Bob Briscoe, BT IETF-72 tsvwg Jul 2008

Slides:



Advertisements
Similar presentations
1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt.
Advertisements

Philip Eardley, Bob Briscoe, Dave Songhurst - BT Francois Le Faucheur, Anna Charny, Vassilis Liatsos – Cisco Kwok-Ho Chan, Joe Babiarz, Stephen Dudley.
Guidelines for Adding Congestion Notification to Protocols that Encapsulate IP draft-briscoe-tsvwg-ecn-encap-guidelines-00 Bob Briscoe IETF-80 Mar 2011.
Internet Security CSCE 813 IPsec
An open ECN service in the IP layer 19 Mar 2001 Bob Briscoe, BT & UCL Jon Crowcroft, UCL M3I - Market Managed Multi-service Internet IST Project No
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
An Architecture for Differentiated Services
ConEx Concepts and Abstract Mechanism draft-ietf-conex-abstract-mech-07.txt draft-ietf-conex-abstract-mech-07.txt Matt Mathis, Google Bob Briscoe, BT IETF-87.
1 Guidelines for Adding Congestion Notification to Protocols that Encapsulate IP draft-briscoe-tsvwg-ecn-encap-guidelines-02 Bob Briscoe, BT John Kaippallimalil,
Byte and Packet Congestion Notification draft-ietf-tsvwg-byte-pkt-congest-02.txt draft-ietf-tsvwg-byte-pkt-congest-02.txt Bob Briscoe, BT IETF-78 tsvwg.
Tunnelling of Explicit Congestion Notification draft-briscoe-tsvwg-ecn-tunnel-08.txt draft-briscoe-tsvwg-ecn-tunnel-08.txt Bob Briscoe, BT IETF-77 tsvwg.
1 Guidelines for Adding Congestion Notification to Protocols that Encapsulate IP draft-briscoe-tsvwg-ecn-encap-guidelines-01 Bob Briscoe IETF-85 Nov 2012.
Quick-Start for TCP and IP draft-ietf-tsvwg-quickstart-02.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti TSVWG, March 2006 This and earlier presentations::
PCN WG (Pre-Congestion Notification) – a brief status update Philip Eardley, BT TSVAREA, IETF-73 Minneapolis 18 Nov 08
Congestion marking for low delay (& admission control) Bob Briscoe BT Research Mar 2005.
Byte and Packet Congestion Notification draft-briscoe-tsvwg-byte-pkt-mark-01.txt draft-briscoe-tsvwg-byte-pkt-mark-01.txt Bob Briscoe, BT & UCL IETF-70.
Byte and Packet Congestion Notification draft-briscoe-tsvwg-byte-pkt-mark-00.txt draft-briscoe-tsvwg-byte-pkt-mark-00.txt Bob Briscoe, BT & UCL IETF-69.
Quick-Start for TCP and IP draft-ietf-tsvwg-quickstart-01.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti TSVWG, November 2005 This and earlier presentations::
Tunnelling of Explicit Congestion Notification draft-briscoe-tsvwg-ecn-tunnel-03.txt draft-briscoe-tsvwg-ecn-tunnel-03.txt Bob Briscoe, BT IETF-75 saag.
Byte and Packet Congestion Notification draft-ietf-tsvwg-byte-pkt-congest-00.txt draft-ietf-tsvwg-byte-pkt-congest-00.txt Bob Briscoe, BT & UCL IETF-73.
Tunnelling of Explicit Congestion Notification draft-briscoe-tsvwg-ecn-tunnel-02.txt draft-briscoe-tsvwg-ecn-tunnel-02.txt Bob Briscoe, BT IETF-74 tsvwg.
Packet Format Issues #227: Need Shim Header to indicate Crypto Property of packet Do we need to add pre-amble header to indicate if data is encrypted or.
1 Guidelines for Adding Congestion Notification to Protocols that Encapsulate IP draft-briscoe-tsvwg-ecn-encap-guidelines-03 Bob Briscoe, BT John Kaippallimalil,
Support for ECN and PCN in MPLS networks draft-davie-ecn-mpls-00.txt Bruce Davie Cisco Systems Bob Briscoe June Tay BT Research.
Byte and Packet Congestion Notification draft-briscoe-tsvwg-byte-pkt-mark-02.txt draft-briscoe-tsvwg-byte-pkt-mark-02.txt Bob Briscoe, BT & UCL IETF-71.
Uni Innsbruck Informatik th IETF, PMTUD WG: Path MTU Discovery Using Options draft-welzl-pmtud-options-01.txt Michael Welzl
1 Guidelines for Adding Congestion Notification to Protocols that Encapsulate IP draft-briscoe-tsvwg-ecn-encap-guidelines-04 Bob Briscoe, BT John Kaippallimalil,
TSVWG IETF-89 (London) 5 th & 7 th March 2014 Gorry Fairhurst David Black James Polk WG chairs 1.
Congestion Notification Process for Real-Time Traffic draft-babiarz-tsvwg-rtecn-04.txt Jozef Babiarz Kwok Ho Chan
K. Salah1 Security Protocols in the Internet IPSec.
Philip Eardley, Bob Briscoe, Dave Songhurst - BT Francois Le Faucheur, Anna Charny, Vassilis Liatsos – Cisco Kwok-Ho Chan, Joe Babiarz, Stephen Dudley.
Multi-protocol Label Switching (MPLS) RFC 3031 MPLS provides new capabilities: QoS support Traffic engineering VPN Multiprotocol support.
Layered Encapsulation of Congestion Notification draft-briscoe-tsvwg-ecn-tunnel-01.txt draft-briscoe-tsvwg-ecn-tunnel-01.txt Bob Briscoe, BT IETF-72 tsvwg.
recap draft-ietf-tsvwg-ecn-encap-guidelines-07
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Ken Grewal Gabriel Montenegro Manav Bhatia
Requirements for LER Forwarding of IPv4 Option Packets
Support for ECN and PCN in MPLS networks
Bob Briscoe, BT IETF-73 pcn Nov 2008
Bob Briscoe Simula Research Laboratory
Encryption and Network Security
IP-NNI Joint Task Force Status Update
draft-khademi-tsvwg-ecn-response-00
Encoding 3 PCN-States in the IP header using a single DSCP draft-ietf-pcn-3-in-1-encoding-06.txt Bob Briscoe, BT Toby Moncaster, independent Michael Menth,
IT443 – Network Security Administration Instructor: Bo Sheng
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
A. Báder, L. Westberg, G. Karagiannis,
Carrying IPSEC Authentication and ESP Headers Across SCPS-NP Networks
Bob Briscoe, BT Murari Sridharan, Microsoft IETF-84 ConEx Jul 2012
Bob Briscoe Simula Research Laboratory
IKEv2 Mobility and Multihoming Protocol (MOBIKE)
draft-bagnulo-tcpm-generalized-ecn-00 M. Bagnulo & B. Briscoe IETF97
IP-NNI Joint Task Force Status Update
Quick-Start for TCP and IP
DetNet Configuration YANG Model
ECN Experimentation draft-black-ecn-experimentation
IP Interconnection Profile
Outline Using cryptography in networks IPSec SSL and TLS.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Encoding 3 PCN-States in the IP header using a single DSCP draft-ietf-pcn-3-in-1-encoding-06.txt Bob Briscoe, BT Toby Moncaster, independent Michael Menth,
draft-ietf-dtn-bpsec-06
OAM for Deterministic Networks with MPLS Data Plane draft-mirsky-detnet-mpls-oam Greg Mirsky Mach Chen IETF-105 July 2019, Montreal.
How OAM Identified in Overlay Protocols draft-mirsky-rtgwg-oam-identify Greg Mirsky IETF-104 March 2019, Prague.
BPSec: AD Review Comments and Responses
OAM for Deterministic Networks draft-mirsky-detnet-oam
TRILL Header Extension Improvements
LOOPS Generic Information Set draft-welzl-loops-gen-info-00
Encoding 3 PCN-States in the IP header using a single DSCP draft-ietf-pcn-3-in-1-encoding-04.txt Bob Briscoe, BT Toby Moncaster, independent Michael Menth,
DetNet Architecture Updates
Presentation transcript:

