologies . . . . . . . . . . . . . . . . . 5
3. Prime Requirements for Setting up Authentication Infrastructure
in SDN adopted Environment . . . . . . . . . . . . . . . . . . . 6
3.1. Identity Declaration and Certification Scenarios in
Multi-Tenant SDN Environment . . . . . . . . . . . . . . . . . . 6
3.2. Multi-Domain Certification Policy Diversities. . . . . . . 8
3.3. Layer of Security Enforcement . . . . . . . . . . . . . . 8
4. SDN aligned Certification Architecture - Building Blocks . . . 8
5. Continuous Certificate Chaining . . . . . . . . . . . . . . . 9
5.1. SDN Multi-Domain Bridge Model . . . . . . . . . . . . . . 10
5.2. SDN Multi-Domain Direct Cross Certification. . . . . . . . 11
5.3. SDN Unifying Domain Model . . . . . . . . . . . . . . . . 12
6. Discontinuous Certificate Chaining . . . . . . . . . . . . . . 13
6.1. SDN-security domains with independent PKI infrastructure . 13
6.2. Discontinuous SDN-security domains with varying
Authentication Infrastructure. . . . . . . . . . . . . . . . . . 15
7. Need for Integrated Operational Framework for Certificate
Chain Management . . . . . .. . . . . . . . .. . . . . . . . . . . 16
8. Contemporary Work aligning to Operational Framework
requirements for Certificate Chaining . . . .. . . . . . . . . . . 18
8.1. Automatic Certificate Management Environment (ACME). . . . 18
8.2. Application Bridging for Federated Access Beyond
Web (ABFAB). . . . . . . . . . . . . . . . . . . . . . . . . . . 20
8.3. System for Cross-Domain Identity Management. . . . . . . . 20
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1. Introduction
1.1. Overview
Adoption of SDN transforms certain inherent characteristics of
traditional carrier network. The newer network architecture invites
more stakeholders to the networking ecosystem, and this introduces
multi-tenant mode of working with resources shared across different
tenants. Sharing of resources is driven from the distributed
autonomous control functions located at logically centralized and
federated Controller plane. And this Controller plane further enables
developing innovative applications and services on top of this
network architecture, which essentially creates the demand for
supporting application subscription specific or network subscription
specific multi-tenancy at the converged infrastructure.
This change in the architecture also introduces a set of
vulnerabilities which the network administrators previously didn't
have to deal with. The logical centralization of Control Plane may
expose itself as single high-value asset to the attackers. And
involvement of more stakeholders to the networking ecosystem, and
integration of their infrastructure to carrier's network, exposes
more potential entry points for attackers.
Chattopadhyay, et al. Expires March 21, 2017 [Page 2]
Internet Draft Multi-Party SDN Trust Architecture September 2016
Thus, planning and implementing authentication and certification
infrastructure becomes one of the most important success factors for
adopting SDN.
Most Technical Reports and Specifications published by Open
Networking Foundation and other SDN focused industry and standard
bodies have recommended PKI based Infrastructure for SDN security
implementation. Thus, this document consolidates relevant
Security Practices, Framework, and Guidelines for establishing PKI
based authentication in SDN adopted network architecture. Some of
these Framework and Guidelines may not have been used significantly
in current network deployment, since multi-tenancy and resource
sharing complexities for network have not been this much critical so
far. Thus, it appears necessary to re-evaluate the feasibility of
implementing some of these not-so-commonly used Frameworks, and to
identify the need for further improvisations required over these
existing standard, practices and frameworks.
Towards this, the document limits its scope to analyze the
authentication requirements supported by PKI based Certification
Infrastructure, and identify the requirements for an operational
framework that can ease the overhead of Certification Chain
Management for SDN adopted network environment.
1.2. Document Outline
Section 2 of this draft introduces the basic terminologies that
are used in context of PKI as well as SDN Technologies. Section 3
outlines the prime requirements to improvise Authentication &
underlying Certification methods in SDN adopted environment. Section
4, 5, and 6 subsequently evaluate different architectural options
that can be adopted to meet the requirements described in Section 3,
and attempts to identify the bottlenecks to operationalize these in
Operator's environment. Section 4 specifically defines the common
building blocks of PKIX based Certification Architecture over which
further assessment of different certificate chaining models are
carried out. Section 5 considers different options for Continuous
Certificate Chaining, and Section 6 considers options for
Discontinuous Certificate Chaining. Section 7 summarizes the
considerations for integrated operational framework for Certification
Chain Management, as evolved while assessing the operational
complexities of different models. These considerations are perceived
as the newer set of requirements; need to be addressed to reduce the
overhead of operationalizing the certificate chaining models for
supporting multi-tenancy and resource sharing complexities. Section 8
evaluates some of the contemporary work being carried out in
different IETF WGs and attempt to establish if part or whole of the
work can be leveraged towards meeting the operational framework
requirements. Section 9 lists down the References for this draft.
2. Basic Terminologies
2.1 Basic PKI Terminologies
The following terms are used throughout this draft. Where
possible, definitions found in [RFC4949] and [RFC5217] have been
used.
Chattopadhyay, et al. Expires March 21, 2017 [Page 3]
Internet Draft Multi-Party SDN Trust Architecture September 2016
Public Key Infrastructure (PKI): A system of CAs that perform some
set of certificate management, archive management, key management,
and token management functions for a community of users in an
application of asymmetric cryptography and share trust relationships,
operate under the same Certificate Policy Document specifying a
shared set of Policy OID(s), and are either operated by a single
organization or under the direction of a single organization.
PKI domain: A set of two or more PKIs that have chosen to enter into
trust relationships with each other through the use of
cross-certificates. Each PKI that has entered into the PKI domain is
considered a member of that PKI domain.
Certificate: A digitally signed data structure that attests to the
binding of a system entity's identity to a public key value (based on
the definition of public key certificate in [RFC4949]).
Certification Authority (CA): An entity that issues certificates
(especially X.509 certificates) and vouches for the binding between
the data items in a certificate [RFC4949].
End Entity (EE): A system entity that is the subject of a
certificate and that is using, or is permitted and able to use, the
matching private key only for a purpose or purposes other than
signing a certificate; i.e., an entity that is not a CA [RFC4949].
Relying party: A system entity that depends on the validity of
information (such as another entity's public key value) provided by a
certificate (from the RFC 4949 [RFC4949] definition of certificate
user).
