Internet DRAFT - draft-herbert-idloc-fast
draft-herbert-idloc-fast
INTERNET-DRAFT T. Herbert
Intended Status: Informational Quantonium
Expires: December 2018
June 26, 2018
Lightweight Identifier-Locator Mapping Using FAST
draft-herbert-idloc-fast-00
Abstract
This proposal provides a method to implement identifier to locator
mapping in the datapath without the need to access an in-network
mapping database or cache. Mappings are encoded in Firewall and
Service Tickets (FAST) tickets as locator information. When a packet
is sent by a mobile node, a ticket is attached that providers the
locator to use in the return path. Peer nodes receive packets with
these tickets, cache the tickets in a flow context, and then attach
them to packets they send as reflected tickets. When a packet with a
reflected ticket enters an identifier-locator domain, the ticket is
parsed to extract the locator. That locator is then used to send the
packet to the appropriate destination over a network overlay.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Copyright and License Notice
T. Herbert Expires December 28, 2018 [Page 1]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Background and motivation . . . . . . . . . . . . . . . . . . . 4
2.1 Mapping Systems . . . . . . . . . . . . . . . . . . . . . . 4
2.2 hICN mobility proposal . . . . . . . . . . . . . . . . . . . 5
2.3 Firewall and Service Tickets . . . . . . . . . . . . . . . . 5
3 Solution Overview . . . . . . . . . . . . . . . . . . . . . . . 6
3.1 Requirements . . . . . . . . . . . . . . . . . . . . . . . . 6
3.2 Reference Topology . . . . . . . . . . . . . . . . . . . . . 7
3.3 Basic packet flow . . . . . . . . . . . . . . . . . . . . . 8
4 Firewall and Service Tickets encoding . . . . . . . . . . . . . 9
4.1 ILA locator encoding . . . . . . . . . . . . . . . . . . . . 10
4.2 Locator index encoding . . . . . . . . . . . . . . . . . . . 10
5 Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.1 Packet flow . . . . . . . . . . . . . . . . . . . . . . . . 11
5.1.1 Ticket requests . . . . . . . . . . . . . . . . . . . . 11
5.1.1.1 Fully qualified locators . . . . . . . . . . . . . . 12
5.1.1.2 Unqualified locators . . . . . . . . . . . . . . . . 12
5.1.2 First hop router processing . . . . . . . . . . . . . . 12
5.1.3 Transit to the peer . . . . . . . . . . . . . . . . . . 12
5.1.4 Peer reflection . . . . . . . . . . . . . . . . . . . . 12
5.1.5 Return path from peer . . . . . . . . . . . . . . . . . 13
5.1.6 Ingress into the origin network . . . . . . . . . . . . 13
5.1.7 Network overlay termination . . . . . . . . . . . . . . 13
5.1.8 Reception at origin of application . . . . . . . . . . . 14
5.2 Fallback . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.3 Mobile events . . . . . . . . . . . . . . . . . . . . . . . 14
5.4 Interaction with expired tickets . . . . . . . . . . . . . . 15
6 Security Considerations . . . . . . . . . . . . . . . . . . . . 15
7 IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 16
8 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 16
9 References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
9.1 Normative References . . . . . . . . . . . . . . . . . . . 16
T. Herbert Expires December 28, 2018 [Page 2]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
9.2 Informative References . . . . . . . . . . . . . . . . . . 16
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 16
T. Herbert Expires December 28, 2018 [Page 3]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
1 Introduction
Identifier-locator protocols, such as ILA and LISP, rely on a
distributed mapping system that maps identifiers to locators for
transmit across an overlay network. Typically, the set of mappings
are maintained in a distributed database or mapping cache. Border
routers of an identifier-locator domain access the database or cache
to map ingress packets to their appropriate locator. The router can
then use a network overlay method to deliver the packet to the mobile
destination; this could be done by address transformation (like in
ILA) or encapsulation (as done by LISP).
