draft-ietf-lisp-rfc6830bis-30.txt | draft-ietf-lisp-rfc6830bis-31.txt | |||
---|---|---|---|---|
Network Working Group D. Farinacci | Network Working Group D. Farinacci | |||
Internet-Draft lispers.net | Internet-Draft lispers.net | |||
Obsoletes: 6830 (if approved) V. Fuller | Obsoletes: 6830 (if approved) V. Fuller | |||
Intended status: Standards Track vaf.net Internet Consulting | Intended status: Standards Track vaf.net Internet Consulting | |||
Expires: July 16, 2020 D. Meyer | Expires: September 6, 2020 D. Meyer | |||
1-4-5.net | 1-4-5.net | |||
D. Lewis | D. Lewis | |||
Cisco Systems | Cisco Systems | |||
A. Cabellos (Ed.) | A. Cabellos (Ed.) | |||
UPC/BarcelonaTech | UPC/BarcelonaTech | |||
January 13, 2020 | March 5, 2020 | |||
The Locator/ID Separation Protocol (LISP) | The Locator/ID Separation Protocol (LISP) | |||
draft-ietf-lisp-rfc6830bis-30 | draft-ietf-lisp-rfc6830bis-31 | |||
Abstract | Abstract | |||
This document describes the Data-Plane protocol for the Locator/ID | This document describes the Data-Plane protocol for the Locator/ID | |||
Separation Protocol (LISP). LISP defines two namespaces, End-point | Separation Protocol (LISP). LISP defines two namespaces, End-point | |||
Identifiers (EIDs) that identify end-hosts and Routing Locators | Identifiers (EIDs) that identify end-hosts and Routing Locators | |||
(RLOCs) that identify network attachment points. With this, LISP | (RLOCs) that identify network attachment points. With this, LISP | |||
effectively separates control from data, and allows routers to create | effectively separates control from data, and allows routers to create | |||
overlay networks. LISP-capable routers exchange encapsulated packets | overlay networks. LISP-capable routers exchange encapsulated packets | |||
according to EID-to-RLOC mappings stored in a local Map-Cache. | according to EID-to-RLOC mappings stored in a local Map-Cache. | |||
skipping to change at page 1, line 49 ¶ | skipping to change at page 1, line 49 ¶ | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on July 16, 2020. | This Internet-Draft will expire on September 6, 2020. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2020 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 2, line 33 ¶ | skipping to change at page 2, line 33 ¶ | |||
1.1. Scope of Applicability . . . . . . . . . . . . . . . . . 4 | 1.1. Scope of Applicability . . . . . . . . . . . . . . . . . 4 | |||
2. Requirements Notation . . . . . . . . . . . . . . . . . . . . 4 | 2. Requirements Notation . . . . . . . . . . . . . . . . . . . . 4 | |||
3. Definition of Terms . . . . . . . . . . . . . . . . . . . . . 5 | 3. Definition of Terms . . . . . . . . . . . . . . . . . . . . . 5 | |||
4. Basic Overview . . . . . . . . . . . . . . . . . . . . . . . 8 | 4. Basic Overview . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
4.1. Packet Flow Sequence . . . . . . . . . . . . . . . . . . 10 | 4.1. Packet Flow Sequence . . . . . . . . . . . . . . . . . . 10 | |||
5. LISP Encapsulation Details . . . . . . . . . . . . . . . . . 12 | 5. LISP Encapsulation Details . . . . . . . . . . . . . . . . . 12 | |||
5.1. LISP IPv4-in-IPv4 Header Format . . . . . . . . . . . . . 13 | 5.1. LISP IPv4-in-IPv4 Header Format . . . . . . . . . . . . . 13 | |||
5.2. LISP IPv6-in-IPv6 Header Format . . . . . . . . . . . . . 14 | 5.2. LISP IPv6-in-IPv6 Header Format . . . . . . . . . . . . . 14 | |||
5.3. Tunnel Header Field Descriptions . . . . . . . . . . . . 15 | 5.3. Tunnel Header Field Descriptions . . . . . . . . . . . . 15 | |||
6. LISP EID-to-RLOC Map-Cache . . . . . . . . . . . . . . . . . 19 | 6. LISP EID-to-RLOC Map-Cache . . . . . . . . . . . . . . . . . 19 | |||