Root CA: A CA that is at the top of a hierarchy, and itself should
not issue certificates to end entities (except those required for its
own operation) but issues subordinate CA certificates to one or more
CAs.
Subordinate CA: A CA whose public key certificate is issued by
another superior CA, and itself must not be used as a trust anchor
CA.
Principal CA (PCA): A CA that should have a self-signed certificate
is designated as the CA that will issue cross-certificates to
Principal CAs in other PKIs, and may be the subject of
cross-certificates issued by Principal CAs in other PKIs.
Trust anchor CA: The trust anchor CA for an end entity is usually
the CA that issued the end entity's certificate. The trust anchor CA
must be the CA that has a self-signed certificate.
Unifying CA: A CA that is at the top of a hierarchy, and itself
should not issue certificates to end entities (except those required
for its own operation) but establishes unilateral cross-certification
with other CAs. A Unifying CA must permit CAs to which it issues
cross-certificates to have self-signed certificates.
Chattopadhyay, et al. Expires March 21, 2017 [Page 4]
Internet Draft Multi-Party SDN Trust Architecture September 2016
Bridge CA: A CA that, itself, does not issue certificates to end
entities (except those required for its own operation) but
establishes unilateral or bilateral cross-certification with other
CAs.
Certification Path: An ordered sequence of certificates where the
subject of each certificate in the path is the issuer of the next
certificate in the path. A certification path begins with a trust
anchor certificate and ends with an end entity certificate.
2.2 Basic SDN Terminologies
The following terms are used throughout this draft. Where
possible, definitions found in "SDN Layers and Architecture
Terminology" draft of SDNRG Research Group has been used.
Software Defined Network (SDN): A programmable networks approach that
supports the separation of Control and Forwarding Planes via
standardized interfaces.
SDN-security Domain: Within an integrated SDN infrastructure, each
subset of infrastructure that contains independent setup of PKI will
be considered as separate SDN-security Domains. An SDN-security
domain is thus same as a PKI Domain if considered in the scope of PKI
implementation in SDN Infrastructure. In case a subset of SDN
infrastructure adopts PKI implementation, while other subset
leverages non-PKI infrastructure, each subset of SDN Infrastructure
will be considered as separate SDN-security Domain.
Device: A device that performs one or more network operations related
to packet manipulation and forwarding. This reference model makes no
distinction whether a network device is physical or virtual. A device
can also be considered as a container for resources and can be a
resource in itself.
Application (App): A piece of software that utilizes underlying
services to perform a function. Application operation can be
parameterized, for example by passing certain arguments at call time,
but it is meant to be a standalone piece of software: an App does not
offer any interfaces to other applications or services.
Service: A piece of software that performs one or more functions and
provides one or more APIs to applications or other services of the
same or different layers to make use of said functions and returns
one or more results. Services can be combined with other services,
or called in a certain serialized manner, to create a new service.
SDN Element: SDN Element is a generic reference of either a Device or
Application or Service as deployed in a Software Defined Network.
Forwarding Plane (FP): The network device part responsible for
forwarding traffic.
Chattopadhyay, et al. Expires March 21, 2017 [Page 5]
Internet Draft Multi-Party SDN Trust Architecture September 2016
Control Plane (CP): Part of the network functionality that is
assigned to control one or more network devices. CP instructs
network devices with respect to how to treat and forward packets. The
control plane interacts primarily with the forwarding plane and less
with the operational plane.
Management Plane (MP): Part of the network functionality responsible
for monitoring, configuring and maintaining one or more network
devices. The management plane is mostly related with the operational
aspect and less with the forwarding plane.
3. Prime Requirements for Setting up Authentication Infrastructure in
SDN adopted Environment
SDN Transformation in Operator's environment is targeted to introduce
newer services with reduced time to roll-out. Such service roll-out
capabilities are enabled by the SDN centralized control layer, and
the ability to ingest applications on top. One of the critical
success factors is the robustness of authentication infrastructure as
can be designed, to deal with multi-tenancy and resource sharing
complexities in SDN integrated environment.
Following aspects have critical influence over the robustness of
authentication infrastructure, as elaborated in sub-sections below.
3.1 Identity Declaration and Certification Scenarios in Multi-Tenant SDN
Environment
In a simplistic representation, the Elements and the Controllers are
envisioned as the resources owned by Network Provider, the SDN
applications running on top of the controllers could be deployed as
internal or external applications deployed by 3rd party Application
Providers. And the services of the applications and network will need
to be extended for Customer Enterprises, making the Enterprise
network environment seamlessly integrated. This essentially creates
the demand for multi-party environment where each stakeholder's part
of the environment can be logically separate, and under the purview
of independent organization. The actual business environment can have
different Infrastructure Providers and Network Function Providers
augmenting to Network Provider's environment. And multiple levels of
tenancy models may need to be provisioned to support the particular
business aligned implementation.
Following scenarios describe the identity declaration, certification
and authentication requirements arising from certain types of
multi-tenancy scenarios.
- An Application Subscriber requires to access Resources hosted by
Network Provider on behalf of Application Provider
This scenario is similar to hosting the applications in public cloud
environment. In this scenario, the Resource requires to prove its
identity to Application Subscriber by presenting its PKIX
Certificate [RFC5280], declaring itself belonging to the domain of
Application Provider. However, originally it belongs to the Network
Provider, thus a Continuous Chaining or similar mechanism needs to
be established between the Network Provider and Application Provider
to certify the ownership of this particular resource.
Chattopadhyay, et al. Expires March 21, 2017 [Page 6]
Internet Draft Multi-Party SDN Trust Architecture September 2016
In absence of continuous chaining provision, the PKIX certificate
can still show the Resource belonging to Network Provider domain and
being used by Application Provider, while Application Subscriber can
manually pin this to trust as a measure of discontinuous certificate
chaining. Once the mechanism is in place, Application Subscriber can
check the validity of the Certificate as per the rules defined in
[RFC6125]. And upon successful validation, the authentication can be
carried out seamlessly.
The UTA WG has been actively developing number of specifications for
standardizing the use of TLS corresponding to different application
layer protocols, and also covering this kind of scenarios for
multi-tenant mode of operation. [RFC7590] is an example of one such
RFC that suggests the protocol specific use of TLS for XMPP in this
type of multi-tenant environment.
- A Network Subscriber requires accessing Resources hosted by
Application Provider on behalf of Network Provider
In certain type of deployment, the resource to be used by Network
Subscriber may be provided on Network Provider's behalf but can
actually belong to the Application Provider. Thus, the PKIX
Certificate of the Resource will have to declare the Resource being
part of Network Provider domain, and this will demand certain kind
of certification chaining between Application Provider and Network
Provider for this particular resource.
- An Application Subscriber requires to access combination of
Resources hosted by Network Provider and Customer Enterprise on
behalf of Application Provider
In certain type of deployment, the Resource being provided to
Application Subscriber may be co-owned by Customer Enterprise and
Network Provider, but being offered to Application Subscriber on
behalf of Application Provider. Now, depending on the business
agreements between the parties, this deployment may require
different type of certificate chaining provisions to certify the
ownership of the Resource under Application Provider domain. In
extreme cases, if the part of the Resource contributed by Customer
Enterprise is treated as part of Network Provider's environment, the
chaining of certificates for the particular resource may require
tri-party involvement.
- A Network Subscriber requires to access combination of resources
hosted by Application Provider and Customer Enterprise on behalf of
Network Provider
Similar to above scenario, the certification of the Resource
belonging to Network Provider domain may require multi-party
involvement depending on nature of business agreements among the
concerned parties.
Chattopadhyay, et al. Expires March 21, 2017 [Page 7]
Internet Draft Multi-Party SDN Trust Architecture September 2016
3.2 Multi-Domain Certification Policy Diversities
Each stakeholder's security policies and practices are generally
supported by deploying its own security infrastructure. Within an
integrated SDN infrastructure, each subset of infrastructure that
contains independent setup of certification / PKI infrastructure will
need to be considered as separate security domain. Thus, every
stakeholder organization will generally have one or more security
domains. In addition, IT administration practices in organization
prefer creating multiple domains even inside single organization's
infrastructure to address complex deployment requirements. For
example, security requirements for Access Network and Data Center can
be very different, and similar diversification of security
requirements may be required in different countries depending on laws
of the land, if Network Provider's environment span across multiple
such geographies. Now, while the Network Provider's infrastructure
evolve towards being SDN Enabled, the requirements for establishing
interoperable certificate management method rises to greater
magnitude due to SDN's focus on establishing interoperable
multi-domain environment.
3.3 Layer of Security Enforcement
An integrated SDN environment will have multiple applications require
supporting diverse transport technologies (such as PBB, MPLS, VxLAN,
NvGRE etc.). A secure and ubiquitous SDN transport fabric would thus
need to comply with the service continuity and connectivity
requirements of such integrated SDN environment.
On the other hand, the choice of application layer protocols for SDN
control plane have become diversified as well. OpenFlow being one of
the primary preferences, other protocols are also being leveraged to
meet the requirements of control plane separation in SDN environment.
In addition, in certain scenarios an overlay network may also be
designed by the SDN Applications, which can contain its own security
infrastructure in the application layer. In such cases,
authentication methods in underlying SDN network shall not interfere
with authentication requirements of the overlaying network.
Thus, authentication method selected at the SDN transport fabric
shall interoperate seamlessly with various deployment scenarios of
integrated SDN Environment.
4. SDN aligned Certification Architecture - Building Blocks
As a next step, the draft evaluates different types of certification
architecture that can potentially be leveraged for SDN Integrated
environment, and also assess the operational flexibilities required
to enable easy realization of these architectures in carrier grade
environment.
Towards this, there are certain building-blocks for setting up PKIX
based Architecture in the integrated SDN environment, and these
building blocks can mostly remain unchanged despite of variations in
different deployment scenarios considered. This section of the draft
summarizes these building blocks, as followed -
Chattopadhyay, et al. Expires March 21, 2017 [Page 8]
Internet Draft Multi-Party SDN Trust Architecture September 2016
(a) For operational and business purposes, integrated SDN environment
can be considered subdivided into separate SDN-security domains each
with specific business scope and administration scope. While these
domains can be owned by Application Providers, Network Provider and
Customer Enterprises, a generic representation of these domains have
been considered here onwards to achieve a business-independent and
technology-aligned analysis stand-point. To enable this, let's assume
an integrated SDN Environment S that comprises of all Elements
required for setting up SDN aligned Network, Hosted SDN Applications,
and Integration with Customer Enterprises. The Integrated SDN
Environment S thus assumed to be divided into multiple SDN-security
domains { S1, S2, S3, ........ Sn}. Each of these domains may contain
an arbitrary number of controllers, switches and other SDN enabling
Elements.
b) It is assumed that each individual SDN-security domain S1, S2,
S3, ..... Sn will typically have their own PKIX infrastructure. In
certain scenarios, if one or more of the domains doesn't conform to
this, the analysis approach will consider integration through
Discontinuous Chaining Model to interoperate PKIX based domains with
non-PKI based domains.
c) Within an SDN-security domain, it is assumed that logical
representation of TLS Client CA and TLS Server CA will be present,
and will be dedicated for role specific certificate issuance. The TLS
Client CA of the domain should issue certificates to the TLS clients
of the domain, which will need to establish TLS connection with other
TLS servers in the same or different domain. The TLS server CA of the
domain shall issue certificates to the TLS servers, which will need
to establish TLS connection with the TLS clients in the same or
different domain.
d) It is assumed that an SDN-security domain may choose to combine
two or more of the CAs. For example, the same CA may be used to issue
TLS client & TLS server certificate both or both-end entity TLS and
IPSec certificates. Furthermore, the same CA may be used to issue
both-end entity certificates, and cross certificates as well
depending on the nature of deployment.
5. Continuous Certificate Chaining
Continuous Certificate Chaining models have certain common patterns
while being used in continuous chain of trust, and these patterns
are described in [RFC5217]. This section identifies the benefits of
the specific model while implemented in SDN integrated environment,
and also the associated challenges that will need to be addressed
separately. Presumably, each of the Models will offer certain
benefits against others in certain deployment scenarios, and this
essentially will steer the infrastructure to adopt an overall hybrid
model. However, the challenges in establishing such hybrid
environment will need to be addressed as well, and the following
section attempts to capture that.