This proposal suggests and alternative method to do fast path
anchorless mobility with identifier-locator protocols that eschews
accessing a mapping database or mapping cache in the datapath.
2 Background and motivation
This section provides background and motivation.
2.1 Mapping Systems
Identifier-locator protocols, network virtualization, and mobility
share a common problem of resolving a mobile or virtual node to its
location in the network. In identifier-locator terminology this is
mapping an identifier to a locator. In virtualization, the process is
mapping a virtual address to a physical address, and in mobility it
is determining the current location of a host with a mobile address.
In a common overlay model, the mapping of identifier to locator is
done before sending a packet over a network overlay. The locator is
an underlay address for forwarding a packet across the network
overlay. There are several methods that can be used to implement the
network overlay, for instance encapsulation or address transformation
could be used, however the motivation and operation mapping
identifiers to locators are essentially the same in any case.
The set of identifier to locator mappings essentially is a
distributed database, and in fact some implementations implement a
mapping system using an "off the shelf" database. Identifiers don't
inherently allow aggregation, so the number of individual entries in
the mapping system maybe quite large (at most one entry for each
identifier). Even in a moderate size network the number of entries
will exceed the number that can be stored in memory of a singe device
so the mapping system must be sharded in some fashion.
One proposed method to scale a mapping system is to use mapping
caches. Border routers implement a mapping cache that contains a
T. Herbert Expires December 28, 2018 [Page 4]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
working set of identifier to locator mappings for traffic currently
passing through the router. Caches are a dynamic optimization driven
by the traffic pattern, however their use in the network entails
potential issues of scaling and DOSability.
2.2 hICN mobility proposal
hICN with anchorless mobility [HICN-AMM] is an alternative proposal
to using a distributed mapping system with identifier locator
protocols.
[HICN-AMM] highlights some drawbacks of traditional mapping systems:
o They entangle forwarding operations and changes to network
location
o Mapping systems at large scale are difficult to manage
o Convergence time after a location change (handover in mobile
network terminology) may be excessive.
[HICN-AMM] and [HICN] describe a solution that eliminates the need
for a global mapping system by sending locator information in-line
with the data path. The locator information is embedded in a new
transport layer header ("Path Label" in transport header shown in
[HICN]). The transport layer header is parsed by routers in the path
and they use the information to create state for forwarding packets
in the return path.
The proposal described in this draft adopts the in-line approach to
convey locator information, however the protocol in the FAST method
is strictly confined to the network layer and there is no requirement
for transport state to be maintained by the network.
2.3 Firewall and Service Tickets
Firewall and Service Tickets (FAST) is a technique to allow an
application to signal to the network requests for admission and
services for a flow. A ticket is data that is attached to a packet by
the source that is inspected and validated by intermediate nodes in a
network. Tickets express a grant or right for packets to traverse a
network or have services applied to them. Tickets may also be
modified by intermediate nodes under certain circumstances.
In order to apply services to inbound packets for a communication,
remote peers reflect received tickets in packets they send without
interpreting them. Tickets are stateless within the network, however
they can be used to attain per flow semantics. Note that in lieu of
T. Herbert Expires December 28, 2018 [Page 5]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
creating flow state in the network, state of interest to the network
can be cached at the endpoints and provided in data packets. Tickets
are encrypted and opaque to the end points for security and privacy.
This proposal uses FAST tickets to convey and reflect locator
information from a peer. FAST tickets employ IPv6 Destination or Hop-
by-Hop options.
3 Solution Overview
The central idea of using identifier locator protocols with FAST is
to put locator information in packets that can be used by network
nodes to achieve forwarding over a network overlay. In FAST, the
information is contained in a ticket and can be encrypted or
otherwise obfuscated so that only the nodes in the network that set
the information in the packet can parse it.
Transparent mobility can be achieved within the network layer, and
accordingly this solution and protocol are confined in the network
layer. Any signaling between applications and the network, or between
transport protocols and the network, is done via IPv6 Destination or
Hop-by-Hop options. This solution is specific to IPv6.
