Internet DRAFT - draft-yong-idr-flowspec-redirect-vpn-rd

draft-yong-idr-flowspec-redirect-vpn-rd







Network Working Group                                            Y. Lucy
Internet-Draft                                                 S. Zhuang
Intended status: Standards Track                                  W. Hao
Expires: September 18, 2016                          Huawei Technologies
                                                          March 17, 2016


           BGP Flowspec Redirect to VPN RD Extended Community
               draft-yong-idr-flowspec-redirect-vpn-rd-00

Abstract

   This document defines a new type of the redirect extended community,
   called as Redirect to VPN RD Extended Community.  When activated, the
   Redirect to VPN RD Extended Community is used to identify the unique
   VPN instance within a router.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 18, 2016.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of



Lucy, et al.           Expires September 18, 2016               [Page 1]

Internet-Draft         Flowspec Redirect to VPN RD            March 2016


   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Operation Concerns in Redirect VRF Action . . . . . . . . . .   3
   3.  Redirect to VPN RD Extended Community Format  . . . . . . . .   5
   4.  Using Redirect VPN RD Extended Community  . . . . . . . . . .   6
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   7
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .   7
     7.2.  Informative References  . . . . . . . . . . . . . . . . .   8
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   8

1.  Introduction

   "Dissemination of Flow Specification Rules" [RFC5575], commonly known
   as BGP Flowspec, provided for a BGP Extended Community
   [RFC4360][RFC4360] that served to redirect traffic that matched the
   flow specification's Network Layer Reachability Information (NLRI) to
   a Virtual Routing and Forwarding (VRF) instance that lists the
   specified route-target in its import policy.  In that RFC, the
   Redirect Extended Community was documented as follows:






















Lucy, et al.           Expires September 18, 2016               [Page 2]

Internet-Draft         Flowspec Redirect to VPN RD            March 2016


   : +--------+--------------------+--------------------------+
   : | type   | extended community | encoding                 |
   : +--------+--------------------+--------------------------+
   : | 0x8008 | redirect           | 6-byte Route Target      |
   : +--------+--------------------+--------------------------+
   :
   : [...]
   :
   : Redirect:  The redirect extended community allows the traffic to be
   : redirected to a VRF routing instance that lists the specified
   : route-target in its import policy. If several local instances
   : match this criteria, the choice between them is a local matter
   : (for example, the instance with the lowest Route Distinguisher
   : value can be elected). This extended community uses the same
   : encoding as the Route Target extended community [RFC4360].
   : [...]
   :
   : 11. IANA Considerations
   : [...]
   :
   : The following traffic filtering flow specification rules have been
   : allocated by IANA from the "BGP Extended Communities Type -
   : Experimental Use" registry as follows:
   : [...]
   :
   : 0x8008 - Flow spec redirect

   [RFC7674] updates RFC 5575 ("Dissemination of Flow Specification
   Rules") to clarify the formatting of the BGP Flowspec Redirect
   Extended Community.  This document defines the following redirect
   extended communities:

   +--------+--------------------+-------------------------------------+
   | type   | extended community | encoding                            |
   +--------+--------------------+-------------------------------------+
   | 0x8008 | redirect AS-2byte  | 2-octet AS, 4-octet Value           |
   | 0x8108 | redirect IPv4      | 4-octet IPv4 Address, 2-octet Value |
   | 0x8208 | redirect AS-4byte  | 4-octet AS, 2-octet Value           |
   +--------+--------------------+-------------------------------------+

2.  Operation Concerns in Redirect VRF Action

   Following example is a case used in a backbone network.

   Traffic Analyzer is installed at the edge of the backbone to detect
   the attack.





Lucy, et al.           Expires September 18, 2016               [Page 3]

Internet-Draft         Flowspec Redirect to VPN RD            March 2016


   Scrubbing Center is installed at the edge of the backbone tackle the
   attack.

   VRF scrubbing-vpn is configured on R1 and R2.  A default route in
   R1's scrubbing-vpn VRF is configured to reach the Scrubbing Center,
   and MP-BGP is configured to advertise the default route from VRF
   scrubbing-vpn to the remote router R2.