Chattopadhyay, et al. Expires March 21, 2017 [Page 9]
Internet Draft Multi-Party SDN Trust Architecture September 2016
5.1 SDN Multi-Domain Bridge Model
In this model, every SDN-security domain develops the trust
relationship by cross-certifying through a Bridge CA, as shown in
Figure below.
The relationship does not get established between a subscriber domain
and a relying-party domain directly, but established from the
Principal CA of the relying-party's domain via a Bridge CA.
Following are certain benefits and specific implementation level
challenges, as evaluated -
a) Setting up a BCA to cross-certify multiple CAs of
multiple organizations will make the implementation much modular and
better manageable in the long term.
b) Establishing the certification chain through BCA typically
increases the deployment time significantly, unless a pre-provisioned
automation framework is in place for on-demand policy mapping and BCA
is locally hosted.
c) Setting up a local BCA will incur significant management overhead
d) 3rd party BCA will typically narrow down the possibilities of
multi-party involvements since affiliation of all parties to the BCA
becomes a mandatory requirement
e) BCA based implementations increases the certification cost, and
involves careful liability management.
Cross-certified Cross-certified
SDN-security domain 1 with BCA SDN-security domain 3 with BCA
+---------> +-----------+ -----+
| | Bridge CA | |
| +-------- +-----------+ <--+ |
| | ^ | | |
| | Cross-certified | | | |
| |SDN-sec domain 2 | | | |
| | with BCA | | | |
+---------|-|---+ +-----------|-|-+ +--|-|-----------------+
|SDN-sec | | | | SDN-sec | | | | | | SDN-sec |
|domain 1 | v | | domain 2 | v | | | v domain 3 |
| +-----+ | | +-----+ | | +-----+ ----+ |
| +---| PCA | | | | PCA | | | | PCA | | |
| | +-----+ | | +-----+ | | +-----+ <-+ | |
| | | | | | | | | ^ | v |
| | | | | | | | | | +----+ |
| | | | | | | | | | | CA |---+ |
| | | | | | | | | | +----+ | |
| | | | | v | | v | ^ | | |
| | | | | +----+ | | +----+ | | | |
| | | | | +---| CA | | | | CA |---+ | | |
| | | | | | +----+ | | +----+ | | |
| | | | | | | | | | | | |
| v v | | v v | | v v v |
| +----+ +----+ | | +----+ +----+ | | +----+ +----+ +----+ |
| | EE | | EE | | | | EE | | EE | | | | EE | | EE | | EE | |
| +----+ +----+ | | +----+ +----+ | | +----+ +----+ +----+ |
+---------------+ +---------------+ +----------------------+
Figure 5: Bridge Model
Chattopadhyay, et al. Expires March 21, 2017 [Page 10]
Internet Draft Multi-Party SDN Trust Architecture September 2016
PCA - Principal Certificate Authority.
BCA - Bridge Certificate Authority.
CA - Certificate Authority
EE - End Entities (Applications/Controllers/Switches)
5.2 SDN Multi-Domain Direct Cross Certification
In this model, each SDN-Security domain certifies each other by
issuing a cross-certificate directly between each Principal CA, as
shown in the figure below. This model shortens the certification path
between the SDN-security domains.
Following are certain benefits and specific implementation level
challenges, as evaluated -
a) This model offers a flexible deployment provision if two different
SDN-security domains of the Network Provider's infrastructure
requires a cross-domain trust provision while the infrastructure
evolve towards SDN enabled infrastructure.
b) This model reduces the time to deployment as well as cost of
certification
c) Reducing the hops in a certification path validation directly
improves the performance and response time of authentication
d) Architecturally this model is not very robust in terms of
modularity and long term manageability. For example, A SDN-security
domain in this model needs to take into account that the other
SDN-security domain may cross-certify with any other SDN-security
domains. If a particular SDN-security domain requires restricting a
particular certification path, it should not rely on the validation
policy of the relying party, but should include the constraints in
the cross-certificate explicitly.
e) Managing the policy-mapping and constraints across all
combinations of cross-certified SDN-security domains will add
operational overhead, unless a framework is in place to manage this
effectively.
+---------------+ +------------------------+
| SDN-sec | cross-certified | SDN-sec |
| domain 1 | each other | domain 2 |
| +-----+ --------------------> +-----+ ----+ |
| | PCA | | | | PCA | | |
| +-----+ <-------------------- +-----+ <-+ | |
| | | | ^ | v |
| | | | | +----+ |
| | | | | | CA |---+ |
| | | | | +----+ | |
| v | | v ^ | | |
| +----+ | | +----+ | | | |
| +---| CA | | | | CA |--+ | | |
| | +----+ | | +----+ | | |
| | | | | | | | |
| v v | | v v v |
| +----+ +----+ | | +----+ +----+ +----+ |
| | EE | | EE | | | | EE | | EE | | EE | |
| +----+ +----+ | | +----+ +----+ +----+ |
+---------------+ +------------------------+
Figure 6: Direct Cross-Certification Model
PCA - Principal Certificate Authority.
CA - Certificate Authority
EE - End Entities (Applications/Controllers/Switches)
Chattopadhyay, et al. Expires March 21, 2017 [Page 11]
Internet Draft Multi-Party SDN Trust Architecture September 2016
5.3 SDN Unifying Domain Model
In this Unifying Domain Model, a SDN-security domain is created by
establishing a joint, superior CA that issues unilateral
cross-certificates to each SDN-security domain, as shown in following
Figure. Such a joint, superior CA is defined as a Unifying CA, and
the Principal CAs in each SDN-security domain have the hierarchical
CA relationship with that Unifying CA. In this model, any relying
party from any of the SDN-security domains must specify the Unifying
CA as its trust anchor CA, in order
to validate a subscriber of other SDN-security domains. If the
relying party does not desire to validate subscribers of other
SDN-security domains, the relying party may continue to use the
Principal CA from its own SDN-security domain as its trust anchor CA.