3.1 Requirements
This section lists some requirements for using FAST with identifier
locator protocols as a solution for fast and efficient mobility.
Requirements are:
- Solution works with any transport protocol or application
- Intermediate devices only process, inspect, or change network
layer headers as specified by RFC8200
- Communication for a flow is bidirectional (at least packets are
sent in both directions)
- Solution is an optimization for highly efficient fast path
anchorless mobile communications. The system must allow a slow
path fallback (for instance if extension headers are dropped for
some path)
- Client side supports FAST. Changes are described in [FAST]. This
should entail no kernel or protocol stack changes since FAST is
encoded in extension headers than can be set for flows using
existing APIs
T. Herbert Expires December 28, 2018 [Page 6]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
- Server side supports ticket reflection as described in [FAST].
This is a generic change in the protocol stack that should be
transparent to applications.
- FAST routers need to be deployed. These are typically border
routers of a domain as described in [FAST]
- Other intermediate nodes need to properly forward packets with
FAST tickets (Hop-by-Hop or Destination options). Note that
RFC8200 relaxes the requirement that all nodes in a path process
Hop-by-Hop options
- Does not rely an transport state being maintained in the network
- Makes no assumptions that packets for a flow always follow the
same path, or that any part of the network path must symmetric
for both directions of a flow
- Maintain security and privacy. In particular, locators are only
visible in the network that implement an overlay that uses them
3.2 Reference Topology
The diagram below provides a reference topology for a simple mobile
network.
______
_________ ( )
+---------+ ( ) +---------+ ( ) +------+
| eNodeB1 +---( RAN )---+ BRouter +---( Internet )--+ Peer |
+---------+ (_________) +----+----+ ( ) +------+
| \ | (______)
+---------+ | \ |
| eNodeB2 +-------+ \ |
+---+-----+ +--------+--+
| | Anchor |
+---+-----+ +-----------+
| UE |
+---------+
Figure 1
The diagram shows a mobile network that contains two eNodeB's (points
of attachment) and one UE (end device) that is currently attached to
eNodeB2. The UE is mobile so it can move from one eNodeB to another
(for instance it may attach to eNodeB1 at some point). The externally
visible address of the UE is an identifier that does not change when
the UE moves in the network. In the diagram, UE may be communicating
with the "Peer" host in the Internet. The Peer only knows the UE by
T. Herbert Expires December 28, 2018 [Page 7]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
its externally visible address. To achieve communications, packets
from the Peer to the UE are sent over some type of network overlay.
The packets of interest with respect to mobility are those destined
to the UE. The Peer might itself be mobile, but that case should be
symmetric and transparent. In this model, it is the local network of
a node that deals with mobility of devices in the network.
It is common for mobile communications to go through an anchor point
that has access to the complete mapping database and provides the
entry point to the network overlay. Anchors may be heavyweight and
force packets into a "long" path with respect to latency. There is
motivation to allow a fast path for critical latency sensitive
communications that bypass anchor points. In figure 1, this fast path
would be implemented in BRouter. That is instead of forwarding
packets through the Anchor, it performs identifier locator-mapping
and network overlay functions itself.
The typically proposed method to eliminate the anchor point is to
implement a mapping cache (in the diagram this would be to place a
cache at BRouter). The proposal described here is an alternative that
doesn't requires a cache.
3.3 Basic packet flow
To use identifier-locator protocols with FAST, an application running
on a host gets a ticket from the network. The ticket encodes
information about the current location of the host. When the
application sends packet, the ticket is attached (in an extension
header). Packets having the ticket are the forwarded to the peer
destination. At the peer, the ticket is saved in flow context, and
subsequently when it sends response packets back to the UE the ticket
is attached to packets as a reflected ticket.
When a packet with a ticket is received at a border router of an
identifier-locator domain, the router parses the reflected ticket and
checks if locator information is included. If it is, the border
router then uses it to send the packet to the proper destination for
the network overlay.
For example, if ILA is in use in the network topology show above, the
flow might be:
1) Application in UE requests ticket, a ticket agent in the
provider network provides a ticket with locator information
indicating that UEs location is at eNode2.
2) Application sends packets. A ticket containing locator
T. Herbert Expires December 28, 2018 [Page 8]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
information for eNodeB2 is attached to each packet.
3) Packet traverse network and are received at Peer. The peer node
saves the receive ticket in a flow context for the application.
4) Peer sends responses. The saved ticket is attached to its
packets as reflected tickets.
5) When a packet is received from the peer at BRouter, the
attached ticket is parsed. The locator information is extracted
that indicates the locator for eNodeB2. BRouter transforms the
destination address to an ILA locator address and forwards the
packet.
6) eNodeB receives ILA packets and performs the reverse
transformation to restore the original destination address
(typical ILA-N processing).
7) Packets are forward to UE. They still contain a ticket which
can be validated by the UE.
4 Firewall and Service Tickets encoding
FAST tickets are encoded in Hop-by-Hop or Destination options. If an
option is modifiable then Hop-by-Hop options should be used.
The format of a FAST ticket in a Destination or Hop-byHop option is:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Opt Data Len | Type | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
| |
~ Ticket ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Tickets are not intended to be parsed outside of the origin network
domain that issues them. Therefore, the ticket format is arbitrary at
the discretion of the domain in which they are issued and
interpreted.
T. Herbert Expires December 28, 2018 [Page 9]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
[FAST] suggests a simple and efficient encoding of a Service Profile
Index:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Expiration time |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Service Profile Index |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
This format can be amended to include locator information. Below are
some example encodings. Note that tickets are potentially set in all
datapath packets so minimizing protocol overhead is a consideration.
4.1 ILA locator encoding
ILA locators are sixty-four bits, and they can be encoded in a FAST
ticket in straightforward fashion. A ticket with expiration time,
service profile and an ILA locator may have format:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type |Q| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Expiration time |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Service Profile Index |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Locator +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Where the 'Q' bit indicates that an unqualified locator was
overwritten. See Section X.
A full 128 bit address could similarly be encoded.
4.2 Locator index encoding
A network may have a comparatively small number of potential
locators. For instance, a mobile provider might associate each eNodeB
with a locator and there may only be a few million of these. In this
case, the border routers might maintain a static table of locator
addresses that can simply be indexed by number in a much smaller
range. A locator index encoded in a ticket might look like this:
T. Herbert Expires December 28, 2018 [Page 10]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type |Q| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Expiration time |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Service Profile Index |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Locator Index |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Where the 'Q' bit indicates that an unqualified locator was
overwritten.
5 Operation
This section describes the operation of identifier-locator protocols
using FAST.
5.1 Packet flow
This sections describes the details of packet flow using identifier
locator protocols with FAST.
5.1.1 Ticket requests
Applications request FAST tickets from a ticket agent in the network
local to the application. The ticket agent can return a ticket for
the application to use in its data packets. The ticket includes
information that is parsed by elements in the issuing network. The
ticket information may include a locator. In other words if the
application is on a mobile device, the network may provide a ticket
that has a locator indicating the current location of the device.
[FAST] describes the process of an application requesting tickets and
setting them in packets. An application will not normally need to
make any special requests for mobility, in this model mobility is
expected to be transparent to the application (the ticket may contain
information about mobility that is opaque to the application). An
issued ticket having locator information will be of type "origin
ticket to be reflected".
There are two possibilities for locator information in an issued
ticket:
1) The locator is fully qualified.
2) The locator is no qualified.
T. Herbert Expires December 28, 2018 [Page 11]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
5.1.1.1 Fully qualified locators
If the locator is qualified then the issued ticket contains the
locator for the end node. If the locator changes, that is the node
moves, then a new ticket will need to be issued to the application.
