Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004.

Slides:



Advertisements
Similar presentations
The Architecture of the Internet or Waist Watching in IP
Advertisements

Who Are You? JPNIC GA Presentation Tokyo Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Who Are You? Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Who Are You? Geoff Huston APNIC Identity and Location in IP.
ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst.
Approaches to Multi-Homing for IPv6 An Architectural View of IPv6 MultiHoming proposals Geoff Huston 2004.
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
SHIM6 Update Geoff Huston Kurtis Lindqvist SHIM6 co-chairs.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Routing Items from IAB Utrecht Workshop Geoff Huston IAB.
Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen
Internet Area IPv6 Multi-Addressing, Locators and Paths.
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Why do current IP semantics cause scaling issues? −Today, “addressing follows topology,” which limits route aggregation compactness −Overloaded IP address.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Project by: Palak Baid (pb2358) Gaurav Pandey (gip2103) Guided by: Jong Yul Kim.
Multihoming in IPV6 Habib Naderi Department of Computer Science University of Auckland.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
Guide to Network Defense and Countermeasures Second Edition
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Internet Protocol Security (IPSec)
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
1 MPLS Architecture. 2 MPLS Network Model MPLS LSR = Label Switched Router LER = Label Edge Router LER LSR LER LSR IP MPLS IP Internet LSR.
1 Introduction on the Architecture of End to End Multihoming Masataka Ohta Tokyo Institute of Technology
Host Identity Protocol
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
An ID/locator split architecture for future networks Ved P. Kafle, Hideki Otsuki, and Masugi Inoue, National Institute of Information and Communications.
M3UA Patrick Sharp.
Req1 - Separability Old: –An RO scheme MUST have the ability to be bypassed by traffic types that desire to use bidirectional tunnels through an HA. New:
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
1 November 2006 in Dagstuhl, Germany
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 6 IP Access Lists 1.
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
GBUTtem 机密 此报告仅供 NGN 实验室内部使用。未经 NGN 实验室的书面许可,其它任 何机构不得擅自传阅、引用或复制。 sando 09/10/2005 Site-Multihoming over IPv6.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
IPv6 Site-Local Discussion Bob Hinden & Margaret Wasserman IETF 56 San Francisco March 2003.
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Shim6 Architecture Geoff Huston IETF-63 August 2005.
Things to Think About Eliot Lear IETF 59. What the document ISN’T This is not a requirements document –We did one of those already – RFC 3582 Not an architectural.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
1/13 draft-carpenter-nvo3-addressing-00 Brian Carpenter Sheng Jiang IETF 84 Jul/Aug 2012 Layer 3 Addressing Considerations for Network Virtualization Overlays.
IETF #58 in Minneapolis1 IPv6 Address Assignment and Route Selection for End-to-End Multihoming Kenji Ohira Kyoto University draft-ohira-assign-select-e2e-multihome-02.txt.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 John Scudder, David Ward Emerging Routing Issues.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
4.1.5 multi-homing.
Network Address Translation (NAT)
Who Are You? Identity and Location in IP Geoff Huston APNIC.
ID / LOC Split - Basic Approach
An Update on Multihoming in IPv6 Report on IETF Activity
Network Address Translation (NAT)
Lecture 36.
Lecture 36.
Presentation transcript:

Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004

This is not a new discussion Big Internet discussion from 10 years ago Has anything changed in this debate over the past 10 years?

Agenda… How Multi-Homing WG has approached the problem What forms of approach are possible to create a useful ID / Locator split in IPv6 Discussion on next steps

The Multi-Homing Motivation How do you create a service thats available 100% of the time? Use a server architecture and location environment that uses sufficient resiliency to provide 100% availability and Connect to the Internet using a service provider than can provide 100% _guaranteed_ availability

100% Network Availability? Multiple connections to a single provider ? BUT - theres a single routing state that is vulnerable to failure Multiple Connections to multiple providers ? More attractive, potentially allowing for failover from one provider to another in the event of various forms of network failure

IPv4 Multihoming Either: Obtain a local AS Obtain PI space Advertise the PI space to all upstream providers Just follow routing Or: Use PA space fragment from one provider Advertise the fragment it to all other upstream providers Just follow routing