Following are certain benefits and specific implementation level
challenges, as evaluated -
a) This model enforces strict security policies and acquire complete
control for security governance across all participating SDN-Security
Domains
b) The model is too rigid, typically not viable for
cross-organization implementation due to high level of liability
implications
c) Implementing this model often requires complete re-architecting
effort
d) Adds to operational overhead in terms of managing the complete CA
hierarchy and security policies, unless an operation framework offers
certain level of automation benefits
Cross-certified Cross-certified
Unifying CA Unifying CA
to SDN-security domain 1 +--------------+ to SDN-security domain 3
+---------| Unifying CA |---+
| +--------------+ |
| | |
| Cross-certified | |
| Unifying CA | |
|to SDN-sec domain 2| |
+-----------|---+ +-------------|-+ +----|-----------------+
| SDN-sec | | | SDN-sec | | | | SDN-sec |
| domain 1 | | | domain 2 | | | | domain 3 |
| v | | v | | v |
| +-----+ | | +-----+ | | +-----+ ----+ |
| +---| PCA | | | | PCA | | | | PCA | | |
| | +-----+ | | +-----+ | | +-----+ <-+ | |
| | | | | | | | | ^ | v |
| | | | | | | | | | +----+ |
| | | | | | | | | | | CA |---+ |
| | | | | | | | | | +----+ | |
| | | | | v | | v | ^ | | |
| | | | | +----+ | | +----+ | | | |
| | | | | +---| CA | | | | CA |---+ | | |
| | | | | | +----+ | | +----+ | | |
| | | | | | | | | | | | |
| v v | | v v | | v v v |
| +----+ +----+ | | +----+ +----+ | | +----+ +----+ +----+ |
| | EE | | EE | | | | EE | | EE | | | | EE | | EE | | EE | |
| +----+ +----+ | | +----+ +----+ | | +----+ +----+ +----+ |
+---------------+ +---------------+ +----------------------+
Figure 7: Unifying Trust Point (Unifying Domain) Model
Chattopadhyay, et al. Expires March 21, 2017 [Page 12]
Internet Draft Multi-Party SDN Trust Architecture September 2016
PCA - Principal Certificate Authority.
CA - Certificate Authority
EE - End Entities (Applications/Controllers/Switches)
6. Discontinuous Certificate Chaining
In discontinuous certificate chaining model, there can be
SDN-security domains which are independent of each other and show no
mutual certificate interoperability relationship. In such case, the
PKI infrastructure within each of the domains will need to be
independent of one another. In certain other scenarios, one
particular domain can have PKI infrastructure while the other can
have completely different non-PKI based security infrastructure, and
thus showing no interoperable relationship.
Following are some of the deployment scenarios where these approaches
appear to be quite useful -
(i) Certain SDN-Security Domain(s) owned by Application Provider or
Customer Enterprise don't require to maintain continuous
certification path with Network Provider's SDN-Security domains -
such deployment may be preferred for loose coupled integration and/or
ad-hoc integration for multi-tenant infrastructure
(ii) Overlaying application network requires implementing non-PKI
security infrastructure but underlying SDN Transport adopts PKI
Infrastructure
6.1 SDN-security domains with independent PKI infrastructure
The trust list model design [RFC5217] can be leveraged in a
discontinuous PKI setup for the above mentioned scenario (i).
Interoperability across multiple disjoint SDN-security domains can be
created by maintaining locally configured list of trust anchors
within each specific SDN-security domains, or by maintaining the
trust list entities external to the SDN-security domains. This
configured lists known as trust lists contain a set of one or more
trust anchors or Certificate Authorities. Such a trust list contains
one or more trust anchors used by a relying party OR the end entities
to explicitly trust one or more SDN-security domain. Establishing
this explicit trust involves human user's explicit pinning of the
certificate against the particular trust anchor.
The discontinuous trust model assumes that each independent
SDN-security domain contains a local certificate authority (CA) Or
Trust Anchor which would grant certificates to the End Entities. It
also assumes that the CA Or Trust Anchor would possess a self-signed
CA certificate which would be used to sign and generate the end
entity Certificate Signing Request (CSR) and Certificate
respectively.
Chattopadhyay, et al. Expires March 21, 2017 [Page 13]
Internet Draft Multi-Party SDN Trust Architecture September 2016
The following Figure 4 shows how two different SDN-security domains
will discretely interoperate while leveraging the trust list model.
The relying party would thus trust the Trust Anchors present in the
trust list. As shown in the below diagram, the End Entity EE1 within
SDN security domain 1, would trust the Certificates granted by Trust
Anchor 1 and Trust Anchor 2. This would mean that EE1 of SDN-security
domain 1 would trust the Trust Anchor 2 and EE2 of SDN-security
domain 2 would trust the Trust Anchor 1, thus extending the trust
across multiple disjoint/discontinuous SDN-security domains. In this
type of model, end entities belonging to different and disjoint
SDN-security domains cannot go through actual and explicit
authentication exchanges due to the unavailability of direct
certification path, but obtains implicit interoperability
relationship by depending on the Trust List configurations.
Following are certain benefits and specific implementation level
challenges, as evaluated -
a) This model offers flexibilities to configure interoperability
relationship without establishing a full certification path
b) The model provides dynamic configuration capabilities over the
Trust List
c) Setting this up is entirely dependent on the end user /
subscriber, and this typically does not offer good experience to the
end user.
+-------------------------+ +-------------------------+
+-------------------------+ +-------------------------+
| SDN-security | | SDN-security |
| domain S1 | | domain S2 |
| +--------------------+ | | +--------------------+ |
| |CA (Trust Anchor 1) | | | |CA (Trust Anchor 2) | |
| +--------------------+ | | +--------------------+ |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| Cert | Grant | | Cert | Grant |
| +-------+--------+ | | +-------+--------+ |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| v Explicit v | | v Explicit v |
| +-----+ 2/3 Leg +-----+ | | +-----+ 2/3 Leg +-----+ |
| | EE1 |<------->| EE2 | | | | EE1 |<------->| EE2 | |
| +-----+ Auth +-----+ | | +-----+ Auth +-----+ |
+----^---------------^----+ +----^---------------^----+
| | | |
| | | |
+-----Implicit Auth/Trust-------------+ |
| |
+------- Implicit Auth/Trust----------+
Chattopadhyay, et al. Expires March 21, 2017 [Page 14]
Internet Draft Multi-Party SDN Trust Architecture September 2016
i) Disjoint/independent SDN-security domains
+-------------------------------------------- -+
| End Entity 1 / EE1 (SDN-security domain S1) |
| +-----------------------------------------+ |
| | Trust List | |
| | +----------------+ +----------------+ | |
| | | SDN domain S1 | | SDN domain S2 | | |
| | | Trust Anchor 1 | | Trust Anchor 2 | | |
| | +----------------+ +----------------+ | |
| +-----------------------------------------+ |
+----------------------------------------------+
ii) Trust List maintained by EE1 (SDN-security domain S1)
+---------------------------------------------+
| End Entity 2 / EE2 (SDN-security domain 2) |
| +-----------------------------------------+ |
| | Trust List | |
| | +----------------+ +----------------+ | |
| | | SDN domain S1 | | SDN domain S2 | | |
| | | Trust Anchor 1 | | Trust Anchor 2 | | |
| | +----------------+ +----------------+ | |
| +-----------------------------------------+ |
+---------------------------------------------+
iii) Trust List maintained by EE2 (SDN-security domain S2)
S1 - SDN-security domain S1
S2 - SDN-security domain S2
CA - Certificate Authority
EE1/EE2 - End Entities (Applications/Controllers/Switches)
Figure 8: SDN Trust List Model between independent SDN-security
domains
6.2 Discontinuous SDN-security domains with varying Authentication
Infrastructure
In certain type of deployments, SDN Applications will impose an
overlaying network on top of underlying software defined network
infrastructure, as described above as Scenario (ii). In such
scenarios, SDN Application Infrastructure can maintain separate
authentication infrastructure while underlying transport fabric will
maintain its own authentication mechanism.