7. Dealing with Large Encapsulated Packets . . . . . . . . . . . 19 | 7. Dealing with Large Encapsulated Packets . . . . . . . . . . . 20 | |||
7.1. A Stateless Solution to MTU Handling . . . . . . . . . . 20 | 7.1. A Stateless Solution to MTU Handling . . . . . . . . . . 20 | |||
7.2. A Stateful Solution to MTU Handling . . . . . . . . . . . 21 | 7.2. A Stateful Solution to MTU Handling . . . . . . . . . . . 21 | |||
8. Using Virtualization and Segmentation with LISP . . . . . . . 21 | 8. Using Virtualization and Segmentation with LISP . . . . . . . 22 | |||
9. Routing Locator Selection . . . . . . . . . . . . . . . . . . 22 | 9. Routing Locator Selection . . . . . . . . . . . . . . . . . . 22 | |||
10. Routing Locator Reachability . . . . . . . . . . . . . . . . 24 | 10. Routing Locator Reachability . . . . . . . . . . . . . . . . 24 | |||
10.1. Echo Nonce Algorithm . . . . . . . . . . . . . . . . . . 26 | 10.1. Echo Nonce Algorithm . . . . . . . . . . . . . . . . . . 26 | |||
11. EID Reachability within a LISP Site . . . . . . . . . . . . . 27 | 11. EID Reachability within a LISP Site . . . . . . . . . . . . . 27 | |||
12. Routing Locator Hashing . . . . . . . . . . . . . . . . . . . 27 | 12. Routing Locator Hashing . . . . . . . . . . . . . . . . . . . 27 | |||
13. Changing the Contents of EID-to-RLOC Mappings . . . . . . . . 28 | 13. Changing the Contents of EID-to-RLOC Mappings . . . . . . . . 28 | |||
13.1. Locator-Status-Bits . . . . . . . . . . . . . . . . . . 29 | 13.1. Locator-Status-Bits . . . . . . . . . . . . . . . . . . 29 | |||
13.2. Database Map-Versioning . . . . . . . . . . . . . . . . 29 | 13.2. Database Map-Versioning . . . . . . . . . . . . . . . . 29 | |||
14. Multicast Considerations . . . . . . . . . . . . . . . . . . 30 | 14. Multicast Considerations . . . . . . . . . . . . . . . . . . 30 | |||
15. Router Performance Considerations . . . . . . . . . . . . . . 31 | 15. Router Performance Considerations . . . . . . . . . . . . . . 31 | |||
16. Security Considerations . . . . . . . . . . . . . . . . . . . 32 | 16. Security Considerations . . . . . . . . . . . . . . . . . . . 32 | |||
17. Network Management Considerations . . . . . . . . . . . . . . 33 | 17. Network Management Considerations . . . . . . . . . . . . . . 33 | |||
18. Changes since RFC 6830 . . . . . . . . . . . . . . . . . . . 33 | 18. Changes since RFC 6830 . . . . . . . . . . . . . . . . . . . 33 | |||
19. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 34 | 19. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 34 | |||
19.1. LISP UDP Port Numbers . . . . . . . . . . . . . . . . . 34 | 19.1. LISP UDP Port Numbers . . . . . . . . . . . . . . . . . 34 | |||
20. References . . . . . . . . . . . . . . . . . . . . . . . . . 34 | 20. References . . . . . . . . . . . . . . . . . . . . . . . . . 34 | |||
20.1. Normative References . . . . . . . . . . . . . . . . . . 34 | 20.1. Normative References . . . . . . . . . . . . . . . . . . 34 | |||
20.2. Informative References . . . . . . . . . . . . . . . . . 35 | 20.2. Informative References . . . . . . . . . . . . . . . . . 36 | |||
Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . 39 | Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . 39 | |||
Appendix B. Document Change Log . . . . . . . . . . . . . . . . 40 | Appendix B. Document Change Log . . . . . . . . . . . . . . . . 40 | |||
B.1. Changes to draft-ietf-lisp-rfc6830bis-27 . . . . . . . . 40 | B.1. Changes to draft-ietf-lisp-rfc6830bis-27 . . . . . . . . 40 | |||
B.2. Changes to draft-ietf-lisp-rfc6830bis-27 . . . . . . . . 40 | B.2. Changes to draft-ietf-lisp-rfc6830bis-27 . . . . . . . . 40 | |||
