NSIS Transport Layer draft-ietf-nsis-ntlp-01.txt Slides:

Slides:



Advertisements
Similar presentations
NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt Charles Shen, Henning Schulzrinne, Sung-Hyuck Lee, Jong Ho Bang IETF#71 – Philadelphia, USA.
Advertisements

Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv4 - The Internet Protocol Version 4
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
CS 408 Computer Networks Congestion Control (from Chapter 05)
1 © NOKIA NSIS MIPv6 FW/ November 8 th 2004 Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-01 S. Thiruvengadam.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
1 IETF 64th meeting, Vancouver, Canada Design Options of NSIS Diagnostics NSLP Xiaoming Fu Ingo Juchem Christian Dickmann Hannes Tschofenig.
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-00.txt Charles Shen, Henning Schulzrinne Sung-Hyuck Lee, Jong Ho Bang IETF#63 – Paris, France August.
MOBILITY SUPPORT IN IPv6
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
1 IETF 64th meeting, Vancouver, Canada Context Transfer Using GIST Xiaoming Fu John Loughney.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Trade-offs and open issues with path discovery and transport or not all requirements are orthogonal… Henning Schulzrinne Columbia University
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
NSIS NATFW NSLP: A Network Firewall Control Protocol draft-ietf-nsis-nslp-natfw-08.txt IETF NSIS Working Group January 2006 M. Stiemerling, H. Tschofenig,
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
GIMPS – The NSIS Transport Layer draft-ietf-nsis-ntlp-02.txt Slides: Robert Hancock, Henning Schulzrinne.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
NSIS Path-coupled Signaling for NAT/Firewall Traversal Martin Stiemerling, Miquel Martin (NEC) Hannes Tschofenig (Siemens AG) Cedric Aoun (Nortel)
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
GIMPS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-06.txt Slides: Robert Hancock, Henning.
NSIS IETF 56 MONDAY, March 17, 2003: Morning Session TUESDAY, March 18, 2003: Afternoon Sessions I.
0 NAT/Firewall NSLP IETF 62th – March 2005 draft-ietf-nsis-nslp-natfw-05.txt Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
RMD – QSP draft-bader-nsis-rmd-diffserv-qsm-01.txt A.Bader, L. Westberg, G. Karagiannis, C. Kappler, T. Phelan, H. Tschofenig IETF-61, Nov. 8, 2004.
GIMPS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-05.txt Slides: Robert Hancock, Henning.
QoS NSLP draft-ietf-nsis-qos-nslp-06.txt Slides: Sven van den Bosch, Georgios Karagiannis, Andrew McDonald.
0 NAT/Firewall NSLP Activities IETF 60th - August 2nd 2004 Cedric Aoun, Martin Stiemerling, Hannes Tschofenig.
NAT traversal for GIST in 300 seconds A. Pashalidis; H. Tschofenig.
Applicability Statement of NSIS Protocols in Mobile Environments (draft-ietf-nsis-applicability-mobility-signaling-00) Sung-Hyuck Lee, Seong-Ho Jeong,
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
An NSLP for Quality of Service draft-buchli-nsis-nslp-00.txt draft-mcdonald-nsis-qos-nslp-00.txt draft-westberg-proposal-for-rsvpv2-nslp-00.txt Slides:
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Multi-hop PANA IETF Currently: –“For simplicity, it is assumed that the PAA is attached to the same link as the device (i.e., no intermediary IP.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Design Considerations for the Common MIH Protocol Functions draft-hepworth-mipshop-mih-design-considerations-01 Ele Hepworth (*), Robert Hancock, Srinivas.
IETF 55 Nov A Two-Level Architecture for Internet Signaling draft-braden-2level-signal-arch-01.txt Bob Braden, Bob Lindell USC Information.
GIMPS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-04.txt Slides: Robert Hancock, Henning.
NSIS NAT/Firewall Signaling NSIS Interim Meeting Romsey/UK, June 2004 Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
K. Salah1 Security Protocols in the Internet IPSec.
Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt Takako Sanda, Xiaoming Fu, Seong-Ho.
NSLP for Quality of Service Sven van den Bosch (ed) Georgios Karagiannis Andrew McDonald (et al.) draft-ietf-nsis-qos-nslp-02.txt Slides:
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
1 NSIS: A New Extensible IP Signaling Protocol Suite Myungchul Kim Tel:
GxxxS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-07.txt Slides: Robert Hancock, Henning.
BANANA BOF Scope & Problem Description
Internet Protocol Version 6 Specifications
Encryption and Network Security
An IPv6 Flow Label Specification Proposal
IT443 – Network Security Administration Instructor: Bo Sheng
Presented by Muhammad Abu Saqer
EA C451 Vishal Gupta.
BANANA BOF Scope & Problem Description
Guide to TCP/IP Fourth Edition
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt
Congestion Control (from Chapter 05)
NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt
Net 323 D: Networks Protocols
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
NTLP strawman draft-schulzrinne-gimps
Presentation transcript:

NSIS Transport Layer draft-ietf-nsis-ntlp-01.txt Slides: Robert Hancock, Henning Schulzrinne (editors) IETF#59 – Seoul March 2004

Overview Status Structure basically unchanged since –00 Some significant changes, some more detail Nearly implementable in a benign environment Changes and Open Issues Intermediaries/Topology/Layer Binding More explanation/detail/simplifications Route change handling Security analysis and documentation Everything else from Section 8 What next…

Intermediaries / Topology / Layer Binding -00 considered allowing intermediate nodes within a session To process an NSLP subset or go through NATs Handled by tunnelled C-mode encapsulations -01 avoid/prohibits these cases Split-level NSLP: must use >1 signalling sessions If NATs are handled in GIMPS, wrap this up with the route discovery process Route recording functionality disappears

Further Issues Should we tighten the rules: require NSLP peers be 1 GIMPS hop apart GIMPS and NSLP topologies are ‘conformant’ Spec. allows this but does not enforce it Some security and routing implications How actually do to NAT traversal Requirements depend on deployment Need to work with NATFW people NSIS-unaware NAT case is especially hard

Messaging Details Worked example in 3.3 Already stimulated some interesting clarifications Decoupled state management for routing and messaging Fragmentation restricted to reliable transports Can’t do it with UDP/DCCP Strawman message formats added 5.1, 5.2, Appendix C Probably many open issues here Addressing flexibility, optional or mandatory fields, level of wildcarding …

Route Change Handling Still following FW assumption: “Anyone can hint; NTLP detects; NSLP repairs” Details relate to: What is detected (and at which node) At what node notifications are delivered Document contains strawman proposal Needs review by NSLP people “Is this what is useful?” Needs review by mobility people (compatibility)

Security Basic picture of how GIMPS provides security for itself is clear Basically handling routing state integrity and DoS prevention Architectural open issues remain: Whether to allow NSLP to bind to GIMPS security How to analyse joint security of NSLP & GIMPS How to capture security protocol ‘profiles’ for different environments Basically 3 sides of the same coin Need face time here to work out how to proceed

Other Open Issues See Section 8! 8.1 Protocol Naming 8.2 General IP Layer Issues 8.3 Encapsulation and Addressing for Datagram Mode 8.4 Intermediate Node Bypass and Router Alert Values 8.5 Messaging Association Flexibility 8.6 Messaging Association Setup Message Sequences 8.7 GIMPS State Teardown 8.8 Datagram Mode Retries & Single Shot Message Support 8.9 GIMPS Support for Message Scoping 8.10 Mandatory or Optional Reverse Routing State 8.11 Additional Discovery Mechanisms 8.12 Alternative Message Routing Requirements 8.13 Congestion Control in Datagram Mode

The End

Backup Slides Old Design Approach pictures (from –00 presentation) 1 slide on each official ‘open issue’ from section 8 of the –01 draft

Design Approach (1/4) Various ways to get required additional functionality into 2205-like approach Currently: build a new messaging framework which incorporates 2205 functions and existing transport/security protocols

Design Approach (2/4) Message flows within a node:

Design Approach (3/4) Routing state is set up as in 2205 When rtg. state exists, policy dictates when messaging associations are set up and used (and what sort, and how many, and when they are torn down again)

Design Approach (4/4) Implications (among others): + Re-use existing transport/security technology + No ‘new’ protocol development + Additional functionality scales like #peers, not #flows/sessions 0 Time/space overhead: little/no impact (given the functionality that is being achieved) - Nodes have to implement (non-trivial) transport/security protocols - Processing at intermediaries gets harder - Routing state maintenance stops being ‘free’ ?