This draft considers this variation manageable if underlying
transport maintains PKI based Infrastructure and non-PKI
infrastructure associated to overlaying application network
subscribes to underlying SDN-security domain for the necessary
interoperability scenarios. The draft doesn't identify any other
method to make PKI based SDN-security domain interoperable with
non-PKI infrastructure associated to overlaying networks.
Chattopadhyay, et al. Expires March 21, 2017 [Page 15]
Internet Draft Multi-Party SDN Trust Architecture September 2016
7. Need for Integrated Operational Framework for Certificate Chain Management
Multi-party involvement, and inclusion of multiple security domains,
increases the operational complexity of SDN Certification
infrastructure. Technology options exercised in different
stakeholders' PKI infrastructure can vary significantly for PKI
operations and management, leading to complex interoperability
requirements. As specifically analyzed in the context of different
certificate chaining models in above sections, variations in Identity
Metadata, Certification metadata, policy attributes, constraints, and
certification status attributes from one SDN-security domain to
another significantly impact the Certificate Chain establishment
capabilities across SDN-security domains. And this typically
introduces severe operational overhead. Thus, setting up a framework
appears necessary to manage the complex interoperability requirements
through set of processes, practice and automation. Following are the
high level requirements as analyzed for the framework -
(i) All stakeholder organization and their SDN-security domains
require to be logically modelled in hierarchical topology within the
integrated operational framework to identify all on-boarded
stakeholders of the Ecosystem and Customers. The hierarchical
topology should also clarify the zoned security models as implemented
and overlapped to the specific parts of the integrated topology.
(ii) Each stakeholder logically modelled in this framework requires
to be associated to an asset repository containing the published
security practice statement and policy statements on PKIX
Certification interoperability. The users of the framework should be
able to lookup the assets corresponding to particular stakeholder.
(iii) The integrated framework should maintain pre-identified policy
mapping provisions across all possible SDN-security domains, for the
cases -
(a) where the policy mapping configurations were applied to
establish a certification interoperability relationship
(b) where the policy mapping configurations are not yet applied
as no certificate interoperability requirement has been
identified yet
(iv) For established certificate interoperability relationship, the
integrated framework requires to model the relationship in the
hierarchical topology across the specific combinations of
SDN-security domains. The relationship needs to be recognizable from
the framework and further lookup should be possible to acquire more
information on enforced policies.
(v) The integrated framework requires providing option to update
existing set of policies already enforced over the specific
SDN-security domains, which are participating in trust relationship.
The update operation should get executed while making necessary
changes with immediate effect or at scheduled time.
(vi) To support dynamic application delivery requirements, on-demand
certification interoperability request should be entertained by
setting up the underlying policies. Pre-identified policy mapping
configurations across the participating SDN-security domains should
be applied on demand to provision this.
Chattopadhyay, et al. Expires March 21, 2017 [Page 16]
Internet Draft Multi-Party SDN Trust Architecture September 2016
(vii) On demand extension of certificate chain should be supported
for on-demand modifications of application delivery requirements. In
certain cases, if SDN Application delivery environment requires
increased coverage by introducing resources from more SDN-security
domains into the application delivery network, the certificate chains
need to be extended accordingly. This requires modifying the existing
certificate interoperability relationship as well as provisioning new
relationship as per the requirements of extended certification path.
The integrated framework should be able to offer these provisions.
(viii) For every certificate interoperability relationship
established and modelled in the integrated framework, the constraints
on the specific certificate path should be explicitly configured
through the framework. The framework should offer Constraint
Management capabilities for representation of the constraints in the
hierarchical topology, ability to establish, modify and remove these
constraints across certification paths.
(ix) Integrated Constraint Management capability in the framework
should be devised for real-time manageability over activation and
de-activation of particular certificate chain.
(x) For on-demand un-subscription of applications or services, the
integrated framework requires to remove the existing certificate
interoperability relationship across participating SDN-security
domains. The removal process shall be carefully designed so that
certificate path used for other application delivery context shall
not get impacted by this.
(xi) The framework requires providing the manageability
over Trust Lists configured for supporting discontinuous chains. The
hierarchical topology in the integrated framework should model the
discontinuous interoperability relationships as well. The implicit
interoperability achieved through Trust List configuration should be
representable corresponding to the particular SDN-Security domains
present in the hierarchy.
(xii) The Framework may also maintain references of
further applications and processes that are used in the scope of
SDN-security domains for PKIX Infrastructure specific operations and
management. Such operations and management may include Key
Management, Certification Status & CRL Management, Certificate
Delivery Management and related aspects.
(xvi) The Framework needs to leverage existing trust relationship
across SDN-security domains to establish cross domain identity
interoperability across these domains. Underlying trust
relationship should benefit the process of creating cross-domain
identity interoperability.
While an integrated operational framework for Certificate
Interoperability Management can consist a distributive set of
applications / tools, processes, Policies, and Practice Statements,
the framework should offer an end to end span of control for managing
the Relationships. Above mentioned features for managing
the interoperability were suggested in the context of such end to
end span of control, while keeping the alignment to the evolving
needs of SDN integrated environment.
