Internet DRAFT - draft-carpenter-nvo3-addressing
draft-carpenter-nvo3-addressing
NVO3 B. Carpenter
Internet-Draft Univ. of Auckland
Intended status: Informational S. Jiang
Expires: January 5, 2013 Huawei Technologies Co., Ltd
July 4, 2012
Layer 3 Addressing Considerations for Network Virtualization Overlays
draft-carpenter-nvo3-addressing-00
Abstract
This document discusses network layer addressing issues for virtual
network overlays in large scale data centres hosting many virtual
servers for multiple customers.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 5, 2013.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Carpenter & Jiang Expires January 5, 2013 [Page 1]
Internet-Draft NVO3 Addresssing July 2012
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Aspects of addressing in virtual overlay networks . . . . . . . 3
2.1. Address Independence and Isolation . . . . . . . . . . . . 3
2.2. Multiple Data Centres . . . . . . . . . . . . . . . . . . . 4
2.3. Address mapping . . . . . . . . . . . . . . . . . . . . . . 4
2.4. Address migration . . . . . . . . . . . . . . . . . . . . . 5
2.5. DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.6. Dual Stack Operation . . . . . . . . . . . . . . . . . . . 6
3. Consequences for IPv4 address management . . . . . . . . . . . 6
4. Consequences for IPv6 address management . . . . . . . . . . . 7
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 7
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 7
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 8
8. Change log [RFC Editor: Please remove] . . . . . . . . . . . . 8
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8
9.1. Normative References . . . . . . . . . . . . . . . . . . . 8
9.2. Informative References . . . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 9
Carpenter & Jiang Expires January 5, 2013 [Page 2]
Internet-Draft NVO3 Addresssing July 2012
1. Introduction
A common technique in large data centres hosting servers and services
for many customers is to use virtual layer 3 network overlays (NVO3)
to organise, manage and separate the virtual servers used by
individual customers. The related problems are discussed in
[I-D.narten-nvo3-overlay-problem-statement], and a framework for the
main components of a solution is described in
[I-D.lasserre-nvo3-framework].
[Note: In this draft we do not yet give detailed references to the
various NVO3 drafts, none of which discuss addressing issues in
detail.]
When emulating a large number of virtual hosts on whatever physical
network topology is used, probably involving multiple LAN segments,
virtual LANs at layer2, and both routers and switches, the question
of the IP addressing scheme for the virtual hosts is not trivial.
The intention of the present document is to describe the resulting
consequences for IP address management in such an environment.
Firstly the general aspects are discussed, and then the consequences
for both IPv4 and IPv6 addressing schemes are described.
2. Aspects of addressing in virtual overlay networks
2.1. Address Independence and Isolation
In a typical hosting centre, there will be a number of customers, who
are quite possibly mutual competitors who happen to use the same
hosting centre. It is essential that virtual hosts assigned to one
customer cannot communicate directly with, or even be aware of,
virtual hosts assigned to any other customer. It is also essential
that virtual networks are operationally independent to the maximum
possible extent.
Therefore, to simplify operations by clearly separating independent
virtual networks (VNs) from one another, and to enhance both real and
perceived confidentiality of each network, it is desirable for the
addresses used by each virtual layer 3 network to be allocated and
managed independently of all the others. A consequence of this is
that it becomes reasonably straightforward to configure layer 3
routing such that traffic from one VN can never unintentionally enter
another one, because each network has its own well defined range of
addresses. Similarly, it is also reasonably straightforward to
configure firewalls or filters to detect and block any unwanted
traffic between VNs, even if there is a routing misconfiguration.
Carpenter & Jiang Expires January 5, 2013 [Page 3]
Internet-Draft NVO3 Addresssing July 2012
For these reasons alone, it is necessary for each VN to have its own
well-defined layer 3 address space that is managed independently of
all other VNs. This requirement is independent of whether the
physical hosts that contain the virtual hosts are on one or more
physical or bridged LANs or VLANs. In other words, once the layer 3
topology is virtualised, layer 2 address independence and isolation
is neither necessary nor sufficient to guarantee layer 3 address
independence and isolation.
It should be understood that independent address allocation does not
imply unique addresses. In the IPv4 context, as further discussed
below, it is very likely that multiple VNs will use the same
ambiguous address space, running over the same physical network
infrastructure.
2.2. Multiple Data Centres
A given customer might have virtual hosts spread across multiple data
centres (DCs). Furthermore, those data centres might be owned and
operated by competing enterprises. The only safe assumption is that
a single address range cannot span multiple DCs, and that a virtual
host being relocated to another DC might need to be renumbered. The
addressing scheme for virtual hosts must be compatible with such a
situation. Most likely this means extending the requirement for
address independence and isolation to cover separate parts of a given
customer's total set of virtual servers. In other words the usage
scenario for any given customer must be able to deal with virtual
hosts in multiple independent and mutually isolated layer 3 address
spaces, and with the risk of occasional virtual host renumbering.
This complicates the issues of routing configuration and address
filtering. If a VN extends over multiple DCs, VN routing across DC
borders must be supported for the address ranges concerned, and
address filtering must also be applied in a consistent way at each DC
hosting part of a given VN.
2.3. Address mapping
Several of the NVO3 documents state the need for an address mapping
scheme. Some aspects of this are discussed in
[I-D.kreeger-nvo3-overlay-cp]. It is generally assumed that an NVO3
system will be built using tunnels, and the required mapping is
between virtual host addresses and tunnel end points. The addressing
scheme for virtual hosts needs to be consistent with the mapping
system adopted and whatever dynamic update protocol is used for that
mapping.
In the case of a VN that covers multiple DCs, the mapping scheme must
Carpenter & Jiang Expires January 5, 2013 [Page 4]
Internet-Draft NVO3 Addresssing July 2012
also support multiple DCs. The mapping update protocol will need to
exchange mapping information between tunnel endpoints at all DCs
involved. This information needs to be specified in some detail, and
it must be decided whether this protocol needs to be run per VN or
per DC, how this protocol decides which DCs it should talk with, etc.
2.4. Address migration
As discussed in [I-D.narten-nvo3-overlay-problem-statement], current
virtual host mechanisms assume that a host's IP address is fixed. If
a workload is migrated from one physical host to another, the
migration mechanisms assume that existing transport layer
associations such as TCP sessions stay alive, and the succesful
migration of a job in progress relies on this.
As workload conditions change in a large data centre, virtual hosts
may need to be migrated from one physical host to another, and quite
possibly this will mean moving to a different physical LAN. However,
the virtual host address itself should remain constant as just
mentioned. The addressing scheme adopted needs to be consistent with
this requirement. Another way to view this is as an inverted form of
renumbering - instead of the address of a given host changing, a
given address is reassigned to a different physical host, thereby
representing the move of a given virtual host.
When such a move occurs, there will normally be changes in both the
layer 2/layer 3 mapping (given by ARP, Neighbour Discovery, etc.) and
the virtual host address to tunnel mapping mentioned above. However,
an address which is moved in this way should still remain part of the
same aggregate for routing purposes. Otherwise, an immediate change
to the routing configuration will be needed as well.
As mentioned above, if a virtual host needs to be migrated between
DCs, it might be unavoidable for its virtual address to change. In
this case an application layer mechanism will be needed to recover
from the resulting loss of transport layer sessions.
2.5. DNS
A Domain Name Service, which resolves queries for hostnames into IP
addresses, can reduce the direct dependence of customer applications
on IP addresses. If a virtual host is always connected using its
hostname, the renumbering issue during inter-DC migrations, mentioned
in previous section, would be significantly mitigated. However, this
would imply a need for rapid DNS updates.
Carpenter & Jiang Expires January 5, 2013 [Page 5]
Internet-Draft NVO3 Addresssing July 2012
2.6. Dual Stack Operation
In the case of a dual stack deployment, where each virtual host has
both an IPv4 and an IPv6 address, there will presumably be some sort
of interdependency of the two addressing schemes. At least, the
virtual subnet topologies would usually be the same for the two
addressing schemes, and virtual hosts would need to migrate
simultaneously for IPv4 and IPv6 purposes. If this was not the case,
scenarios requiring IPv4/IPv6 interworking might arise unexpectedly,
which would be inconvenient and inefficient. A particular case would
be the migration of a virtual host between two DCs, one of which
supports dual stack and the other of which supports only a single
stack.
In general, these situations would require a layer 3 IPv4/IPv6
translator within a VN. This solution should be avoided if possible.
3. Consequences for IPv4 address management
In IPv4, it must be assumed that in many if not most cases, the
virtual hosts will be numbered out of ambiguous private address space
[RFC1918]. The only safe assumption for a general model is that any
individual VN may use the same address space as any other. This
increases the importance of the requirements for address isolation,
independence and mapping. In fact, without address mapping (and in
some scenarios network address translation) a large scale IPv4 NVO3
system could not be made to work.
Since the IPv4 addresses in use will be ambiguous, management tools
must be carefully designed so that operators will never need to rely
on addresses alone to identify individual servers. For example, when
an address is presented to an operator for any reason, it should
always be tagged with some sort of VN identifier. The same goes for
any place that an address is logged or stored for any other reason.
Legacy software and tools that do not do this should be avoided as
much as possible.
An interesting aspect of using, say, Net 10 for every VN instance is
that the number of virtual hosts can be quite large, up to 2**24 (in
excess of 16 million). This frees the designer from traditional
limits on the size of an IPv4 subnet.
An unavoidable consequence of using RFC1918 addresses is that the
virtual hosts, if accessed by outside users, will be hidden behind
either an application layer proxy or a NAT. In both cases these
might be part of a load balancing system.
Carpenter & Jiang Expires January 5, 2013 [Page 6]
Internet-Draft NVO3 Addresssing July 2012
4. Consequences for IPv6 address management
In IPv6, there is no concept of ambiguous private space. Each VN can
have its own global-scope address prefix. This removes the
operational problems casued by ambiguous addresses in IPv4.
Even a basic /64 prefix would allow for more virtual host addresses
than would ever be possible in IPv4, so again the designer is not
restricted by any absolute limit on subnet size. Nevertheless, it is
advisable to use a shorter prefix such as /48 or /56 for each VN, so
that a VN can span more than one LAN using standard IPv6 routing
without difficulty. It is unclear that tunnels and address mapping
are needed for IPv6-based VNs, due to the absence of ambiguous
addresses.
A choice can be made between a regular IPv6 prefix from the
customer's own IPv6 space or from ISP-assigned space, and a Unique
Local Address prefix [RFC4193], [I-D.liu-v6ops-ula-usage-analysis].
The latter has the advantage of needing no administrative procedure
before assigning it, and it is also routinely blocked by site and ISP
border routers, like an RFC1918 prefix. However, apart from that the
choice of IPv6 prefix has little external importance and is mainly a
matter of convenience.
There is no requirement for IPv6 prefix translation [RFC6296] between
the virtual hosts and any outside users. However, the presence of
such translation, or of some form of load balancing, cannot be
excluded.
5. Security Considerations
Routing configurations and filters in firewalls and routers should be
constructed such that, by default, packets from virtual hosts in one
VN cannot be forwarded into another VN. Traffic to and from a given
VN should only be allowed for the designated users of that VN, and
for the VN management and operations tools.
An independent and isolated addressing scheme is not by itself a
security solution. While it might avoid the most trivial and
straightforward penetration attempts, it is in no way a substitute
for a security solution that responds to specific threat models in
the NVO3 situation.
6. IANA Considerations
This document requests no action by IANA.
Carpenter & Jiang Expires January 5, 2013 [Page 7]
Internet-Draft NVO3 Addresssing July 2012
7. Acknowledgements
Valuable comments and contributions were made by ... and others.
This document was produced using the xml2rfc tool [RFC2629].
8. Change log [RFC Editor: Please remove]
draft-carpenter-nvo3-addressing-00: original version, 2012-07-04.
9. References
9.1. Normative References
[RFC1918] Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and
E. Lear, "Address Allocation for Private Internets",
BCP 5, RFC 1918, February 1996.
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", RFC 2460, December 1998.
[RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast
Addresses", RFC 4193, October 2005.
9.2. Informative References
[I-D.kreeger-nvo3-overlay-cp]
Black, D., Dutt, D., Kreeger, L., Sridhavan, M., and T.
Narten, "Network Virtualization Overlay Control Protocol
Requirements", draft-kreeger-nvo3-overlay-cp-00 (work in
progress), January 2012.
[I-D.lasserre-nvo3-framework]
Lasserre, M., Balus, F., Morin, T., Bitar, N., and Y.
Rekhter, "Framework for DC Network Virtualization",
draft-lasserre-nvo3-framework-02 (work in progress),
June 2012.
[I-D.liu-v6ops-ula-usage-analysis]
Liu, B., Jiang, S., and C. Byrne, "Analysis and
recommendation for the ULA usage",
draft-liu-v6ops-ula-usage-analysis-02 (work in progress),
March 2012.
[I-D.narten-nvo3-overlay-problem-statement]
Narten, T., Sridhavan, M., Dutt, D., Black, D., and L.
Carpenter & Jiang Expires January 5, 2013 [Page 8]
Internet-Draft NVO3 Addresssing July 2012
Kreeger, "Problem Statement: Overlays for Network
Virtualization",
draft-narten-nvo3-overlay-problem-statement-02 (work in
progress), June 2012.
[RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
June 1999.
[RFC6296] Wasserman, M. and F. Baker, "IPv6-to-IPv6 Network Prefix
Translation", RFC 6296, June 2011.
Authors' Addresses
Brian Carpenter
Department of Computer Science
University of Auckland
PB 92019
Auckland, 1142
New Zealand
Email: brian.e.carpenter@gmail.com
Sheng Jiang
Huawei Technologies Co., Ltd
Q14, Huawei Campus
No.156 Beiqing Road
Hai-Dian District, Beijing 100095
P.R. China
Email: jiangsheng@huawei.com
Carpenter & Jiang Expires January 5, 2013 [Page 9]