       +--------+
       |Traffic |
   +---+Analyzer|
   |   +--------+                                VPN instances in R2:
   |
 | |                                             ip vpn-instance vpn1
 | |FlowSpec rule with                            RD: 10:1
 | |Redirect RT: 100:1                            IRT: 10:1 100:1
 v |                                              ERT: 10:1 100:1
   |    Scrubbing vrf in R1:
   |    ip vpn-instance scrubbing-vpn            ip vpn-instance scrubbing-vpn
   |     RD: 100:1                                RD: 100:1
   |     IRT: 100:1                               IRT: 100:1
+--+--+  ERT: 100:1                      +-----+  ERT: 100:1
|  R1 +----------------------------------+ R2  +
+-----+      ------------->              +-----+ ip vpn-instance vpn2
   |         FlowSpec rule with                   RD: 200:1
   |         Redirect RT: 100:1                   IRT: 10:1 100:1
   |                                              ERT: 10:1
   |                 <------Redirect DDoS Traffic
   |                        to Scrubbing Center from R2
   |   +----------+
   |   |Scrubbing |
   +---+Center    |
       +----------+

Figure 1 Redirect DDoS Traffic to Scrubbing Center Using Redirect VPN RT


   Upon detecting the attack target to the user of the backbone network,
   Traffic Analyzer will push a Flowspec rule to R1 with Redirect RT:
   100:1.

   R1 will advertise the receiving Flowspec rule to R2.

   If the VRF scrubbing-vpn on R2 is the only VRF routing instance, then
   the receiving Flowspec rule from R1 can be imported by the VRF
   routing instance scrubbing-vpn.  The attack traffic that matches the
   Flowspec rule on R2 will be redirected to the VRF scrubbing-vpn and
   sent to the Scrubbing Center.



Lucy, et al.           Expires September 18, 2016               [Page 4]

Internet-Draft         Flowspec Redirect to VPN RD            March 2016


   However in this case, there are several local instances on R2 can
   match the Redirect RT: 100:1(as shown in following table).  To make
   it work, according to RFC 5575, an operator has to configure R2 so
   that 'Redirect to VPN' will point to the scrubbing-vpn, which
   introduces operation complex and/or prone to an error.  To avoid this
   configuration, a unique RT value for BGP FS 'Redirect to VPN' action
   has to be selected, which can be an operation complex in a large
   network.

   +---------------+--------------------+----------------+
   | VRF           | IRT                | RD             |
   +---------------+--------------------+----------------+
   | vpn1          | 10:1 100:1         | 10:1           |
   | scrubbing-vpn | 100:1              | 100:1          |
   | vpn2          | 10:1 100:1         | 200:1          |
   +---------------+--------------------+----------------+


   The reason for the above issue is that the IRT isn't unique on one
   router, for example, IRT 100:1 can be assigned to multiple VRF
   instances: vpn1, scrubbing-vpn and vpn2.

   The Route Distinguisher is unique on one router, In order to address
   this operational concern, this document introduces a new type of the
   redirect extended community, called as Redirect to VPN RD Extended
   Community, When activated, the Redirect to VPN RD Extended Community
   is used to identify the unique VPN instance within a router.

3.  Redirect to VPN RD Extended Community Format

   This document defines a new type of the redirect extended community,
   called as Redirect to VPN RD Extended Community.  This extended
   community is a new transitive extended community with the Sub-Type
   field is TBD.  The IANA registry of BGP Extended Communities clearly
   identifies communities of specific formats: "Two-octet AS Specific
   Extended Community" [RFC4360], "Four-octet AS Specific Extended
   Community" [RFC5668], and "IPv4 Address Specific Extended Community"
   [RFC4360].  Route Targets [RFC4360] identify this format in the high-
   order (Type) octet of the Extended Community, Redirect to VPN RD
   Extended Community uses the same mechanism

   This document defines the following VPN RD Extended Communities:









Lucy, et al.           Expires September 18, 2016               [Page 5]

Internet-Draft         Flowspec Redirect to VPN RD            March 2016


+------+--------+--------------------+-------------------------------------+
| Type |Sub-Type| Extended Community | Encoding                            |
+------+--------+--------------------+-------------------------------------+
| 0x80 | TBD    | AS-2byte RD        | 2-octet AS, 4-octet Value           |
| 0x81 | TBD    | IPv4 RD            | 4-octet IPv4 Address, 2-octet Value |
| 0x82 | TBD    | AS-4byte RD        | 4-octet AS, 2-octet Value           |
+------+--------+--------------------+-------------------------------------+
                Figure 2: VPN RD Extended Communities

   It should be noted that the low-order nibble of the Redirect's Type
   field corresponds to the Route Target Extended Community format field
   (Type).  (See Sections 3.1, 3.2, and 4 of [RFC4360] plus Section 2 of
   [RFC5668].)  The low-order octet (Sub-Type) of the Redirect to VPN RD
   Extended Community is TBD, in contrast to 0x02 for Route Targets and
   0x08 for Redirect to VPN RT Extended Community.