Chattopadhyay, et al. Expires March 21, 2017 [Page 17]
Internet Draft Multi-Party SDN Trust Architecture September 2016
8. Contemporary Work aligning to Operational Framework requirements for
Certificate Chaining
8.1 Automatic Certificate Management Environment (ACME)
The ACME draft specification could potentially offer solutions on the
following areas -
- Pre-identified policy mapping across multiple participating
SDN-security domains
- On demand extension of certificate chains between multiple SDN
security domains in response to dynamic tenancy requirements
- On demand removal of existing certificate chains between multiple
security domains without compromising other tenancy requirements
- Defined method for Key management, Certification Status
management, Certificate Revocation list management and certificate
delivery management
The ongoing work in ACME WG thus can be leveraged in the context of
this draft, and requirements (vi), (vii), (x), and part of (xii) as
documented in this draft can be addressed.
Resources belonging to certain domain are offered to another domain
through dynamic tenancy agreement, and by potentially leveraging ACME
implementation, dynamic registration, authorization and certificate
issuance for the resources against the new domain can be carried out
automatically.
In certain cases, on demand extension of certificate or certificate
chain require to be supported due to real-time modifications required
for SDN application delivery. On-demand modification of certificate
can potentially be addressed through ACME specification, like
extending the certificates for Subject Name Indication (SNI) or
similar multi-tenancy related enhancements. (TBD - Analysis of
ongoing ACME specification work will need to be carried out to
evaluate the level of support for TLS extensions for multi-tenancy).
On demand modifications of certificate-chain can also be managed
through ACME implementation, especially for scenarios where security
practices of new domain require establishing a new chain of trust.
Certification Authorities involved in the new chain will require to
support ACME implementation at every intermediate stage to carry out
automated certification.
During expiry of tenancy agreement or on-demand un-subscription of
SDN applications, automated revocation of certificates can also be
carried out by potentially leveraging ACME implementations.
Following diagrams elaborate some of the possible deployment
scenarios.
SDN-Security Domain 2-------+-----+
| +-----------+ | |
+-----------------------+ | ACME | | |
| +-------------------+ | | Client | | |
| |Domain 1 |Domain 1 | | +-----+-----+ | CA |
| |Resource |Resource | | +-----v-----+ | |
| | |provided | | | ACME | | |
| | |to | | | Server | | |
| | |Domain 2 | | +-----------+ | |
| +-------------------+-----------------+-----+
| |
|SDN-Security Domain 1 |
+-----------------------+
Figure 9: Automated Certification of tenant resources with new
Domain's CA
Chattopadhyay, et al. Expires March 21, 2017 [Page 18]
Internet Draft Multi-Party SDN Trust Architecture September 2016
Above diagram elaborates a deployment scenario where Domain 1's some
of the resources are provided to Domain 2 as a result of certain
dynamic tenancy agreement, and certification of same resources
against Domain 2's CA can potentially be carried out by leveraging
ACME implementation.
SDN+Security Domain 2+------+
+ |
+-----------------------+ |
| +-------------------+ | +---------+ |
| |Domain 1 |Domain 1 | | | ACME | |
| |Resource |Resource | | | Client | |
| | |provided | | +----+----+ |
| | |to | | | |
| | |Domain 2 | | | |
| +-------------------------------------+
| +--------+ +--------+ | |
| | CA | | ACME | <-------+
| | | | Server | |
| +--------+ +--------+ |
|SDN|Security Domain 1 |
+-----------------------+
Figure 10: Automated certificate enhancement of tenant resources
in existing Domain
The above diagram elaborates a deployment scenario where Domain 2's
resources acquire the Certificate from Domain 1's CA. Thus, if
Domain 1's some of the resources are provided to Domain 2 as a
result of dynamic tenancy agreement, automated certificate
enhancement can potentially be carried out by leveraging ACME
implementation.
SDN-Security Domain 2+------+ +---------+
+ | |---------|
+-----------------------+ | || ||
| +-------------------+ | +--------+ | || ACME ||
| |Domain 1 |Domain 1 | | | ACME |--|---->|| Server||
| |Resource |Resource | | | Client | | || ||
| | |provided | | +--------+ | || ||
| | |to | | | +---------+
| | |Domain 2 | | | | |
| +-------------------+-----------------+ | |
| | | 3rd |
| | | Party |
| | | CA |
| | | |
|SDN-Security Domain 1 | | |
+-----------------------+ +---------+
Figure 11: Automated certification of tenant resources with 3rd
party CA
The above diagram elaborates a deployment scenario where Domain 2
relies on 3rd party CA, and certification of tenant resources can
potentially leverage ACME implementation for automated execution.
Chattopadhyay, et al. Expires March 21, 2017 [Page 19]
Internet Draft Multi-Party SDN Trust Architecture September 2016
8.2 Application Bridging for Federated Access Beyond web (ABFAB)
RFC 7832 published by ABFAB WG describes the use cases for
leveraging federated identities for non-web based applications,
essentially to reduce administrative overhead and avoid redundant
registrations of principal. The RFC targets to define use cases that
requires supporting the movement of application and virtual
functions to the cloud, and thus require supporting dynamic
deployment and configuration of security services, authentication
and authorization for those applications. It is perceived that ABFAB
will help in this context as a way moving from the model of manually
configured authentication and authorization towards a more easily
managed system involving federated trust and identity. The RFC
describes various use cases for cloud services, high performance
computing, grid infrastructure, databases and directories, Media
Streaming, Printing, Device's access to Telecom Infrastructure,
smart objects etc., and for each of these use cases, dynamic
deployment provisioning and automated configuration of
authentication & Authorization services appear necessary.
Section 2 of RFC 7832 declares that for many applications,
principals need not have pre-instantiated accounts that their
federated identity maps to, before their first visit to that
application; the application can perform this process on the fly. In
cases where such accounts are required for particular applications,
the pre-provisioning process is marked out of scope for ABFAB WG. In
the particular context, RFC 7832 suggests to refer drafts published
by SCIM WG, specifying the method for pre-provisioning.
To analyze the said pre-provisioning requirement, an assessment of
RFC 7831 will be required. Following is a representative
architecture diagram of ABFAB, positioned over multiple of
SDN-Security Domains forming the underlay SDN enabled Cloud
infrastructure.