5.1.1.2 Unqualified locators
If the locator is not qualified, then the locator information in the
issued ticket contains a "not set" value. For instance, in the case
the locator is expressed by a Locator Index as in section 2.2, the
"not set" value may be -1 (all ones). A upstream router of an end
node may write a qualified locator value into the locator
information; most often this would just be its own locator value in
cases where it is the first upstream hop of end devices that provides
location in the network. For instance, an eNodeB router acting as the
first hop for a UE may write its locator value in tickets of packets
it's forwarding from UEs. The implication is that this will be the
locator used in the network overlay on the return path to reach the
end node. Note that to write a locator into to a ticket requires that
the ticket is in a modifiable Hop-by-Hop option.
5.1.2 First hop router processing
Once an application has been issued a ticket with a locator it will
set the tickets in all packets sent to the peer node. The first hop
upstream router in the FAST domain parses the ticket; this may
typically be the first hop router in a provider network closest to
end customer node.
If the ticket contains a qualified locator, the first hop node may
validate it (as part of FAST ticket validation). If the ticket has
unqualified locator information, the first hop node may set it to a
qualified locator value in the packet. As described above, the
locator information written is likely to be that corresponding to the
locator of the first hop device.
5.1.3 Transit to the peer
Beyond the first hop router to the ultimate peer destination, no
processing of the locator information in a ticket should be needed.
Intervening networks and routers should deliver the ticket to the
destination host unchanged.
5.1.4 Peer reflection
At the peer host, the procedures described in [FAST] are followed to
save the received ticket in a flow context and to reflect it in
T. Herbert Expires December 28, 2018 [Page 12]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
subsequent packets. As with other reflected tickets, one containing
locator information is treated as an opaque value that is not parsed
or modified by the peer or any network outside of the origin network.
5.1.5 Return path from peer
Packets sent by a peer will include reflected tickets for a flow. No
processing of the locator information in a ticket should be needed
until the packet reaches the origin network of the ticket.
Intervening networks and routers should deliver the ticket to the
destination origin network unchanged.
5.1.6 Ingress into the origin network
A the border router for the origin network, tickets are parsed and
the encoded services are applied. If the ticket contains locator
information then that can be used for forward the packet over the
overlay network.
The specific operation depends on the protocol used to provide the
overlay network functionality. For instance, if ILA is in use and the
locator information is just a sixty-four bit locator as described in
Section 4.1, then the given locator is written to the destination of
the packet and the packet is forwarded towards the locator following
the procedures of ILA. Similarly, if a locator index is contained in
the ticket as described in Section 4.2, then that value is used to
index the locator table to get a sixty-four bit locator that can be
written into the destination address. Procedures for use of the
locator information to do encapsulation, such as that done by LISP,
are similar.
Note that the service parameters contained in the ticket may provide
addition information about how the packet is to be sent over the
network overlay. For instance, the service parameters might indicate
the packet is encrypted or to use some extensions of an encapsulation
protocol.
5.1.7 Network overlay termination
When a packet is received at the terminating point of an overlay it
is restored to the original packet. That is, if the packet was
encpasulated then it's unencpasulated, or if the destination address
was transformed then the reverse transformation is done to restore
the original address.
If the ticket was modified by the network, for instance an
unqualified locator was overwritten (indicated by the 'Q' bit being
set as described in Section 4), then the original ticket needs to be
T. Herbert Expires December 28, 2018 [Page 13]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
restored.
5.1.8 Reception at origin of application
At the end host, received reflected tickets are validated for
acceptance as described in [FAST]. This is done by comparing the
received ticket to that which was sent on the corresponding flow.
5.2 Fallback
The proposal described here is strictly a fast path optimization. It
should not be assumed that tickets can completely replace a mobile
infrastructure. In particular, this solution relies on several
parties to implement protocols correctly. For instance, the use of
extension headers requires that they can be successfully sent through
a network. As reported in [RFC7872], support for forwarding packets
with extension headers is not yet ubiquitous.
Therefore, a fallback infrastructure is required. In the simplest
case, this is just to fallback to forwarding through anchor points.