4.  Using Redirect VPN RD Extended Community

   Upon detecting the attack target to the user of the backbone network,
   Traffic Analyzer will push a Flowspec rule to R1 with Redirect VPN
   RD: 100:1.

   R1 will advertise the receiving Flowspec rule to R2.

   In R2, the receiving Flowspec rule from R1 can be imported by the VRF
   routing instance scrubbing-vpn.  The attack traffic that matches the
   Flowspec rule on R2 will be correctly redirected to the VRF
   scrubbing-vpn and sent to the Scrubbing Center.























Lucy, et al.           Expires September 18, 2016               [Page 6]

Internet-Draft         Flowspec Redirect to VPN RD            March 2016


       +--------+
       |Traffic |
   +---+Analyzer|
   |   +--------+                                VPN instances in R2:
   |
 | |                                             ip vpn-instance vpn1
 | |FlowSpec rule with                            RD: 10:1
 | |Redirect VPN RD: 100:1                        IRT: 10:1 100:1
 v |                                              ERT: 10:1 100:1
   |    Scrubbing vrf in R1:
   |    ip vpn-instance scrubbing-vpn            ip vpn-instance scrubbing-vpn
   |     RD: 100:1                                RD: 100:1
   |     IRT: 100:1                               IRT: 100:1
+--+--+  ERT: 100:1                      +-----+  ERT: 100:1
|  R1 +----------------------------------+ R2  +
+-----+      ------------->              +-----+ ip vpn-instance vpn2
   |         FlowSpec rule with                   RD: 200:1
   |         Redirect VPN RD: 100:1               IRT: 10:1 100:1
   |                                              ERT: 10:1
   |                 <------Redirect DDoS Traffic
   |                        to Scrubbing Center from R2
   |   +----------+
   |   |Scrubbing |
   +---+Center    |
       +----------+

Figure 3: Redirect DDoS Traffic to Scrubbing Center Using Redirect VPN RD


   The above procedures assume that all PEs are upgraded to support the
   Redirect to VPN RD Extended Community.

5.  IANA Considerations

   TBD.

6.  Security Considerations

   TBD.

7.  References

7.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.



Lucy, et al.           Expires September 18, 2016               [Page 7]

Internet-Draft         Flowspec Redirect to VPN RD            March 2016


   [RFC4271]  Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
              Border Gateway Protocol 4 (BGP-4)", RFC 4271,
              DOI 10.17487/RFC4271, January 2006,
              <http://www.rfc-editor.org/info/rfc4271>.

   [RFC4360]  Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended
              Communities Attribute", RFC 4360, DOI 10.17487/RFC4360,
              February 2006, <http://www.rfc-editor.org/info/rfc4360>.

   [RFC4760]  Bates, T., Chandra, R., Katz, D., and Y. Rekhter,
              "Multiprotocol Extensions for BGP-4", RFC 4760,
              DOI 10.17487/RFC4760, January 2007,
              <http://www.rfc-editor.org/info/rfc4760>.

   [RFC5492]  Scudder, J. and R. Chandra, "Capabilities Advertisement
              with BGP-4", RFC 5492, DOI 10.17487/RFC5492, February
              2009, <http://www.rfc-editor.org/info/rfc5492>.

   [RFC5575]  Marques, P., Sheth, N., Raszuk, R., Greene, B., Mauch, J.,
              and D. McPherson, "Dissemination of Flow Specification
              Rules", RFC 5575, DOI 10.17487/RFC5575, August 2009,
              <http://www.rfc-editor.org/info/rfc5575>.

   [RFC5668]  Rekhter, Y., Sangli, S., and D. Tappan, "4-Octet AS
              Specific BGP Extended Community", RFC 5668,
              DOI 10.17487/RFC5668, October 2009,
              <http://www.rfc-editor.org/info/rfc5668>.

7.2.  Informative References

   [RFC7674]  Haas, J., Ed., "Clarification of the Flowspec Redirect
              Extended Community", RFC 7674, DOI 10.17487/RFC7674,
              October 2015, <http://www.rfc-editor.org/info/rfc7674>.

Authors' Addresses

   lucy.yong
   Huawei Technologies

   Email: lucy.yong@huawei.com











Lucy, et al.           Expires September 18, 2016               [Page 8]

Internet-Draft         Flowspec Redirect to VPN RD            March 2016


   Shunwan Zhuang
   Huawei Technologies
   Huawei Bld., No.156 Beiqing Rd.
   Beijing  100095
   China

   Email: zhuangshunwan@huawei.com


   Weiguo Hao
   Huawei Technologies
   101 Software Avenue,
   Nanjing  210012
   China

   Email: haoweiguo@huawei.com



































Lucy, et al.           Expires September 18, 2016               [Page 9]