Table 4 SR security issues for zero-trust network environment.

From: A data plane security model of SR-BE/TE based on zero-trust architecture

Security issue

Specific description

Major threats

Untrusted network

element

Eavesdropping and replay23,24

After the tag of source node and data packet is obtained by eavesdropping, the explicit path of downstream traffic of eavesdropping point will be obtained directly, and replay attack can be realized by replaying normal identity messages to access the network

Confidentiality and

Authenticability

Message

Forgery25,26

SR is usually only verified at domain boundary devices. By means of routing protocol flooding mechanism, forging control plane protocol messages, or modifying packet headers, it can change critical flow paths or occupy specific link bandwidth, create routing loops, drop traffic, intentionally report errors and other consequences, and destroy link load balance or block network communication

Integrity

Denial of

service attack2

According to the SR protocol, when the "segment left" field is non-zero, the router in the domain needs to send ICMP messages to the source address of the data packet. Attackers can use this to force SR nodes to generate and send a large number of ICMP messages, thus realizing DoS/DDoS attacks

Usability

Identity

Deception27

Because all the nodes in the SR trust domain are under the unified control, it is usually impossible to implement identity deception in the domain, but the nodes outside the domain may access the SR network as nodes in the domain

Confidentiality and

controllability

Intra-domain detection based on back door of device27

By detecting and using the back door of network device, the tag information and data packet payload generated by control protocols such as OSPF for SR are obtained by grabbing packets or tampering with forwarding table entries, and the MPLS/IPv6 tag stack information in them is analyzed to obtain the node tags, link tags and topological relations of downstream device

Controllability and

confidentiality

In-domain detection based on social

engineering attack27

Log in to the device in SR domain without credit by means of social engineering such as cheating passwords, obtain the label and topology information stored by the device by means of show command, CLI (Command-Line Interface), SNMP (Simple Network Management Protocol) and NETCONF (Network Configuration Protocol) with the help of device maintenance and management tools, and use the device as a sniffing springboard and OAM functions such as MPLS tracert and MPLS ping of SR-MPLS network. Construct attack messages with different label stacks and specific TTL to detect network topology, nodes and links hop by hop. In the network which multi-source manufacturers' devices using different control standards coexist, springboard detection is easier to succeed

Controllability and

confidentiality

Failure of intra-domain node28

Due to the lack of stable label release mechanism, modifying SRGB (SR Global Block) of SR router, assigning used labels to it or configuring MPLS label range will lead to service interruption, and the device needs to be restarted

Usability

PKI/CA

failure

Failure of infrastructure29

Attackers captured network security infrastructure such as PKI/CA (Public Key Infrastructure/Certificate Authority) through APT attacks, which led to the failure of traffic encryption in SR domain

Confidentiality and

Authenticability