B.3. Changes to draft-ietf-lisp-rfc6830bis-26 . . . . . . . . 40 | B.3. Changes to draft-ietf-lisp-rfc6830bis-26 . . . . . . . . 40 | |||
B.4. Changes to draft-ietf-lisp-rfc6830bis-25 . . . . . . . . 41 | B.4. Changes to draft-ietf-lisp-rfc6830bis-25 . . . . . . . . 41 | |||
B.5. Changes to draft-ietf-lisp-rfc6830bis-24 . . . . . . . . 41 | B.5. Changes to draft-ietf-lisp-rfc6830bis-24 . . . . . . . . 41 | |||
B.6. Changes to draft-ietf-lisp-rfc6830bis-23 . . . . . . . . 41 | B.6. Changes to draft-ietf-lisp-rfc6830bis-23 . . . . . . . . 41 | |||
B.7. Changes to draft-ietf-lisp-rfc6830bis-22 . . . . . . . . 41 | B.7. Changes to draft-ietf-lisp-rfc6830bis-22 . . . . . . . . 41 | |||
B.8. Changes to draft-ietf-lisp-rfc6830bis-21 . . . . . . . . 41 | B.8. Changes to draft-ietf-lisp-rfc6830bis-21 . . . . . . . . 41 | |||
skipping to change at page 19, line 13 ¶ | skipping to change at page 19, line 13 ¶ | |||
second, and more importantly, it provides for suppression of looping | second, and more importantly, it provides for suppression of looping | |||
packets in the event there is a loop of concatenated tunnels due to | packets in the event there is a loop of concatenated tunnels due to | |||
misconfiguration. | misconfiguration. | |||
Some xTRs and PxTRs performs re-encapsulation operations and need to | Some xTRs and PxTRs performs re-encapsulation operations and need to | |||
treat the 'Explicit Congestion Notification' (ECN) in a special way. | treat the 'Explicit Congestion Notification' (ECN) in a special way. | |||
Because the re-encapsulation operation is a sequence of two | Because the re-encapsulation operation is a sequence of two | |||
operations, namely a decapsulation followed by an encapsulation, the | operations, namely a decapsulation followed by an encapsulation, the | |||
ECN bits MUST be treated as described above for these two operations. | ECN bits MUST be treated as described above for these two operations. | |||
The LISP dataplane protocol is not backwards compatible with | ||||
[RFC6830] and does not have explicit support for introducing future | ||||
protocol changes (e.g. an explicit version field), However, the LISP | ||||
control plane [I-D.ietf-lisp-rfc6833bis] allows an ETR to register | ||||
dataplane capabilities by means of new LCAF types [RFC8060]. In this | ||||
way an ITR can be made aware of the dataplane capabilities of an ETR, | ||||
and encapsulate accordingly. The specification of the new LCAF | ||||
types, new LCAF mechanisms, and their use, is out of the scope of | ||||
this document. | ||||
6. LISP EID-to-RLOC Map-Cache | 6. LISP EID-to-RLOC Map-Cache | |||
ITRs and PITRs maintain an on-demand cache, referred as LISP EID-to- | ITRs and PITRs maintain an on-demand cache, referred as LISP EID-to- | |||
RLOC Map-Cache, that contains mappings from EID-prefixes to locator | RLOC Map-Cache, that contains mappings from EID-prefixes to locator | |||
sets. The cache is used to encapsulate packets from the EID space to | sets. The cache is used to encapsulate packets from the EID space to | |||
the corresponding RLOC network attachment point. | the corresponding RLOC network attachment point. | |||
When an ITR/PITR receives a packet from inside of the LISP site to | When an ITR/PITR receives a packet from inside of the LISP site to | |||
destinations outside of the site a longest-prefix match lookup of the | destinations outside of the site a longest-prefix match lookup of the | |||
EID is done to the Map-Cache. | EID is done to the Map-Cache. | |||
skipping to change at page 34, line 26 ¶ | skipping to change at page 34, line 30 ¶ | |||
lisp-data 4341 udp LISP Data Packets | lisp-data 4341 udp LISP Data Packets | |||
20. References | 20. References | |||