Scaling Global Routing Both approaches have obvious implications in terms of additional entries being added to the global routing system, with little (or no) control over route object propagation

Scaling There are potentially millions of sites that would see a benefit in multi-homing. It is commonly believed that the routing table cannot meet this demand Is there an alternative approach that can support multi-homing without imposing a massive load on the global routing system? Change scope controls in routing (ptomaine, grow) Change the protocol architecture (HIP, multi6)

What Multi-Homing would like… The multi-homed site uses 2 address blocks One from each provider No additional routing table entry required

The Problem Space ISP AISP B Site Exit Router(s) Local M-H Host Remote Host M-H Site Path B Path A

Functional Goals RFC3582 enumerates the goals as: Redundancy Load Sharing Traffic Engineering Policy Simplicity Transport-Layer Surviveability DNS compatibility Filtering Capability Scaleability Legacy compatibility Also we need to think about:: Interaction with routing Aspects of an ID/Locator split, if used Changes to packets on the wire Names, Hosts, endpoints and the DNS i.e. Do everything, simply, efficiently and cheaply with no other impact !

Status of Multi6 There appears to be no simple, secure, one- ended approach to this problem space Both ends of the session need to be aware of the capability of binding multiple locators into a single session This implies that multi-homing in V6 will remain, in the near future, a routing technique And the agenda for multi6 is, in reality, focussed on the practical issues of id/locator split protocol design (in practice, or a virtual split) And the question is is the scope of the multi6 effort sufficiently generic so as to provide useful outcomes for the general case of id/locator split functionality in IPv6?

Agenda… How Multi-Homing has approached the problem What forms of approach are possible to create a useful ID / Locator split in IPv6 Discussion on next steps

ID / Locator Split The IP protocol architecture has made a number of simplifying assumptions Your IP address is the same as your identity (who) Your IP address is the same as your location (where) Your IP address is used to forward packets to you (how) If you want multi-homing to work then your identity (who) must be dynamically mappable to multiple locations (where) and forwarding paths (how) its still me, but my location address has changed

Benefits: Allow indirection between identity and location Provide appropriate authentication mechanisms for the right function Allow location addresses to reflect topology and provider hierarchies without overload of identity semantics Allow identities to be persistent across location change (mobility, re-homing)

Generic Approaches: Insert a new level in the protocol stack New protocol element Modify the Transport or IP layer of the protocol stack in the host Modified protocol element The difference is subtle, but it relates to the persistence, scope and functionality of the identity binding.

Identity Identity Protocol Element Define an Identity Protocol element that: presents an identity-based token to the upper layer protocol Allows multiple IP address locators to be associated with the identity Allows sessions to be defined by an identity peering, and allows the lower levels to be agile across a set of locators Most likely to be placed at layer 3.5 (Transport / IP interface), allowing the transport layer to peer using identity tokens and the IP layer to form packets based on current locators Is this layer 3.6 (session) or layer 3.4 (host)? IP Transport ULP

IP Identity Protocol Element Identity Transport ULP IP Identity Transport ULP Connect to server.iab.org Connect to id: id: == 2001:360::1 Packet to 2001:360::1 DNS – name to ID mapping DNS – identity to locator mapping A basic example scenario of host-based persistent identity

Proposals for an Identity Token Space Use identity tokens lifted from a protocols address space DNS, Appns, Transport manipulate an address IP functions on locators Stack Protocol element performs mapping FQDN as the identity token Is this creating a circular dependency? Does this impose unreasonable demands on the properties of the DNS? Structured token What would be the unique attribute of a novel token space that distinguishes it from the above? Unstructured token Allows for self-allocation of identity tokens (opportunistic tokens) How to map from identity tokens to locators using a lookup service? Hierarchically Structured Space Unstructured

Identity Structures Persistent structured address that is a host-based identity (that may or may not have locator significance) Can perform id locator mapping (bi-directionally) via a structured search mechanism or Opportunistic self-generated bit sequence used in the context of session-based identity Is used in the context of dynamic binding of additional locators to an existing session or Trying to mesh these two approaches in some manner

Protocol Element Implementation Conventional Add a wrapper around the upper level protocol data unit and communicate with the peer element using this in band space IP Header Identity Field Transport Header Payload IP Identity Transport ULP