+----------------+ +-----------------+
| +----------+ | | +-----------+ |
+---------+ | | Identity | | | | Relying | |
| +----> | Provider +<-------> | Party 1 | |
| Client | | | | | | | | |
| | | +----------+ | | +-----------+ |
+---------+ | | | |
| <--->Federated Trust<---> |
| SDN-Security | | SDN-Security |
| Domain 1 | | Domain 2 |
+----------------+ +-----------------+
Figure 12: ABFAB Architecture and Underlying Trust Requirements
The diagram considers the scenario while the Client is associated to
a particular Identity Provider, and decides for the first time to
access the Application supported by Relying Party 1. Let's assume
the architecture is such that the Relying Party will have to choose
this particular Identity Provider from the available federation
substrates. Also, in this architecture, Relying Party 1 and Identity
Provider both belong to different SDN-Security domains. From this
representation, it clarifies that pre-provisioning expectations will
have to cover the followings -
Chattopadhyay, et al. Expires March 21, 2017 [Page 20]
Internet Draft Multi-Party SDN Trust Architecture September 2016
(i) Dynamic pre-provisioning of Identity Federation - Relying Party
1 is deciding to federate with Identity Provider for the first time
for the Client, and thus dynamically creating/mapping the account in
the applications against the federated identity
(ii) Dynamic pre-provisioning of Underlying Trust - Since Relying
Party and Identity Provider belonging to different SDN-Security
domains, and if a continuous chain of trust has not yet been
established between these two domains, the same needs to be
established dynamically as part of the pre-provisioning process. The
process for establishing this chain of trust may involve AAA proxy,
Trust Broker, Global Certificate Credentials, or a combination of
some of these methods.
As these pre-provisioning requirements are identified as
out-of-scope for ABFAB's charter, these will thus be evaluated in
the context of drafts published by SCIM WG.
8.3 System for Cross-domain Identity Management (SCIM)
RFC 7642 describes the use cases SCIM WG addresses for Cloud Service
Providers (CSP) and Enterprise Cloud Subscribers (ECS), to support
leveraging federated identities for web based applications. The
following diagram explains the architecture, and then analyzes the
pre-provisioning process recommended by the drafts RFC 7642, 7643
and 7644.
+--------------------+ +---------------------+
| | | |
+--------+ | +------------+ | | +-------------+ |
| | | | | | | | | |
| Cloud | | | Directory | | | | Relying | |
| System +--------->| Service A |<----------->| Party B | |
| User | | | | | | | | |
+--------+ | +------------+ | | +-------------+ |
| | | |
| | | |
|SDN-Security Domain1| | SDN-Security |
| of ECS1/CSP1 | | Domain 2 of CSP2 |
+--------------------+ +---------------------+
ECS - Enterprise Cloud Subscriber CSP - Cloud Service Provider
Figure 13: SCIM Architecture for pre-provisioning cross-domain
identity
If the Cloud System User's identity is maintained in Directory
Service A, and Cloud System User visits the application hosted by
Relying Party B for the first time, SCIM architecture provides a
method to leverage the identity of the user from Directory Service
A, and enable Relying Party B to authenticate and grant access to
the user dynamically. The protocol leveraged, as working between
Directory Service A and Relying Party B chalks out the communication
required to make the Directory Service A provides relevant
information about Cloud System User, and also transfer required set
of identity attributes to Relying Party B.
Chattopadhyay, et al. Expires March 21, 2017 [Page 21]
Internet Draft Multi-Party SDN Trust Architecture September 2016
This approach complies
with the requirements of 'Dynamic pre-provisioning of Identity
Federation', as discussed in the previous section. However, it is
observed that the suggested approach in the draft assumes that trust
relationship between Directory Service A and Relying Party B are
already in place, and thus doesn't deal with the scenarios to
enforce 'Dynamic pre-provisioning of Underlying Trust', as discussed
in the previous section.
The assessment of drafts published by ABFAB and SCIM WG thus
confirms that dynamic pre-provisioning of cross-domain identity
management is dependent on pre-provisioning of underlying trust for
a fully dynamic demand-driven environment, and none of these WGs
cover this specific part as part of their charter.
9. References
1) [RFC5280] "Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile"
2) [RFC 5217] "Memorandum for Multi-Domain Public Key
Infrastructure Interoperability"
3) [RFC6402] "Certificate Management over CMS (CMC) Updates"
4) [RFC7030] "Enrollment over Secure Transport"
5) [RFC4778] "Operational Security Current Practices in Internet
Service Provider Environments"
6) [RFC7426] "Software-Defined Networking (SDN): Layers and
Architecture Terminology"
7) [OF-SDNSEC] draft-mrw-sdnsec-openflow-analysis-02 "Security
Analysis of the Open Networking Foundation (ONF) OpenFlow Switch
Specification"
8) [SDN-SP] draft-sin-sdnrg-sdn-approach-01 "Software-Defined
Networking: A Service Provider's Perspective"
9) [ETSI-NFVSec] NFV Security Problem Statement, ETSI NFV ISG
10) [RFC6125] Representation and Verification of Domain-Based
Application Service Identity within Internet Public Key
Infrastructure Using X.509 (PKIX) Certificates in the Context of
Transport Layer Security (TLS)
11) [RFC7590] Use of Transport Layer Security (TLS) in the
Extensible Messaging and Presence Protocol (XMPP)
12) draft-ietf-acme-acme-01 "Automatic Certificate Management
Environment (ACME)"
13) [RFC 7831] Application Bridging for Federated Access Beyond
Web (ABFAB) Architecture
Chattopadhyay, et al. Expires March 21, 2017 [Page 22]
Internet Draft Multi-Party SDN Trust Architecture September 2016
14) [RFC 7832] Application Bridging for Federated Access Beyond
Web (ABFAB) Use Cases
15) [RFC 7642] System for Cross-domain Identity Management:
Definitions, Overview, Concepts, and Requirements
16) [RFC 7644] System for Cross-domain Identity Management:
Protocol
Authors' Addresses
Saurabh Chattopadhyay
Noida, India
Email: saurabhchattopadhya@hcl.com
Kaushik Datta
Bangalore, India
Email: Kaushik.Datta@hcl.com
Chattopadhyay, et al. Expires March 21, 2017 [Page 23]
Internet Draft Multi-Party SDN Trust Architecture September 2016