That path can be chosen independently of whether the fast path is
implemented. In the data path the selection of which path to take is
easily chosen, if a packet contains a valid ticket with valid locator
information then the fast path can be taken, else the slow path is
selected.
5.3 Mobile events
When a mobile node moves and its locator changes, it is desirable to
converge to using the new locator as a quickly as possible. With
tickets that contain locator information, a modified ticket needs to
be sent to a peer host.
If an application was issued a ticket with qualified locator
information then a new ticket needs to the be issued. This can be
done by the application receiving a signal that a mobile event has
occurred that causes it to make new ticket requests for established
flows.
If an application has a ticket with an unqualified locator then the
network should start writing the new locator information into packets
that are sent by the application after the mobile event. This should
be transparent to the application.
Note that in either case, in order to update the tickets that a peer
is reflecting, the application needs to send packets to the peer that
includes an updated ticket. There is no guarantee on when an
application may send packets, so there is the possibility of a window
T. Herbert Expires December 28, 2018 [Page 14]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
where the peer node is sending reflected tickets with outdated
locator information. The window should be limited by the expiration
time of a ticket (see below), however it is recommended to implement
mechanisms to avoid communication blackholes. For instance, a "care
of address" mapping entry could be installed at the old locator
device to forward to the new one. Such solutions are also used to
mitigate database convergence time or update caches in other
solutions.
5.4 Interaction with expired tickets
FAST typically expects ticket to have an expiration time. If a ticket
is received within the expiration time and it is considered valid,
then the packet is forwarded per the services indicated by the
ticket. If a packet with a ticket is received that is expired, it
might still be accepted subject to rate limiting. Accepting expired
tickets is useful in the case that a connection goes idle and after
some time the remote peer starts to send.
For tickets that are expired and contain locator information, an
implementation should ignore the locator information and take the
fallback path. If the mobile application responds it can include a
fresh ticket so that the fast path is taken on subsequent packets.
Ignoring the locator information in expired tickets puts an upper
bound on the window that an outdated locator can be used (see section
5.3).
6 Security Considerations
Locator information can be highly sensitive data especially if it
could reveal physical location of individuals. Effort must be made to
safeguard this information. In particular, locators in plain text
should only be exposed within the origin network providing mobility.
This includes hiding locators from end hosts. [FAST] discusses
security of tickets including recommendations to encrypt them.
Tickets may be reused in packets for some period, and it is desirable
to prevent third parties from making an inferences based on the fact
the a ticket for a flow changed. For instance, it should not be
deducible that a node has moved on the basis of a new ticket being
used on a flow. To avoid this possibility tickets for a flow should
be changed randomly to avoid correlating ticket changes to events.
T. Herbert Expires December 28, 2018 [Page 15]
INTERNET DRAFT draft-herbert-idloc-fast-00 June 26, 2018
7 IANA Considerations
There are no IANA considerations in this document. [FAST] requests
numbers for Destination and Hop-by-Hop options that would be used by
this proposal.
8 Acknowledgments
9 References
9.1 Normative References
[RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", STD 86, RFC 8200, DOI
10.17487/RFC8200, July 2017, <https://www.rfc-
editor.org/info/rfc8200>.
[FAST] Herbert, T., "Firewall and Service Tickets", draft-herbert-
fast-01, June 2018.
9.2 Informative References
[HICN] L. Muscariello, G. Carofiglio, J. Auge, and M. Papalini,
"Hybrid Information-Centric Networking", draft-muscariello-
intarea-hicn-00, June 2018
[HICN-AMM] Auge, J., Carofiglio, G., Muscariello, L., and M.
Papalini, "Anchorless mobility management through hICN
(hICN-AMM): Deployment options", draft-auge-dmm-hicn-
mobility-deployment-options-00 (work in progress), June
2018.
Author's Address
Tom Herbert
Quantonium
Santa Clara, CA
USA
Email: tom@quantonium.net
T. Herbert Expires December 28, 2018 [Page 16]