Protocol Element Implementation Out of Band Use distinct protocol to allow the protocols element to exchange information with its peer IP Identity Transport ULP IP Identity Transport ULP Identity Peering Protocol Transport Protocol

Protocol Element Implementation Referential Use a reference to a third party point as a means of peering (e.g. DNS Identifier RRs) IP Identity Transport ULP IP Identity Transport ULP Transport Protocol DNS

Identity Protocol Element Proposals Alter the Transport Protocol to allow a number of locators to be associated with a session e.g. SCTP Alter the IP protocol to support IP- in-IP structures that distinguish between current-locator-address and persistent-locator-address i.e. MIP6 IP Transport ULP IP Transport ULP

Identity Protocol Element Proposals HIP: Shim between Transport and IP layer Presents a stable identity to the transport layer (cryptographic hash of local identity key) Allows multiple locators to be bound to the identity, and communicates this binding to the remote end (HIP protocol) Allows the local host to switch source locators in the event of network failure to ensure session surviveability. The crytographic function is used to determine if the new locator is part of an already established session. (same key, same session) IP Transport ULP

Identity Protocol Element Proposals NOID + SIM (CBID 128) + CB64: Addition of an identifier shim layer to the protocol stack. The identifier / locator mapping may be contained in the DNS (NOID) or may be contained within a protocol exchange (SIM), or a hybrid approach (CB64) IP Transport ULP

Identity Protocol Element Location It appears that the proposals share a common approach: Above the IP forwarding layer (Routing) Below IP fragmentation and IPSEC (IP Endpoint) IP Transport ULP Identity insertion point

Common Issues Picking the best source locator (how do know what destination works at the remote end?) Use each locator in turn until a response is received Use a identity peering protocol to allow the remote end to make its own selection from a locator set Picking the best destination locator Longest match Use each in turn Picking the best source / destination locator pair As these may be related choices

Common Issues Detecting network failure (How does a host know that its time to use a different source and/or destination locator?) Heartbeat within the session Modified transport protocol to trigger locator change Host / Router interaction to trigger locator change Application timeframe vs network timeframe Failure during session startup and failure following session establishment

Common Issues Network layer protocol element How do you know a session is completed? The concept of session establishment and teardown is a transport concept, not an IP level concept What do you need to do to bootstrap? Are there distinguished locators that you always need to use to get a session up?

Common Issues Session Persistence Use one locator as the home locator and encapsulate the packet with alternative locators Set up the session with a set of locators and have transport protocol maintain the session across the locator set Optionally delay the locator binding, or allow the peer dynamic change of the locator pool Use a new peering based on an identity protocol element and allow locators to be associated with the session identity

Common Issues Identity / Locator Binding domain Is the binding maintained per session? In which case multiple sessions with the same endpoints need to maintain parallel bindings Is the binding shared across sessions? In which case how do you know when to discard a binding set?

Common Issues Bilateral peer applications vs multi-party applications What changes for 3 or more parties to a protocol exchange? Application hand-over and referral How does the remote party identify the multi-homed party for third party referrals?

Security Considerations Major agenda of study required! Worthy of a separate effort to identify security threats and how to mitigate these threat

Agenda… How Multi-Homing has approached the problem What forms of approach are possible to create a useful ID / Locator split in IPv6 Discussion on next steps

Open Questions Id/Loc questions Is the specification of a structured identity space coupled with changes to the IPV6 protocol stack a case of solution overkill? What additional infrastructure service overheads are required to distribute a structured identity space? Is there an existing identity space that could be used for this purpose? Is the identity point the device or the protocol stack? Is per-session opportunistic identity a suitably lightweight solution? Is this just multi-homing or a more generic id/locator discussion?

Open Questions Applications and Identities Is a self reference within an application the identity value? If so, then can opportunistic id values be used in this context? Should an application be aware of the presence distinction between id and locator, and alter its self-identification according to the capability of the current session? How does this apply to UDP?

Properties of an /Locator Split Properties of a structured identity space Creating yet another managed token space for a set of structured stack identities may be overkill Properties of opportunistic keys The lack of persistence may make initial key association vulnerable to attack Lack of support for referral function Continuation of overloaded semantics of IPv6 addresses Should a coherent architecture support a range of identity types?