8.1: Protocol Naming GIMPS (General Internet Messaging Protocol for Signaling) GIST (Generic Internet Signaling Transport) LUMPS (Lightweight Universal Messaging for Path associated Signaling) Other combinations of G/C, I, P, S, M, R, T, S (again) Remember Atlanta: NTLP is a stupid name and we promise not to use it for the real protocol

8.2 General IP Layer Issues UDP or raw-IP Interception on protocol number (raw-IP) or assume RAO (either) Rely on UDP checksum or include our own Getting through NSIS-unaware NATs Implementation issues (can't easily do raw IP i/o, or can’t control TTLs via UDP) Aim for one choice?

8.3 Encapsulation and Addressing for D-Mode Assume UDP (or raw-IP) only No DCCP, IPsec, … Flow sender or signalling sender as source address? Or implementation issue? Need a well-known port? Details on traffic class, flow label…

8.4 Intermediate Node Bypass and RAO Values Assume interception on RAO present (and RAO value) Reality check? How to assign values to protect routers from high volumes of ‘irrelevant’ signalling messages? 2+ aggregation options – need input requirements from NSLP work Cf considerations (message rewriting)

8.5 Messaging Association Flexibility How many to allow and how many different sorts? Many different possible stack configurations Policies for using different parallel associations Which should be the ‘MUST’ to implement? (decision needed eventually) Do we end up with another ISAKMP?

8.6 Messaging Association Setup Message Sequences Allow the MA to be setup upstream as well as downstream? When to propagate the GIMPS-query Relative to other stages in the process When to propagate the MA setup Relative to other stages in the process Interactions between MA setup and discovery exchange

8.7 GIMPS State Teardown Is this needed explicitly? What is the cost of leaving it up? How do you know when it is no longer needed? E.g. to send NSLP teardowns (more important) Potential race conditions in mobility scenarios RSVP comparison: what is the value of PATH TEAR? Is there any fate sharing between GIMPS and NSLP state?

8.8 Datagram Mode ‘Transport’ How to control retransmission in d-mode Needed if downstream message is lost Congestion issue Should it be extended to provide one-shot message transfer to NSLP? Or ‘c-mode or nothing’ Congestion control in general (rate limits?)

8.9 GIMPS Support for Message Scoping Which layer knows about network edges? Some applications need this Should it be a service provided by GIMPS? Rationale: it’s the GIMPS layer which has better access to clues about infrastructure configuration Aggregation boundaries, IP TTL, GHC…

8.10 Mandatory or Optional Reverse Routing State Wanted by NSLPs which want to be lightweight in per-flow state requirements Not clear if this is done at protocol level… “don’t store reverse state for this message” … or at implementation/API level “I will never send reverse messages for that flow” May need to be added to datagram mode description Needs very careful analysis of error conditions

8.11 Additional Discovery Mechanisms Should we consider other discovery mechanisms Compared to RAO+interception approach Examples Closer integration with routing protocols Configuration of topology constraints Can apply both to upstream and downstream Would require repeating the routing state integrity security analysis

8.12 Alternative Message Routing Requirements Some additional desires for message routing Pre-installation on backup or predicted path May be out of scope now but providing it later probably shouldn’t break the protocol NATFW “inbound reservation” message Not clear if this can be disguised as a normal message Teardown on old path (QoS-NSLP SII issue) Can be done inside implementation if topology conformance is strictly enforced

8.13 Congestion Control in Datagram Mode How? How conservative/how aggressive? Any way to use ECN? Needs more scenarios and analysis Current baseline assumption is that datagram mode can be cautious May be inappropriate for NSLPs that want to use it to shunt large volumes of data around