20.1. Normative References | 20.1. Normative References | |||
[I-D.ietf-lisp-6834bis] | [I-D.ietf-lisp-6834bis] | |||
Iannone, L., Saucez, D., and O. Bonaventure, "Locator/ID | Iannone, L., Saucez, D., and O. Bonaventure, "Locator/ID | |||
Separation Protocol (LISP) Map-Versioning", draft-ietf- | Separation Protocol (LISP) Map-Versioning", draft-ietf- | |||
lisp-6834bis-04 (work in progress), August 2019. | lisp-6834bis-06 (work in progress), February 2020. | |||
[I-D.ietf-lisp-rfc6833bis] | [I-D.ietf-lisp-rfc6833bis] | |||
Farinacci, D., Maino, F., Fuller, V., and A. Cabellos- | Farinacci, D., Maino, F., Fuller, V., and A. Cabellos- | |||
Aparicio, "Locator/ID Separation Protocol (LISP) Control- | Aparicio, "Locator/ID Separation Protocol (LISP) Control- | |||
Plane", draft-ietf-lisp-rfc6833bis-26 (work in progress), | Plane", draft-ietf-lisp-rfc6833bis-27 (work in progress), | |||
November 2019. | January 2020. | |||
[RFC0768] Postel, J., "User Datagram Protocol", STD 6, RFC 768, | [RFC0768] Postel, J., "User Datagram Protocol", STD 6, RFC 768, | |||
DOI 10.17487/RFC0768, August 1980, | DOI 10.17487/RFC0768, August 1980, | |||
<https://www.rfc-editor.org/info/rfc768>. | <https://www.rfc-editor.org/info/rfc768>. | |||
[RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | |||
DOI 10.17487/RFC0791, September 1981, | DOI 10.17487/RFC0791, September 1981, | |||
<https://www.rfc-editor.org/info/rfc791>. | <https://www.rfc-editor.org/info/rfc791>. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
skipping to change at page 35, line 14 ¶ | skipping to change at page 35, line 20 ¶ | |||
[RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: | [RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: | |||
Defeating Denial of Service Attacks which employ IP Source | Defeating Denial of Service Attacks which employ IP Source | |||
Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827, | Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827, | |||
May 2000, <https://www.rfc-editor.org/info/rfc2827>. | May 2000, <https://www.rfc-editor.org/info/rfc2827>. | |||
[RFC6040] Briscoe, B., "Tunnelling of Explicit Congestion | [RFC6040] Briscoe, B., "Tunnelling of Explicit Congestion | |||
Notification", RFC 6040, DOI 10.17487/RFC6040, November | Notification", RFC 6040, DOI 10.17487/RFC6040, November | |||
2010, <https://www.rfc-editor.org/info/rfc6040>. | 2010, <https://www.rfc-editor.org/info/rfc6040>. | |||
[RFC6830] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The | ||||
Locator/ID Separation Protocol (LISP)", RFC 6830, | ||||
DOI 10.17487/RFC6830, January 2013, | ||||
<https://www.rfc-editor.org/info/rfc6830>. | ||||
[RFC6831] Farinacci, D., Meyer, D., Zwiebel, J., and S. Venaas, "The | [RFC6831] Farinacci, D., Meyer, D., Zwiebel, J., and S. Venaas, "The | |||
Locator/ID Separation Protocol (LISP) for Multicast | Locator/ID Separation Protocol (LISP) for Multicast | |||
Environments", RFC 6831, DOI 10.17487/RFC6831, January | Environments", RFC 6831, DOI 10.17487/RFC6831, January | |||
2013, <https://www.rfc-editor.org/info/rfc6831>. | 2013, <https://www.rfc-editor.org/info/rfc6831>. | |||
[RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | |||
Writing an IANA Considerations Section in RFCs", BCP 26, | Writing an IANA Considerations Section in RFCs", BCP 26, | |||
RFC 8126, DOI 10.17487/RFC8126, June 2017, | RFC 8126, DOI 10.17487/RFC8126, June 2017, | |||
<https://www.rfc-editor.org/info/rfc8126>. | <https://www.rfc-editor.org/info/rfc8126>. | |||
End of changes. 11 change blocks. | ||||
10 lines changed or deleted | 25 lines changed or added | |||
This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |