Internet DRAFT - draft-boucadair-pcp-sfc-classifier-control
draft-boucadair-pcp-sfc-classifier-control
PCP Working Group M. Boucadair
Internet-Draft France Telecom
Intended status: Standards Track October 20, 2014
Expires: April 23, 2015
PCP as a Traffic Classifier Control Protocol
draft-boucadair-pcp-sfc-classifier-control-01
Abstract
This document specifies how PCP (Port Control Protocol) can be used
as a classifier control protocol.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 23, 2015.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
Boucadair Expires April 23, 2015 [Page 1]
Internet-Draft PCP & Traffic Classification October 2014
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Scope of this Document . . . . . . . . . . . . . . . . . . . 3
3. Objectives for Controlling Classifiers . . . . . . . . . . . 3
4. PCP as a Traffic Classifier Control Protocol . . . . . . . . 4
5. Deployment Model . . . . . . . . . . . . . . . . . . . . . . 5
6. Missing PCP Extensions . . . . . . . . . . . . . . . . . . . 5
7. Detailed Specification . . . . . . . . . . . . . . . . . . . 6
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
9. Security Considerations . . . . . . . . . . . . . . . . . . . 6
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 6
11.1. Normative References . . . . . . . . . . . . . . . . . . 6
11.2. Informative References . . . . . . . . . . . . . . . . . 6
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction
PCP (Port Control Protocol, [RFC6887]) has been specified to control
an upstream function such as NATs or firewalls. PCP can be used to
interact with both statefull and stateless functions.
PCP can be abstracted as a means to notify an upstream network with
the flow characteristics that would trigger decisions on the
appropriate policies to be applied on these flows at the network
side. This document focuses on a typical function that is present in
operational networks: Traffic Classifier Function. Two examples are
listed below:
DiffServ Classifiers A typical example of packet classifier is
DiffServ Classifier [RFC2475] that is responsible to select
packets in a traffic stream based on the content of some portion
of the packet header: this can be based solely on the DSCP field
or based on a combination of more header fields, such as source
address, destination address, DSCP field, protocol ID, source port
and destination port numbers, and other information such as
incoming interface. These classifiers must be configured by some
means as documented in [RFC2475]:
"Classifiers are used to "steer" packets matching some
specified rule to an element of a traffic conditioner for
further processing. Classifiers must be configured by some
Boucadair Expires April 23, 2015 [Page 2]
Internet-Draft PCP & Traffic Classification October 2014
management procedure in accordance with the appropriate TCA
(Traffic Conditioning Agreemet)."
This document proposes PCP to configure DiffServ Classifiers.
SFC Classifiers Another classifier is SFC Classifier (e.g.,
[I-D.ietf-sfc-problem-statement] [I-D.ietf-sfc-architecture]).
This classifier is responsible for classifying flows to determine
which Service Function Chain (SFC) they belong to.
Similar to DiffServ, an SFC Classifier can rely on a variety of
classifying rules.
PCP can be used to instruct SFC Classifier policies.
A traffic classifier (or classifier for short) is a function that is
responsible for classifying flows based on (pre-defined) rules. Once
the traffic is classified, it can be marked to bear its class of
service (DSCP re-marking [RFC2474]), dropped, shaped, or any other
action instructed by the matching rule. This document focuses on
classification rules that manipulate L3/L4 fields of IP packets.
A Classifier can be seen as a statefull service function that applies
a set of policies for packets and/or flows matching a set of
criteria. This document specifies how PCP can be used as a
classifier control protocol.
Note a classifier can be co-located with a CGN (Carrier Grade NAT,
[RFC6888]), or a firewall. PCP can be used to install policies in
all these functions.
2. Scope of this Document
This version of the document explains the motivations, basic
assumptions, and identifies some missing features. Detailed
specification of required extensions will be elaborated in future
versions of the document.
This document focuses on the control of L2/L3/L4 Classifiers.
Sophisticated classifiers based on heuristics (e.g., those involving
DPI (Deep Packet Inspection) modules) are out of scope.
3. Objectives for Controlling Classifiers
Below are listed some objectives for a classifier control means:
o Rationalize the management of classification rules.
Boucadair Expires April 23, 2015 [Page 3]
Internet-Draft PCP & Traffic Classification October 2014
o Help assessing the impact of removing or modifying a
classification rule.
o Check the coherency of instantiated classification rules.
o Help aggregating rules: this allows to optimize the classification
rule table and therefor accelerate packet/flow processing (mainly
reduce lookup delays).
o Adjust classification rules when rules are based on volatile
identifiers (e.g., IP address).
o Maintain an global overview of instantiated rules in involved
Network Elements.
o Rapidly restore state during failure events.
o Network Elements can retrieve their table after failure events
whiteout requiring permanent storage capacity.
4. PCP as a Traffic Classifier Control Protocol
PCP fulfils most of the objectives listed in the previous section.
Concretely, PCP allows for the following:
o Directionality
o Classification involving port sets
o Classification rules involving IPv4 addresses
o Classification rules involving IPv4 prefixes
o Classification rules involving IPv6 addresses
o Classification rules involving IPv6 prefixes
o Classification rules with or without NAT
o Feedback loop to assess whether a classification rule has been
successfully enforced: PREFER_FAILURE
o Associate a description with classification rules
o Classification rules are associated with lifetimes
o PCP client can re-install states if a loss is detected
Boucadair Expires April 23, 2015 [Page 4]
Internet-Draft PCP & Traffic Classification October 2014
o PCP server does not need to store the entries in a permanent
storage; state can be installed by the PCP client
o PCP client detects rapidly any state loss, including reboot of the
PCP server
o Multiple PCP clients can control the same PCP server
o 2-way exchange is needed to install new state
o No need to lock the server waiting when concurrent clients are in
contact with the server.
5. Deployment Model
The reference architecture adopted in this document assumes that both
the PCP client and server are managed by the same administrative
entity (e.g., an operator).
Classification rules are not exposed outside an administrative
domain. In particular, subscribers are not aware of these policies.
PCP requests received in the subscriber-faced interfaces are not
allowed to manage policies enforced in the classifiers.
6. Missing PCP Extensions
Some candidate extensions are listed below:
o Extended THIRD_PARTY option to include a L2 identifier (e.g., MAC
address), an opaque subscriber-identifier, an IMSI, etc. A
candidate option is defined in [I-D.ripke-pcp-tunnel-id-option].
This extension is also needed to control NATs that are Layer-2
Aware (see Section 2.1 of [RFC6887]).
o Extended FILTER to include a remote range of ports. This
extension might be useful for the firewall case.
o DSCP-based filtering. This extension is also useful for the
firewall control case.
o DSCP re-marking: this is to be enforced at the boundaries of a
domain. The marking at the access segment may not the same as the
core network. Marking must be enforced by a trusted device.
o Explicit actions: re-mark, drop, shape (can be used with FLOWDATA
[I-D.wing-pcp-flowdata]).
Boucadair Expires April 23, 2015 [Page 5]
Internet-Draft PCP & Traffic Classification October 2014
o A means to indicate the SFC binding.
7. Detailed Specification
This section will be completed if the working group agrees with the
problem to be solved.
8. IANA Considerations
To be completed.
9. Security Considerations
Security considerations discussed in [RFC6887] MUST be taken into
account.
10. Acknowledgements
TBC.
11. References
11.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC6887] Wing, D., Cheshire, S., Boucadair, M., Penno, R., and P.
Selkirk, "Port Control Protocol (PCP)", RFC 6887, April
2013.
11.2. Informative References
[I-D.ietf-sfc-architecture]
Halpern, J. and C. Pignataro, "Service Function Chaining
(SFC) Architecture", draft-ietf-sfc-architecture-02 (work
in progress), September 2014.
[I-D.ietf-sfc-problem-statement]
Quinn, P. and T. Nadeau, "Service Function Chaining
Problem Statement", draft-ietf-sfc-problem-statement-10
(work in progress), August 2014.
[I-D.ripke-pcp-tunnel-id-option]
Ripke, A., Dietz, T., Quittek, J., and R. Silva, "PCP
Tunnel-ID Option", draft-ripke-pcp-tunnel-id-option-01
(work in progress), July 2014.
Boucadair Expires April 23, 2015 [Page 6]
Internet-Draft PCP & Traffic Classification October 2014
[I-D.wing-pcp-flowdata]
Wing, D., Penno, R., and T. Reddy, "PCP Flowdata Option",
draft-wing-pcp-flowdata-00 (work in progress), July 2013.
[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
"Definition of the Differentiated Services Field (DS
Field) in the IPv4 and IPv6 Headers", RFC 2474, December
1998.
[RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z.,
and W. Weiss, "An Architecture for Differentiated
Services", RFC 2475, December 1998.
[RFC6888] Perreault, S., Yamagata, I., Miyakawa, S., Nakagawa, A.,
and H. Ashida, "Common Requirements for Carrier-Grade NATs
(CGNs)", BCP 127, RFC 6888, April 2013.
Author's Address
Mohamed Boucadair
France Telecom
Rennes 35000
France
Email: mohamed.boucadair@orange.com
Boucadair Expires April 23, 2015 [Page 7]