Bob Briscoe, BT IETF-72 tsvwg Jul 2008 Layered Encapsulation of Congestion Notification draft-briscoe-tsvwg-ecn-tunnel-01.txt Bob Briscoe, BT IETF-72 tsvwg Jul 2008

updated draft Layered Encapsulation of Congestion Notification updated draft: draft-briscoe-tsvwg-ecn-tunnel-01.txt intended status: standards track immediate intent: move to WG item discuss widening scope exec summary bring ECN IP in IP tunnel ingress [RFC3168] into line with IPsec [RFC4301] all tunnels can behave the same, revealing full congestion info only wire protocol processing, not marking or response algorithms thorough analysis of implications: security, control, & management guidance on specifying ECN behaviour for new links, alternate PHBs ideally fix egress too (currently only 'for discussion')

one main update to RFC3168 ECN DS ECN DS ECN E ‘I’ DS ECN DS ECN DS ECN DS ECN encapsulation at tunnel ingress decapsulation at tunnel egress ‘I’ incoming header (also = outgoing inner) outgoing outer RFC3168 ECN limited functionality RFC3168 ECN full functionality RFC4301 IPsec Not-ECT ECT(0) ECT(1) CE proposal unchanged compatibility state for legacy 'reset' CE no longer used 'copy' CE becomes normal state for all IP in IP

why update ECN RFC3168 now? sequence of standards actions led to perverse position despite everyone’s best intentions 2001: RFC3168 tunnel ingress specified cautiously due to security concerns 2005: RFC4301 IPsec decided caution wasn't necessary IETF Security Area decided 2-bit ECN covert channel can be managed vestige of security no longer used by IPsec now limits usefulness of non-IPsec tunnels already PCN "excess rate marking" says "doesn't work with 3168 tunnels" anyway, copying of whole ECN field is simpler

activity from initial -00 to -01 draft general agreement on list with 'copy on encap' concern on list (a year ago) over a couple of details exception for in-path load regulators (resolved by removing it) conceptual model from RFC2983 avoids need for exception Appx D: Non-dependence of tunnelling on in-path load regulation reconstructing precise cross-tunnel congestion metric (resolved) Appx B: suggested precise cross-tunnel measurement technique since replaced with really simple technique [for -02 after IETF-72] that was 1 year ago agreed to go dormant until PCN wire protocol clearer... 1-before 2-inner encap 3-outer

current egress behaviour OK(ish) DS ECN DS ECN E ‘I’ DS ECN DS ECN DS ECN DS ECN encapsulation at tunnel ingress decapsulation at tunnel egress E incoming inner incoming outer Not-ECT ECT(0) ECT(1) CE drop (!!!) CE (!!!) Outgoing header (RFC3168 full & RFC4301) (bold red = proposed for all IP in IP) works for current ECN propose only one state at egress same behaviour for both ingress states but any changes to ECT lost effectively wastes ½ bit in IP header PCN tried to use ECT codepoints having to waste DSCPs instead (!!!) = illegal transition, E MAY raise an alarm

ideally fix egress too (only 'for discussion') DS ECN DS ECN E ‘I’ DS ECN DS ECN DS ECN DS ECN encapsulation at tunnel ingress decapsulation at tunnel egress E incoming inner incoming outer Not-ECT ECT(0) ECT(1) CE drop (!!!) CE (!!!) Outgoing header (RFC3168 full & RFC4301) (bold red = proposed for all IP in IP) change egress at same time? backwards compatible just previous tunnels wouldn't propagate changes to ECT this is not currently part of proposal but documented in an appendix (!!!) = illegal transition, E MAY raise an alarm

next steps would like to request as WG item PCN w-g needs to know if proposal is likely to happen also implications for PWE3 (if using ECN) will need IPsec to be happy that they aren't affected also to discuss (here or on list): should we change the egress at the same time?

Layered Encapsulation of Congestion Notification draft-briscoe-tsvwg-ecn-tunnel-01.txt Q&A

backward & forward compatibility egress pro-posed RFC 4301 RFC 3168 RFC 2481 RFC2401 RFC2003 ingress mode * 4301 full lim 2481 lim? - action calc B inner calc A I-D.ecn-tunnel proposed normal 'copy' B n/a compat 'zero' '3g IPsec' RFC4301 ECN RFC3168 'reset CE' limited ECN expt RFC2481 'copy'? A limited? '2g IPsec' IP in IP broken: loses CE B: calculation B (preserves CE from outer) A: calculation A (for when ECN field was 2 separate bits) inner: forwards inner header, discarding outer n/a: not allowed by configuration

tunnel contribution to congestion, pt The large square represents 100 packets Q. how to measure pt at egress? A. pt = 12/70  17% just monitor the 70 packets without the inner header marked ECN marking across tunnel 30 problem: marks some packets marked already pt 12 0% 30% 100% inner header (already ECN marked before ingress)

conflicting design constraints security vs. management & control information security constraint (lesser known IPsec reqm’t) I can prevent covert channel AM with encryption E an prevent covert channel MB with integrity checking tunnel ingress control / management constraints marking algorithm at M may depend on prior markings (since A) e.g. a number of PCN marking proposals work this way M may need to monitor congestion since A e.g. if M is monitoring an SLA at a border IPsec crypto cannot cover mutable fields (ECN, DS & TTL) if ‘I’ copies ECN CE, it opens up 2-bit covert channel AM or RM physically protected domain physically protected domain crypto protected tunnel A ‘I’ E B X M X A R ‘I’ M E B

conflicting design constraints security vs. congestion control information security constraint (lesser known IPsec reqm’t) I can prevent covert channel AM with encryption E an prevent covert channel MB with integrity checking tunnel egress control constraint explicit congestion notification control channel MBA IPsec crypto cannot cover mutable fields (ECN, DS & TTL) if E copies ECN CE, it opens up 2-bit covert channel MB physically protected domain physically protected domain crypto protected tunnel A ‘I’ E B X M X A ‘I’ M E B