
From terry@terrym.net  Wed Feb  3 16:03:30 2010
Return-Path: <terry@terrym.net>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F05593A68E1 for <lisp@core3.amsl.com>; Wed,  3 Feb 2010 16:03:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fQwg5K4yJ9o7 for <lisp@core3.amsl.com>; Wed,  3 Feb 2010 16:03:29 -0800 (PST)
Received: from ey-out-2122.google.com (ey-out-2122.google.com [74.125.78.26]) by core3.amsl.com (Postfix) with ESMTP id D029D3A689D for <lisp@ietf.org>; Wed,  3 Feb 2010 16:03:28 -0800 (PST)
Received: by ey-out-2122.google.com with SMTP id 22so498040eye.51 for <lisp@ietf.org>; Wed, 03 Feb 2010 16:04:09 -0800 (PST)
Received: by 10.213.109.140 with SMTP id j12mr201369ebp.84.1265241849264; Wed, 03 Feb 2010 16:04:09 -0800 (PST)
Received: from ?192.168.1.101? (c122-104-151-4.fitzg3.qld.optusnet.com.au [122.104.151.4]) by mx.google.com with ESMTPS id 14sm1166864ewy.11.2010.02.03.16.04.06 (version=TLSv1/SSLv3 cipher=RC4-MD5); Wed, 03 Feb 2010 16:04:08 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1077)
From: Terry manderson <terry@terrym.net>
In-Reply-To: <4B4FA7AA.1090204@joelhalpern.com>
Date: Thu, 4 Feb 2010 10:04:01 +1000
Content-Transfer-Encoding: quoted-printable
Message-Id: <16E4E038-9870-4CAF-AEA6-F51A9E45D9DB@terrym.net>
References: <4B4FA7AA.1090204@joelhalpern.com>
To: lisp@ietf.org
X-Mailer: Apple Mail (2.1077)
Subject: Re: [lisp] WG Secretary
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Feb 2010 00:03:30 -0000

Folks,

Just to remind you, we are still seeking someone to take on the LISP =
secretary role. The LISP working-group charter has  set the bar quite =
high and if we are to have documents published this year there will be a =
lot of exciting and vibrant action. What better way to be involved!

Taking on the WG secretary role is an ideal way for you to become =
involved in the chairing aspects of IETF work groups It also signals to =
all your peers the commitment you make to the standards development =
process, to such an extent that it may just be the perfect lead-in role =
to being a work group chair yourself!=20

If you are interested please email Joel or myself ASAP and we will talk =
you through it.

Cheers
Terry

On 15/01/2010, at 9:24 AM, Joel M. Halpern wrote:

> At IETF meetings, there is often the interesting spot at the beginning =
of meetings while the chairs look for a minute taker.
> There are also times between meetings when it is helpful to have =
someone who has committed to take notes of things.
> The practice has started developing to appoint working group =
secretaries.  This person is acknowledged in the Charter for the Working =
Group.  This person commits to coming to the meeting and taking notes, =
and to helping the chairs out somewhat in between.
>=20
> It is generally good if this is NOT someone who is presenting a lot, =
since it is rather difficult to take notes and present at the same time.
>=20
> Terry and I are looking for a volunteer to step forward and assit the =
group in the role of WG secretary.
> Please!
>=20
> Yours,
> Joel (and Terry)
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From terry.manderson@icann.org  Wed Feb  3 16:58:58 2010
Return-Path: <terry.manderson@icann.org>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4BADF3A690C for <lisp@core3.amsl.com>; Wed,  3 Feb 2010 16:58:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ieba2qQ10Aqr for <lisp@core3.amsl.com>; Wed,  3 Feb 2010 16:58:57 -0800 (PST)
Received: from EXPFE100-2.exc.icann.org (expfe100-2.exc.icann.org [64.78.22.237]) by core3.amsl.com (Postfix) with ESMTP id 7FE753A6856 for <lisp@ietf.org>; Wed,  3 Feb 2010 16:58:57 -0800 (PST)
Received: from EXVPMBX100-1.exc.icann.org ([64.78.22.232]) by EXPFE100-2.exc.icann.org ([64.78.22.237]) with mapi; Wed, 3 Feb 2010 16:59:41 -0800
From: Terry Manderson <terry.manderson@icann.org>
To: "lisp@ietf.org" <lisp@ietf.org>
Date: Wed, 3 Feb 2010 16:59:39 -0800
Thread-Topic: Timelines for IETF77 and new versions
Thread-Index: AcqlNVO5N2r50JmDCEWhDRz1nRxbtg==
Message-ID: <C790591B.27DA%terry.manderson@icann.org>
Accept-Language: en, en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en, en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [lisp] Timelines for IETF77 and new versions
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Feb 2010 00:58:58 -0000

Folks,

I'd just like to cover some administrative items.

The timeline you need to be aware of is:

* 2010-03-01 (Monday): Internet Draft Cut-off for initial document (-00)
submission by 17:00 PST (01:00 Tuesday, March 2 UTC), upload using IETF ID
Submission Tool.

* 2010-03-08 (Monday): Internet Draft final submission cut-off by 17:00 PST
(01:00 Tuesday, March 9 UTC), upload using IETF ID Submission Tool.

* 2010-03-12 (Friday): Early Bird registration and payment cut-off at 17:00
PST (01:00 Saturday, March 13 UTC).

* 2010-03-15 (Monday): Registration cancellation cut-off at 17:00 PDT (24:0=
0
UTC).

* 2010-03-19 (Friday): Final Pre-Registration and Pre-Payment cut-off at
17:00 PDT (24:00 UTC).

** 2010-03-21 - 2010-03-26: 77th IETF Meeting in Anaheim, California, USA.


Please note that we (Joel and I), as chairs, are not accepting any new item=
s
unless they are 100% in charter and will not detract from the work at hand.

to remind you, that work is (from charter):

Goals and Milestones:
  Mar 2010 - Submit base LISP specification to the IESG as Experimental
  Mar 2010 - Submit base ALT specification to the IESG as Experimental
  Mar 2010 - Submit the LISP Interworking specification to the IESG as
            Experimental
  Jun 2010 - Submit the LISP Map Server specification to the IESG as
            Experimental
  Jun 2010 - Submit Recommendations for Securing the LISP Mapping System to
            the IESG as Experimental
  Jul 2010 - Submit LISP for Multicast Environments to the IESG as
            Experimental
  Dec 2010 - Submit a preliminary analysis as Informational
  Dec 2010 - Re-charter or close.

If you are considering presenting at IETF 77, it would be appreciated if yo=
u
could contact Joel and myself sooner rather than later!

Lastly, I hope you have noticed that the following documents have new
versions:

    draft-ietf-lisp
    draft-ietf-lisp-alt

So this is a reminder for ALL to review the documents and email comments to
the list.

Cheers
Terry & Joel.







From amos@oasis-tech.net  Sat Feb  6 11:04:16 2010
Return-Path: <amos@oasis-tech.net>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7F03928C124 for <lisp@core3.amsl.com>; Sat,  6 Feb 2010 11:04:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.74
X-Spam-Level: 
X-Spam-Status: No, score=-0.74 tagged_above=-999 required=5 tests=[BAYES_20=-0.74]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dUjsl23wpLn9 for <lisp@core3.amsl.com>; Sat,  6 Feb 2010 11:04:15 -0800 (PST)
Received: from mtaout20.012.net.il (mtaout20.012.net.il [80.179.55.166]) by core3.amsl.com (Postfix) with ESMTP id AB4433A692C for <lisp@ietf.org>; Sat,  6 Feb 2010 11:04:14 -0800 (PST)
Received: from conversion-daemon.a-mtaout20.012.net.il by a-mtaout20.012.net.il (HyperSendmail v2007.08) id <0KXF00700OTT2H00@a-mtaout20.012.net.il> for lisp@ietf.org; Sat, 06 Feb 2010 21:04:09 +0200 (IST)
Received: from [192.168.254.12] ([192.117.158.233]) by a-mtaout20.012.net.il (HyperSendmail v2007.08) with ESMTPA id <0KXF00541OYSUK40@a-mtaout20.012.net.il> for lisp@ietf.org; Sat, 06 Feb 2010 21:04:06 +0200 (IST)
Date: Sat, 06 Feb 2010 21:04:03 +0200
From: Amos Rosenboim <amos@oasis-tech.net>
X-012-Sender: slick@inter.net.il
To: lisp@ietf.org
Message-id: <EABECB64-510C-4D6D-8570-F8AB7FE9B873@oasis-tech.net>
MIME-version: 1.0 (Apple Message framework v936)
X-Mailer: Apple Mail (2.936)
Content-type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-transfer-encoding: 7bit
X-Mailman-Approved-At: Sun, 07 Feb 2010 08:02:44 -0800
Subject: [lisp] experimenting with lisp
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 Feb 2010 19:08:12 -0000

Hello,

I read a little about lisp both in NANOG tutorial as well as some  
Cisco documentation.
Are you looking to extend the lisp deployment and add testers and sites?
If so I will be more than happy to participate.

Regards

Amos


From dino@cisco.com  Tue Feb  9 09:50:14 2010
Return-Path: <dino@cisco.com>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8B80728C24F for <lisp@core3.amsl.com>; Tue,  9 Feb 2010 09:50:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.242
X-Spam-Level: 
X-Spam-Status: No, score=-10.242 tagged_above=-999 required=5 tests=[AWL=-0.357, BAYES_00=-2.599, HTML_COMMENT_SAVED_URL=0.114, HTML_MESSAGE=0.001, J_CHICKENPOX_43=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EW-O0M8tN96p for <lisp@core3.amsl.com>; Tue,  9 Feb 2010 09:50:10 -0800 (PST)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by core3.amsl.com (Postfix) with ESMTP id AFB6928C24B for <lisp@ietf.org>; Tue,  9 Feb 2010 09:50:10 -0800 (PST)
Authentication-Results: sj-iport-6.cisco.com; dkim=neutral (message not signed) header.i=none
X-Files: draft-farinacci-lisp-lig-02.txt, rfcdiff-lisp-lig-01-to-02.html : 24591, 24724
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: ApoEAN8vcUurR7Hu/2dsb2JhbADCa4ohjXiCSQiCAwSORw
X-IronPort-AV: E=Sophos;i="4.49,437,1262563200";  d="txt'?html'217?scan'217,208,217";a="480565519"
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-6.cisco.com with ESMTP; 09 Feb 2010 17:51:16 +0000
Received: from xbh-sjc-211.amer.cisco.com (xbh-sjc-211.cisco.com [171.70.151.144]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id o19HpGL8026283 for <lisp@ietf.org>; Tue, 9 Feb 2010 17:51:16 GMT
Received: from xfe-sjc-211.amer.cisco.com ([171.70.151.174]) by xbh-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.3959);  Tue, 9 Feb 2010 09:51:16 -0800
Received: from [192.168.5.214] ([10.21.114.100]) by xfe-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.3959);  Tue, 9 Feb 2010 09:51:15 -0800
Message-Id: <47E76F21-47C3-4373-998B-0D6F57F1A6E5@cisco.com>
From: Dino Farinacci <dino@cisco.com>
To: lisp@ietf.org
Content-Type: multipart/mixed; boundary=Apple-Mail-2--332133380
Mime-Version: 1.0 (Apple Message framework v936)
Date: Tue, 9 Feb 2010 09:51:15 -0800
X-Mailer: Apple Mail (2.936)
X-OriginalArrivalTime: 09 Feb 2010 17:51:15.0846 (UTC) FILETIME=[79EE0260:01CAA9B0]
Subject: [lisp] New lig draft -02 version update
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Feb 2010 17:50:14 -0000

--Apple-Mail-2--332133380
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit

Since the lig ID expired, we did a refresh update. ID and diff file  
enclosed.

Thanks,
Dino/Dave


--Apple-Mail-2--332133380
Content-Disposition: attachment;
	filename=draft-farinacci-lisp-lig-02.txt
Content-Type: text/plain;
	x-unix-mode=0644;
	name="draft-farinacci-lisp-lig-02.txt"
Content-Transfer-Encoding: quoted-printable




Network Working Group                                       D. Farinacci
Internet-Draft                                                  D. Meyer
Intended status: Experimental                              cisco Systems
Expires: August 13, 2010                                February 9, 2010


                       LISP Internet Groper (LIG)
                    draft-farinacci-lisp-lig-02.txt

Abstract

   A simple tool called the LISP Internet Groper or 'lig' can be used to
   query the LISP mapping database.  This draft describes how it works.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 13, 2010.

Copyright Notice

   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must



Farinacci & Meyer        Expires August 13, 2010                [Page 1]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the BSD License.


Table of Contents

   1.  Requirements Notation  . . . . . . . . . . . . . . . . . . . .  3
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Definition of Terms  . . . . . . . . . . . . . . . . . . . . .  5
   4.  Basic Overview . . . . . . . . . . . . . . . . . . . . . . . .  7
   5.  Implementation Details . . . . . . . . . . . . . . . . . . . .  9
     5.1.  LISP Router Implementation . . . . . . . . . . . . . . . .  9
     5.2.  Public Domain Host Implementation  . . . . . . . . . . . . 10
   6.  Testing the ALT  . . . . . . . . . . . . . . . . . . . . . . . 12
   7.  Future Enhancements  . . . . . . . . . . . . . . . . . . . . . 13
   8.  Deployed Network Diagnostic Tools  . . . . . . . . . . . . . . 14
   9.  Security Considerations  . . . . . . . . . . . . . . . . . . . 15
   10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
     10.1. Normative References . . . . . . . . . . . . . . . . . . . 16
     10.2. Informative References . . . . . . . . . . . . . . . . . . 16
   Appendix A.  Acknowledgments . . . . . . . . . . . . . . . . . . . 17
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 18




























Farinacci & Meyer        Expires August 13, 2010                [Page 2]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


1.  Requirements Notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].














































Farinacci & Meyer        Expires August 13, 2010                [Page 3]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


2.  Introduction

   LISP [LISP] specifies an architecture and mechanism for replacing the
   addresses currently used by IP with two separate name spaces:
   Endpoint IDS (EIDs), used within sites, and Routing Locators (RLOCs),
   used on the transit networks that make up the Internet
   infrastructure.  To achieve this separation, the Locator/ID
   Separation Protocol (LISP) defines protocol mechanisms for mapping
   from EIDs to RLOCs.  In addition, LISP assumes the existence of a
   database to store and propagate those mappings globally.  Several
   such databases have been proposed, among them: LISP-CONS [CONS],
   LISP-NERD [NERD], and LISP+ALT [ALT], with LISP+ALT being the system
   that is currently being implemented and deployed on the pilot LISP
   network.

   In conjunction with the various mapping systems, there exists a
   network based API called LISP Map-Server [LISP-MS].  Using Map
   Resolvers and Map Servers allows LISP sites to query and register
   into the database in a uniform way independent of the mapping system
   used.  Sending Map-Requests to Map Resolvers provides a secure
   mechanism mechanism to obtain a Map-Reply containing the
   authoritative EID-to-RLOC mapping for a destination LISP site.

   The 'lig' is a manual management tool to query the mapping database.
   It can be run by all devices which implement LISP, including ITRs,
   ETRs, PTR, Map-Resolvers, Map-Servers, and LISP-ALT routers, as well
   as by a host system at either a LISP-capable or non-LISP-capable
   site.























Farinacci & Meyer        Expires August 13, 2010                [Page 4]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


3.  Definition of Terms

   Map-Server:   a network infrastructure component which learns EID-to-
      RLOC mapping entries from an authoritative source (typically, an
      ETR, though static configuration or another out-of-band mechanism
      may be used).  A Map-Server advertises these mappings in the
      distributed mapping database.

   Map-Resolver:   a network infrastructure component which accepts LISP
      Encapsulated Map-Requests, typically from an ITR, quickly
      determines whether or not the destination IP address is part of
      the EID namespace; if it is not, a Negative Map-Reply is
      immediately returned.  Otherwise, the Map-Resolver finds the
      appropriate EID-to-RLOC mapping by consulting the distributed
      mapping database system.

   Routing Locator (RLOC):   the IPv4 or IPv6 address of an egress
      tunnel router (ETR).  It is the output of a EID-to-RLOC mapping
      lookup.  An EID maps to one or more RLOCs.  Typically, RLOCs are
      numbered from topologically-aggregatable blocks that are assigned
      to a site at each point to which it attaches to the global
      Internet; where the topology is defined by the connectivity of
      provider networks, RLOCs can be thought of as PA addresses.
      Multiple RLOCs can be assigned to the same ETR device or to
      multiple ETR devices at a site.

   Endpoint ID (EID):   a 32-bit (for IPv4) or 128-bit (for IPv6) value
      used in the source and destination address fields of the first
      (most inner) LISP header of a packet.  The host obtains a
      destination EID the same way it obtains an destination address
      today, for example through a DNS lookup or SIP exchange.  The
      source EID is obtained via existing mechanisms used to set a
      host's "local" IP address.  An EID is allocated to a host from an
      EID-prefix block associated with the site where the host is
      located.  An EID can be used by a host to refer to other hosts.
      EIDs MUST NOT be used as LISP RLOCs.  Note that EID blocks may be
      assigned in a hierarchical manner, independent of the network
      topology, to facilitate scaling of the mapping database.  In
      addition, an EID block assigned to a site may have site-local
      structure (subnetting) for routing within the site; this structure
      is not visible to the global routing system.

   EID-to-RLOC Cache:   a short-lived, on-demand table in an ITR that
      stores, tracks, and is responsible for timing-out and otherwise
      validating EID-to-RLOC mappings.  This cache is distinct from the
      full "database" of EID-to-RLOC mappings, it is dynamic, local to
      the ITR(s), and relatively small while the database is
      distributed, relatively static, and much more global in scope.



Farinacci & Meyer        Expires August 13, 2010                [Page 5]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


   EID-to-RLOC Database:   a global distributed database that contains
      all known EID-prefix to RLOC mappings.  Each potential ETR
      typically contains a small piece of the database: the EID-to-RLOC
      mappings for the EID prefixes "behind" the router.  These map to
      one of the router's own, globally-visible, IP addresses.

   Encapsulated Map-Request (EMR):   an EMR is a Map-Request message
      which is encapsulated with another LISP header using UDP
      destination port number 4341.  It is used so an ITR, PTR, or a
      system initiating a 'lig' command can get the Map-Request to a
      Map-Resolver by using locater addresses.  When the Map-Request is
      decapsulated by the Map-Resolver it will be forwarded on the ALT
      network to the Map-Server that has injected the EID-prefix for a
      registered site.  The Map-Server will then encapsulate the Map-
      Request in a LISP packet and send it to an an ETR at the site.
      The ETR will then return an authoritative reply to the system that
      initiated the request.


































Farinacci & Meyer        Expires August 13, 2010                [Page 6]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


4.  Basic Overview

   When the lig command is run, a Map-Request is sent for a destination
   EID.  When a Map-Reply is returned, the contents are displayed to the
   user.  The information displayed includes:

   o  The EID-prefix for the site the queried destination EID matches.

   o  The locator address of the Map Replier.

   o  The locator-set for the mapping entry which includes the locator
      address, up/down status, priority, and weight of each locator.

   o  An round-trip-time estimate for the Map-Request/Map-Reply
      exchange.

   A possible syntax for a lig command could be:


       lig <destination> [source <source>] [to <map-resolver>]

   Parameter description:

   <destination>:  is either a Fully Qualified Domain Name or a
      destination EID for a remote LISP site.

   source <source>:  is an optional source EID to be inserted in the
      "Source EID" field of the Map-Request.

   to <map-resolver>:  is an optional Fully Qualified Domain Name or
      RLOC address for a Map-Resolver.

   The lig utility has two usage cases.  The first being a way to query
   the mapping database for a particular EID.  And the other to verify
   if a site has registered successfully with a Map-Server.

   The first usage has already been described.  Verifying registration
   is called "ligging yourself".  What occurs is in the lig initiator, a
   Map-Request is sent for one of the EIDs for the lig initiator's site.
   The Map-Request is then returned to one of the ETRs for the lig
   initiating site.  In response to the Map-Request, a Map-Reply is sent
   back to the locator address of the lig initiator (note the Map-Reply
   could be sent by the lig initiator).  That Map-Reply is processed and
   the mapping data for lig initiating site is displayed for the user.
   Refer to the syntax in section Section 5.1 for an implementation of
   "ligging yourself".  However, for host-based implementations within a
   LISP site, "lig self" is less useful since the host may not have an
   RLOC to receive a Map-Reply with.  But, lig can be used in a non-LISP



Farinacci & Meyer        Expires August 13, 2010                [Page 7]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


   site as well as from infrastructure hosts to get mapping information.


















































Farinacci & Meyer        Expires August 13, 2010                [Page 8]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


5.  Implementation Details

5.1.  LISP Router Implementation

   The cisco LISP prototype implementation has support for lig for IPv4
   and IPv6.  The command line description is:


       lig <dest-eid> [source <source-eid>] [to <mr>] [count <1-5>]

   This command initiates the LISP Internet Groper.  It is similar to
   the DNS analogue 'dig' but works on the LISP mapping database.  When
   this command is invoked, the local system will send a Map-Request to
   the configured Map-Resolver.  When a Map-Reply is returned, its
   contents will be displayed to the user.  By default, up to 3 Map-
   Requests are sent if no Map-Reply is returned but once a Map-Reply is
   returned no other Map-Requests are sent.  The destination can take a
   DNS name, or an IPv4 or IPv6 EID address.  The <source-eid> can be
   one of the EID addresses assigned to the site in the default VRF.
   When <mr> is specified, then the Map-Request is sent to the address.
   Otherwise, the Map-Request is sent to a configured Map-Resolver.
   When a Map-Resolver is not configured then the Map-Request is sent on
   the ALT network if the local router is attached to the ALT.  When
   "count <1-5>" is specified, 1, 2, 3, 4, or 5 Map-Requests are sent.

   Some sample output:


     titanium-dino# lig titanium-dmm.lisp4.net
     Send map-request to 10.0.0.1 for 192.168.1.1 ...
     Received map-reply from 10.0.0.2 with rtt 0.081468 secs

     Map-cache entry for titanium-dmm.lisp4.net EID 192.168.1.1:
     192.168.1.0/24, uptime: 13:59:59, expires: 23:59:58,
                     via map-reply, auth
       Locator          Uptime    State  Priority/Weight  Packets In/Out
       10.0.0.2         13:59:59  up     1/100            0/14

   Using lig to "lig yourself" is accomplished with the following
   syntax:


       lig {self | self6} [source <source-eid>] [to <mr>] [count <1-5>]

   Use this command for a simple way to see if the site is registered
   with the mapping database system.  The destination-EID address for
   the Map-Request will be the first configured EID-prefix for the site
   (with the host-bits set to 0).  For example, if the site's EID-prefix



Farinacci & Meyer        Expires August 13, 2010                [Page 9]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


   is 192.168.1.0/24, the destination-EID for the Map-Request is
   192.168.1.0.  The source-EID address for the Map-Request will also be
   192.168.1.0 (in this example) and the Map-Request is sent to the
   configured Map-Resolver.  If the Map-Resolver and Map-Server are the
   same LISP system, then the "lig self" is testing if the Map-Resolver
   can "turn back a Map-Request to the site".  If another Map-Resolver
   is used, it can test that the site's EID-prefix has been injected
   into the ALT infrastructure in which case the lig Map-Request is
   processed by the Map-Resolver, propagated through each ALT router hop
   to the site's registered Map-Server.  Then the Map-Server returns the
   Map-Request to originating site.  In which case, an xTR at the
   originating site sends a Map-Reply to the source of the Map-Request
   (could be itself or another xTR for the site).  All other command
   parameters are described above.  Using "lig self6" tests for
   registering of IPv6 EID- prefixes.

   Some sample output for ligging yourself:


     rutile# lig self
     Send loopback map-request to 10.0.0.1 for 192.168.2.0 ...
     Received map-reply from 10.0.0.3 with rtt 0.001592 secs

     Map-cache entry for EID 192.168.2.0:
     192.168.2.0/24, uptime: 00:00:02, expires: 23:59:57
                     via map-reply, self
       Locator       Uptime    State  Priority/Weight  Packets In/Out
       10.0.0.3      00:00:02  up     1/100            0/0


     titanium-simlo# lig self6
     Send loopback map-request to 10.0.0.1 for 192:168:1:: ...
     Received map-reply from 10::1 with rtt 0.044372 secs

     Map-cache entry for EID 192:168:1:::
     192:168:1::/48, uptime: 00:00:01, expires: 23:59:58
                        via map-reply, self
       Locator          Uptime    State  Priority/Weight  Packets In/Out
       10.0.0.3         00:00:01  up     1/100            0/0
       10::1            00:00:01  up     2/0              0/0

5.2.  Public Domain Host Implementation

   There is a public domain implementation that can run on any x86 based
   system.  The only requirement is that the system that initiates lig
   must have an address assigned from the locator namespace.





Farinacci & Meyer        Expires August 13, 2010               [Page 10]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


       lig [-d] <eid> -m <map-resolver> [-c <count>] [-t <timeout>]

   Parameter description:

   -d:  prints additional protocol debug output.

   <eid>:  is the destination EID or FQDN of a LISP host.

   -m <map-resolver>:  is the RLOC address or FQDN of a Map-Resolver.

   -c <count>:  the number of Map-Requests to send before the first Map-
      Reply is returned.  The default value is 3.  The range is from 1
      to 5.

   -t <timeout>:  the amount of time, in seconds, before another Map-
      Request is sent when no Map-Reply is returned.  The default value
      is 2 seconds.  The range is from 1 to 5.

   Some sample output:


     % lig titanium-test.lisp4.net -m 10.0.0.1
     Send map-request to 10.0.0.1 for 192.168.1.1 ...
     Received map-reply from 10.0.0.2 with rtt 0.04000 sec

     Mapping entry for EID 192.168.1.1:
     192.168.1.0/24, record ttl: 60
      Locator           State     Priority/Weight
      10.0.0.1          up        1/25
      10.0.0.2          up        1/25
      10.0.0.3          up        1/25
      10.0.0.4          up        2/25

   The public domain implementation of lig is available at
   http://github.com/davidmeyer/lig.
















Farinacci & Meyer        Expires August 13, 2010               [Page 11]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


6.  Testing the ALT

   There are cases where a Map-Reply is returned from a lig request but
   the user doesn't really know how much of the mapping infrastructure
   was tested.  There are two cases to consider, avoiding the ALT and
   traversing the ALT.

   When an ITR sends a lig request to its Map-Resolver for a
   destination-EID, the Map-Resolver could also be configured as a Map-
   Server.  And if the destination-EID is for a site that registers with
   this Map-Server, the Map-Request is sent to the site directly without
   testing the ALT.  This occurs because the Map-Server is the source of
   the advertisement for the site's EID-prefix.  So if the map-reply is
   returned to the lig requesting site, you cannot be sure that other
   sites can reach the same destination-EID.

   If a Map-Resolver is used that is not a Map-Server for the EID-prefix
   being sought, then the ALT infrastructure can be tested.  This test
   case is testing the functionality of the Map-Resolver, traversal of
   the ALT (testing BGP-over-GRE), and the Map-Server.

   It is recommended that users issue 2 lig requests, each which send
   Map-Requests to different Map-Resolvers.

   The network can have a LISP-ALT router deployed as a "ALT looking-
   glass" node.  This type of router has BGP peering sessions with other
   ALT routers where it does not inject any EID-prefixes into the ALT
   but just learns ones advertised by other ALT routers and Map-Servers.
   This router is configured as a Map-Resolver.  Lig users can point to
   the ALT looking-glass router for Map-Resolver services via the "to
   <map-resolver>" parameter on the lig command.  The ALT looking-glass
   node can be used to lig other sites as well as your own site.  When
   the ALT looking-glass is used as a Map-Resolver, you can be assured
   the ALT network is being tested.

















Farinacci & Meyer        Expires August 13, 2010               [Page 12]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


7.  Future Enhancements

   When negative Map-Replies have been further developed and
   implemented, lig should be modified appropriately to process and
   clearly indicate how and why a negative Map-Reply was received.
   Negative Map-Replies could be sent in the following cases, the lig
   request was initiated for a non-EID address or the Map-Request
   initiated by lig request is being rejected due to rate-limiting on
   the replier.










































Farinacci & Meyer        Expires August 13, 2010               [Page 13]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


8.  Deployed Network Diagnostic Tools

   There is an web-based interface to do auto-polling with lig on the
   back-end for most of the LISP sites on the LISP test network.  The
   web-page can be accessed at http://www.lisp4.net/status.

   There is a LISP site monitoring web-based interface that can be found
   at http://www.lisp4.net/lisp-site.

   At http://baldomar.ccaba.upc.edu/lispmon, written by the folks at
   UPC, shows a geographical map indicating where each LISP site
   resides.







































Farinacci & Meyer        Expires August 13, 2010               [Page 14]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


9.  Security Considerations

   The use of lig does not affect the security of the LISP
   infrastructure as it is simply a tool that facilities diagnostic
   querying.  See [LISP], [ALT], and [LISP-MS] for descriptions of the
   security properties of the LISP infrastructure.













































Farinacci & Meyer        Expires August 13, 2010               [Page 15]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

10.2.  Informative References

   [ALT]      Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "LISP
              Alternative Topology (LISP-ALT)",
              draft-ietfr-lisp-alt-03.txt (work in progress),
              February 2010.

   [CONS]     Farinacci, D., Fuller, V., and D. Meyer, "LISP-CONS: A
              Content distribution Overlay Network  Service for LISP",
              draft-meyer-lisp-cons-03.txt (work in progress),
              November 2007.

   [LISP]     Farinacci, D., Fuller, V., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol (LISP)",
              draft-ietf-lisp-06.txt (work in progress), January 2010.

   [LISP-MS]  Farinacci, D. and V. Fuller, "LISP Map Server",
              draft-ietf-lisp-ms-04.txt (work in progress),
              October 2009.

   [NERD]     Lear, E., "NERD: A Not-so-novel EID to RLOC Database",
              draft-lear-lisp-nerd-04.txt (work in progress),
              April 2008.





















Farinacci & Meyer        Expires August 13, 2010               [Page 16]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


Appendix A.  Acknowledgments

   Thanks and kudos to John Zwiebel, Andrew Partan, Darrel Lewis, and
   Vince Fuller for providing critical feedback on the lig design and
   prototype implementations.  These folks as well as all the people on
   lisp-beta@external.cisco.com who tested lig functionality and
   continue to do so, we extend our sincere thanks.












































Farinacci & Meyer        Expires August 13, 2010               [Page 17]
=0C
Internet-Draft         LISP Internet Groper (LIG)          February 2010


Authors' Addresses

   Dino Farinacci
   cisco Systems
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: dino@cisco.com


   Dave Meyer
   cisco Systems
   170 Tasman Drive
   San Jose, CA
   USA

   Email: dmm@cisco.com

































Farinacci & Meyer        Expires August 13, 2010               [Page 18]
=0C

--Apple-Mail-2--332133380
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed
Content-Transfer-Encoding: 7bit





--Apple-Mail-2--332133380
Content-Disposition: attachment;
	filename=rfcdiff-lisp-lig-01-to-02.html
Content-Type: text/html;
	x-unix-mode=0600;
	name="rfcdiff-lisp-lig-01-to-02.html"
Content-Transfer-Encoding: 7bit


<!-- saved from url=(0029)http://tools.ietf.org/rfcdiff -->
<HTML><HEAD><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><TITLE>wdiff draft-farinacci-lisp-lig-01.txt draft-farinacci-lisp-lig-02.txt</TITLE></HEAD><BODY>
<PRE>
Network Working Group                                       D. Farinacci
Internet-Draft                                                  D. Meyer
Intended status: Experimental                              cisco Systems
Expires: <STRIKE><FONT color="red">November 6, 2009                                    May 5, 2009</FONT></STRIKE> <STRONG><FONT color="green">August 13, 2010                                February 9, 2010</FONT></STRONG>

                       LISP Internet Groper (LIG)
                    <STRIKE><FONT color="red">draft-farinacci-lisp-lig-01.txt</FONT></STRIKE>
                    <STRONG><FONT color="green">draft-farinacci-lisp-lig-02.txt

Abstract

   A simple tool called the LISP Internet Groper or 'lig' can be used to
   query the LISP mapping database.  This draft describes how it works.</FONT></STRONG>

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on <STRIKE><FONT color="red">November 6, 2009.</FONT></STRIKE> <STRONG><FONT color="green">August 13, 2010.</FONT></STRONG>

Copyright Notice

   Copyright (c) <STRIKE><FONT color="red">2009</FONT></STRIKE> <STRONG><FONT color="green">2010</FONT></STRONG> IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   <STRONG><FONT color="green">(http://trustee.ietf.org/license-info)</FONT></STRONG> in effect on the date of
   publication of this <STRIKE><FONT color="red">document (http://trustee.ietf.org/license-info).</FONT></STRIKE> <STRONG><FONT color="green">document.</FONT></STRONG>  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.

<STRIKE><FONT color="red">Abstract

   A simple tool called</FONT></STRIKE>  <STRONG><FONT color="green">Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of</FONT></STRONG>
   the <STRIKE><FONT color="red">LISP Internet Groper or 'lig' can be used to
   query</FONT></STRIKE> <STRONG><FONT color="green">Trust Legal Provisions and are provided without warranty as
   described in</FONT></STRONG> the <STRIKE><FONT color="red">LISP mapping database.  This draft describes how it works.</FONT></STRIKE> <STRONG><FONT color="green">BSD License.</FONT></STRONG>

Table of Contents

   1.  Requirements Notation  . . . . . . . . . . . . . . . . . . . .  3
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Definition of Terms  . . . . . . . . . . . . . . . . . . . . .  5
   4.  Basic Overview . . . . . . . . . . . . . . . . . . . . . . . .  7
   5.  Implementation Details . . . . . . . . . . . . . . . . . . . .  9
     5.1.  LISP Router Implementation . . . . . . . . . . . . . . . .  9
     5.2.  Public Domain Host Implementation  . . . . . . . . . . . . 10
   6.  Testing the ALT  . . . . . . . . . . . . . . . . . . . . . . . 12
   7.  Future Enhancements  . . . . . . . . . . . . . . . . . . . . . 13
   8.  <STRONG><FONT color="green">Deployed Network Diagnostic Tools  . . . . . . . . . . . . . . 14
   9.</FONT></STRONG>  Security Considerations  . . . . . . . . . . . . . . . . . . . <STRIKE><FONT color="red">14
   9.</FONT></STRIKE> <STRONG><FONT color="green">15
   10.</FONT></STRONG> References . . . . . . . . . . . . . . . . . . . . . . . . . . <STRIKE><FONT color="red">15
     9.1.</FONT></STRIKE> <STRONG><FONT color="green">16
     10.1.</FONT></STRONG> Normative References . . . . . . . . . . . . . . . . . . . <STRIKE><FONT color="red">15
     9.2.</FONT></STRIKE> <STRONG><FONT color="green">16
     10.2.</FONT></STRONG> Informative References . . . . . . . . . . . . . . . . . . <STRIKE><FONT color="red">15</FONT></STRIKE> <STRONG><FONT color="green">16</FONT></STRONG>
   Appendix A.  Acknowledgments . . . . . . . . . . . . . . . . . . . <STRIKE><FONT color="red">16</FONT></STRIKE> <STRONG><FONT color="green">17</FONT></STRONG>
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . <STRIKE><FONT color="red">17</FONT></STRIKE> <STRONG><FONT color="green">18</FONT></STRONG>

1.  Requirements Notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

2.  Introduction

   LISP [LISP] specifies an architecture and mechanism for replacing the
   addresses currently used by IP with two separate name spaces:
   Endpoint IDS (EIDs), used within sites, and Routing Locators (RLOCs),
   used on the transit networks that make up the Internet
   infrastructure.  To achieve this separation, the Locator/ID
   Separation Protocol (LISP) defines protocol mechanisms for mapping
   from EIDs to RLOCs.  In addition, LISP assumes the existence of a
   database to store and propagate those mappings globally.  Several
   such databases have been proposed, among them: LISP-CONS [CONS],
   LISP-NERD [NERD], and LISP+ALT [ALT], with LISP+ALT being the system
   that is currently being implemented and deployed on the pilot LISP
   network.

   In conjunction with the various mapping systems, there exists a
   network based API called LISP Map-Server [LISP-MS].  Using Map
   Resolvers and Map Servers allows LISP sites to query and register
   into the database in a uniform way independent of the mapping system
   used.  Sending Map-Requests to Map Resolvers provides a secure
   mechanism mechanism to obtain a Map-Reply containing the
   authoritative EID-to-RLOC mapping for a destination LISP site.

   The 'lig' is a manual management tool to query the mapping database.
   It can be run by all devices which implement LISP, including ITRs,
   ETRs, PTR, Map-Resolvers, Map-Servers, and LISP-ALT routers, as well
   as by a host system at either a LISP-capable or non-LISP-capable
   site.

3.  Definition of Terms

   Map-Server:   a network infrastructure component which learns EID-to-
      RLOC mapping entries from an authoritative source (typically, an
      ETR, though static configuration or another out-of-band mechanism
      may be used).  A Map-Server advertises these mappings in the
      distributed mapping database.

   Map-Resolver:   a network infrastructure component which accepts LISP
      Encapsulated Map-Requests, typically from an ITR, quickly
      determines whether or not the destination IP address is part of
      the EID namespace; if it is not, a Negative Map-Reply is
      immediately returned.  Otherwise, the Map-Resolver finds the
      appropriate EID-to-RLOC mapping by consulting the distributed
      mapping database system.

   Routing Locator (RLOC):   the IPv4 or IPv6 address of an egress
      tunnel router (ETR).  It is the output of a EID-to-RLOC mapping
      lookup.  An EID maps to one or more RLOCs.  Typically, RLOCs are
      numbered from topologically-aggregatable blocks that are assigned
      to a site at each point to which it attaches to the global
      Internet; where the topology is defined by the connectivity of
      provider networks, RLOCs can be thought of as PA addresses.
      Multiple RLOCs can be assigned to the same ETR device or to
      multiple ETR devices at a site.

   Endpoint ID (EID):   a 32-bit (for IPv4) or 128-bit (for IPv6) value
      used in the source and destination address fields of the first
      (most inner) LISP header of a packet.  The host obtains a
      destination EID the same way it obtains an destination address
      today, for example through a DNS lookup or SIP exchange.  The
      source EID is obtained via existing mechanisms used to set a
      host's "local" IP address.  An EID is allocated to a host from an
      EID-prefix block associated with the site where the host is
      located.  An EID can be used by a host to refer to other hosts.
      EIDs MUST NOT be used as LISP RLOCs.  Note that EID blocks may be
      assigned in a hierarchical manner, independent of the network
      topology, to facilitate scaling of the mapping database.  In
      addition, an EID block assigned to a site may have site-local
      structure (subnetting) for routing within the site; this structure
      is not visible to the global routing system.

   EID-to-RLOC Cache:   a short-lived, on-demand table in an ITR that
      stores, tracks, and is responsible for timing-out and otherwise
      validating EID-to-RLOC mappings.  This cache is distinct from the
      full "database" of EID-to-RLOC mappings, it is dynamic, local to
      the ITR(s), and relatively small while the database is
      distributed, relatively static, and much more global in scope.

   EID-to-RLOC Database:   a global distributed database that contains
      all known EID-prefix to RLOC mappings.  Each potential ETR
      typically contains a small piece of the database: the EID-to-RLOC
      mappings for the EID prefixes "behind" the router.  These map to
      one of the router's own, globally-visible, IP addresses.

   Encapsulated Map-Request (EMR):   an EMR is a Map-Request message
      which is encapsulated with another LISP header using UDP
      destination port number 4341.  It is used so an ITR, PTR, or a
      system initiating a 'lig' command can get the Map-Request to a
      Map-Resolver by using locater addresses.  When the Map-Request is
      decapsulated by the Map-Resolver it will be forwarded on the ALT
      network to the Map-Server that has injected the EID-prefix for a
      registered site.  The Map-Server will then encapsulate the Map-
      Request in a LISP packet and send it to an an ETR at the site.
      The ETR will then return an authoritative reply to the system that
      initiated the request.

4.  Basic Overview

   When the lig command is run, a Map-Request is sent for a destination
   EID.  When a Map-Reply is returned, the contents are displayed to the
   user.  The information displayed includes:

   o  The EID-prefix for the site the queried destination EID matches.

   o  The locator address of the Map Replier.

   o  The locator-set for the mapping entry which includes the locator
      address, up/down status, priority, and weight of each locator.

   o  An round-trip-time estimate for the Map-Request/Map-Reply
      exchange.

   A possible syntax for a lig command could be:

       lig &lt;destination&gt; [source &lt;source&gt;] [to &lt;map-resolver&gt;]

   Parameter description:

   &lt;destination&gt;:  is either a Fully Qualified Domain Name or a
      destination EID for a remote LISP site.

   source &lt;source&gt;:  is an optional source EID to be inserted in the
      "Source EID" field of the Map-Request.

   to &lt;map-resolver&gt;:  is an optional Fully Qualified Domain Name or
      RLOC address for a Map-Resolver.

   The lig utility has two usage cases.  The first being a way to query
   the mapping database for a particular EID.  And the other to verify
   if a site has registered successfully with a Map-Server.

   The first usage has already been described.  Verifying registration
   is called "ligging yourself".  What occurs is in the lig initiator, a
   Map-Request is sent for one of the EIDs for the lig initiator's site.
   The Map-Request is then returned to one of the ETRs for the lig
   initiating site.  In response to the Map-Request, a Map-Reply is sent
   back to the locator address of the lig initiator (note the Map-Reply
   could be sent by the lig initiator).  That Map-Reply is processed and
   the mapping data for lig initiating site is displayed for the user.
   Refer to the syntax in section Section 5.1 for an implementation of
   "ligging yourself".  However, for host-based implementations within a
   LISP site, "lig self" is less useful since the host may not have an
   RLOC to receive a Map-Reply with.  But, lig can be used in a non-LISP
   site as well as from infrastructure hosts to get mapping information.

5.  Implementation Details

5.1.  LISP Router Implementation

   The cisco LISP prototype implementation has support for lig for IPv4
   and IPv6.  The command line description is:

       lig &lt;dest-eid&gt; [source &lt;source-eid&gt;] [to &lt;mr&gt;] [count &lt;1-5&gt;]

   This command initiates the LISP Internet Groper.  It is similar to
   the DNS analogue 'dig' but works on the LISP mapping database.  When
   this command is invoked, the local system will send a Map-Request to
   the configured Map-Resolver.  When a Map-Reply is returned, its
   contents will be displayed to the user.  By default, up to 3 Map-
   Requests are sent if no Map-Reply is returned but once a Map-Reply is
   returned no other Map-Requests are sent.  The destination can take a
   DNS name, or an IPv4 or IPv6 EID address.  The &lt;source-eid&gt; can be
   one of the EID addresses assigned to the site in the default VRF.
   When &lt;mr&gt; is specified, then the Map-Request is sent to the address.
   Otherwise, the Map-Request is sent to a configured Map-Resolver.
   When a Map-Resolver is not configured then the Map-Request is sent on
   the ALT network if the local router is attached to the ALT.  When
   "count &lt;1-5&gt;" is specified, 1, 2, 3, 4, or 5 Map-Requests are sent.

   Some sample output:

     titanium-dino# lig titanium-dmm.lisp4.net
     Send map-request to 10.0.0.1 for 192.168.1.1 ...
     Received map-reply from 10.0.0.2 with rtt 0.081468 secs

     Map-cache entry for titanium-dmm.lisp4.net EID 192.168.1.1:
     192.168.1.0/24, uptime: 13:59:59, expires: 23:59:58,
                     via map-reply, auth
       Locator          Uptime    State  Priority/Weight  Packets In/Out
       10.0.0.2         13:59:59  up     1/100            0/14

   Using lig to "lig yourself" is accomplished with the following
   syntax:

       lig {self | self6} [source &lt;source-eid&gt;] [to &lt;mr&gt;] [count &lt;1-5&gt;]

   Use this command for a simple way to see if the site is registered
   with the mapping database system.  The destination-EID address for
   the Map-Request will be the first configured EID-prefix for the site
   (with the host-bits set to 0).  For example, if the site's EID-prefix
   is 192.168.1.0/24, the destination-EID for the Map-Request is
   192.168.1.0.  The source-EID address for the Map-Request will also be
   192.168.1.0 (in this example) and the Map-Request is sent to the
   configured Map-Resolver.  If the Map-Resolver and Map-Server are the
   same LISP system, then the "lig self" is testing if the Map-Resolver
   can "turn back a Map-Request to the site".  If another Map-Resolver
   is used, it can test that the site's EID-prefix has been injected
   into the ALT infrastructure in which case the lig Map-Request is
   processed by the Map-Resolver, propagated through each ALT router hop
   to the site's registered Map-Server.  Then the Map-Server returns the
   Map-Request to originating site.  In which case, an xTR at the
   originating site sends a Map-Reply to the source of the Map-Request
   (could be itself or another xTR for the site).  All other command
   parameters are described above.  Using "lig self6" tests for
   registering of IPv6 EID- prefixes.

   Some sample output for ligging yourself:

     rutile# lig self
     Send loopback map-request to 10.0.0.1 for 192.168.2.0 ...
     Received map-reply from 10.0.0.3 with rtt 0.001592 secs

     Map-cache entry for EID 192.168.2.0:
     192.168.2.0/24, uptime: 00:00:02, expires: 23:59:57
                     via map-reply, self
       Locator       Uptime    State  Priority/Weight  Packets In/Out
       10.0.0.3      00:00:02  up     1/100            0/0

     titanium-simlo# lig self6
     Send loopback map-request to 10.0.0.1 for 192:168:1:: ...
     Received map-reply from 10::1 with rtt 0.044372 secs

     Map-cache entry for EID 192:168:1:::
     192:168:1::/48, uptime: 00:00:01, expires: 23:59:58
                        via map-reply, self
       Locator          Uptime    State  Priority/Weight  Packets In/Out
       10.0.0.3         00:00:01  up     1/100            0/0
       10::1            00:00:01  up     2/0              0/0

5.2.  Public Domain Host Implementation

   There is a public domain implementation that can run on any x86 based
   system.  The only requirement is that the system that initiates lig
   must have an address assigned from the locator namespace.

       lig [-d] &lt;eid&gt; -m &lt;map-resolver&gt; [-c &lt;count&gt;] [-t &lt;timeout&gt;]

   Parameter description:

   -d:  prints additional protocol debug output.

   &lt;eid&gt;:  is the destination EID or FQDN of a LISP host.

   -m &lt;map-resolver&gt;:  is the RLOC address or FQDN of a Map-Resolver.

   -c &lt;count&gt;:  the number of Map-Requests to send before the first Map-
      Reply is returned.  The default value is 3.  The range is from 1
      to 5.

   -t &lt;timeout&gt;:  the amount of time, in seconds, before another Map-
      Request is sent when no Map-Reply is returned.  The default value
      is 2 seconds.  The range is from 1 to 5.

   Some sample output:

     % lig titanium-test.lisp4.net -m 10.0.0.1
     Send map-request to 10.0.0.1 for 192.168.1.1 ...
     Received map-reply from 10.0.0.2 with rtt 0.04000 sec

     Mapping entry for EID 192.168.1.1:
     192.168.1.0/24, record ttl: 60
      Locator           State     Priority/Weight
      10.0.0.1          up        1/25
      10.0.0.2          up        1/25
      10.0.0.3          up        1/25
      10.0.0.4          up        2/25

   The public domain implementation of lig is available at
   <STRIKE><FONT color="red">sourceforge.net.</FONT></STRIKE>
   <STRONG><FONT color="green">http://github.com/davidmeyer/lig.</FONT></STRONG>

6.  Testing the ALT

   There are cases where a Map-Reply is returned from a lig request but
   the user doesn't really know how much of the mapping infrastructure
   was tested.  There are two cases to consider, avoiding the ALT and
   traversing the ALT.

   When an ITR sends a lig request to its Map-Resolver for a
   destination-EID, the Map-Resolver could also be configured as a Map-
   Server.  And if the destination-EID is for a site that registers with
   this Map-Server, the Map-Request is sent to the site directly without
   testing the ALT.  This occurs because the Map-Server is the source of
   the advertisement for the site's EID-prefix.  So if the map-reply is
   returned to the lig requesting site, you cannot be sure that other
   sites can reach the same destination-EID.

   If a Map-Resolver is used that is not a Map-Server for the EID-prefix
   being sought, then the ALT infrastructure can be tested.  This test
   case is testing the functionality of the Map-Resolver, traversal of
   the ALT (testing BGP-over-GRE), and the Map-Server.

   It is recommended that users issue 2 lig requests, each which send
   Map-Requests to different Map-Resolvers.

   The network can have a LISP-ALT router deployed as a "ALT looking-
   glass" node.  This type of router has BGP peering sessions with other
   ALT routers where it does not inject any EID-prefixes into the ALT
   but just learns ones advertised by other ALT routers and Map-Servers.
   This router is configured as a Map-Resolver.  Lig users can point to
   the ALT looking-glass router for Map-Resolver services via the "to
   &lt;map-resolver&gt;" parameter on the lig command.  The ALT looking-glass
   node can be used to lig other sites as well as your own site.  When
   the ALT looking-glass is used as a Map-Resolver, you can be assured
   the ALT network is being tested.

7.  Future Enhancements

   When negative Map-Replies have been further developed and
   implemented, lig should be modified appropriately to process and
   clearly indicate how and why a negative Map-Reply was received.
   Negative Map-Replies could be sent in the following cases, the lig
   request was initiated for a non-EID address or the Map-Request
   initiated by lig request is being rejected due to rate-limiting on
   the replier.

8.  <STRONG><FONT color="green">Deployed Network Diagnostic Tools

   There is an web-based interface to do auto-polling with lig on the
   back-end for most of the LISP sites on the LISP test network.  The
   web-page can be accessed at http://www.lisp4.net/status.

   There is a LISP site monitoring web-based interface that can be found
   at http://www.lisp4.net/lisp-site.

   At http://baldomar.ccaba.upc.edu/lispmon, written by the folks at
   UPC, shows a geographical map indicating where each LISP site
   resides.

9.</FONT></STRONG>  Security Considerations

   The use of lig does not affect the security of the LISP
   infrastructure as it is simply a tool that facilities diagnostic
   querying.  See [LISP], [ALT], and [LISP-MS] for descriptions of the
   security properties of the LISP infrastructure.

<STRIKE><FONT color="red">9.</FONT></STRIKE>

<STRONG><FONT color="green">10.</FONT></STRONG>  References

<STRIKE><FONT color="red">9.1.</FONT></STRIKE>

<STRONG><FONT color="green">10.1.</FONT></STRONG>  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

<STRIKE><FONT color="red">9.2.</FONT></STRIKE>

<STRONG><FONT color="green">10.2.</FONT></STRONG>  Informative References

   [ALT]      Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "LISP
              Alternative Topology (LISP-ALT)",
              <STRIKE><FONT color="red">draft-fuller-lisp-alt-03.txt</FONT></STRIKE>
              <STRONG><FONT color="green">draft-ietfr-lisp-alt-03.txt</FONT></STRONG> (work in progress),
              February <STRIKE><FONT color="red">2009.</FONT></STRIKE> <STRONG><FONT color="green">2010.</FONT></STRONG>

   [CONS]     Farinacci, D., Fuller, V., and D. Meyer, "LISP-CONS: A
              Content distribution Overlay Network  Service for LISP",
              draft-meyer-lisp-cons-03.txt (work in progress),
              November 2007.

   [LISP]     Farinacci, D., Fuller, V., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol (LISP)",
              <STRIKE><FONT color="red">draft-farinacci-lisp-12.txt</FONT></STRIKE>
              <STRONG><FONT color="green">draft-ietf-lisp-06.txt</FONT></STRONG> (work in progress),
              <STRIKE><FONT color="red">March 2009.</FONT></STRIKE> <STRONG><FONT color="green">January 2010.</FONT></STRONG>

   [LISP-MS]  Farinacci, D. and V. Fuller, "LISP Map Server",
              <STRIKE><FONT color="red">draft-fuller-lisp-ms-00.txt</FONT></STRIKE>
              <STRONG><FONT color="green">draft-ietf-lisp-ms-04.txt</FONT></STRONG> (work in progress),
              <STRIKE><FONT color="red">March</FONT></STRIKE>
              <STRONG><FONT color="green">October</FONT></STRONG> 2009.

   [NERD]     Lear, E., "NERD: A Not-so-novel EID to RLOC Database",
              draft-lear-lisp-nerd-04.txt (work in progress),
              April 2008.

Appendix A.  Acknowledgments

   Thanks and kudos to John Zwiebel, Andrew Partan, Darrel Lewis, and
   Vince Fuller for providing critical feedback on the lig design and
   prototype implementations.  These folks as well as all the people on
   lisp-beta@external.cisco.com who tested lig functionality and
   continue to do so, we extend our sincere thanks.

Authors' Addresses

   Dino Farinacci
   cisco Systems
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: dino@cisco.com

   Dave Meyer
   cisco Systems
   170 Tasman Drive
   San Jose, CA
   USA

   Email: dmm@cisco.com
</PRE>

</BODY></HTML>
--Apple-Mail-2--332133380
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed
Content-Transfer-Encoding: 7bit



--Apple-Mail-2--332133380--

From darlewis@cisco.com  Fri Feb 12 15:15:38 2010
Return-Path: <darlewis@cisco.com>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 552733A790F for <lisp@core3.amsl.com>; Fri, 12 Feb 2010 15:15:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.032
X-Spam-Level: 
X-Spam-Status: No, score=-6.032 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_39=0.6, MANGLED_SAVELE=2.3, RCVD_IN_DNSWL_HI=-8, SARE_HTML_SINGLETS=1.666]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qQ8+sK+Nr0EL for <lisp@core3.amsl.com>; Fri, 12 Feb 2010 15:15:31 -0800 (PST)
Received: from sj-iport-5.cisco.com (sj-iport-5.cisco.com [171.68.10.87]) by core3.amsl.com (Postfix) with ESMTP id 990DD3A67D1 for <lisp@ietf.org>; Fri, 12 Feb 2010 15:15:31 -0800 (PST)
Authentication-Results: sj-iport-5.cisco.com; dkim=neutral (message not signed) header.i=none
X-Files: draft-ietf-lisp-Interworking-00-to-01-diff.html, draft-ietf-lisp-interworking-01.txt : 61649, 47428
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAP5vdUurRN+J/2dsb2JhbACbDnSnRoo8jRCCVIIEBIMT
X-IronPort-AV: E=Sophos;i="4.49,463,1262563200";  d="txt'?html'217?scan'217,208,217";a="150755415"
Received: from sj-core-3.cisco.com ([171.68.223.137]) by sj-iport-5.cisco.com with ESMTP; 12 Feb 2010 23:16:50 +0000
Received: from [10.21.74.176] ([10.21.74.176]) by sj-core-3.cisco.com (8.13.8/8.14.3) with ESMTP id o1CNGohV001967 for <lisp@ietf.org>; Fri, 12 Feb 2010 23:16:50 GMT
From: Darrel Lewis <darlewis@cisco.com>
Content-Type: multipart/mixed; boundary=Apple-Mail-6--53398945
Date: Fri, 12 Feb 2010 15:16:49 -0800
Message-Id: <5D6E81D4-77A1-4A20-B8AD-664F9316A969@cisco.com>
To: lisp@ietf.org
Mime-Version: 1.0 (Apple Message framework v1077)
X-Mailer: Apple Mail (2.1077)
Subject: [lisp] Proposed draft-ietf-lisp-interworking-01 draft
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Feb 2010 23:15:38 -0000

--Apple-Mail-6--53398945
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


Here is an updated version of the LISP Interworking specification that =
I'd like to
publish to the Internet Drafts repository.

The main addition to the draft is a the introduction of an optional =
network element called the "Proxy Egress Tunnel Router" or PETR.  =20

Both html diffs and the full text of the new draft are attached.

Comments appreciated.  I'd like to get this posted next Friday (by
Feb 22nd).

-Darrel
	(for the other Interworking authors: Dino, Dave, and Vince)


--Apple-Mail-6--53398945
Content-Disposition: attachment;
	filename=draft-ietf-lisp-Interworking-00-to-01-diff.html
Content-Type: text/html;
	name="draft-ietf-lisp-Interworking-00-to-01-diff.html"
Content-Transfer-Encoding: 7bit

<html><head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<title>wdiff draft-ietf-lisp-interworking-00.txt draft-ietf-lisp-interworking-01.txt</title></head><body>
<pre>
Network Working Group                                           D. Lewis
Internet-Draft                                                  D. Meyer
Intended status: Experimental                               D. Farinacci
Expires: <strike><font color="red">November 27, 2009</font></strike> <strong><font color="green">August 16, 2010</font></strong>                                       V. Fuller
                                                     Cisco Systems, Inc.
                                                            <strike><font color="red">May 26, 2009</font></strike>
                                                       <strong><font color="green">February 12, 2010</font></strong>

                  Interworking LISP with IPv4 and IPv6
                    <strike><font color="red">draft-ietf-lisp-interworking-00</font></strike>
                  <strong><font color="green">draft-ietf-lisp-interworking-01.txt

Abstract

   This document describes techniques for allowing sites running the
   Locator/ID Separation Protocol (LISP [LISP]) to interoperate with
   Internet sites (using either IPv4, IPv6, or both) which are not
   running LISP.  A fundamental property of LISP speaking sites is that
   they use Endpoint Identifiers (EIDs), rather than traditional IP
   addresses, in the source and destination fields of all traffic they
   emit or receive.  While EIDs are syntactically identical to IPv4 or
   IPv6 addresses, routes for them are not carried in the global routing
   system so an interoperability mechanism is needed for non-LISP-
   speaking sites to exchange traffic with LISP-speaking sites.  This
   document introduces three such mechanisms: the first uses a new
   network element, the LISP Proxy Ingress Tunnel Routers (PITR)
   (Section 5) to act as a intermediate LISP Ingress Tunnel Router (ITR)
   for non-LISP-speaking hosts while the second adds Network Address
   Translation (NAT) functionality to LISP Ingress and LISP Egress
   Tunnel Routers (xTRs) to substitute routable IP addresses for non-
   routable EIDs.  Finally, this document introduces a Proxy Egress
   Tunnel Router (PETR) to solve cases where a LISP site cannot send a
   packet which has as its source address a non-routable EID</font></strong>

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."
   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on <strike><font color="red">November 27, 2009.</font></strike> <strong><font color="green">August 16, 2010.</font></strong>

Copyright Notice

   Copyright (c) <strike><font color="red">2009</font></strike> <strong><font color="green">2010</font></strong> IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   <strong><font color="green">(http://trustee.ietf.org/license-info)</font></strong> in effect on the date of
   publication of this <strike><font color="red">document (http://trustee.ietf.org/license-info).</font></strike> <strong><font color="green">document.</font></strong>  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.

<strike><font color="red">Abstract

   This</font></strike>  <strong><font color="green">Code Components extracted from this</font></strong> document <strike><font color="red">describes techniques for allowing sites running the
   Locator/ID Separation Protocol (LISP [LISP]) to interoperate with
   Internet sites not running LISP.  A fundamental property of LISP-
   speaking sites is that they use Endpoint Identifiers (EIDs), rather
   than traditional IP addresses,</font></strike> <strong><font color="green">must
   include Simplified BSD License text as described</font></strong> in <strong><font color="green">Section 4.e of</font></strong>
   the <strike><font color="red">source</font></strike> <strong><font color="green">Trust Legal Provisions</font></strong> and <strike><font color="red">destination fields
   of all traffic they emit or receive.  While EIDs</font></strike> are <strike><font color="red">syntactically
   identical to IP addresses, routes for them are not carried in the
   global routing system so an interoperability mechanism is needed for
   non-LISP-speaking sites to exchange traffic with LISP-speaking sites.
   This document introduces two such mechanisms: the first uses a new
   network element, the LISP Proxy Tunnel Router (PTR) (Section 5) to
   act</font></strike> <strong><font color="green">provided without warranty</font></strong> as <strike><font color="red">a intermediate LISP Ingress Tunnel Router (ITR) for non-LISP-
   speaking hosts while</font></strike>
   <strong><font color="green">described in</font></strong> the <strike><font color="red">second adds Network Address Translation
   (NAT) functionality to LISP Ingress and LISP Egress Tunnel Routers
   (xTRs) to substitute routable IP addresses for non-routable EIDs.</font></strike> <strong><font color="green">BSD License.</font></strong>

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">3</font></strike>  <strong><font color="green">4</font></strong>
   2.  LISP Interworking Models . . . . . . . . . . . . . . . . . . .  <strike><font color="red">3</font></strike>  <strong><font color="green">6</font></strong>
   3.  Definition of Terms  . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">5</font></strike>  <strong><font color="green">8</font></strong>
   4.  Routable EIDs  . . . . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">6
     4.1.</font></strike> <strong><font color="green">11
   5.</font></strong>  Impact on Routing Table  . . . . . . . . . . . . . . . . .  <strike><font color="red">6
     4.2.</font></strike> <strong><font color="green">. . 12
   6.</font></strong>  Requirement for using BGP  . . . . . . . . . . . . . . . .  <strike><font color="red">6
     4.3.</font></strike> <strong><font color="green">. . 13
   7.</font></strong>  Limiting the Impact of Routable EIDs . . . . . . . . . . .  <strike><font color="red">6
     4.4.</font></strike> <strong><font color="green">. . 14
   8.</font></strong>  Use of Routable EIDs for Testing LISP  . . . . . . . . . .  <strike><font color="red">7
   5.</font></strike> <strong><font color="green">. . 15
   9.</font></strong>  Proxy <strong><font color="green">Ingress</font></strong> Tunnel Routers . . . . . . . . . . . . . . . . . <strike><font color="red">. . . .  7
     5.1.  PTR</font></strike> <strong><font color="green">16
   10. PITR</font></strong> EID announcements . . . . . . . . . . . . . . . . . .  <strike><font color="red">7
     5.2.</font></strike> <strong><font color="green">. . 17
   11.</font></strong> Packet Flow with <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> . . . . . . . . . . . . . . . . . .  <strike><font color="red">8
     5.3.</font></strike> <strong><font color="green">. . 18
   12.</font></strong> Scaling <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong>  . . . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">9
     5.4.</font></strike> <strong><font color="green">. 20
   13.</font></strong> Impact of the <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> placement in the network . . . . . . .  <strike><font color="red">9
     5.5.</font></strike> <strong><font color="green">. . 21
   14.</font></strong> Benefit to Networks Deploying <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong>  . . . . . . . . . . . .  <strike><font color="red">9
   6.</font></strike> <strong><font color="green">. 22
   15.</font></strong> LISP-NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">10
     6.1.</font></strike> <strong><font color="green">23
     15.1.</font></strong>  LISP-NAT for LISP-NR addressed hosts  . . . . . . . . . . <strike><font color="red">. 10
     6.2.</font></strike> <strong><font color="green">23
     15.2.</font></strong>  LISP Sites with Hosts using RFC 1918 Addresses
            Sending to non-LISP Sites . . . . . . . . . . . . . . . . <strike><font color="red">. . . . 11
     6.3.</font></strike> <strong><font color="green">24
     15.3.</font></strong>  LISP Sites with Hosts using RFC 1918 Addresses
            Communicating to Other LISP Sites . . . . . . . . . . . . <strike><font color="red">11
     6.4.</font></strike> <strong><font color="green">24
     15.4.</font></strong>  LISP-NAT and multiple EIDs  . . . . . . . . . . . . . . . <strike><font color="red">. 12
     6.5.</font></strike> <strong><font color="green">25
     15.5.  When</font></strong> LISP-NAT and <strike><font color="red">PTRs Together</font></strike> <strong><font color="green">PITRs used by the same LISP Site  . .</font></strong> . <strong><font color="green">25
   16. Proxy Egress Tunnel Routers</font></strong>  . . . . . . . . . . . . . . . <strike><font color="red">12
   7.</font></strike> <strong><font color="green">. . 27
     16.1.  Packet Flow with Proxy Egress Tunnel Routers  . . . . . . 27
   17. Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs
       (PETRs)  . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
   18. How Proxy-ITRs and Proxy-ETRs Interact . . . . . . . . . . . . 30
   19.</font></strong> Security Considerations  . . . . . . . . . . . . . . . . . . . <strike><font color="red">13
   8.</font></strike> <strong><font color="green">31
   20.</font></strong> Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">13
   9.</font></strike> <strong><font color="green">32
   21.</font></strong> IANA Considerations  . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">14
   10.</font></strike> <strong><font color="green">33
   22.</font></strong> References . . . . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">14
     10.1.</font></strike> <strong><font color="green">34
     22.1.</font></strong>  Normative References  . . . . . . . . . . . . . . . . . . <strike><font color="red">. 14
     10.2.</font></strike> <strong><font color="green">34
     22.2.</font></strong>  Informative References  . . . . . . . . . . . . . . . . . <strike><font color="red">. 14</font></strike> <strong><font color="green">34</font></strong>
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">14</font></strike> <strong><font color="green">35</font></strong>

1.  Introduction

   This document describes two mechanisms for interoperation between
   LISP [LISP] sites, which use non-globally-routed EIDs, and non-LISP
   sites: use of <strike><font color="red">PTRs,</font></strike> <strong><font color="green">PITRs,</font></strong> which create highly-aggregated routes to EID
   prefixes for non-LISP sites to <strike><font color="red">follow; and the</font></strike> <strong><font color="green">follow.  The</font></strong> use of NAT by LISP ETRs
   when communicating with non-LISP hosts.  <strong><font color="green">And finally the use of Proxy
   Egress Tunnel routers (PETRs) LISP for sites relying on PITRs and
   which are faced with certain restrictions.</font></strong>

   A key behavior of the separation of Locators and End-Point-IDs is
   that EID prefixes are not advertised to the Internet's Default Free
   Zone (DFZ).  Specifically, only RLOCs are carried in the Internet's
   DFZ.  Existing Internet sites (and their hosts) who do not
   participate in the LISP system must still be able to reach sites
   numbered from this non routed EID space.  This draft describes a set
   of mechanisms that can be used to provide reachability between sites
   that are LISP-capable and those that are not.  This document
   introduces <strike><font color="red">two</font></strike> <strong><font color="green">three</font></strong> such <strike><font color="red">mechanisms: the</font></strike> <strong><font color="green">mechanisms.  The</font></strong> first uses a new network
   element, the LISP Proxy <strong><font color="green">Ingress</font></strong> Tunnel Router <strike><font color="red">(PTR)</font></strike> <strong><font color="green">(PITR)</font></strong> (Section 5) to
   act as a intermediate LISP Ingress Tunnel Router (ITR) for <strike><font color="red">non-LISP-speaking
   hosts while the</font></strike> <strong><font color="green">non-LISP-
   speaking hosts.  The</font></strong> second adds a form of Network Address
   Translation (NAT) functionality to Tunnel Routers (xTRs) to
   substitute routable IP addresses for non-routable EIDs.  <strong><font color="green">The final
   network element is the LISP Proxy Egress Tunnel Routers (PETR), which
   act as an intermediate Egress Tunnel Router (ETR) for LISP sites who
   are using PITRs but need assistance in reaching non-LISP sites.</font></strong>

   More detailed descriptions of these mechanisms and the network
   elements involved may be found in the following sections:

   - Section 2 describes the different cases where interworking
   mechanisms are needed

   - Section 3 defines terms used throughout the document

   - Section 4 describes the relationship between the new EID prefix
   space and the IP address space used by the current Internet

   - Section 5 introduces and describes the operation of <strike><font color="red">PTRs</font></strike> <strong><font color="green">Proxy-ITRs</font></strong>

   - Section 6 defines how NAT is used by ETRs to translate non-routable
   EIDs into routable IP addresses.

   <strong><font color="green">- Section 7 introduces and describes the operations of Proxy-ETRs

   - Section 8 describes the relationship between asymmetric and
   Symmetric interworking mechanisms (Proxy-ITRs and Proxy-ETRs vs LISP-
   NAT)</font></strong>

   Note that any successful interworking model should be independent of
   any particular EID-to-RLOC mapping algorithm.  This document does not
   comment on the value of any of the particular <strong><font color="green">LISP</font></strong> mapping <strike><font color="red">system.</font></strike> <strong><font color="green">systems.</font></strong>

2.  LISP Interworking Models

   There are 4 unicast connectivity cases which describe how sites can
   communicate with each other:

   1.  Non-LISP site to Non-LISP site

   2.  LISP site to LISP site

   3.  LISP site to Non-LISP site

   4.  Non-LISP site to LISP site

   Note that while Cases 3 and 4 seem similar, there are subtle
   differences due to the way communications are originated.

   The first case is the Internet as we know it today and as such will
   not be discussed further here.  The second case is documented in
   [LISP] and, hence, there are no new interworking requirements because
   there are no new protocol requirements placed on intermediate non-
   LISP routers.

   In case 3, LISP site to Non-LISP site, a LISP site can <strong><font color="green">(in most
   cases)</font></strong> send packets to a non-LISP site because the non-LISP site
   prefixes are routable.  The non-LISP site need not do anything new to
   receive packets.  The only action the LISP site needs <strong><font color="green">(with two
   possible caveats introduced below)</font></strong> to take is to know when not to <strike><font color="red">LISP-
   encapsulate</font></strike>
   <strong><font color="green">LISP-encapsulate</font></strong> packets.  This can be achieved via two mechanisms:

   1.  At the ITR in the source site, if the destination of an IP packet
       is found to match a prefix from the BGP routing table, then the
       site is directly reachable by the BGP core that exists and
       operates today.

   2.  Second, if (from the perspective of the ITR at the source site)
       the destination address of an IP address is not found in the EID-
       to-RLOC mapping database, the ITR could infer that it is not a
       LISP-capable site, and decide to not LISP-encapsulate the packet.

   <strong><font color="green">3.  There are two potential caveats involved with Case 3, where there
       could be some situations where (unencapsualted) packets
       originated by a LISP site may not be forwarded to a non-LISP
       site.  One of these caveats (uRPF check failure) are detailed in
       Section 9 (Security Considerations).  The second caveat (protocol
       traversal) is reviewed in section 7, (Proxy-Egress Tunnel
       Routers).</font></strong>

   Case 4, <strong><font color="green">typically</font></strong> the most challenging, occurs when a host at a <strike><font color="red">non-LISP</font></strike> <strong><font color="green">non-
   LISP</font></strong> site wishes to send traffic to a host at a LISP site.  If the
   source host uses a (non-globally-routable) EID as the destination IP
   address, the packet is forwarded inside the source site until it
   reaches a router which cannot forward it, at which point the traffic
   is dropped.  For traffic not to be dropped, either some route must be
   exist for the destination EID outside of LISP-speaking part of the
   network or an alternate mechanism must be in place.  Section 5 <strike><font color="red">(PTRs)</font></strike>
   <strong><font color="green">(PITRs)</font></strong> and Section 6 (LISP-NAT) describe two such mechanisms.

   Note that case 4 includes packets returning to the LISP Site in case
   3.

3.  Definition of Terms

   Endpoint ID (EID):  <strong><font color="green">Endpoint ID (EID):</font></strong> A <strike><font color="red">32-</font></strike> <strong><font color="green">32-bit (for IPv4)</font></strong> or 128-bit
      <strong><font color="green">(for IPv6)</font></strong> value used in the source and destination <strong><font color="green">address</font></strong> fields
      of the first (most inner) LISP header of a packet.  <strike><font color="red">A packet that is emitted by</font></strike>  <strong><font color="green">The host
      obtains</font></strong> a <strike><font color="red">system contains EIDs in its
      headers and LISP headers are prepended only when</font></strike> <strong><font color="green">destination EID</font></strong> the <strike><font color="red">packet
      reaches</font></strike> <strong><font color="green">same way it obtains</font></strong> an <strike><font color="red">Ingress Tunnel Router (ITR) on the data path to the</font></strike> destination <strike><font color="red">EID.

   EID-Prefix Aggregate:  A set of EID-prefixes said</font></strike>
      <strong><font color="green">address today, for example through a DNS lookup or SIP exchange.
      The source EID is obtained via existing mechanisms used</font></strong> to <strike><font color="red">be aggregatable
      in the [RFC4632] sense.  That is, an EID-Prefix aggregate</font></strike> <strong><font color="green">set a
      host's "local" IP address.  An EID</font></strong> is
      <strike><font color="red">defined</font></strike> <strong><font color="green">allocated</font></strong> to <strike><font color="red">be</font></strike> a <strike><font color="red">single contiguous power-of-two</font></strike> <strong><font color="green">host from an</font></strong>
      EID-prefix <strike><font color="red">block.
      Such a</font></strike> block <strong><font color="green">associated with the site where the host</font></strong> is <strike><font color="red">characterized</font></strike>
      <strong><font color="green">located.  An EID can be used</font></strong> by a <strike><font color="red">prefix and</font></strike> <strong><font color="green">host to refer to other hosts.
      EIDs MUST NOT be used as LISP RLOCs.  Note that EID blocks may be
      assigned in</font></strong> a <strike><font color="red">length.

   Routing Locator (RLOC):  An IP address</font></strike> <strong><font color="green">hierarchical manner, independent</font></strong> of <strike><font color="red">a LISP tunnel router.  It
      is</font></strike> the <strike><font color="red">output</font></strike> <strong><font color="green">network
      topology, to facilitate scaling</font></strong> of <strike><font color="red">a</font></strike> <strong><font color="green">the mapping database.  In
      addition, an EID block assigned to a site may have site-local
      structure (subnetting) for routing within the site; this structure
      is not visible to the global routing system.  When used in
      discussions with other Locator/ID separation proposals, a LISP EID
      will be called a "LEID".  Throughout this document, any references
      to "EID" refers to an LEID.

   EID-Prefix:  EID-prefix: A power-of-2 block of EIDs which are
      allocated to a site by an address allocation authority.  EID-
      prefixes are associated with a set of RLOC addresses which make up
      a "database mapping".  EID-prefix allocations can be broken up
      into smaller blocks when an RLOC set is to be associated with the
      smaller EID- prefix.  A globally routed address block (whether PI
      or PA) is not an EID-prefix.  However, a globally routed address
      block may be removed from global routing and reused as an EID-
      prefix.  A site that receives an explicitly allocated EID-prefix
      may not use that EID-prefix as a globally routed prefix assigned
      to RLOCs

   EID-Prefix Aggregate:  A set of EID-prefixes said to be aggregatable
      in the [RFC4632] sense.  That is, an EID-Prefix aggregate is
      defined to be a single contiguous power-of-two EID-prefix block.
      Such a block is characterized by a prefix and a length.  Provider
      Independent (PI) Addresses: an address block assigned from a pool
      where blocks are not associated with any particular location in
      the network (e.g. from a particular service provider), and is
      therefore not topologically aggregatable in the routing system.

   Routing Locator (RLOC):  The IPv4 or IPv6 address of an egress tunnel
      router (ETR).  It is the output of a</font></strong> EID-to-RLOC mapping lookup.
      An EID maps to one or more RLOCs.  Typically, RLOCs are numbered
      from <strike><font color="red">topologically-
      aggregatable</font></strike> <strong><font color="green">topologically-aggregatable</font></strong> blocks <strike><font color="red">and</font></strike> <strong><font color="green">that</font></strong> are assigned to a site
      at each point to which it attaches to the global Internet; where
      the topology is defined by the connectivity of provider networks,
      RLOCs can be thought of as <strike><font color="red">Provider Aggregatable (PA)</font></strike> <strong><font color="green">PA</font></strong> addresses.  <strong><font color="green">Multiple RLOCs can be
      assigned to the same ETR device or to multiple ETR devices at a
      site.</font></strong>

   EID-to-RLOC Mapping:  A binding between an EID and the RLOC-set that
      can be used to reach the EID.  We use the term "mapping" in this
      document to refer to a EID-to-RLOC mapping.

   EID Prefix Reachability:  An EID prefix is said to be "reachable" if
      one or more of its locators are reachable.  That is, an EID prefix
      is reachable if the ETR (or its proxy) is reachable.

   Default Mapping:  A Default Mapping is a mapping entry for EID-prefix
      0.0.0.0/0.  It maps to a locator-set used for all EIDs in the
      Internet.  If there is a more specific EID-prefix in the mapping
      cache it overrides the Default Mapping entry.  The Default Mapping
      route can be learned by configuration or from a Map-Reply message
      [LISP].

   LISP Routable (LISP-R) Site:  A LISP site whose addresses are used as
      both globally routable IP addresses and LISP EIDs.

   LISP Non-Routable (LISP-NR) Site:  A LISP site whose addresses are
      EIDs only, these EIDs are not found in the legacy Internet routing
      table.

   LISP Proxy <strong><font color="green">Ingress</font></strong> Tunnel Router <strike><font color="red">(PTR):  PTRs</font></strike> <strong><font color="green">(PITR):  PITRs</font></strong> are used to provide
      interconnectivity between sites which use LISP EIDs and those
      which do not.  They act as a gateway between the Legacy Internet
      and the LISP enabled Network.  A given <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> advertises one or more
      highly aggregated EID prefixes into the public Internet and acts
      as the ITR for traffic received from the public Internet.  LISP
      Proxy <strong><font color="green">Ingress</font></strong> Tunnel Routers are described in Section <strike><font color="red">5.</font></strike> <strong><font color="green">9.</font></strong>

   LISP Network Address Translation (LISP-NAT):  Network Address
      Translation between EID space assigned to a site and RLOC space
      also assigned to that site.  LISP Network Address Translation is
      described in Section <strike><font color="red">6.

    EID Sub Namespace:  A power-of-two block of aggregatable locators
      set aside for</font></strike> <strong><font color="green">15.</font></strong>

   LISP <strike><font color="red">interworking.

4.</font></strike> <strong><font color="green">Proxy Egress Tunnel Router (PETR):  PETRs are used to provide a
      LISP site's ITRs the ability to send traffic to non-LISP sites in
      cases where unencapsualted packets (the default mechanism) would
      fail to be delivered.  PETRs are implemented by having an ITR
      encapsulate all non-LISP destined traffic to a pre-configured
      PETR.  LISP Proxy Egress Tunnel Routers are described in
      Section 16.

    EID Sub Namespace:  A power-of-two block of aggregatable locators
      set aside for LISP interworking.

4.</font></strong>  Routable EIDs

   An obvious way to achieve interworking between LISP and non-LISP
   hosts is to simply announce EID prefixes into the DFZ, much like
   routing system, effectively treating them as "Provider Independent
   (PI)" prefixes.  Doing this is undesirable as it defeats one of the
   primary goals of LISP - to reduce global routing system state.

<strike><font color="red">4.1.</font></strike>

<strong><font color="green">5.</font></strong>  Impact on Routing Table

   If EID prefixes are announced into the DFZ, the impact is similar to
   the case in which LISP has not been deployed, because these EID
   prefixes will be no more aggregatable than existing PI addressing.
   This behavior is not desirable and such a mechanism is not viewed as
   a viable long term solution.

<strike><font color="red">4.2.</font></strike>

<strong><font color="green">6.</font></strong>  Requirement for using BGP

   Non-LISP sites today use BGP to, among other things, enable ingress
   traffic engineering.  Relaxing this requirement is another primary
   design goal of LISP.

<strike><font color="red">4.3.</font></strike>

<strong><font color="green">7.</font></strong>  Limiting the Impact of Routable EIDs

   Two schemes are proposed to limit the impact of having EIDs announced
   in the current global Internet routing table:

   <strong><font color="green">1.</font></strong>  Section <strike><font color="red">5</font></strike> <strong><font color="green">9</font></strong> discusses the LISP Proxy Tunnel Router, an approach
       that provides ITR functionality to bridge LISP-capable and <strike><font color="red">non-LISP-
      capable</font></strike> <strong><font color="green">non-
       LISP-capable</font></strong> sites.

   <strong><font color="green">2.</font></strong>  Section <strike><font color="red">6</font></strike> <strong><font color="green">15</font></strong> discusses another approach, LISP-NAT, in which NAT
       [RFC2993] is combined with ITR functionality to limit the the
       impact of routable EIDs on the Internet routing infrastructure.

<strike><font color="red">4.4.</font></strike>

<strong><font color="green">8.</font></strong>  Use of Routable EIDs for Testing LISP

   A primary design goal for LISP (and other Locator/ID separation
   proposals) is to facilitate topological aggregation of addresses and,
   thus, decrease global routing system state.  Another goal is to
   achieve the benefits of improved aggregation as soon as possible.
   <strike><font color="red">Advertising</font></strike>
   <strong><font color="green">Sites advertising</font></strong> routes for LISP EID prefixes into the global
   routing system is therefore not recommended.

   That being said, <strong><font color="green">single homed</font></strong> sites <strong><font color="green">(or multi-homed sites that are
   not leaking more specific exceptions) and</font></strong> that are already using
   provider-aggregated prefixes can use these prefixes as LISP EIDs
   without adding state to the routing system; in other words, such
   sites do not cause additional prefixes to be advertised.  For such
   sites, connectivity to a non-LISP sites does not require interworking
   machinery because the "PA" EIDs are already <strike><font color="red">routable.

5.</font></strike> <strong><font color="green">routable (they are
   effectively LISP-R type sites).  Their EIDs are found in the LISP
   mapping system, and their (aggregate) PA prefix(es) are found in the
   DFZ Internet.

   The continued announcements of an existing site's Provider
   Independent (or "PI") prefix(s) is of course under control of that
   site, and some period of transition where a site is is found both in
   the LISP mapping system and as a discrete prefix in the Internet
   routing system may be a viable transition strategy.  Care should be
   taken not to advertise additional more specific LISP EID prefixes
   into the DFZ.

9.</font></strong>  Proxy <strong><font color="green">Ingress</font></strong> Tunnel Routers

   Proxy <strong><font color="green">Ingress</font></strong> Tunnel Routers <strike><font color="red">(PTRs)</font></strike> <strong><font color="green">(PITRs)</font></strong> allow for non-LISP sites to
   communicate with LISP-NR sites.  A <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> is a new network element that
   shares many characteristics with the LISP ITR.  <strike><font color="red">PTRs</font></strike>  <strong><font color="green">PITRs</font></strong> allow non-LISP
   sites to send packets to LISP-NR sites without any changes to
   protocols or equipment at the non-LISP site.  <strike><font color="red">PTRs</font></strike>  <strong><font color="green">PITRs</font></strong> have two primary
   functions:

   Originating EID Advertisements:  <strike><font color="red">PTRs</font></strike>  <strong><font color="green">PITRs</font></strong> advertise highly aggregated
      EID-prefix space on behalf of LISP sites to so that non-LISP sites
      can reach them.

   Encapsulating Legacy Internet Traffic:  <strike><font color="red">PTRs</font></strike>  <strong><font color="green">PITRs</font></strong> also encapsulate non-
      LISP Internet traffic into LISP packets and route them towards
      their destination RLOCs.

<strike><font color="red">5.1.  PTR</font></strike>

<strong><font color="green">10.  PITR</font></strong> EID announcements

   A key part of <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> functionality is to advertise routes for highly-
   aggregated EID prefixes into part of the global routing system.
   Aggressive aggregation is performed to minimize the number of new
   announced routes.  In addition, careful placement of <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> can
   greatly reduce the scope of these new routes.  To this end, <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong>
   should be deployed close to non-LISP-speaking rather than close to
   LISP sites.  Such deployment not only limits the scope of EID-prefix
   route advertisements, it also also allows traffic forwarding load to
   be spread among many <strike><font color="red">PTRs.

5.2.</font></strike> <strong><font color="green">PITRs.

11.</font></strong>  Packet Flow with <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong>

   Packets from a non-LISP site can reach a LISP-NR site with the aid of
   a <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>  By advertising a route for a particular EID prefix into the
   global routing system, traffic destined for that EID prefix is routed
   to the <strike><font color="red">PTR,</font></strike> <strong><font color="green">PITR,</font></strong> which then performs LISP encapsulation.  Once
   encapsulated, traffic packets use the LISP (outer) header's
   destination address to reach the destination ETR.

   What follows is an example of the path a packet would take when using
   a <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>  In this example, the LISP-NR site is given the EID prefix
   240.0.0.0/24.  For the purposes of this example, this prefix and no
   covering aggregate is present in the global routing system.  In other
   words, if a packet with this destination were to reach a router in
   the "Default Free Zone", it would be dropped.

   A full protocol exchange example follows:

   1.  Source host makes a DNS lookup EID for destination, and gets
       240.1.1.1 in return.

   2.  Source host has a default route to customer Edge (CE) router and
       forwards the packet to the CE.

   3.  The CE has a default route to its Provider Edge (PE) router, and
       forwards the packet to the PE.

   4.  The PE has route to 240.0.0.0/24 and the next hop is the <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>

   5.  The <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> has or acquires a mapping for 240.1.1.1 and LISP
       encapsulates, the packet now has a destination address of the
       RLOC.  The source address of this encapsulated packet is the
       <strike><font color="red">PTR's</font></strike>
       <strong><font color="green">PITR's</font></strong> RLOC.

   6.  The <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> looks up the RLOC, and forwards LISP packet to the next
       hop.

   7.  The ETR decapsulates the packet and delivers the packet to the
       240.1.1.1 host in the destination LISP site.

   8.  Packets from host 240.1.1.1 will flow back through the LISP
       site's ITR.  Such packets are not encapsulated because the ITR
       knows that the destination (the original source) is a non-LISP
       site.  The ITR knows this because it can check the LISP mapping
       database for the destination EID, and on a failure determine that
       the destination site is not LISP enabled.

   9.  Packets are then routed natively and directly to the destination
       (original source) site.

   Note that in this example the return path is asymmetric, so return
   traffic will not go back through the <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>  This is because the
   LISP-NR site's ITR will discover that the originating site is not a
   LISP site, and not encapsulate the returning packet (see [LISP] for
   details of ITR behavior).

   The asymmetric nature of traffic flows allows the <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> to be
   relatively simple - it will only have to encapsulate LISP packets.

<strike><font color="red">5.3.</font></strike>

<strong><font color="green">12.</font></strong>  Scaling <strike><font color="red">PTRs

   PTRs</font></strike> <strong><font color="green">PITRs

   PITRs</font></strong> attract traffic by announcing the LISP EID namespace into parts
   of the non-LISP-speaking global routing system.  There are several
   ways that a network could control how traffic reaches a particular
   <strike><font color="red">PTR</font></strike>
   <strong><font color="green">PITR</font></strong> to prevent it from receiving more traffic than it can handle:

   First, the <strike><font color="red">PTR's</font></strike> <strong><font color="green">PITR's</font></strong> aggregate routes might be selectively announced,
   giving a coarse way to control the quantity of traffic attracted by
   that <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>

   Second, the same address might be announced by multiple <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> in
   order to share the traffic using IP Anycast.  The asymmetric nature
   of traffic flows allows the <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> to be relatively simple - it will
   only have to encapsulate LISP packets.

<strike><font color="red">5.4.</font></strike>

<strong><font color="green">13.</font></strong>  Impact of the <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> placement in the network

   There are several approaches that a network could take in placing
   <strike><font color="red">PTRs.</font></strike>
   <strong><font color="green">PITRs.</font></strong>  Placing the <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> near the ingress of traffic allows for the
   communication between the non-LISP site and the LISP site to have the
   least "stretch" (i.e. the least number of forwarding hops when
   compared to an optimal path between the sites).

   Some proposals, for example CRIO [CRIO], have suggested grouping <strike><font color="red">PTRs</font></strike>
   <strong><font color="green">PITRs</font></strong> near an arbitrary subset of ETRs and announcing a 'local'
   subset of EID space.  This model cannot guarantee minimum stretch if
   the EID prefix route advertisement points are changed (such a change
   might occur if a site adds, removes, or replaces one or more ISPs
   connections).

<strike><font color="red">5.5.</font></strike>

<strong><font color="green">14.</font></strong>  Benefit to Networks Deploying <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong>

   When traffic destined for LISP-NR site arrives and is encapsulated at
   a <strike><font color="red">PTR,</font></strike> <strong><font color="green">PITR,</font></strong> a new LISP packet header is pre-pended.  This causes the
   packet's destination to be set to the destination site RLOC.  Because
   traffic is thus routed towards RLOCs, it can potentially better
   follow the network's traffic engineering policies (such as closest
   exit routing).  This also means that providers who are not default-
   free and do not deploy <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> end up sending more traffic to expensive
   transit links rather than to RLOC addresses, to which they may have
   settlement-free peering.  For large transit providers, deploying <strike><font color="red">PTRs</font></strike>
   <strong><font color="green">PITRs</font></strong> may attract more traffic, and therefore more revenue, from
   their customers.

<strike><font color="red">6.</font></strike>

<strong><font color="green">15.</font></strong>  LISP-NAT

   LISP Network Address Translation (LISP-NAT) is a limited form of NAT
   [RFC2993].  LISP-NAT is designed to enable the interworking of non-
   LISP sites and LISP-NR sites by ensuring that the LISP-NR's site
   addresses are always routable.  LISP-NAT accomplishes this by
   translating a host's source address from an 'inner' value to an
   'outer' value and keeping this translation in a table that it can
   reference for subsequent packets.

   In addition, existing RFC 1918 [RFC1918] sites can use LISP-NAT to
   talk to both LISP or non-LISP sites.

   The basic concept of LISP-NAT is that when transmitting a packet, the
   ITR replaces a non-routable EID source address with a routable source
   address, which enables packets to return to the site.

   There are two main cases that involve LISP-NAT:

   1.  Hosts at LISP sites that use non-routable global EIDs speaking to
       non-LISP sites using global addresses.

   2.  Hosts at LISP sites that use RFC 1918 private EIDs speaking to
       other sites, who may be either LISP or non-LISP.

   Note that LISP-NAT is not needed in the case of LISP-R (routable
   global EIDs) sources.  This is because the LISP-R source's address is
   routable, and return packets will be able to natively reach the site.

<strike><font color="red">6.1.</font></strike>

<strong><font color="green">15.1.</font></strong>  LISP-NAT for LISP-NR addressed hosts

   LISP-NAT allows a host with a LISP-NR EID to communicate with non-
   LISP hosts by translating the LISP-NR EID to a globally unique
   address.  This globally unique address may be a either a PI or PA
   address.

   An example of this translation follows.  For this example, a site has
   been assigned a LISP-NR EID of 220.1.1.0/24.  In order to utilize
   LISP-NAT, the site has also been provided the PA EID of
   128.200.1.0/24, and uses the first address (128.200.1.1) as the
   site's RLOC.  The rest of this PA space (128.200.1.2 to
   128.200.1.254) is used as a translation pool for this site's hosts
   who need to communicate with non-LISP hosts.

   The translation table might look like the following:

     Site NR-EID    Site R-EID      Site's RLOC    Translation Pool
   <strike><font color="red">=========================================================================</font></strike>
     <strong><font color="green">===================================================================</font></strong>
     220.1.1.0/24   128.200.1.0/24  128.200.1.1    <strike><font color="red">128.200.1.2 - 128.200.1.254</font></strike>    <strong><font color="green">128.200.1.2-254</font></strong>

                    Figure 1: Example Translation Table

   The Host 220.1.1.2 sends a packet destined for a non-LISP site to its
   default route (the ITR).  The ITR receives the packet, and determines
   that the destination is not a LISP site.  How the ITR makes this
   determination is up to the ITRs implementation of the EID-to-RLOC
   mapping system used (see, for example [LISP-ALT]).

   The ITR then rewrites the source address of the packet from 220.1.1.2
   to 128.200.1.2, which is the first available address in the LISP-R
   EID space available to it.  The ITR keeps this translation in a table
   in order to reverse this process when receiving packets destined to
   128.200.1.2.

   Finally, when the ITR forwards this packet without encapsulating it,
   it uses the entry in its LISP-NAT table to translate the returning
   packets' destination IPs to the proper host.

<strike><font color="red">6.2.</font></strike>

<strong><font color="green">15.2.</font></strong>  LISP Sites with Hosts using RFC 1918 Addresses Sending to <strike><font color="red">non-LISP</font></strike> <strong><font color="green">non-
       LISP</font></strong> Sites

   In the case where RFC 1918 addressed hosts desire to communicate with
   non-LISP hosts the LISP-NAT implementation acts much like an existing
   IPv4 NAT device.  The ITR providing the NAT service must use LISP-R
   EIDs for its global pool as well as providing all the standard NAT
   functions required today.

   The source of the packet must be translated to a LISP-R EID in a
   manner similar to Section <strike><font color="red">6,</font></strike> <strong><font color="green">15,</font></strong> and this packet must be forwarded to
   the ITR's next hop for the destination, without LISP encapsulation.

<strike><font color="red">6.3.</font></strike>

<strong><font color="green">15.3.</font></strong>  LISP Sites with Hosts using RFC 1918 Addresses   Communicating to
       Other LISP Sites

   LISP-NAT allows a host with a RFC 1918 address to communicate with
   LISP hosts by translating the RFC 1918 address to a LISP EID.  After
   translation, the communication between source and destination ITR and
   ETRs continues as described in [LISP].

   An example of this translation and encapsulation follows.  For this
   example, a host has been assigned a RFC 1918 address of 192.168.1.2.
   In order to utilize LISP-NAT, the site also has been provided the
   LISP-R EID of 192.0.2.0/24, and uses the first address (192.0.2.1) as
   the site's RLOC.  The rest of this PA space (192.0.2.2 to
   192.0.2.254) is used as a translation pool for this site's hosts who
   need to communicate with both non-LISP and LISP hosts.

   The Host 192.168.1.2 sends a packet destined for a non-LISP site to
   its default route (the ITR).  The ITR receives the packet and
   determines that the destination is a LISP site.  How the ITR makes
   this determination is up to the ITRs implementation of the EID/RLOC
   mapping system.

   The ITR then rewrites the source address of the packet from
   192.168.1.2 to 192.0.2.2, which is the first available address in the
   LISP EID space available to it.  The ITR keeps this translation in a
   table in order to reverse this process when receiving packets
   destined to 192.0.2.2.

   The ITR then LISP encapsulates this packet (see [LISP] for details).
   The ITR uses the site's RLOC as the LISP outer header's source and
   the translation address as the LISP inner header's source.  Once it
   decapsulates returning traffic, it uses the entry in its LISP-NAT
   table to translate the returning packet's destination IP address and
   then forward to the proper host.

<strike><font color="red">6.4.</font></strike>

<strong><font color="green">15.4.</font></strong>  LISP-NAT and multiple EIDs

   When a site has two addresses that a host might use for global
   reachability, care must be chosen on which EID is found in DNS.  For
   example, whether applications such as DNS use the LISP-R EID or the
   LISP-NR EID.  This problem exists for NAT in general, but the
   specific issue described above is unique to LISP.  Using <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> can
   mitigate this problem, since the LISP-NR EID can be reached in all
   cases.

<strike><font color="red">6.5.</font></strike>

<strong><font color="green">15.5.  When</font></strong> LISP-NAT and <strike><font color="red">PTRs Together</font></strike> <strong><font color="green">PITRs used by the same LISP Site</font></strong>

   With LISP-NAT, there are two EIDs possible for a given host, the
   LISP-R EID and the LISP-NR EID.  When a site has two addresses that a
   host might use for global reachability, name-to-address directories
   may need to be modified.

   This problem, global addressability, exists for NAT in general, but
   the specific issue described above is unique to LOC/ID split schemes.
   Some schemes [ref: 6-1 proxy] have suggested running a separate DNS
   instance for legacy types of EIDs.  This solves the problem but
   introduces complexity for the site.  Alternatively, using <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> can
   mitigate this problem, because the LISP-NR EID can <strike><font color="red">hbe</font></strike> <strong><font color="green">be</font></strong> reached in <strike><font color="red">all
   cases.</font></strike> <strong><font color="green">all
   cases.

   In summary, there are two options for interworking LISP with IPv4 and
   V6.  In the NAT case the LISP site can use NAT and manage the
   transition on its own.  In the PITR case, we add a new network
   element called a PITR that can relieve that burden on the site, with
   the downside of potentially adding stretch to sites trying to reach
   the LISP site.

16.  Proxy Egress Tunnel Routers

   Proxy Egress Tunnel Routers (PETRs) allow for LISP-NR sites to
   communicate with non-LISP sites in the case where the access network
   does not allow for the LISP-NR site send packets with the source
   address of the site's EID(s).  A PETR is a new network element that
   conceptually acts as an ETR for traffic destined to non-LISP sites.
   This also has the effect of allowing an ITR avoid having to decide
   whether to encapsulate packets or not - it will always encapsulate
   packets.  Packets destined to LISP sites will travel directly to that
   site's ETR, all other packets will be sent to the site's PETR.

   There are two primary reasons why sites would want to utilize a PETR:

   Avoiding strict uRPF failures:  Some provider's access networks
      require the source of the packets emitted to be within the
      addressing scope of the access networks. (see section 9)

   Traversing a different IP Protocol:  A LISP site may want to transmit
      packets to a non-LISP site where the some of the intermediate
      network does not support an IP protocol (v4 or v6).  PETRs can
      allow this LISP site's data to 'hop over' this by utilizing LISP's
      support for mixed protocol encapsulation.

16.1.  Packet Flow with Proxy Egress Tunnel Routers

   Packets from a LISP site can reach a non-LISP site with the aid of a
   Proxy-ETR (or PETR).  An ITR is simply configured to send all non-
   LISP traffic, which it normally would have forwarded natively (non-
   encapsulated), to a PETR.  Note that this outer encapsulation may be
   in another IP protocol than the (inner) encapsulated data.  Traffic
   then uses use the LISP (outer) header's destination address to reach
   the destination PETR.

   A PETR should verify the (inner) source EID of the packet at time of
   decapsulation in order to verify that this is from a configured LISP
   site.  This is to prevent spoofed inner sources from being
   encapsulated through the Proxy-ETR.

   What follows is an example of the path a packet would take when using
   a PETR.  In this example, the LISP-NR site is given the EID prefix
   240.2.0.0/24, and it is trying to reach host at a non-LISP site with
   the IP prefix of 192.0.2.0/24.  For the purposes of this example, the
   destination is a non-LISP site and 192.0.2.0/24 is found in the
   Internet's routing system.

   A full protocol exchange example follows:

   1.  Source host makes a DNS lookup for the destination, and gets
       192.0.2.100 (a non-LISP site) in return.

   2.  Source host has a default route to customer Edge (CE) router and
       forwards the packet towards the CE.

   3.  The CE is a LISP ITR, and is configured to encapsulate traffic
       destined for non-lisp sites to a Proxy-ETR.

   4.  The Proxy ETR decapsulates the LISP packet and forwards the
       original packet to its next hop.

   5.  The packet is then routed natively and directly to the
       destination (non-LISP) site 192.0.2.0/24.

   Note that in this example the return path is asymmetric, so return
   traffic will not go back through the Proxy-ITR.  This means that in
   order to reach LISP-NR sites, non-lisp sites must still use Proxy
   ITRs.

17.  Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs (PETRs)</font></strong>

   In summary, there are <strike><font color="red">two</font></strike> <strong><font color="green">three</font></strong> options for interworking LISP with <strong><font color="green">non-
   LISP Sites (for both</font></strong> IPv4 and
   <strike><font color="red">V6.</font></strike> <strong><font color="green">IPv6).</font></strong>  In the <strike><font color="red">NAT case</font></strike> <strong><font color="green">LISP-NAT option</font></strong> the LISP
   site can <strike><font color="red">use NAT and</font></strike> manage <strong><font color="green">and control</font></strong> the
   <strike><font color="red">transition</font></strike> <strong><font color="green">interworking</font></strong> on its own.  In the <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong>
   case, we add a new network element
   <strike><font color="red">called a PTR that can</font></strike> relieve that burden on the site,
   with the
   <strike><font color="red">downside</font></strike> <strong><font color="green">cost</font></strong> of potentially adding stretch to <strong><font color="green">the connections of
   non-LISP</font></strong> sites <strike><font color="red">trying to reach</font></strike> <strong><font color="green">communicating with</font></strong> the LISP site.

<strike><font color="red">7.</font></strike>  <strong><font color="green">The third option is
   Proxy-ETRs, which are optionally used by sites relying on PITRs case
   to mitigate two caveats for LISP sites communicating with non-LISP
   sites.  This means Proxy-ETRs are not expected to be deployed by
   themselves, they will always be used to assist sites already using
   PITRs.

18.  How Proxy-ITRs and Proxy-ETRs Interact

   There is a subtle difference between Symmetrical (LISP-NAT) vs
   Asymmetrical (Proxy-ITR and Proxy-ETR) Interworking techniques.
   Operationally, Proxy-ITRs (PITRs) and Proxy-ETRs (PETRs) can (and
   likely should) be decoupled since Proxy-ITRs are best deployed
   closest to non-LISP sites, and Proxy-ETRs are best located close to
   the LISP site's they are decapsulating on behalf of.  This asymmetric
   placement of the two network elements keeps the stretched imposed on
   the connection to a minimum, while still allowing for coarsely
   aggregated announcements of EIDs into the Internet's routing table.

19.</font></strong>  Security Considerations

   Like any LISP ITR, <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> will have the <strike><font color="red">ability</font></strike> <strong><font color="green">opportunity</font></strong> to inspect traffic
   at the time that they encapsulate.  <strike><font color="red">More work needs to be done to see if
   this ability can be exploited by the control plane along</font></strike>  <strong><font color="green">The location of these devices in</font></strong>
   the <strike><font color="red">lines</font></strike> <strong><font color="green">network can have implications for dropping malicious traffic on
   behalf</font></strong> of
   <strike><font color="red">Remote Triggered BGP Black Holes.  XXX:Reference?</font></strike> <strong><font color="green">ETRs who request this behavior (via the drop action bit in
   Map-Reply packets for an EID or EID prefix).</font></strong>

   As with traditional NAT, LISP-NAT will <strike><font color="red">hide</font></strike> <strong><font color="green">obscure</font></strong> the actual host <strike><font color="red">ID</font></strike>
   <strong><font color="green">LISP-NR EID</font></strong> behind the <strike><font color="red">RLOCs</font></strike> <strong><font color="green">LISP-R addresses</font></strong> used as the NAT pool.

   When LISP Sites <strike><font color="red">reply</font></strike> <strong><font color="green">send packets</font></strong> to non-LISP sites <strike><font color="red">and</font></strike> <strong><font color="green">(these non-LISP</font></strong> rely
   on <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> to enable
   <strike><font color="red">Interworking,</font></strike> <strong><font color="green">Interworking),</font></strong> packets will <strike><font color="red">be sourced from addresses</font></strike> <strong><font color="green">have the Site's EID as
   its source IP address.  These EIDs may</font></strong> not <strong><font color="green">be</font></strong> recognized by their
   Internet Service Provider's Unicast Reverse Path Forwarding (uRPF)
   <strong><font color="green">rules</font></strong> enabled on the Provider Edge Router.  Several options are
   available to the service provider.  For example they could enable a
   less strict version of uRPF, where they only look for the existence
   of the the EID prefix in the routing table.  Another, more secure,
   option is to add a static route for the customer on the PE router,
   but not redistribute this route into the provider's routing table.

<strike><font color="red">8.</font></strike>
   <strong><font color="green">Finally, Proxy-ETRs can enable LISP sites to bypass this uRPF check
   by encapsulating all of their egressing traffic destined to non-LISP
   sites to the Proxy-ETR (thus ensuring the outer IP source address is
   the site's RLOC).

20.</font></strong>  Acknowledgments

   Thanks goes to Christian Vogt, Lixia <strike><font color="red">Zhang and</font></strike> <strong><font color="green">Zhang,</font></strong> Robin <strike><font color="red">Whittle</font></strike> <strong><font color="green">Whittle, Michael
   Menth, and Xuewei Wang</font></strong> who have made insightful comments with respect
   to <strike><font color="red">interworking</font></strike> <strong><font color="green">LISP Interworking</font></strong> and transition mechanisms.

   A special thanks goes to Scott Brim for his initial brainstorming of
   these ideas and also for his careful review.

<strike><font color="red">9.</font></strike>

<strong><font color="green">21.</font></strong>  IANA Considerations

   This document creates no new requirements on IANA namespaces
   [RFC2434].

<strike><font color="red">10.</font></strike>

<strong><font color="green">22.</font></strong>  References

<strike><font color="red">10.1.</font></strike>

<strong><font color="green">22.1.</font></strong>  Normative References

   [LISP]     Farinacci, D., Fuller, V., <strike><font color="red">Oran,</font></strike> <strong><font color="green">Meyer,</font></strong> D., and D. <strike><font color="red">Meyer,</font></strike> <strong><font color="green">Lewis,</font></strong>
              "Locator/ID Separation Protocol (LISP)",
              <strike><font color="red">draft-ietf-lisp-00</font></strike>
              <strong><font color="green">draft-ietf-lisp-06</font></strong> (work in progress), <strike><font color="red">May 2009.</font></strike> <strong><font color="green">January 2010.</font></strong>

   [LISP-ALT]
              Farinacci, D., Fuller, V., <strong><font color="green">Meyer, D.,</font></strong> and D. <strike><font color="red">Meyer,</font></strike> <strong><font color="green">Lewis,</font></strong> "LISP
              Alternative Topology (LISP-ALT)", <strike><font color="red">draft-ietf-lisp-alt-00</font></strike>
              <strong><font color="green">draft-ietf-lisp-alt-02.txt</font></strong> (work in progress), <strike><font color="red">May 2009.</font></strike>
              <strong><font color="green">January 2010.</font></strong>

   [RFC1918]  Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and
              E. Lear, "Address Allocation for Private Internets",
              BCP 5, RFC 1918, February 1996.

   [RFC4632]  Fuller, V. and T. Li, "Classless Inter-domain Routing
              (CIDR): The Internet Address Assignment and Aggregation
              Plan", BCP 122, RFC 4632, August 2006.

<strike><font color="red">10.2.</font></strike>

<strong><font color="green">22.2.</font></strong>  Informative References

   [CRIO]     Zhang, X., Francis, P., Wang, J., and K. Yoshida, "CRIO:
              Scaling IP Routing with the Core Router-Integrated
              Overlay".

   [RFC2434]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 2434,
              October 1998.

   [RFC2993]  Hain, T., "Architectural Implications of NAT", RFC 2993,
              November 2000.

Authors' Addresses

   Darrel Lewis
   Cisco Systems, Inc.

   Email: darlewis@cisco.com

   David Meyer
   Cisco Systems, Inc.

   Email: dmm@cisco.com

   Dino Farinacci
   Cisco Systems, Inc.

   Email: dino@cisco.com

   Vince Fuller
   Cisco Systems, Inc.

   Email: vaf@cisco.com
</pre>
</body></html>
--Apple-Mail-6--53398945
Content-Disposition: attachment;
	filename=draft-ietf-lisp-interworking-01.txt
Content-Type: text/plain;
	name="draft-ietf-lisp-interworking-01.txt"
Content-Transfer-Encoding: quoted-printable




Network Working Group                                           D. Lewis
Internet-Draft                                                  D. Meyer
Intended status: Experimental                               D. Farinacci
Expires: August 16, 2010                                       V. Fuller
                                                     Cisco Systems, Inc.
                                                       February 12, 2010


                  Interworking LISP with IPv4 and IPv6
                  draft-ietf-lisp-interworking-01.txt

Abstract

   This document describes techniques for allowing sites running the
   Locator/ID Separation Protocol (LISP [LISP]) to interoperate with
   Internet sites (using either IPv4, IPv6, or both) which are not
   running LISP.  A fundamental property of LISP speaking sites is that
   they use Endpoint Identifiers (EIDs), rather than traditional IP
   addresses, in the source and destination fields of all traffic they
   emit or receive.  While EIDs are syntactically identical to IPv4 or
   IPv6 addresses, routes for them are not carried in the global routing
   system so an interoperability mechanism is needed for non-LISP-
   speaking sites to exchange traffic with LISP-speaking sites.  This
   document introduces three such mechanisms: the first uses a new
   network element, the LISP Proxy Ingress Tunnel Routers (PITR)
   (Section 5) to act as a intermediate LISP Ingress Tunnel Router (ITR)
   for non-LISP-speaking hosts while the second adds Network Address
   Translation (NAT) functionality to LISP Ingress and LISP Egress
   Tunnel Routers (xTRs) to substitute routable IP addresses for non-
   routable EIDs.  Finally, this document introduces a Proxy Egress
   Tunnel Router (PETR) to solve cases where a LISP site cannot send a
   packet which has as its source address a non-routable EID

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."




Lewis, et al.            Expires August 16, 2010                [Page 1]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 16, 2010.

Copyright Notice

   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the BSD License.





























Lewis, et al.            Expires August 16, 2010                [Page 2]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  LISP Interworking Models . . . . . . . . . . . . . . . . . . .  6
   3.  Definition of Terms  . . . . . . . . . . . . . . . . . . . . .  8
   4.  Routable EIDs  . . . . . . . . . . . . . . . . . . . . . . . . 11
   5.  Impact on Routing Table  . . . . . . . . . . . . . . . . . . . 12
   6.  Requirement for using BGP  . . . . . . . . . . . . . . . . . . 13
   7.  Limiting the Impact of Routable EIDs . . . . . . . . . . . . . 14
   8.  Use of Routable EIDs for Testing LISP  . . . . . . . . . . . . 15
   9.  Proxy Ingress Tunnel Routers . . . . . . . . . . . . . . . . . 16
   10. PITR EID announcements . . . . . . . . . . . . . . . . . . . . 17
   11. Packet Flow with PITRs . . . . . . . . . . . . . . . . . . . . 18
   12. Scaling PITRs  . . . . . . . . . . . . . . . . . . . . . . . . 20
   13. Impact of the PITRs placement in the network . . . . . . . . . 21
   14. Benefit to Networks Deploying PITRs  . . . . . . . . . . . . . 22
   15. LISP-NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
     15.1.  LISP-NAT for LISP-NR addressed hosts  . . . . . . . . . . 23
     15.2.  LISP Sites with Hosts using RFC 1918 Addresses
            Sending to non-LISP Sites . . . . . . . . . . . . . . . . 24
     15.3.  LISP Sites with Hosts using RFC 1918 Addresses
            Communicating to Other LISP Sites . . . . . . . . . . . . 24
     15.4.  LISP-NAT and multiple EIDs  . . . . . . . . . . . . . . . 25
     15.5.  When LISP-NAT and PITRs used by the same LISP Site  . . . 25
   16. Proxy Egress Tunnel Routers  . . . . . . . . . . . . . . . . . 27
     16.1.  Packet Flow with Proxy Egress Tunnel Routers  . . . . . . 27
   17. Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs
       (PETRs)  . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
   18. How Proxy-ITRs and Proxy-ETRs Interact . . . . . . . . . . . . 30
   19. Security Considerations  . . . . . . . . . . . . . . . . . . . 31
   20. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 32
   21. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 33
   22. References . . . . . . . . . . . . . . . . . . . . . . . . . . 34
     22.1.  Normative References  . . . . . . . . . . . . . . . . . . 34
     22.2.  Informative References  . . . . . . . . . . . . . . . . . 34
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 35















Lewis, et al.            Expires August 16, 2010                [Page 3]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


1.  Introduction

   This document describes two mechanisms for interoperation between
   LISP [LISP] sites, which use non-globally-routed EIDs, and non-LISP
   sites: use of PITRs, which create highly-aggregated routes to EID
   prefixes for non-LISP sites to follow.  The use of NAT by LISP ETRs
   when communicating with non-LISP hosts.  And finally the use of Proxy
   Egress Tunnel routers (PETRs) LISP for sites relying on PITRs and
   which are faced with certain restrictions.

   A key behavior of the separation of Locators and End-Point-IDs is
   that EID prefixes are not advertised to the Internet's Default Free
   Zone (DFZ).  Specifically, only RLOCs are carried in the Internet's
   DFZ.  Existing Internet sites (and their hosts) who do not
   participate in the LISP system must still be able to reach sites
   numbered from this non routed EID space.  This draft describes a set
   of mechanisms that can be used to provide reachability between sites
   that are LISP-capable and those that are not.  This document
   introduces three such mechanisms.  The first uses a new network
   element, the LISP Proxy Ingress Tunnel Router (PITR) (Section 5) to
   act as a intermediate LISP Ingress Tunnel Router (ITR) for non-LISP-
   speaking hosts.  The second adds a form of Network Address
   Translation (NAT) functionality to Tunnel Routers (xTRs) to
   substitute routable IP addresses for non-routable EIDs.  The final
   network element is the LISP Proxy Egress Tunnel Routers (PETR), which
   act as an intermediate Egress Tunnel Router (ETR) for LISP sites who
   are using PITRs but need assistance in reaching non-LISP sites.

   More detailed descriptions of these mechanisms and the network
   elements involved may be found in the following sections:

   - Section 2 describes the different cases where interworking
   mechanisms are needed

   - Section 3 defines terms used throughout the document

   - Section 4 describes the relationship between the new EID prefix
   space and the IP address space used by the current Internet

   - Section 5 introduces and describes the operation of Proxy-ITRs

   - Section 6 defines how NAT is used by ETRs to translate non-routable
   EIDs into routable IP addresses.

   - Section 7 introduces and describes the operations of Proxy-ETRs

   - Section 8 describes the relationship between asymmetric and
   Symmetric interworking mechanisms (Proxy-ITRs and Proxy-ETRs vs LISP-



Lewis, et al.            Expires August 16, 2010                [Page 4]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   NAT)

   Note that any successful interworking model should be independent of
   any particular EID-to-RLOC mapping algorithm.  This document does not
   comment on the value of any of the particular LISP mapping systems.














































Lewis, et al.            Expires August 16, 2010                [Page 5]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


2.  LISP Interworking Models

   There are 4 unicast connectivity cases which describe how sites can
   communicate with each other:

   1.  Non-LISP site to Non-LISP site

   2.  LISP site to LISP site

   3.  LISP site to Non-LISP site

   4.  Non-LISP site to LISP site

   Note that while Cases 3 and 4 seem similar, there are subtle
   differences due to the way communications are originated.

   The first case is the Internet as we know it today and as such will
   not be discussed further here.  The second case is documented in
   [LISP] and, hence, there are no new interworking requirements because
   there are no new protocol requirements placed on intermediate non-
   LISP routers.

   In case 3, LISP site to Non-LISP site, a LISP site can (in most
   cases) send packets to a non-LISP site because the non-LISP site
   prefixes are routable.  The non-LISP site need not do anything new to
   receive packets.  The only action the LISP site needs (with two
   possible caveats introduced below) to take is to know when not to
   LISP-encapsulate packets.  This can be achieved via two mechanisms:

   1.  At the ITR in the source site, if the destination of an IP packet
       is found to match a prefix from the BGP routing table, then the
       site is directly reachable by the BGP core that exists and
       operates today.

   2.  Second, if (from the perspective of the ITR at the source site)
       the destination address of an IP address is not found in the EID-
       to-RLOC mapping database, the ITR could infer that it is not a
       LISP-capable site, and decide to not LISP-encapsulate the packet.

   3.  There are two potential caveats involved with Case 3, where there
       could be some situations where (unencapsualted) packets
       originated by a LISP site may not be forwarded to a non-LISP
       site.  One of these caveats (uRPF check failure) are detailed in
       Section 9 (Security Considerations).  The second caveat (protocol
       traversal) is reviewed in section 7, (Proxy-Egress Tunnel
       Routers).

   Case 4, typically the most challenging, occurs when a host at a non-



Lewis, et al.            Expires August 16, 2010                [Page 6]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   LISP site wishes to send traffic to a host at a LISP site.  If the
   source host uses a (non-globally-routable) EID as the destination IP
   address, the packet is forwarded inside the source site until it
   reaches a router which cannot forward it, at which point the traffic
   is dropped.  For traffic not to be dropped, either some route must be
   exist for the destination EID outside of LISP-speaking part of the
   network or an alternate mechanism must be in place.  Section 5
   (PITRs) and Section 6 (LISP-NAT) describe two such mechanisms.

   Note that case 4 includes packets returning to the LISP Site in case
   3.








































Lewis, et al.            Expires August 16, 2010                [Page 7]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


3.  Definition of Terms

   Endpoint ID (EID):  Endpoint ID (EID): A 32-bit (for IPv4) or 128-bit
      (for IPv6) value used in the source and destination address fields
      of the first (most inner) LISP header of a packet.  The host
      obtains a destination EID the same way it obtains an destination
      address today, for example through a DNS lookup or SIP exchange.
      The source EID is obtained via existing mechanisms used to set a
      host's "local" IP address.  An EID is allocated to a host from an
      EID-prefix block associated with the site where the host is
      located.  An EID can be used by a host to refer to other hosts.
      EIDs MUST NOT be used as LISP RLOCs.  Note that EID blocks may be
      assigned in a hierarchical manner, independent of the network
      topology, to facilitate scaling of the mapping database.  In
      addition, an EID block assigned to a site may have site-local
      structure (subnetting) for routing within the site; this structure
      is not visible to the global routing system.  When used in
      discussions with other Locator/ID separation proposals, a LISP EID
      will be called a "LEID".  Throughout this document, any references
      to "EID" refers to an LEID.

   EID-Prefix:  EID-prefix: A power-of-2 block of EIDs which are
      allocated to a site by an address allocation authority.  EID-
      prefixes are associated with a set of RLOC addresses which make up
      a "database mapping".  EID-prefix allocations can be broken up
      into smaller blocks when an RLOC set is to be associated with the
      smaller EID- prefix.  A globally routed address block (whether PI
      or PA) is not an EID-prefix.  However, a globally routed address
      block may be removed from global routing and reused as an EID-
      prefix.  A site that receives an explicitly allocated EID-prefix
      may not use that EID-prefix as a globally routed prefix assigned
      to RLOCs

   EID-Prefix Aggregate:  A set of EID-prefixes said to be aggregatable
      in the [RFC4632] sense.  That is, an EID-Prefix aggregate is
      defined to be a single contiguous power-of-two EID-prefix block.
      Such a block is characterized by a prefix and a length.  Provider
      Independent (PI) Addresses: an address block assigned from a pool
      where blocks are not associated with any particular location in
      the network (e.g. from a particular service provider), and is
      therefore not topologically aggregatable in the routing system.

   Routing Locator (RLOC):  The IPv4 or IPv6 address of an egress tunnel
      router (ETR).  It is the output of a EID-to-RLOC mapping lookup.
      An EID maps to one or more RLOCs.  Typically, RLOCs are numbered
      from topologically-aggregatable blocks that are assigned to a site
      at each point to which it attaches to the global Internet; where
      the topology is defined by the connectivity of provider networks,



Lewis, et al.            Expires August 16, 2010                [Page 8]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


      RLOCs can be thought of as PA addresses.  Multiple RLOCs can be
      assigned to the same ETR device or to multiple ETR devices at a
      site.

   EID-to-RLOC Mapping:  A binding between an EID and the RLOC-set that
      can be used to reach the EID.  We use the term "mapping" in this
      document to refer to a EID-to-RLOC mapping.

   EID Prefix Reachability:  An EID prefix is said to be "reachable" if
      one or more of its locators are reachable.  That is, an EID prefix
      is reachable if the ETR (or its proxy) is reachable.

   Default Mapping:  A Default Mapping is a mapping entry for EID-prefix
      0.0.0.0/0.  It maps to a locator-set used for all EIDs in the
      Internet.  If there is a more specific EID-prefix in the mapping
      cache it overrides the Default Mapping entry.  The Default Mapping
      route can be learned by configuration or from a Map-Reply message
      [LISP].

   LISP Routable (LISP-R) Site:  A LISP site whose addresses are used as
      both globally routable IP addresses and LISP EIDs.

   LISP Non-Routable (LISP-NR) Site:  A LISP site whose addresses are
      EIDs only, these EIDs are not found in the legacy Internet routing
      table.

   LISP Proxy Ingress Tunnel Router (PITR):  PITRs are used to provide
      interconnectivity between sites which use LISP EIDs and those
      which do not.  They act as a gateway between the Legacy Internet
      and the LISP enabled Network.  A given PITR advertises one or more
      highly aggregated EID prefixes into the public Internet and acts
      as the ITR for traffic received from the public Internet.  LISP
      Proxy Ingress Tunnel Routers are described in Section 9.

   LISP Network Address Translation (LISP-NAT):  Network Address
      Translation between EID space assigned to a site and RLOC space
      also assigned to that site.  LISP Network Address Translation is
      described in Section 15.

   LISP Proxy Egress Tunnel Router (PETR):  PETRs are used to provide a
      LISP site's ITRs the ability to send traffic to non-LISP sites in
      cases where unencapsualted packets (the default mechanism) would
      fail to be delivered.  PETRs are implemented by having an ITR
      encapsulate all non-LISP destined traffic to a pre-configured
      PETR.  LISP Proxy Egress Tunnel Routers are described in
      Section 16.





Lewis, et al.            Expires August 16, 2010                [Page 9]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


    EID Sub Namespace:  A power-of-two block of aggregatable locators
      set aside for LISP interworking.

















































Lewis, et al.            Expires August 16, 2010               [Page 10]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


4.  Routable EIDs

   An obvious way to achieve interworking between LISP and non-LISP
   hosts is to simply announce EID prefixes into the DFZ, much like
   routing system, effectively treating them as "Provider Independent
   (PI)" prefixes.  Doing this is undesirable as it defeats one of the
   primary goals of LISP - to reduce global routing system state.












































Lewis, et al.            Expires August 16, 2010               [Page 11]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


5.  Impact on Routing Table

   If EID prefixes are announced into the DFZ, the impact is similar to
   the case in which LISP has not been deployed, because these EID
   prefixes will be no more aggregatable than existing PI addressing.
   This behavior is not desirable and such a mechanism is not viewed as
   a viable long term solution.












































Lewis, et al.            Expires August 16, 2010               [Page 12]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


6.  Requirement for using BGP

   Non-LISP sites today use BGP to, among other things, enable ingress
   traffic engineering.  Relaxing this requirement is another primary
   design goal of LISP.














































Lewis, et al.            Expires August 16, 2010               [Page 13]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


7.  Limiting the Impact of Routable EIDs

   Two schemes are proposed to limit the impact of having EIDs announced
   in the current global Internet routing table:

   1.  Section 9 discusses the LISP Proxy Tunnel Router, an approach
       that provides ITR functionality to bridge LISP-capable and non-
       LISP-capable sites.

   2.  Section 15 discusses another approach, LISP-NAT, in which NAT
       [RFC2993] is combined with ITR functionality to limit the the
       impact of routable EIDs on the Internet routing infrastructure.







































Lewis, et al.            Expires August 16, 2010               [Page 14]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


8.  Use of Routable EIDs for Testing LISP

   A primary design goal for LISP (and other Locator/ID separation
   proposals) is to facilitate topological aggregation of addresses and,
   thus, decrease global routing system state.  Another goal is to
   achieve the benefits of improved aggregation as soon as possible.
   Sites advertising routes for LISP EID prefixes into the global
   routing system is therefore not recommended.

   That being said, single homed sites (or multi-homed sites that are
   not leaking more specific exceptions) and that are already using
   provider-aggregated prefixes can use these prefixes as LISP EIDs
   without adding state to the routing system; in other words, such
   sites do not cause additional prefixes to be advertised.  For such
   sites, connectivity to a non-LISP sites does not require interworking
   machinery because the "PA" EIDs are already routable (they are
   effectively LISP-R type sites).  Their EIDs are found in the LISP
   mapping system, and their (aggregate) PA prefix(es) are found in the
   DFZ Internet.

   The continued announcements of an existing site's Provider
   Independent (or "PI") prefix(s) is of course under control of that
   site, and some period of transition where a site is is found both in
   the LISP mapping system and as a discrete prefix in the Internet
   routing system may be a viable transition strategy.  Care should be
   taken not to advertise additional more specific LISP EID prefixes
   into the DFZ.
























Lewis, et al.            Expires August 16, 2010               [Page 15]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


9.  Proxy Ingress Tunnel Routers

   Proxy Ingress Tunnel Routers (PITRs) allow for non-LISP sites to
   communicate with LISP-NR sites.  A PITR is a new network element that
   shares many characteristics with the LISP ITR.  PITRs allow non-LISP
   sites to send packets to LISP-NR sites without any changes to
   protocols or equipment at the non-LISP site.  PITRs have two primary
   functions:

   Originating EID Advertisements:  PITRs advertise highly aggregated
      EID-prefix space on behalf of LISP sites to so that non-LISP sites
      can reach them.

   Encapsulating Legacy Internet Traffic:  PITRs also encapsulate non-
      LISP Internet traffic into LISP packets and route them towards
      their destination RLOCs.



































Lewis, et al.            Expires August 16, 2010               [Page 16]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


10.  PITR EID announcements

   A key part of PITR functionality is to advertise routes for highly-
   aggregated EID prefixes into part of the global routing system.
   Aggressive aggregation is performed to minimize the number of new
   announced routes.  In addition, careful placement of PITRs can
   greatly reduce the scope of these new routes.  To this end, PITRs
   should be deployed close to non-LISP-speaking rather than close to
   LISP sites.  Such deployment not only limits the scope of EID-prefix
   route advertisements, it also also allows traffic forwarding load to
   be spread among many PITRs.








































Lewis, et al.            Expires August 16, 2010               [Page 17]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


11.  Packet Flow with PITRs

   Packets from a non-LISP site can reach a LISP-NR site with the aid of
   a PITR.  By advertising a route for a particular EID prefix into the
   global routing system, traffic destined for that EID prefix is routed
   to the PITR, which then performs LISP encapsulation.  Once
   encapsulated, traffic packets use the LISP (outer) header's
   destination address to reach the destination ETR.

   What follows is an example of the path a packet would take when using
   a PITR.  In this example, the LISP-NR site is given the EID prefix
   240.0.0.0/24.  For the purposes of this example, this prefix and no
   covering aggregate is present in the global routing system.  In other
   words, if a packet with this destination were to reach a router in
   the "Default Free Zone", it would be dropped.

   A full protocol exchange example follows:

   1.  Source host makes a DNS lookup EID for destination, and gets
       240.1.1.1 in return.

   2.  Source host has a default route to customer Edge (CE) router and
       forwards the packet to the CE.

   3.  The CE has a default route to its Provider Edge (PE) router, and
       forwards the packet to the PE.

   4.  The PE has route to 240.0.0.0/24 and the next hop is the PITR.

   5.  The PITR has or acquires a mapping for 240.1.1.1 and LISP
       encapsulates, the packet now has a destination address of the
       RLOC.  The source address of this encapsulated packet is the
       PITR's RLOC.

   6.  The PITR looks up the RLOC, and forwards LISP packet to the next
       hop.

   7.  The ETR decapsulates the packet and delivers the packet to the
       240.1.1.1 host in the destination LISP site.

   8.  Packets from host 240.1.1.1 will flow back through the LISP
       site's ITR.  Such packets are not encapsulated because the ITR
       knows that the destination (the original source) is a non-LISP
       site.  The ITR knows this because it can check the LISP mapping
       database for the destination EID, and on a failure determine that
       the destination site is not LISP enabled.





Lewis, et al.            Expires August 16, 2010               [Page 18]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   9.  Packets are then routed natively and directly to the destination
       (original source) site.

   Note that in this example the return path is asymmetric, so return
   traffic will not go back through the PITR.  This is because the
   LISP-NR site's ITR will discover that the originating site is not a
   LISP site, and not encapsulate the returning packet (see [LISP] for
   details of ITR behavior).

   The asymmetric nature of traffic flows allows the PITR to be
   relatively simple - it will only have to encapsulate LISP packets.








































Lewis, et al.            Expires August 16, 2010               [Page 19]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


12.  Scaling PITRs

   PITRs attract traffic by announcing the LISP EID namespace into parts
   of the non-LISP-speaking global routing system.  There are several
   ways that a network could control how traffic reaches a particular
   PITR to prevent it from receiving more traffic than it can handle:

   First, the PITR's aggregate routes might be selectively announced,
   giving a coarse way to control the quantity of traffic attracted by
   that PITR.

   Second, the same address might be announced by multiple PITRs in
   order to share the traffic using IP Anycast.  The asymmetric nature
   of traffic flows allows the PITR to be relatively simple - it will
   only have to encapsulate LISP packets.




































Lewis, et al.            Expires August 16, 2010               [Page 20]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


13.  Impact of the PITRs placement in the network

   There are several approaches that a network could take in placing
   PITRs.  Placing the PITR near the ingress of traffic allows for the
   communication between the non-LISP site and the LISP site to have the
   least "stretch" (i.e. the least number of forwarding hops when
   compared to an optimal path between the sites).

   Some proposals, for example CRIO [CRIO], have suggested grouping
   PITRs near an arbitrary subset of ETRs and announcing a 'local'
   subset of EID space.  This model cannot guarantee minimum stretch if
   the EID prefix route advertisement points are changed (such a change
   might occur if a site adds, removes, or replaces one or more ISPs
   connections).





































Lewis, et al.            Expires August 16, 2010               [Page 21]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


14.  Benefit to Networks Deploying PITRs

   When traffic destined for LISP-NR site arrives and is encapsulated at
   a PITR, a new LISP packet header is pre-pended.  This causes the
   packet's destination to be set to the destination site RLOC.  Because
   traffic is thus routed towards RLOCs, it can potentially better
   follow the network's traffic engineering policies (such as closest
   exit routing).  This also means that providers who are not default-
   free and do not deploy PITRs end up sending more traffic to expensive
   transit links rather than to RLOC addresses, to which they may have
   settlement-free peering.  For large transit providers, deploying
   PITRs may attract more traffic, and therefore more revenue, from
   their customers.






































Lewis, et al.            Expires August 16, 2010               [Page 22]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


15.  LISP-NAT

   LISP Network Address Translation (LISP-NAT) is a limited form of NAT
   [RFC2993].  LISP-NAT is designed to enable the interworking of non-
   LISP sites and LISP-NR sites by ensuring that the LISP-NR's site
   addresses are always routable.  LISP-NAT accomplishes this by
   translating a host's source address from an 'inner' value to an
   'outer' value and keeping this translation in a table that it can
   reference for subsequent packets.

   In addition, existing RFC 1918 [RFC1918] sites can use LISP-NAT to
   talk to both LISP or non-LISP sites.

   The basic concept of LISP-NAT is that when transmitting a packet, the
   ITR replaces a non-routable EID source address with a routable source
   address, which enables packets to return to the site.

   There are two main cases that involve LISP-NAT:

   1.  Hosts at LISP sites that use non-routable global EIDs speaking to
       non-LISP sites using global addresses.

   2.  Hosts at LISP sites that use RFC 1918 private EIDs speaking to
       other sites, who may be either LISP or non-LISP.

   Note that LISP-NAT is not needed in the case of LISP-R (routable
   global EIDs) sources.  This is because the LISP-R source's address is
   routable, and return packets will be able to natively reach the site.

15.1.  LISP-NAT for LISP-NR addressed hosts

   LISP-NAT allows a host with a LISP-NR EID to communicate with non-
   LISP hosts by translating the LISP-NR EID to a globally unique
   address.  This globally unique address may be a either a PI or PA
   address.

   An example of this translation follows.  For this example, a site has
   been assigned a LISP-NR EID of 220.1.1.0/24.  In order to utilize
   LISP-NAT, the site has also been provided the PA EID of
   128.200.1.0/24, and uses the first address (128.200.1.1) as the
   site's RLOC.  The rest of this PA space (128.200.1.2 to
   128.200.1.254) is used as a translation pool for this site's hosts
   who need to communicate with non-LISP hosts.

   The translation table might look like the following:






Lewis, et al.            Expires August 16, 2010               [Page 23]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


     Site NR-EID    Site R-EID      Site's RLOC    Translation Pool
     =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
     220.1.1.0/24   128.200.1.0/24  128.200.1.1    128.200.1.2-254

                    Figure 1: Example Translation Table

   The Host 220.1.1.2 sends a packet destined for a non-LISP site to its
   default route (the ITR).  The ITR receives the packet, and determines
   that the destination is not a LISP site.  How the ITR makes this
   determination is up to the ITRs implementation of the EID-to-RLOC
   mapping system used (see, for example [LISP-ALT]).

   The ITR then rewrites the source address of the packet from 220.1.1.2
   to 128.200.1.2, which is the first available address in the LISP-R
   EID space available to it.  The ITR keeps this translation in a table
   in order to reverse this process when receiving packets destined to
   128.200.1.2.

   Finally, when the ITR forwards this packet without encapsulating it,
   it uses the entry in its LISP-NAT table to translate the returning
   packets' destination IPs to the proper host.

15.2.  LISP Sites with Hosts using RFC 1918 Addresses Sending to non-
       LISP Sites

   In the case where RFC 1918 addressed hosts desire to communicate with
   non-LISP hosts the LISP-NAT implementation acts much like an existing
   IPv4 NAT device.  The ITR providing the NAT service must use LISP-R
   EIDs for its global pool as well as providing all the standard NAT
   functions required today.

   The source of the packet must be translated to a LISP-R EID in a
   manner similar to Section 15, and this packet must be forwarded to
   the ITR's next hop for the destination, without LISP encapsulation.

15.3.  LISP Sites with Hosts using RFC 1918 Addresses   Communicating to
       Other LISP Sites

   LISP-NAT allows a host with a RFC 1918 address to communicate with
   LISP hosts by translating the RFC 1918 address to a LISP EID.  After
   translation, the communication between source and destination ITR and
   ETRs continues as described in [LISP].

   An example of this translation and encapsulation follows.  For this
   example, a host has been assigned a RFC 1918 address of 192.168.1.2.
   In order to utilize LISP-NAT, the site also has been provided the
   LISP-R EID of 192.0.2.0/24, and uses the first address (192.0.2.1) as
   the site's RLOC.  The rest of this PA space (192.0.2.2 to



Lewis, et al.            Expires August 16, 2010               [Page 24]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   192.0.2.254) is used as a translation pool for this site's hosts who
   need to communicate with both non-LISP and LISP hosts.

   The Host 192.168.1.2 sends a packet destined for a non-LISP site to
   its default route (the ITR).  The ITR receives the packet and
   determines that the destination is a LISP site.  How the ITR makes
   this determination is up to the ITRs implementation of the EID/RLOC
   mapping system.

   The ITR then rewrites the source address of the packet from
   192.168.1.2 to 192.0.2.2, which is the first available address in the
   LISP EID space available to it.  The ITR keeps this translation in a
   table in order to reverse this process when receiving packets
   destined to 192.0.2.2.

   The ITR then LISP encapsulates this packet (see [LISP] for details).
   The ITR uses the site's RLOC as the LISP outer header's source and
   the translation address as the LISP inner header's source.  Once it
   decapsulates returning traffic, it uses the entry in its LISP-NAT
   table to translate the returning packet's destination IP address and
   then forward to the proper host.

15.4.  LISP-NAT and multiple EIDs

   When a site has two addresses that a host might use for global
   reachability, care must be chosen on which EID is found in DNS.  For
   example, whether applications such as DNS use the LISP-R EID or the
   LISP-NR EID.  This problem exists for NAT in general, but the
   specific issue described above is unique to LISP.  Using PITRs can
   mitigate this problem, since the LISP-NR EID can be reached in all
   cases.

15.5.  When LISP-NAT and PITRs used by the same LISP Site

   With LISP-NAT, there are two EIDs possible for a given host, the
   LISP-R EID and the LISP-NR EID.  When a site has two addresses that a
   host might use for global reachability, name-to-address directories
   may need to be modified.

   This problem, global addressability, exists for NAT in general, but
   the specific issue described above is unique to LOC/ID split schemes.
   Some schemes [ref: 6-1 proxy] have suggested running a separate DNS
   instance for legacy types of EIDs.  This solves the problem but
   introduces complexity for the site.  Alternatively, using PITRs can
   mitigate this problem, because the LISP-NR EID can be reached in all
   cases.

   In summary, there are two options for interworking LISP with IPv4 and



Lewis, et al.            Expires August 16, 2010               [Page 25]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   V6.  In the NAT case the LISP site can use NAT and manage the
   transition on its own.  In the PITR case, we add a new network
   element called a PITR that can relieve that burden on the site, with
   the downside of potentially adding stretch to sites trying to reach
   the LISP site.














































Lewis, et al.            Expires August 16, 2010               [Page 26]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


16.  Proxy Egress Tunnel Routers

   Proxy Egress Tunnel Routers (PETRs) allow for LISP-NR sites to
   communicate with non-LISP sites in the case where the access network
   does not allow for the LISP-NR site send packets with the source
   address of the site's EID(s).  A PETR is a new network element that
   conceptually acts as an ETR for traffic destined to non-LISP sites.
   This also has the effect of allowing an ITR avoid having to decide
   whether to encapsulate packets or not - it will always encapsulate
   packets.  Packets destined to LISP sites will travel directly to that
   site's ETR, all other packets will be sent to the site's PETR.

   There are two primary reasons why sites would want to utilize a PETR:

   Avoiding strict uRPF failures:  Some provider's access networks
      require the source of the packets emitted to be within the
      addressing scope of the access networks. (see section 9)

   Traversing a different IP Protocol:  A LISP site may want to transmit
      packets to a non-LISP site where the some of the intermediate
      network does not support an IP protocol (v4 or v6).  PETRs can
      allow this LISP site's data to 'hop over' this by utilizing LISP's
      support for mixed protocol encapsulation.

16.1.  Packet Flow with Proxy Egress Tunnel Routers

   Packets from a LISP site can reach a non-LISP site with the aid of a
   Proxy-ETR (or PETR).  An ITR is simply configured to send all non-
   LISP traffic, which it normally would have forwarded natively (non-
   encapsulated), to a PETR.  Note that this outer encapsulation may be
   in another IP protocol than the (inner) encapsulated data.  Traffic
   then uses use the LISP (outer) header's destination address to reach
   the destination PETR.

   A PETR should verify the (inner) source EID of the packet at time of
   decapsulation in order to verify that this is from a configured LISP
   site.  This is to prevent spoofed inner sources from being
   encapsulated through the Proxy-ETR.

   What follows is an example of the path a packet would take when using
   a PETR.  In this example, the LISP-NR site is given the EID prefix
   240.2.0.0/24, and it is trying to reach host at a non-LISP site with
   the IP prefix of 192.0.2.0/24.  For the purposes of this example, the
   destination is a non-LISP site and 192.0.2.0/24 is found in the
   Internet's routing system.

   A full protocol exchange example follows:




Lewis, et al.            Expires August 16, 2010               [Page 27]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   1.  Source host makes a DNS lookup for the destination, and gets
       192.0.2.100 (a non-LISP site) in return.

   2.  Source host has a default route to customer Edge (CE) router and
       forwards the packet towards the CE.

   3.  The CE is a LISP ITR, and is configured to encapsulate traffic
       destined for non-lisp sites to a Proxy-ETR.

   4.  The Proxy ETR decapsulates the LISP packet and forwards the
       original packet to its next hop.

   5.  The packet is then routed natively and directly to the
       destination (non-LISP) site 192.0.2.0/24.

   Note that in this example the return path is asymmetric, so return
   traffic will not go back through the Proxy-ITR.  This means that in
   order to reach LISP-NR sites, non-lisp sites must still use Proxy
   ITRs.
































Lewis, et al.            Expires August 16, 2010               [Page 28]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


17.  Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs (PETRs)

   In summary, there are three options for interworking LISP with non-
   LISP Sites (for both IPv4 and IPv6).  In the LISP-NAT option the LISP
   site can manage and control the interworking on its own.  In the PITR
   case, we add a new network element relieve that burden on the site,
   with the cost of potentially adding stretch to the connections of
   non-LISP sites communicating with the LISP site.  The third option is
   Proxy-ETRs, which are optionally used by sites relying on PITRs case
   to mitigate two caveats for LISP sites communicating with non-LISP
   sites.  This means Proxy-ETRs are not expected to be deployed by
   themselves, they will always be used to assist sites already using
   PITRs.






































Lewis, et al.            Expires August 16, 2010               [Page 29]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


18.  How Proxy-ITRs and Proxy-ETRs Interact

   There is a subtle difference between Symmetrical (LISP-NAT) vs
   Asymmetrical (Proxy-ITR and Proxy-ETR) Interworking techniques.
   Operationally, Proxy-ITRs (PITRs) and Proxy-ETRs (PETRs) can (and
   likely should) be decoupled since Proxy-ITRs are best deployed
   closest to non-LISP sites, and Proxy-ETRs are best located close to
   the LISP site's they are decapsulating on behalf of.  This asymmetric
   placement of the two network elements keeps the stretched imposed on
   the connection to a minimum, while still allowing for coarsely
   aggregated announcements of EIDs into the Internet's routing table.








































Lewis, et al.            Expires August 16, 2010               [Page 30]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


19.  Security Considerations

   Like any LISP ITR, PITRs will have the opportunity to inspect traffic
   at the time that they encapsulate.  The location of these devices in
   the network can have implications for dropping malicious traffic on
   behalf of ETRs who request this behavior (via the drop action bit in
   Map-Reply packets for an EID or EID prefix).

   As with traditional NAT, LISP-NAT will obscure the actual host
   LISP-NR EID behind the LISP-R addresses used as the NAT pool.

   When LISP Sites send packets to non-LISP sites (these non-LISP rely
   on PITRs to enable Interworking), packets will have the Site's EID as
   its source IP address.  These EIDs may not be recognized by their
   Internet Service Provider's Unicast Reverse Path Forwarding (uRPF)
   rules enabled on the Provider Edge Router.  Several options are
   available to the service provider.  For example they could enable a
   less strict version of uRPF, where they only look for the existence
   of the the EID prefix in the routing table.  Another, more secure,
   option is to add a static route for the customer on the PE router,
   but not redistribute this route into the provider's routing table.
   Finally, Proxy-ETRs can enable LISP sites to bypass this uRPF check
   by encapsulating all of their egressing traffic destined to non-LISP
   sites to the Proxy-ETR (thus ensuring the outer IP source address is
   the site's RLOC).


























Lewis, et al.            Expires August 16, 2010               [Page 31]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


20.  Acknowledgments

   Thanks goes to Christian Vogt, Lixia Zhang, Robin Whittle, Michael
   Menth, and Xuewei Wang who have made insightful comments with respect
   to LISP Interworking and transition mechanisms.

   A special thanks goes to Scott Brim for his initial brainstorming of
   these ideas and also for his careful review.











































Lewis, et al.            Expires August 16, 2010               [Page 32]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


21.  IANA Considerations

   This document creates no new requirements on IANA namespaces
   [RFC2434].















































Lewis, et al.            Expires August 16, 2010               [Page 33]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


22.  References

22.1.  Normative References

   [LISP]     Farinacci, D., Fuller, V., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol (LISP)",
              draft-ietf-lisp-06 (work in progress), January 2010.

   [LISP-ALT]
              Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "LISP
              Alternative Topology (LISP-ALT)",
              draft-ietf-lisp-alt-02.txt (work in progress),
              January 2010.

   [RFC1918]  Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and
              E. Lear, "Address Allocation for Private Internets",
              BCP 5, RFC 1918, February 1996.

   [RFC4632]  Fuller, V. and T. Li, "Classless Inter-domain Routing
              (CIDR): The Internet Address Assignment and Aggregation
              Plan", BCP 122, RFC 4632, August 2006.

22.2.  Informative References

   [CRIO]     Zhang, X., Francis, P., Wang, J., and K. Yoshida, "CRIO:
              Scaling IP Routing with the Core Router-Integrated
              Overlay".

   [RFC2434]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 2434,
              October 1998.

   [RFC2993]  Hain, T., "Architectural Implications of NAT", RFC 2993,
              November 2000.

















Lewis, et al.            Expires August 16, 2010               [Page 34]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


Authors' Addresses

   Darrel Lewis
   Cisco Systems, Inc.

   Email: darlewis@cisco.com


   David Meyer
   Cisco Systems, Inc.

   Email: dmm@cisco.com


   Dino Farinacci
   Cisco Systems, Inc.

   Email: dino@cisco.com


   Vince Fuller
   Cisco Systems, Inc.

   Email: vaf@cisco.com



























Lewis, et al.            Expires August 16, 2010               [Page 35]
=0C


--Apple-Mail-6--53398945--

From darlewis@cisco.com  Fri Feb 12 16:54:37 2010
Return-Path: <darlewis@cisco.com>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0385428C1E0 for <lisp@core3.amsl.com>; Fri, 12 Feb 2010 16:54:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.299
X-Spam-Level: 
X-Spam-Status: No, score=-8.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MANGLED_TOOL=2.3, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bXbmaeXIlABc for <lisp@core3.amsl.com>; Fri, 12 Feb 2010 16:54:36 -0800 (PST)
Received: from sj-iport-4.cisco.com (sj-iport-4.cisco.com [171.68.10.86]) by core3.amsl.com (Postfix) with ESMTP id 4B1AD3A792A for <lisp@ietf.org>; Fri, 12 Feb 2010 16:54:36 -0800 (PST)
Authentication-Results: sj-iport-4.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-AV: E=Sophos;i="4.49,464,1262563200"; d="scan'208";a="87702454"
Received: from sj-core-2.cisco.com ([171.71.177.254]) by sj-iport-4.cisco.com with ESMTP; 13 Feb 2010 00:55:56 +0000
Received: from [10.21.74.176] ([10.21.74.176]) by sj-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id o1D0tuEM022433; Sat, 13 Feb 2010 00:55:56 GMT
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Darrel Lewis <darlewis@cisco.com>
In-Reply-To: <5D6E81D4-77A1-4A20-B8AD-664F9316A969@cisco.com>
Date: Fri, 12 Feb 2010 16:55:56 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <9E784D3F-1B42-4E2E-9585-E1AECF1612D7@cisco.com>
References: <5D6E81D4-77A1-4A20-B8AD-664F9316A969@cisco.com>
To: Darrel Lewis <darlewis@cisco.com>
X-Mailer: Apple Mail (2.1077)
Cc: lisp@ietf.org
Subject: Re: [lisp] Proposed draft-ietf-lisp-interworking-01 draft
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Feb 2010 00:54:37 -0000

I just noticed some formatting bugs on the section numbers.  Will fix =
and post corrections.  But that shouldn't effect content for review.

-Darrel


On Feb 12, 2010, at 3:16 PM, Darrel Lewis wrote:

>=20
> Here is an updated version of the LISP Interworking specification that =
I'd like to
> publish to the Internet Drafts repository.
>=20
> The main addition to the draft is a the introduction of an optional =
network element called the "Proxy Egress Tunnel Router" or PETR.  =20
>=20
> Both html diffs and the full text of the new draft are attached.
>=20
> Comments appreciated.  I'd like to get this posted next Friday (by
> Feb 22nd).
>=20
> -Darrel
> 	(for the other Interworking authors: Dino, Dave, and Vince)
>=20
> =
<draft-ietf-lisp-Interworking-00-to-01-diff.html><draft-ietf-lisp-interwor=
king-01.txt>_______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From darlewis@cisco.com  Fri Feb 12 17:27:22 2010
Return-Path: <darlewis@cisco.com>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AC42328C255 for <lisp@core3.amsl.com>; Fri, 12 Feb 2010 17:27:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.165
X-Spam-Level: 
X-Spam-Status: No, score=-7.165 tagged_above=-999 required=5 tests=[AWL=1.133,  BAYES_00=-2.599, MANGLED_TOOL=2.3, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kvats8-rxz+8 for <lisp@core3.amsl.com>; Fri, 12 Feb 2010 17:27:18 -0800 (PST)
Received: from sj-iport-5.cisco.com (sj-iport-5.cisco.com [171.68.10.87]) by core3.amsl.com (Postfix) with ESMTP id 05D3A28C254 for <lisp@ietf.org>; Fri, 12 Feb 2010 17:27:14 -0800 (PST)
Authentication-Results: sj-iport-5.cisco.com; dkim=neutral (message not signed) header.i=none
X-Files: draft-ietf-lisp-Interworking-00-to-01-diff, draft-ietf-lisp-interworking-01.txt : 60364, 45944
X-IronPort-AV: E=Sophos;i="4.49,464,1262563200";  d="txt'?scan'208,217";a="150840375"
Received: from sj-core-4.cisco.com ([171.68.223.138]) by sj-iport-5.cisco.com with ESMTP; 13 Feb 2010 01:28:34 +0000
Received: from [10.21.74.176] ([10.21.74.176]) by sj-core-4.cisco.com (8.13.8/8.14.3) with ESMTP id o1D1SUT5005688; Sat, 13 Feb 2010 01:28:30 GMT
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: multipart/mixed; boundary=Apple-Mail-8--45498354
From: Darrel Lewis <darlewis@cisco.com>
In-Reply-To: <5D6E81D4-77A1-4A20-B8AD-664F9316A969@cisco.com>
Date: Fri, 12 Feb 2010 17:28:30 -0800
Message-Id: <0715C8C7-822B-4C32-B47C-A64458B00B3C@cisco.com>
References: <5D6E81D4-77A1-4A20-B8AD-664F9316A969@cisco.com>
To: Darrel Lewis <darlewis@cisco.com>
X-Mailer: Apple Mail (2.1077)
Cc: lisp@ietf.org
Subject: Re: [lisp] Proposed draft-ietf-lisp-interworking-01 draft
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Feb 2010 01:27:22 -0000

--Apple-Mail-8--45498354
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii

Corrected diff and proposed draft attached.

Thanks,

-Darrel


--Apple-Mail-8--45498354
Content-Disposition: attachment;
	filename=draft-ietf-lisp-Interworking-00-to-01-diff
Content-Type: application/octet-stream;
	name="draft-ietf-lisp-Interworking-00-to-01-diff"
Content-Transfer-Encoding: 7bit

<html><head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<title>wdiff draft-ietf-lisp-interworking-00.txt draft-ietf-lisp-interworking-01.txt</title></head><body>
<pre>
Network Working Group                                           D. Lewis
Internet-Draft                                                  D. Meyer
Intended status: Experimental                               D. Farinacci
Expires: <strike><font color="red">November 27, 2009</font></strike> <strong><font color="green">August 17, 2010</font></strong>                                       V. Fuller
                                                     Cisco Systems, Inc.
                                                            <strike><font color="red">May 26, 2009</font></strike>
                                                       <strong><font color="green">February 13, 2010</font></strong>

                  Interworking LISP with IPv4 and IPv6
                    <strike><font color="red">draft-ietf-lisp-interworking-00</font></strike>
                  <strong><font color="green">draft-ietf-lisp-interworking-01.txt

Abstract

   This document describes techniques for allowing sites running the
   Locator/ID Separation Protocol (LISP [LISP]) to interoperate with
   Internet sites (using either IPv4, IPv6, or both) which are not
   running LISP.  A fundamental property of LISP speaking sites is that
   they use Endpoint Identifiers (EIDs), rather than traditional IP
   addresses, in the source and destination fields of all traffic they
   emit or receive.  While EIDs are syntactically identical to IPv4 or
   IPv6 addresses, routes for them are not carried in the global routing
   system so an interoperability mechanism is needed for non-LISP-
   speaking sites to exchange traffic with LISP-speaking sites.  This
   document introduces three such mechanisms: the first uses a new
   network element, the LISP Proxy Ingress Tunnel Routers (PITR)
   (Section 5) to act as a intermediate LISP Ingress Tunnel Router (ITR)
   for non-LISP-speaking hosts while the second adds Network Address
   Translation (NAT) functionality to LISP Ingress and LISP Egress
   Tunnel Routers (xTRs) to substitute routable IP addresses for non-
   routable EIDs.  Finally, this document introduces a Proxy Egress
   Tunnel Router (PETR) to solve cases where a LISP site cannot send a
   packet which has as its source address a non-routable EID</font></strong>

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."
   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on <strike><font color="red">November 27, 2009.</font></strike> <strong><font color="green">August 17, 2010.</font></strong>

Copyright Notice

   Copyright (c) <strike><font color="red">2009</font></strike> <strong><font color="green">2010</font></strong> IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   <strong><font color="green">(http://trustee.ietf.org/license-info)</font></strong> in effect on the date of
   publication of this <strike><font color="red">document (http://trustee.ietf.org/license-info).</font></strike> <strong><font color="green">document.</font></strong>  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.

<strike><font color="red">Abstract

   This</font></strike>  <strong><font color="green">Code Components extracted from this</font></strong> document <strike><font color="red">describes techniques for allowing sites running the
   Locator/ID Separation Protocol (LISP [LISP]) to interoperate with
   Internet sites not running LISP.  A fundamental property of LISP-
   speaking sites is that they use Endpoint Identifiers (EIDs), rather
   than traditional IP addresses,</font></strike> <strong><font color="green">must
   include Simplified BSD License text as described</font></strong> in <strong><font color="green">Section 4.e of</font></strong>
   the <strike><font color="red">source</font></strike> <strong><font color="green">Trust Legal Provisions</font></strong> and <strike><font color="red">destination fields
   of all traffic they emit or receive.  While EIDs</font></strike> are <strike><font color="red">syntactically
   identical to IP addresses, routes for them are not carried in the
   global routing system so an interoperability mechanism is needed for
   non-LISP-speaking sites to exchange traffic with LISP-speaking sites.
   This document introduces two such mechanisms: the first uses a new
   network element, the LISP Proxy Tunnel Router (PTR) (Section 5) to
   act</font></strike> <strong><font color="green">provided without warranty</font></strong> as <strike><font color="red">a intermediate LISP Ingress Tunnel Router (ITR) for non-LISP-
   speaking hosts while</font></strike>
   <strong><font color="green">described in</font></strong> the <strike><font color="red">second adds Network Address Translation
   (NAT) functionality to LISP Ingress and LISP Egress Tunnel Routers
   (xTRs) to substitute routable IP addresses for non-routable EIDs.</font></strike> <strong><font color="green">BSD License.</font></strong>

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">3</font></strike>  <strong><font color="green">4</font></strong>
   2.  LISP Interworking Models . . . . . . . . . . . . . . . . . . .  <strike><font color="red">3</font></strike>  <strong><font color="green">6</font></strong>
   3.  Definition of Terms  . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">5</font></strike>  <strong><font color="green">8</font></strong>
   4.  Routable EIDs  . . . . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">6</font></strike> <strong><font color="green">11</font></strong>
     4.1.  Impact on Routing Table  . . . . . . . . . . . . . . . . .  <strike><font color="red">6</font></strike> <strong><font color="green">11</font></strong>
     4.2.  Requirement for using BGP  . . . . . . . . . . . . . . . .  <strike><font color="red">6</font></strike> <strong><font color="green">11</font></strong>
     4.3.  Limiting the Impact of Routable EIDs . . . . . . . . . . .  <strike><font color="red">6</font></strike> <strong><font color="green">11</font></strong>
     4.4.  Use of Routable EIDs for Testing LISP  . . . . . . . . . .  <strike><font color="red">7</font></strike> <strong><font color="green">11</font></strong>
   5.  Proxy <strong><font color="green">Ingress</font></strong> Tunnel Routers . . . . . . . . . . . . . . . . . <strike><font color="red">. . . .  7</font></strike> <strong><font color="green">13</font></strong>
     5.1.  <strike><font color="red">PTR</font></strike>  <strong><font color="green">PITR</font></strong> EID announcements . . . . . . . . . . . . . . . . . .  <strike><font color="red">7</font></strike> <strong><font color="green">13</font></strong>
     5.2.  Packet Flow with <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> . . . . . . . . . . . . . . . . . .  <strike><font color="red">8</font></strike> <strong><font color="green">13</font></strong>
     5.3.  Scaling <strike><font color="red">PTRs .</font></strike> <strong><font color="green">PITRs</font></strong>  . . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">9</font></strike> <strong><font color="green">14</font></strong>
     5.4.  Impact of the <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> placement in the network . . . . . . .  <strike><font color="red">9</font></strike> <strong><font color="green">15</font></strong>
     5.5.  Benefit to Networks Deploying <strike><font color="red">PTRs .</font></strike> <strong><font color="green">PITRs</font></strong>  . . . . . . . . . . .  <strike><font color="red">9</font></strike> <strong><font color="green">15</font></strong>
   6.  LISP-NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">10</font></strike> <strong><font color="green">16</font></strong>
     6.1.  LISP-NAT for LISP-NR addressed hosts . . . . . . . . . . . <strike><font color="red">10</font></strike> <strong><font color="green">16</font></strong>
     6.2.  LISP Sites with Hosts using RFC 1918 Addresses Sending
           to non-LISP Sites  . . . . . . . . . . . . . . . . . . . . <strike><font color="red">11</font></strike> <strong><font color="green">17</font></strong>
     6.3.  LISP Sites with Hosts using RFC 1918 Addresses
           Communicating to Other LISP Sites  . . . . . . . . . . . . <strike><font color="red">11</font></strike> <strong><font color="green">17</font></strong>
     6.4.  LISP-NAT and multiple EIDs . . . . . . . . . . . . . . . . <strike><font color="red">12</font></strike> <strong><font color="green">18</font></strong>
     6.5.  <strong><font color="green">When</font></strong> LISP-NAT and <strike><font color="red">PTRs Together</font></strike> <strong><font color="green">PITRs used by the same LISP Site . .</font></strong> . . <strong><font color="green">18
   7.  Proxy Egress Tunnel Routers</font></strong>  . . . . . . . . . . . . . . <strike><font color="red">12
   7.</font></strike> <strong><font color="green">. . . 20
     7.1.  Packet Flow with Proxy Egress Tunnel Routers . . . . . . . 20
   8.  Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs
       (PETRs)  . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
     8.1.  How Proxy-ITRs and Proxy-ETRs Interact . . . . . . . . . . 22
   9.</font></strong>  Security Considerations  . . . . . . . . . . . . . . . . . . . <strike><font color="red">13
   8.</font></strike> <strong><font color="green">23
   10.</font></strong> Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">13
   9.</font></strike> <strong><font color="green">24
   11.</font></strong> IANA Considerations  . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">14
   10.</font></strike> <strong><font color="green">25
   12.</font></strong> References . . . . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">14
     10.1.</font></strike> <strong><font color="green">26
     12.1.</font></strong> Normative References . . . . . . . . . . . . . . . . . . . <strike><font color="red">14
     10.2.</font></strike> <strong><font color="green">26
     12.2.</font></strong> Informative References . . . . . . . . . . . . . . . . . . <strike><font color="red">14</font></strike> <strong><font color="green">26</font></strong>
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">14</font></strike> <strong><font color="green">27</font></strong>

1.  Introduction

   This document describes two mechanisms for interoperation between
   LISP [LISP] sites, which use non-globally-routed EIDs, and non-LISP
   sites: use of <strike><font color="red">PTRs,</font></strike> <strong><font color="green">PITRs,</font></strong> which create highly-aggregated routes to EID
   prefixes for non-LISP sites to <strike><font color="red">follow; and the</font></strike> <strong><font color="green">follow.  The</font></strong> use of NAT by LISP ETRs
   when communicating with non-LISP hosts.  <strong><font color="green">And finally the use of Proxy
   Egress Tunnel routers (PETRs) LISP for sites relying on PITRs and
   which are faced with certain restrictions.</font></strong>

   A key behavior of the separation of Locators and End-Point-IDs is
   that EID prefixes are not advertised to the Internet's Default Free
   Zone (DFZ).  Specifically, only RLOCs are carried in the Internet's
   DFZ.  Existing Internet sites (and their hosts) who do not
   participate in the LISP system must still be able to reach sites
   numbered from this non routed EID space.  This draft describes a set
   of mechanisms that can be used to provide reachability between sites
   that are LISP-capable and those that are not.  This document
   introduces <strike><font color="red">two</font></strike> <strong><font color="green">three</font></strong> such <strike><font color="red">mechanisms: the</font></strike> <strong><font color="green">mechanisms.  The</font></strong> first uses a new network
   element, the LISP Proxy <strong><font color="green">Ingress</font></strong> Tunnel Router <strike><font color="red">(PTR)</font></strike> <strong><font color="green">(PITR)</font></strong> (Section 5) to
   act as a intermediate LISP Ingress Tunnel Router (ITR) for <strike><font color="red">non-LISP-speaking
   hosts while the</font></strike> <strong><font color="green">non-LISP-
   speaking hosts.  The</font></strong> second adds a form of Network Address
   Translation (NAT) functionality to Tunnel Routers (xTRs) to
   substitute routable IP addresses for non-routable EIDs.

   <strike><font color="red">More detailed descriptions of these mechanisms and the</font></strike>  <strong><font color="green">The final
   network element is the LISP Proxy Egress Tunnel Routers (PETR), which
   act as an intermediate Egress Tunnel Router (ETR) for LISP sites who
   are using PITRs but need assistance in reaching non-LISP sites.

   More detailed descriptions of these mechanisms and the</font></strong> network
   elements involved may be found in the following sections:

   - Section 2 describes the different cases where interworking
   mechanisms are needed

   - Section 3 defines terms used throughout the document

   - Section 4 describes the relationship between the new EID prefix
   space and the IP address space used by the current Internet

   - Section 5 introduces and describes the operation of <strike><font color="red">PTRs</font></strike> <strong><font color="green">Proxy-ITRs</font></strong>

   - Section 6 defines how NAT is used by ETRs to translate non-routable
   EIDs into routable IP addresses.

   <strong><font color="green">- Section 7 introduces and describes the operations of Proxy-ETRs

   - Section 8 describes the relationship between asymmetric and
   Symmetric interworking mechanisms (Proxy-ITRs and Proxy-ETRs vs LISP-
   NAT)</font></strong>

   Note that any successful interworking model should be independent of
   any particular EID-to-RLOC mapping algorithm.  This document does not
   comment on the value of any of the particular <strong><font color="green">LISP</font></strong> mapping <strike><font color="red">system.</font></strike> <strong><font color="green">systems.</font></strong>

2.  LISP Interworking Models

   There are 4 unicast connectivity cases which describe how sites can
   communicate with each other:

   1.  Non-LISP site to Non-LISP site

   2.  LISP site to LISP site

   3.  LISP site to Non-LISP site

   4.  Non-LISP site to LISP site

   Note that while Cases 3 and 4 seem similar, there are subtle
   differences due to the way communications are originated.

   The first case is the Internet as we know it today and as such will
   not be discussed further here.  The second case is documented in
   [LISP] and, hence, there are no new interworking requirements because
   there are no new protocol requirements placed on intermediate non-
   LISP routers.

   In case 3, LISP site to Non-LISP site, a LISP site can <strong><font color="green">(in most
   cases)</font></strong> send packets to a non-LISP site because the non-LISP site
   prefixes are routable.  The non-LISP site need not do anything new to
   receive packets.  The only action the LISP site needs <strong><font color="green">(with two
   possible caveats introduced below)</font></strong> to take is to know when not to <strike><font color="red">LISP-
   encapsulate</font></strike>
   <strong><font color="green">LISP-encapsulate</font></strong> packets.  This can be achieved via two mechanisms:

   1.  At the ITR in the source site, if the destination of an IP packet
       is found to match a prefix from the BGP routing table, then the
       site is directly reachable by the BGP core that exists and
       operates today.

   2.  Second, if (from the perspective of the ITR at the source site)
       the destination address of an IP address is not found in the EID-
       to-RLOC mapping database, the ITR could infer that it is not a
       LISP-capable site, and decide to not LISP-encapsulate the packet.

   <strong><font color="green">3.  There are two potential caveats involved with Case 3, where there
       could be some situations where (unencapsualted) packets
       originated by a LISP site may not be forwarded to a non-LISP
       site.  One of these caveats (uRPF check failure) are detailed in
       Section 9 (Security Considerations).  The second caveat (protocol
       traversal) is reviewed in section 7, (Proxy-Egress Tunnel
       Routers).</font></strong>

   Case 4, <strong><font color="green">typically</font></strong> the most challenging, occurs when a host at a <strike><font color="red">non-LISP</font></strike> <strong><font color="green">non-
   LISP</font></strong> site wishes to send traffic to a host at a LISP site.  If the
   source host uses a (non-globally-routable) EID as the destination IP
   address, the packet is forwarded inside the source site until it
   reaches a router which cannot forward it, at which point the traffic
   is dropped.  For traffic not to be dropped, either some route must be
   exist for the destination EID outside of LISP-speaking part of the
   network or an alternate mechanism must be in place.  Section 5 <strike><font color="red">(PTRs)</font></strike>
   <strong><font color="green">(PITRs)</font></strong> and Section 6 (LISP-NAT) describe two such mechanisms.

   Note that case 4 includes packets returning to the LISP Site in case
   3.

3.  Definition of Terms

   Endpoint ID (EID):  <strong><font color="green">Endpoint ID (EID):</font></strong> A <strike><font color="red">32-</font></strike> <strong><font color="green">32-bit (for IPv4)</font></strong> or 128-bit
      <strong><font color="green">(for IPv6)</font></strong> value used in the source and destination <strong><font color="green">address</font></strong> fields
      of the first (most inner) LISP header of a packet.  <strike><font color="red">A packet that is emitted by</font></strike>  <strong><font color="green">The host
      obtains</font></strong> a <strike><font color="red">system contains EIDs in its
      headers and LISP headers are prepended only when</font></strike> <strong><font color="green">destination EID</font></strong> the <strike><font color="red">packet
      reaches</font></strike> <strong><font color="green">same way it obtains</font></strong> an <strike><font color="red">Ingress Tunnel Router (ITR) on the data path to the</font></strike> destination <strike><font color="red">EID.

   EID-Prefix Aggregate:  A set of EID-prefixes said</font></strike>
      <strong><font color="green">address today, for example through a DNS lookup or SIP exchange.
      The source EID is obtained via existing mechanisms used</font></strong> to <strike><font color="red">be aggregatable
      in the [RFC4632] sense.  That is, an EID-Prefix aggregate</font></strike> <strong><font color="green">set a
      host's "local" IP address.  An EID</font></strong> is
      <strike><font color="red">defined</font></strike> <strong><font color="green">allocated</font></strong> to <strike><font color="red">be</font></strike> a <strike><font color="red">single contiguous power-of-two</font></strike> <strong><font color="green">host from an</font></strong>
      EID-prefix <strike><font color="red">block.
      Such a</font></strike> block <strong><font color="green">associated with the site where the host</font></strong> is <strike><font color="red">characterized</font></strike>
      <strong><font color="green">located.  An EID can be used</font></strong> by a <strike><font color="red">prefix and</font></strike> <strong><font color="green">host to refer to other hosts.
      EIDs MUST NOT be used as LISP RLOCs.  Note that EID blocks may be
      assigned in</font></strong> a <strike><font color="red">length.

   Routing Locator (RLOC):  An IP address</font></strike> <strong><font color="green">hierarchical manner, independent</font></strong> of <strike><font color="red">a LISP tunnel router.  It
      is</font></strike> the <strike><font color="red">output</font></strike> <strong><font color="green">network
      topology, to facilitate scaling</font></strong> of <strike><font color="red">a EID-to-RLOC</font></strike> <strong><font color="green">the</font></strong> mapping <strike><font color="red">lookup.  An</font></strike> <strong><font color="green">database.  In
      addition, an EID block assigned to a site may have site-local
      structure (subnetting) for routing within the site; this structure
      is not visible to the global routing system.  When used in
      discussions with other Locator/ID separation proposals, a LISP EID
      will be called a "LEID".  Throughout this document, any references
      to "EID" refers to an LEID.

   EID-Prefix:  EID-prefix: A power-of-2 block of EIDs which are
      allocated to a site by an address allocation authority.  EID-
      prefixes are associated with a set of RLOC addresses which make up
      a "database mapping".  EID-prefix allocations can be broken up
      into smaller blocks when an RLOC set is to be associated with the
      smaller EID- prefix.  A globally routed address block (whether PI
      or PA) is not an EID-prefix.  However, a globally routed address
      block may be removed from global routing and reused as an EID-
      prefix.  A site that receives an explicitly allocated EID-prefix
      may not use that EID-prefix as a globally routed prefix assigned
      to RLOCs

   EID-Prefix Aggregate:  A set of EID-prefixes said to be aggregatable
      in the [RFC4632] sense.  That is, an EID-Prefix aggregate is
      defined to be a single contiguous power-of-two EID-prefix block.
      Such a block is characterized by a prefix and a length.  Provider
      Independent (PI) Addresses: an address block assigned from a pool
      where blocks are not associated with any particular location in
      the network (e.g. from a particular service provider), and is
      therefore not topologically aggregatable in the routing system.

   Routing Locator (RLOC):  The IPv4 or IPv6 address of an egress tunnel
      router (ETR).  It is the output of a EID-to-RLOC mapping lookup.
      An</font></strong> EID maps to one or more RLOCs.  Typically, RLOCs are numbered
      from <strike><font color="red">topologically-
      aggregatable</font></strike> <strong><font color="green">topologically-aggregatable</font></strong> blocks <strike><font color="red">and</font></strike> <strong><font color="green">that</font></strong> are assigned to a site
      at each point to which it attaches to the global Internet; where
      the topology is defined by the connectivity of provider networks,
      RLOCs can be thought of as <strike><font color="red">Provider Aggregatable (PA)</font></strike> <strong><font color="green">PA</font></strong> addresses.  <strong><font color="green">Multiple RLOCs can be
      assigned to the same ETR device or to multiple ETR devices at a
      site.</font></strong>

   EID-to-RLOC Mapping:  A binding between an EID and the RLOC-set that
      can be used to reach the EID.  We use the term "mapping" in this
      document to refer to a EID-to-RLOC mapping.

   EID Prefix Reachability:  An EID prefix is said to be "reachable" if
      one or more of its locators are reachable.  That is, an EID prefix
      is reachable if the ETR (or its proxy) is reachable.

   Default Mapping:  A Default Mapping is a mapping entry for EID-prefix
      0.0.0.0/0.  It maps to a locator-set used for all EIDs in the
      Internet.  If there is a more specific EID-prefix in the mapping
      cache it overrides the Default Mapping entry.  The Default Mapping
      route can be learned by configuration or from a Map-Reply message
      [LISP].

   LISP Routable (LISP-R) Site:  A LISP site whose addresses are used as
      both globally routable IP addresses and LISP EIDs.

   LISP Non-Routable (LISP-NR) Site:  A LISP site whose addresses are
      EIDs only, these EIDs are not found in the legacy Internet routing
      table.

   LISP Proxy <strong><font color="green">Ingress</font></strong> Tunnel Router <strike><font color="red">(PTR):  PTRs</font></strike> <strong><font color="green">(PITR):  PITRs</font></strong> are used to provide
      interconnectivity between sites which use LISP EIDs and those
      which do not.  They act as a gateway between the Legacy Internet
      and the LISP enabled Network.  A given <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> advertises one or more
      highly aggregated EID prefixes into the public Internet and acts
      as the ITR for traffic received from the public Internet.  LISP
      Proxy <strong><font color="green">Ingress</font></strong> Tunnel Routers are described in Section 5.

   LISP Network Address Translation (LISP-NAT):  Network Address
      Translation between EID space assigned to a site and RLOC space
      also assigned to that site.  LISP Network Address Translation is
      described in Section 6.

    <strike><font color="red">EID Sub Namespace:  A power-of-two block of aggregatable locators
      set aside for</font></strike>

   LISP <strike><font color="red">interworking.

4.  Routable EIDs

   An obvious</font></strike> <strong><font color="green">Proxy Egress Tunnel Router (PETR):  PETRs are used to provide a
      LISP site's ITRs the ability to send traffic to non-LISP sites in
      cases where unencapsualted packets (the default mechanism) would
      fail to be delivered.  PETRs are implemented by having an ITR
      encapsulate all non-LISP destined traffic to a pre-configured
      PETR.  LISP Proxy Egress Tunnel Routers are described in
      Section 7.

    EID Sub Namespace:  A power-of-two block of aggregatable locators
      set aside for LISP interworking.

4.  Routable EIDs

   An obvious</font></strong> way to achieve interworking between LISP and non-LISP
   hosts is to simply announce EID prefixes into the DFZ, much like
   routing system, effectively treating them as "Provider Independent
   (PI)" prefixes.  Doing this is undesirable as it defeats one of the
   primary goals of LISP - to reduce global routing system state.

4.1.  Impact on Routing Table

   If EID prefixes are announced into the DFZ, the impact is similar to
   the case in which LISP has not been deployed, because these EID
   prefixes will be no more aggregatable than existing PI addressing.
   This behavior is not desirable and such a mechanism is not viewed as
   a viable long term solution.

4.2.  Requirement for using BGP

   Non-LISP sites today use BGP to, among other things, enable ingress
   traffic engineering.  Relaxing this requirement is another primary
   design goal of LISP.

4.3.  Limiting the Impact of Routable EIDs

   Two schemes are proposed to limit the impact of having EIDs announced
   in the current global Internet routing table:

   <strong><font color="green">1.</font></strong>  Section 5 discusses the LISP Proxy Tunnel Router, an approach
       that provides ITR functionality to bridge LISP-capable and <strike><font color="red">non-LISP-
      capable</font></strike> <strong><font color="green">non-
       LISP-capable</font></strong> sites.

   <strong><font color="green">2.</font></strong>  Section 6 discusses another approach, LISP-NAT, in which NAT
       [RFC2993] is combined with ITR functionality to limit the the
       impact of routable EIDs on the Internet routing infrastructure.

4.4.  Use of Routable EIDs for Testing LISP

   A primary design goal for LISP (and other Locator/ID separation
   proposals) is to facilitate topological aggregation of addresses and,
   thus, decrease global routing system state.  Another goal is to
   achieve the benefits of improved aggregation as soon as possible.
   <strike><font color="red">Advertising</font></strike>
   <strong><font color="green">Sites advertising</font></strong> routes for LISP EID prefixes into the global
   routing system is therefore not recommended.

   That being said, <strong><font color="green">single homed sites (or multi-homed</font></strong> sites that are
   <strong><font color="green">not leaking more specific exceptions) and that are</font></strong> already using
   provider-aggregated prefixes can use these prefixes as LISP EIDs
   without adding state to the routing system; in other words, such
   sites do not cause additional prefixes to be advertised.  For such
   sites, connectivity to a non-LISP sites does not require interworking
   machinery because the "PA" EIDs are already <strike><font color="red">routable.</font></strike> <strong><font color="green">routable (they are
   effectively LISP-R type sites).  Their EIDs are found in the LISP
   mapping system, and their (aggregate) PA prefix(es) are found in the
   DFZ Internet.

   The continued announcements of an existing site's Provider
   Independent (or "PI") prefix(s) is of course under control of that
   site, and some period of transition where a site is is found both in
   the LISP mapping system and as a discrete prefix in the Internet
   routing system may be a viable transition strategy.  Care should be
   taken not to advertise additional more specific LISP EID prefixes
   into the DFZ.</font></strong>

5.  Proxy <strong><font color="green">Ingress</font></strong> Tunnel Routers

   Proxy <strong><font color="green">Ingress</font></strong> Tunnel Routers <strike><font color="red">(PTRs)</font></strike> <strong><font color="green">(PITRs)</font></strong> allow for non-LISP sites to
   communicate with LISP-NR sites.  A <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> is a new network element that
   shares many characteristics with the LISP ITR.  <strike><font color="red">PTRs</font></strike>  <strong><font color="green">PITRs</font></strong> allow non-LISP
   sites to send packets to LISP-NR sites without any changes to
   protocols or equipment at the non-LISP site.  <strike><font color="red">PTRs</font></strike>  <strong><font color="green">PITRs</font></strong> have two primary
   functions:

   Originating EID Advertisements:  <strike><font color="red">PTRs</font></strike>  <strong><font color="green">PITRs</font></strong> advertise highly aggregated
      EID-prefix space on behalf of LISP sites to so that non-LISP sites
      can reach them.

   Encapsulating Legacy Internet Traffic:  <strike><font color="red">PTRs</font></strike>  <strong><font color="green">PITRs</font></strong> also encapsulate non-
      LISP Internet traffic into LISP packets and route them towards
      their destination RLOCs.

5.1.  <strike><font color="red">PTR</font></strike>  <strong><font color="green">PITR</font></strong> EID announcements

   A key part of <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> functionality is to advertise routes for highly-
   aggregated EID prefixes into part of the global routing system.
   Aggressive aggregation is performed to minimize the number of new
   announced routes.  In addition, careful placement of <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> can
   greatly reduce the scope of these new routes.  To this end, <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong>
   should be deployed close to non-LISP-speaking rather than close to
   LISP sites.  Such deployment not only limits the scope of EID-prefix
   route advertisements, it also also allows traffic forwarding load to
   be spread among many <strike><font color="red">PTRs.</font></strike> <strong><font color="green">PITRs.</font></strong>

5.2.  Packet Flow with <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong>

   Packets from a non-LISP site can reach a LISP-NR site with the aid of
   a <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>  By advertising a route for a particular EID prefix into the
   global routing system, traffic destined for that EID prefix is routed
   to the <strike><font color="red">PTR,</font></strike> <strong><font color="green">PITR,</font></strong> which then performs LISP encapsulation.  Once
   encapsulated, traffic packets use the LISP (outer) header's
   destination address to reach the destination ETR.

   What follows is an example of the path a packet would take when using
   a <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>  In this example, the LISP-NR site is given the EID prefix
   240.0.0.0/24.  For the purposes of this example, this prefix and no
   covering aggregate is present in the global routing system.  In other
   words, if a packet with this destination were to reach a router in
   the "Default Free Zone", it would be dropped.

   A full protocol exchange example follows:

   1.  Source host makes a DNS lookup EID for destination, and gets
       240.1.1.1 in return.

   2.  Source host has a default route to customer Edge (CE) router and
       forwards the packet to the CE.

   3.  The CE has a default route to its Provider Edge (PE) router, and
       forwards the packet to the PE.

   4.  The PE has route to 240.0.0.0/24 and the next hop is the <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>

   5.  The <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> has or acquires a mapping for 240.1.1.1 and LISP
       encapsulates, the packet now has a destination address of the
       RLOC.  The source address of this encapsulated packet is the
       <strike><font color="red">PTR's</font></strike>
       <strong><font color="green">PITR's</font></strong> RLOC.

   6.  The <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> looks up the RLOC, and forwards LISP packet to the next
       hop.

   7.  The ETR decapsulates the packet and delivers the packet to the
       240.1.1.1 host in the destination LISP site.

   8.  Packets from host 240.1.1.1 will flow back through the LISP
       site's ITR.  Such packets are not encapsulated because the ITR
       knows that the destination (the original source) is a non-LISP
       site.  The ITR knows this because it can check the LISP mapping
       database for the destination EID, and on a failure determine that
       the destination site is not LISP enabled.

   9.  Packets are then routed natively and directly to the destination
       (original source) site.

   Note that in this example the return path is asymmetric, so return
   traffic will not go back through the <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>  This is because the
   LISP-NR site's ITR will discover that the originating site is not a
   LISP site, and not encapsulate the returning packet (see [LISP] for
   details of ITR behavior).

   The asymmetric nature of traffic flows allows the <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> to be
   relatively simple - it will only have to encapsulate LISP packets.

5.3.  Scaling <strike><font color="red">PTRs

   PTRs</font></strike> <strong><font color="green">PITRs

   PITRs</font></strong> attract traffic by announcing the LISP EID namespace into parts
   of the non-LISP-speaking global routing system.  There are several
   ways that a network could control how traffic reaches a particular
   <strike><font color="red">PTR</font></strike>
   <strong><font color="green">PITR</font></strong> to prevent it from receiving more traffic than it can handle:

   First, the <strike><font color="red">PTR's</font></strike> <strong><font color="green">PITR's</font></strong> aggregate routes might be selectively announced,
   giving a coarse way to control the quantity of traffic attracted by
   that <strike><font color="red">PTR.</font></strike> <strong><font color="green">PITR.</font></strong>

   Second, the same address might be announced by multiple <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> in
   order to share the traffic using IP Anycast.  The asymmetric nature
   of traffic flows allows the <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> to be relatively simple - it will
   only have to encapsulate LISP packets.

5.4.  Impact of the <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> placement in the network

   There are several approaches that a network could take in placing
   <strike><font color="red">PTRs.</font></strike>
   <strong><font color="green">PITRs.</font></strong>  Placing the <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong> near the ingress of traffic allows for the
   communication between the non-LISP site and the LISP site to have the
   least "stretch" (i.e. the least number of forwarding hops when
   compared to an optimal path between the sites).

   Some proposals, for example CRIO [CRIO], have suggested grouping <strike><font color="red">PTRs</font></strike>
   <strong><font color="green">PITRs</font></strong> near an arbitrary subset of ETRs and announcing a 'local'
   subset of EID space.  This model cannot guarantee minimum stretch if
   the EID prefix route advertisement points are changed (such a change
   might occur if a site adds, removes, or replaces one or more ISPs
   connections).

5.5.  Benefit to Networks Deploying <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong>

   When traffic destined for LISP-NR site arrives and is encapsulated at
   a <strike><font color="red">PTR,</font></strike> <strong><font color="green">PITR,</font></strong> a new LISP packet header is pre-pended.  This causes the
   packet's destination to be set to the destination site RLOC.  Because
   traffic is thus routed towards RLOCs, it can potentially better
   follow the network's traffic engineering policies (such as closest
   exit routing).  This also means that providers who are not default-
   free and do not deploy <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> end up sending more traffic to expensive
   transit links rather than to RLOC addresses, to which they may have
   settlement-free peering.  For large transit providers, deploying <strike><font color="red">PTRs</font></strike>
   <strong><font color="green">PITRs</font></strong> may attract more traffic, and therefore more revenue, from
   their customers.

6.  LISP-NAT

   LISP Network Address Translation (LISP-NAT) is a limited form of NAT
   [RFC2993].  LISP-NAT is designed to enable the interworking of non-
   LISP sites and LISP-NR sites by ensuring that the LISP-NR's site
   addresses are always routable.  LISP-NAT accomplishes this by
   translating a host's source address from an 'inner' value to an
   'outer' value and keeping this translation in a table that it can
   reference for subsequent packets.

   In addition, existing RFC 1918 [RFC1918] sites can use LISP-NAT to
   talk to both LISP or non-LISP sites.

   The basic concept of LISP-NAT is that when transmitting a packet, the
   ITR replaces a non-routable EID source address with a routable source
   address, which enables packets to return to the site.

   There are two main cases that involve LISP-NAT:

   1.  Hosts at LISP sites that use non-routable global EIDs speaking to
       non-LISP sites using global addresses.

   2.  Hosts at LISP sites that use RFC 1918 private EIDs speaking to
       other sites, who may be either LISP or non-LISP.

   Note that LISP-NAT is not needed in the case of LISP-R (routable
   global EIDs) sources.  This <strong><font color="green">case occurs when a site is announcing its
   prefix into both the LISP mapping system as well as the Internet DFZ.
   This</font></strong> is because the LISP-R source's address is routable, and return
   packets will be able to natively reach the site.

6.1.  LISP-NAT for LISP-NR addressed hosts

   LISP-NAT allows a host with a LISP-NR EID to communicate with non-
   LISP hosts by translating the LISP-NR EID to a globally unique
   address.  This globally unique address may be a either a PI or PA
   address.

   An example of this translation follows.  For this example, a site has
   been assigned a LISP-NR EID of 220.1.1.0/24.  In order to utilize
   LISP-NAT, the site has also been provided the PA EID of
   128.200.1.0/24, and uses the first address (128.200.1.1) as the
   site's RLOC.  The rest of this PA space (128.200.1.2 to
   128.200.1.254) is used as a translation pool for this site's hosts
   who need to communicate with non-LISP hosts.

   The translation table might look like the following:

     Site NR-EID    Site R-EID      Site's RLOC    Translation Pool
   <strike><font color="red">=========================================================================</font></strike>
     <strong><font color="green">===================================================================</font></strong>
     220.1.1.0/24   128.200.1.0/24  128.200.1.1    <strike><font color="red">128.200.1.2 - 128.200.1.254</font></strike>    <strong><font color="green">128.200.1.2-254</font></strong>

                    Figure 1: Example Translation Table

   The Host 220.1.1.2 sends a packet destined for a non-LISP site to its
   default route (the ITR).  The ITR receives the packet, and determines
   that the destination is not a LISP site.  How the ITR makes this
   determination is up to the ITRs implementation of the EID-to-RLOC
   mapping system used (see, for example [LISP-ALT]).

   The ITR then rewrites the source address of the packet from 220.1.1.2
   to 128.200.1.2, which is the first available address in the LISP-R
   EID space available to it.  The ITR keeps this translation in a table
   in order to reverse this process when receiving packets destined to
   128.200.1.2.

   Finally, when the ITR forwards this packet without encapsulating it,
   it uses the entry in its LISP-NAT table to translate the returning
   packets' destination IPs to the proper host.

6.2.  LISP Sites with Hosts using RFC 1918 Addresses Sending to non-LISP
      Sites

   In the case where RFC 1918 addressed hosts desire to communicate with
   non-LISP hosts the LISP-NAT implementation acts much like an existing
   IPv4 NAT device.  The ITR providing the NAT service must use LISP-R
   EIDs for its global pool as well as providing all the standard NAT
   functions required today.

   The source of the packet must be translated to a LISP-R EID in a
   manner similar to Section 6, and this packet must be forwarded to the
   ITR's next hop for the destination, without LISP encapsulation.

6.3.  LISP Sites with Hosts using RFC 1918 Addresses   Communicating to
      Other LISP Sites

   LISP-NAT allows a host with a RFC 1918 address to communicate with
   LISP hosts by translating the RFC 1918 address to a LISP EID.  After
   translation, the communication between source and destination ITR and
   ETRs continues as described in [LISP].

   An example of this translation and encapsulation follows.  For this
   example, a host has been assigned a RFC 1918 address of 192.168.1.2.
   In order to utilize LISP-NAT, the site also has been provided the
   LISP-R EID of 192.0.2.0/24, and uses the first address (192.0.2.1) as
   the site's RLOC.  The rest of this PA space (192.0.2.2 to
   192.0.2.254) is used as a translation pool for this site's hosts who
   need to communicate with both non-LISP and LISP hosts.

   The Host 192.168.1.2 sends a packet destined for a non-LISP site to
   its default route (the ITR).  The ITR receives the packet and
   determines that the destination is a LISP site.  How the ITR makes
   this determination is up to the ITRs implementation of the EID/RLOC
   mapping system.

   The ITR then rewrites the source address of the packet from
   192.168.1.2 to 192.0.2.2, which is the first available address in the
   LISP EID space available to it.  The ITR keeps this translation in a
   table in order to reverse this process when receiving packets
   destined to 192.0.2.2.

   The ITR then LISP encapsulates this packet (see [LISP] for details).
   The ITR uses the site's RLOC as the LISP outer header's source and
   the translation address as the LISP inner header's source.  Once it
   decapsulates returning traffic, it uses the entry in its LISP-NAT
   table to translate the returning packet's destination IP address and
   then forward to the proper host.

6.4.  LISP-NAT and multiple EIDs

   When a site has two addresses that a host might use for global
   reachability, care must be chosen on which EID is found in DNS.  For
   example, whether applications such as DNS use the LISP-R EID or the
   LISP-NR EID.  This problem exists for NAT in general, but the
   specific issue described above is unique to LISP.  Using <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> can
   mitigate this problem, since the LISP-NR EID can be reached in all
   cases.

6.5.  <strong><font color="green">When</font></strong> LISP-NAT and <strike><font color="red">PTRs Together</font></strike> <strong><font color="green">PITRs used by the same LISP Site</font></strong>

   With LISP-NAT, there are two EIDs possible for a given host, the
   LISP-R EID and the LISP-NR EID.  When a site has two addresses that a
   host might use for global reachability, name-to-address directories
   may need to be modified.

   This problem, global addressability, exists for NAT in general, but
   the specific issue described above is unique to LOC/ID split schemes.
   Some schemes [ref: 6-1 proxy] have suggested running a separate DNS
   instance for legacy types of EIDs.  This solves the problem but
   introduces complexity for the site.  Alternatively, using <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> can
   mitigate this problem, because the LISP-NR EID can <strike><font color="red">hbe</font></strike> <strong><font color="green">be</font></strong> reached in <strike><font color="red">all
   cases.</font></strike> <strong><font color="green">all
   cases.

   In summary, there are two options for interworking LISP with IPv4 and
   V6.  In the NAT case the LISP site can use NAT and manage the
   transition on its own.  In the PITR case, we add a new network
   element called a PITR that can relieve that burden on the site, with
   the downside of potentially adding stretch to sites trying to reach
   the LISP site.

7.  Proxy Egress Tunnel Routers

   Proxy Egress Tunnel Routers (PETRs) allow for LISP-NR sites to
   communicate with non-LISP sites in the case where the access network
   does not allow for the LISP-NR site send packets with the source
   address of the site's EID(s).  A PETR is a new network element that
   conceptually acts as an ETR for traffic destined to non-LISP sites.
   This also has the effect of allowing an ITR avoid having to decide
   whether to encapsulate packets or not - it will always encapsulate
   packets.  Packets destined to LISP sites will travel directly to that
   site's ETR, all other packets will be sent to the site's PETR.

   There are two primary reasons why sites would want to utilize a PETR:

   Avoiding strict uRPF failures:  Some provider's access networks
      require the source of the packets emitted to be within the
      addressing scope of the access networks. (see section 9)

   Traversing a different IP Protocol:  A LISP site may want to transmit
      packets to a non-LISP site where the some of the intermediate
      network does not support an IP protocol (v4 or v6).  PETRs can
      allow this LISP site's data to 'hop over' this by utilizing LISP's
      support for mixed protocol encapsulation.

7.1.  Packet Flow with Proxy Egress Tunnel Routers

   Packets from a LISP site can reach a non-LISP site with the aid of a
   Proxy-ETR (or PETR).  An ITR is simply configured to send all non-
   LISP traffic, which it normally would have forwarded natively (non-
   encapsulated), to a PETR.  Note that this outer encapsulation may be
   in another IP protocol than the (inner) encapsulated data.  Traffic
   then uses use the LISP (outer) header's destination address to reach
   the destination PETR.

   A PETR should verify the (inner) source EID of the packet at time of
   decapsulation in order to verify that this is from a configured LISP
   site.  This is to prevent spoofed inner sources from being
   encapsulated through the Proxy-ETR.

   What follows is an example of the path a packet would take when using
   a PETR.  In this example, the LISP-NR site is given the EID prefix
   240.2.0.0/24, and it is trying to reach host at a non-LISP site with
   the IP prefix of 192.0.2.0/24.  For the purposes of this example, the
   destination is a non-LISP site and 192.0.2.0/24 is found in the
   Internet's routing system.

   A full protocol exchange example follows:

   1.  Source host makes a DNS lookup for the destination, and gets
       192.0.2.100 (a non-LISP site) in return.

   2.  Source host has a default route to customer Edge (CE) router and
       forwards the packet towards the CE.

   3.  The CE is a LISP ITR, and is configured to encapsulate traffic
       destined for non-lisp sites to a Proxy-ETR.

   4.  The Proxy ETR decapsulates the LISP packet and forwards the
       original packet to its next hop.

   5.  The packet is then routed natively and directly to the
       destination (non-LISP) site 192.0.2.0/24.

   Note that in this example the return path is asymmetric, so return
   traffic will not go back through the Proxy-ITR.  This means that in
   order to reach LISP-NR sites, non-lisp sites must still use Proxy
   ITRs.

8.  Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs (PETRs)</font></strong>

   In summary, there are <strike><font color="red">two</font></strike> <strong><font color="green">three</font></strong> options for interworking LISP with <strong><font color="green">non-
   LISP Sites (for both</font></strong> IPv4 and
   <strike><font color="red">V6.</font></strike> <strong><font color="green">IPv6).</font></strong>  In the <strike><font color="red">NAT case</font></strike> <strong><font color="green">LISP-NAT option</font></strong> the LISP
   site can <strike><font color="red">use NAT and</font></strike> manage <strong><font color="green">and control</font></strong> the
   <strike><font color="red">transition</font></strike> <strong><font color="green">interworking</font></strong> on its own.  In the <strike><font color="red">PTR</font></strike> <strong><font color="green">PITR</font></strong>
   case, we add a new network element
   <strike><font color="red">called a PTR that can</font></strike> relieve that burden on the site,
   with the
   <strike><font color="red">downside</font></strike> <strong><font color="green">cost</font></strong> of potentially adding stretch to <strong><font color="green">the connections of
   non-LISP</font></strong> sites <strike><font color="red">trying to reach</font></strike> <strong><font color="green">communicating with</font></strong> the LISP site.

<strike><font color="red">7.</font></strike>  <strong><font color="green">The third option is
   Proxy-ETRs, which are optionally used by sites relying on PITRs case
   to mitigate two caveats for LISP sites communicating with non-LISP
   sites.  This means Proxy-ETRs are not expected to be deployed by
   themselves, they will always be used to assist sites already using
   PITRs.

8.1.  How Proxy-ITRs and Proxy-ETRs Interact

   There is a subtle difference between Symmetrical (LISP-NAT) vs
   Asymmetrical (Proxy-ITR and Proxy-ETR) Interworking techniques.
   Operationally, Proxy-ITRs (PITRs) and Proxy-ETRs (PETRs) can (and
   likely should) be decoupled since Proxy-ITRs are best deployed
   closest to non-LISP sites, and Proxy-ETRs are best located close to
   the LISP site's they are decapsulating on behalf of.  This asymmetric
   placement of the two network elements keeps the stretched imposed on
   the connection to a minimum, while still allowing for coarsely
   aggregated announcements of EIDs into the Internet's routing table.

9.</font></strong>  Security Considerations

   Like any LISP ITR, <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> will have the <strike><font color="red">ability</font></strike> <strong><font color="green">opportunity</font></strong> to inspect traffic
   at the time that they encapsulate.  <strike><font color="red">More work needs to be done to see if
   this ability can be exploited by the control plane along</font></strike>  <strong><font color="green">The location of these devices in</font></strong>
   the <strike><font color="red">lines</font></strike> <strong><font color="green">network can have implications for dropping malicious traffic on
   behalf</font></strong> of
   <strike><font color="red">Remote Triggered BGP Black Holes.  XXX:Reference?</font></strike> <strong><font color="green">ETRs who request this behavior (via the drop action bit in
   Map-Reply packets for an EID or EID prefix).</font></strong>

   As with traditional NAT, LISP-NAT will <strike><font color="red">hide</font></strike> <strong><font color="green">obscure</font></strong> the actual host <strike><font color="red">ID</font></strike>
   <strong><font color="green">LISP-NR EID</font></strong> behind the <strike><font color="red">RLOCs</font></strike> <strong><font color="green">LISP-R addresses</font></strong> used as the NAT pool.

   When LISP Sites <strike><font color="red">reply</font></strike> <strong><font color="green">send packets</font></strong> to non-LISP sites <strike><font color="red">and</font></strike> <strong><font color="green">(these non-LISP</font></strong> rely
   on <strike><font color="red">PTRs</font></strike> <strong><font color="green">PITRs</font></strong> to enable
   <strike><font color="red">Interworking,</font></strike> <strong><font color="green">Interworking),</font></strong> packets will <strike><font color="red">be sourced from addresses</font></strike> <strong><font color="green">have the Site's EID as
   its source IP address.  These EIDs may</font></strong> not <strong><font color="green">be</font></strong> recognized by their
   Internet Service Provider's Unicast Reverse Path Forwarding (uRPF)
   <strong><font color="green">rules</font></strong> enabled on the Provider Edge Router.  Several options are
   available to the service provider.  For example they could enable a
   less strict version of uRPF, where they only look for the existence
   of the the EID prefix in the routing table.  Another, more secure,
   option is to add a static route for the customer on the PE router,
   but not redistribute this route into the provider's routing table.

<strike><font color="red">8.</font></strike>
   <strong><font color="green">Finally, Proxy-ETRs can enable LISP sites to bypass this uRPF check
   by encapsulating all of their egressing traffic destined to non-LISP
   sites to the Proxy-ETR (thus ensuring the outer IP source address is
   the site's RLOC).

10.</font></strong>  Acknowledgments

   Thanks goes to Christian Vogt, Lixia <strike><font color="red">Zhang and</font></strike> <strong><font color="green">Zhang,</font></strong> Robin <strike><font color="red">Whittle</font></strike> <strong><font color="green">Whittle, Michael
   Menth, and Xuewei Wang</font></strong> who have made insightful comments with respect
   to <strike><font color="red">interworking</font></strike> <strong><font color="green">LISP Interworking</font></strong> and transition mechanisms.

   A special thanks goes to Scott Brim for his initial brainstorming of
   these ideas and also for his careful review.

<strike><font color="red">9.</font></strike>

<strong><font color="green">11.</font></strong>  IANA Considerations

   This document creates no new requirements on IANA namespaces
   [RFC2434].

<strike><font color="red">10.</font></strike>

<strong><font color="green">12.</font></strong>  References

<strike><font color="red">10.1.</font></strike>

<strong><font color="green">12.1.</font></strong>  Normative References

   [LISP]     Farinacci, D., Fuller, V., <strike><font color="red">Oran,</font></strike> <strong><font color="green">Meyer,</font></strong> D., and D. <strike><font color="red">Meyer,</font></strike> <strong><font color="green">Lewis,</font></strong>
              "Locator/ID Separation Protocol (LISP)",
              <strike><font color="red">draft-ietf-lisp-00</font></strike>
              <strong><font color="green">draft-ietf-lisp-06</font></strong> (work in progress), <strike><font color="red">May 2009.</font></strike> <strong><font color="green">January 2010.</font></strong>

   [LISP-ALT]
              Farinacci, D., Fuller, V., <strong><font color="green">Meyer, D.,</font></strong> and D. <strike><font color="red">Meyer,</font></strike> <strong><font color="green">Lewis,</font></strong> "LISP
              Alternative Topology (LISP-ALT)", <strike><font color="red">draft-ietf-lisp-alt-00</font></strike>
              <strong><font color="green">draft-ietf-lisp-alt-02.txt</font></strong> (work in progress), <strike><font color="red">May 2009.</font></strike>
              <strong><font color="green">January 2010.</font></strong>

   [RFC1918]  Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and
              E. Lear, "Address Allocation for Private Internets",
              BCP 5, RFC 1918, February 1996.

   [RFC4632]  Fuller, V. and T. Li, "Classless Inter-domain Routing
              (CIDR): The Internet Address Assignment and Aggregation
              Plan", BCP 122, RFC 4632, August 2006.

<strike><font color="red">10.2.</font></strike>

<strong><font color="green">12.2.</font></strong>  Informative References

   [CRIO]     Zhang, X., Francis, P., Wang, J., and K. Yoshida, "CRIO:
              Scaling IP Routing with the Core Router-Integrated
              Overlay".

   [RFC2434]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 2434,
              October 1998.

   [RFC2993]  Hain, T., "Architectural Implications of NAT", RFC 2993,
              November 2000.

Authors' Addresses

   Darrel Lewis
   Cisco Systems, Inc.

   Email: darlewis@cisco.com

   David Meyer
   Cisco Systems, Inc.

   Email: dmm@cisco.com

   Dino Farinacci
   Cisco Systems, Inc.

   Email: dino@cisco.com

   Vince Fuller
   Cisco Systems, Inc.

   Email: vaf@cisco.com
</pre>
</body></html>
--Apple-Mail-8--45498354
Content-Disposition: attachment;
	filename=draft-ietf-lisp-interworking-01.txt
Content-Type: text/plain;
	name="draft-ietf-lisp-interworking-01.txt"
Content-Transfer-Encoding: quoted-printable




Network Working Group                                           D. Lewis
Internet-Draft                                                  D. Meyer
Intended status: Experimental                               D. Farinacci
Expires: August 17, 2010                                       V. Fuller
                                                     Cisco Systems, Inc.
                                                       February 13, 2010


                  Interworking LISP with IPv4 and IPv6
                  draft-ietf-lisp-interworking-01.txt

Abstract

   This document describes techniques for allowing sites running the
   Locator/ID Separation Protocol (LISP [LISP]) to interoperate with
   Internet sites (using either IPv4, IPv6, or both) which are not
   running LISP.  A fundamental property of LISP speaking sites is that
   they use Endpoint Identifiers (EIDs), rather than traditional IP
   addresses, in the source and destination fields of all traffic they
   emit or receive.  While EIDs are syntactically identical to IPv4 or
   IPv6 addresses, routes for them are not carried in the global routing
   system so an interoperability mechanism is needed for non-LISP-
   speaking sites to exchange traffic with LISP-speaking sites.  This
   document introduces three such mechanisms: the first uses a new
   network element, the LISP Proxy Ingress Tunnel Routers (PITR)
   (Section 5) to act as a intermediate LISP Ingress Tunnel Router (ITR)
   for non-LISP-speaking hosts while the second adds Network Address
   Translation (NAT) functionality to LISP Ingress and LISP Egress
   Tunnel Routers (xTRs) to substitute routable IP addresses for non-
   routable EIDs.  Finally, this document introduces a Proxy Egress
   Tunnel Router (PETR) to solve cases where a LISP site cannot send a
   packet which has as its source address a non-routable EID

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."




Lewis, et al.            Expires August 17, 2010                [Page 1]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 17, 2010.

Copyright Notice

   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the BSD License.





























Lewis, et al.            Expires August 17, 2010                [Page 2]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  LISP Interworking Models . . . . . . . . . . . . . . . . . . .  6
   3.  Definition of Terms  . . . . . . . . . . . . . . . . . . . . .  8
   4.  Routable EIDs  . . . . . . . . . . . . . . . . . . . . . . . . 11
     4.1.  Impact on Routing Table  . . . . . . . . . . . . . . . . . 11
     4.2.  Requirement for using BGP  . . . . . . . . . . . . . . . . 11
     4.3.  Limiting the Impact of Routable EIDs . . . . . . . . . . . 11
     4.4.  Use of Routable EIDs for Testing LISP  . . . . . . . . . . 11
   5.  Proxy Ingress Tunnel Routers . . . . . . . . . . . . . . . . . 13
     5.1.  PITR EID announcements . . . . . . . . . . . . . . . . . . 13
     5.2.  Packet Flow with PITRs . . . . . . . . . . . . . . . . . . 13
     5.3.  Scaling PITRs  . . . . . . . . . . . . . . . . . . . . . . 14
     5.4.  Impact of the PITRs placement in the network . . . . . . . 15
     5.5.  Benefit to Networks Deploying PITRs  . . . . . . . . . . . 15
   6.  LISP-NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
     6.1.  LISP-NAT for LISP-NR addressed hosts . . . . . . . . . . . 16
     6.2.  LISP Sites with Hosts using RFC 1918 Addresses Sending
           to non-LISP Sites  . . . . . . . . . . . . . . . . . . . . 17
     6.3.  LISP Sites with Hosts using RFC 1918 Addresses
           Communicating to Other LISP Sites  . . . . . . . . . . . . 17
     6.4.  LISP-NAT and multiple EIDs . . . . . . . . . . . . . . . . 18
     6.5.  When LISP-NAT and PITRs used by the same LISP Site . . . . 18
   7.  Proxy Egress Tunnel Routers  . . . . . . . . . . . . . . . . . 20
     7.1.  Packet Flow with Proxy Egress Tunnel Routers . . . . . . . 20
   8.  Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs
       (PETRs)  . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
     8.1.  How Proxy-ITRs and Proxy-ETRs Interact . . . . . . . . . . 22
   9.  Security Considerations  . . . . . . . . . . . . . . . . . . . 23
   10. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 24
   11. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 25
   12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26
     12.1. Normative References . . . . . . . . . . . . . . . . . . . 26
     12.2. Informative References . . . . . . . . . . . . . . . . . . 26
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 27















Lewis, et al.            Expires August 17, 2010                [Page 3]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


1.  Introduction

   This document describes two mechanisms for interoperation between
   LISP [LISP] sites, which use non-globally-routed EIDs, and non-LISP
   sites: use of PITRs, which create highly-aggregated routes to EID
   prefixes for non-LISP sites to follow.  The use of NAT by LISP ETRs
   when communicating with non-LISP hosts.  And finally the use of Proxy
   Egress Tunnel routers (PETRs) LISP for sites relying on PITRs and
   which are faced with certain restrictions.

   A key behavior of the separation of Locators and End-Point-IDs is
   that EID prefixes are not advertised to the Internet's Default Free
   Zone (DFZ).  Specifically, only RLOCs are carried in the Internet's
   DFZ.  Existing Internet sites (and their hosts) who do not
   participate in the LISP system must still be able to reach sites
   numbered from this non routed EID space.  This draft describes a set
   of mechanisms that can be used to provide reachability between sites
   that are LISP-capable and those that are not.  This document
   introduces three such mechanisms.  The first uses a new network
   element, the LISP Proxy Ingress Tunnel Router (PITR) (Section 5) to
   act as a intermediate LISP Ingress Tunnel Router (ITR) for non-LISP-
   speaking hosts.  The second adds a form of Network Address
   Translation (NAT) functionality to Tunnel Routers (xTRs) to
   substitute routable IP addresses for non-routable EIDs.  The final
   network element is the LISP Proxy Egress Tunnel Routers (PETR), which
   act as an intermediate Egress Tunnel Router (ETR) for LISP sites who
   are using PITRs but need assistance in reaching non-LISP sites.

   More detailed descriptions of these mechanisms and the network
   elements involved may be found in the following sections:

   - Section 2 describes the different cases where interworking
   mechanisms are needed

   - Section 3 defines terms used throughout the document

   - Section 4 describes the relationship between the new EID prefix
   space and the IP address space used by the current Internet

   - Section 5 introduces and describes the operation of Proxy-ITRs

   - Section 6 defines how NAT is used by ETRs to translate non-routable
   EIDs into routable IP addresses.

   - Section 7 introduces and describes the operations of Proxy-ETRs

   - Section 8 describes the relationship between asymmetric and
   Symmetric interworking mechanisms (Proxy-ITRs and Proxy-ETRs vs LISP-



Lewis, et al.            Expires August 17, 2010                [Page 4]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   NAT)

   Note that any successful interworking model should be independent of
   any particular EID-to-RLOC mapping algorithm.  This document does not
   comment on the value of any of the particular LISP mapping systems.














































Lewis, et al.            Expires August 17, 2010                [Page 5]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


2.  LISP Interworking Models

   There are 4 unicast connectivity cases which describe how sites can
   communicate with each other:

   1.  Non-LISP site to Non-LISP site

   2.  LISP site to LISP site

   3.  LISP site to Non-LISP site

   4.  Non-LISP site to LISP site

   Note that while Cases 3 and 4 seem similar, there are subtle
   differences due to the way communications are originated.

   The first case is the Internet as we know it today and as such will
   not be discussed further here.  The second case is documented in
   [LISP] and, hence, there are no new interworking requirements because
   there are no new protocol requirements placed on intermediate non-
   LISP routers.

   In case 3, LISP site to Non-LISP site, a LISP site can (in most
   cases) send packets to a non-LISP site because the non-LISP site
   prefixes are routable.  The non-LISP site need not do anything new to
   receive packets.  The only action the LISP site needs (with two
   possible caveats introduced below) to take is to know when not to
   LISP-encapsulate packets.  This can be achieved via two mechanisms:

   1.  At the ITR in the source site, if the destination of an IP packet
       is found to match a prefix from the BGP routing table, then the
       site is directly reachable by the BGP core that exists and
       operates today.

   2.  Second, if (from the perspective of the ITR at the source site)
       the destination address of an IP address is not found in the EID-
       to-RLOC mapping database, the ITR could infer that it is not a
       LISP-capable site, and decide to not LISP-encapsulate the packet.

   3.  There are two potential caveats involved with Case 3, where there
       could be some situations where (unencapsualted) packets
       originated by a LISP site may not be forwarded to a non-LISP
       site.  One of these caveats (uRPF check failure) are detailed in
       Section 9 (Security Considerations).  The second caveat (protocol
       traversal) is reviewed in section 7, (Proxy-Egress Tunnel
       Routers).

   Case 4, typically the most challenging, occurs when a host at a non-



Lewis, et al.            Expires August 17, 2010                [Page 6]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   LISP site wishes to send traffic to a host at a LISP site.  If the
   source host uses a (non-globally-routable) EID as the destination IP
   address, the packet is forwarded inside the source site until it
   reaches a router which cannot forward it, at which point the traffic
   is dropped.  For traffic not to be dropped, either some route must be
   exist for the destination EID outside of LISP-speaking part of the
   network or an alternate mechanism must be in place.  Section 5
   (PITRs) and Section 6 (LISP-NAT) describe two such mechanisms.

   Note that case 4 includes packets returning to the LISP Site in case
   3.








































Lewis, et al.            Expires August 17, 2010                [Page 7]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


3.  Definition of Terms

   Endpoint ID (EID):  Endpoint ID (EID): A 32-bit (for IPv4) or 128-bit
      (for IPv6) value used in the source and destination address fields
      of the first (most inner) LISP header of a packet.  The host
      obtains a destination EID the same way it obtains an destination
      address today, for example through a DNS lookup or SIP exchange.
      The source EID is obtained via existing mechanisms used to set a
      host's "local" IP address.  An EID is allocated to a host from an
      EID-prefix block associated with the site where the host is
      located.  An EID can be used by a host to refer to other hosts.
      EIDs MUST NOT be used as LISP RLOCs.  Note that EID blocks may be
      assigned in a hierarchical manner, independent of the network
      topology, to facilitate scaling of the mapping database.  In
      addition, an EID block assigned to a site may have site-local
      structure (subnetting) for routing within the site; this structure
      is not visible to the global routing system.  When used in
      discussions with other Locator/ID separation proposals, a LISP EID
      will be called a "LEID".  Throughout this document, any references
      to "EID" refers to an LEID.

   EID-Prefix:  EID-prefix: A power-of-2 block of EIDs which are
      allocated to a site by an address allocation authority.  EID-
      prefixes are associated with a set of RLOC addresses which make up
      a "database mapping".  EID-prefix allocations can be broken up
      into smaller blocks when an RLOC set is to be associated with the
      smaller EID- prefix.  A globally routed address block (whether PI
      or PA) is not an EID-prefix.  However, a globally routed address
      block may be removed from global routing and reused as an EID-
      prefix.  A site that receives an explicitly allocated EID-prefix
      may not use that EID-prefix as a globally routed prefix assigned
      to RLOCs

   EID-Prefix Aggregate:  A set of EID-prefixes said to be aggregatable
      in the [RFC4632] sense.  That is, an EID-Prefix aggregate is
      defined to be a single contiguous power-of-two EID-prefix block.
      Such a block is characterized by a prefix and a length.  Provider
      Independent (PI) Addresses: an address block assigned from a pool
      where blocks are not associated with any particular location in
      the network (e.g. from a particular service provider), and is
      therefore not topologically aggregatable in the routing system.

   Routing Locator (RLOC):  The IPv4 or IPv6 address of an egress tunnel
      router (ETR).  It is the output of a EID-to-RLOC mapping lookup.
      An EID maps to one or more RLOCs.  Typically, RLOCs are numbered
      from topologically-aggregatable blocks that are assigned to a site
      at each point to which it attaches to the global Internet; where
      the topology is defined by the connectivity of provider networks,



Lewis, et al.            Expires August 17, 2010                [Page 8]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


      RLOCs can be thought of as PA addresses.  Multiple RLOCs can be
      assigned to the same ETR device or to multiple ETR devices at a
      site.

   EID-to-RLOC Mapping:  A binding between an EID and the RLOC-set that
      can be used to reach the EID.  We use the term "mapping" in this
      document to refer to a EID-to-RLOC mapping.

   EID Prefix Reachability:  An EID prefix is said to be "reachable" if
      one or more of its locators are reachable.  That is, an EID prefix
      is reachable if the ETR (or its proxy) is reachable.

   Default Mapping:  A Default Mapping is a mapping entry for EID-prefix
      0.0.0.0/0.  It maps to a locator-set used for all EIDs in the
      Internet.  If there is a more specific EID-prefix in the mapping
      cache it overrides the Default Mapping entry.  The Default Mapping
      route can be learned by configuration or from a Map-Reply message
      [LISP].

   LISP Routable (LISP-R) Site:  A LISP site whose addresses are used as
      both globally routable IP addresses and LISP EIDs.

   LISP Non-Routable (LISP-NR) Site:  A LISP site whose addresses are
      EIDs only, these EIDs are not found in the legacy Internet routing
      table.

   LISP Proxy Ingress Tunnel Router (PITR):  PITRs are used to provide
      interconnectivity between sites which use LISP EIDs and those
      which do not.  They act as a gateway between the Legacy Internet
      and the LISP enabled Network.  A given PITR advertises one or more
      highly aggregated EID prefixes into the public Internet and acts
      as the ITR for traffic received from the public Internet.  LISP
      Proxy Ingress Tunnel Routers are described in Section 5.

   LISP Network Address Translation (LISP-NAT):  Network Address
      Translation between EID space assigned to a site and RLOC space
      also assigned to that site.  LISP Network Address Translation is
      described in Section 6.

   LISP Proxy Egress Tunnel Router (PETR):  PETRs are used to provide a
      LISP site's ITRs the ability to send traffic to non-LISP sites in
      cases where unencapsualted packets (the default mechanism) would
      fail to be delivered.  PETRs are implemented by having an ITR
      encapsulate all non-LISP destined traffic to a pre-configured
      PETR.  LISP Proxy Egress Tunnel Routers are described in
      Section 7.





Lewis, et al.            Expires August 17, 2010                [Page 9]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


    EID Sub Namespace:  A power-of-two block of aggregatable locators
      set aside for LISP interworking.

















































Lewis, et al.            Expires August 17, 2010               [Page 10]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


4.  Routable EIDs

   An obvious way to achieve interworking between LISP and non-LISP
   hosts is to simply announce EID prefixes into the DFZ, much like
   routing system, effectively treating them as "Provider Independent
   (PI)" prefixes.  Doing this is undesirable as it defeats one of the
   primary goals of LISP - to reduce global routing system state.

4.1.  Impact on Routing Table

   If EID prefixes are announced into the DFZ, the impact is similar to
   the case in which LISP has not been deployed, because these EID
   prefixes will be no more aggregatable than existing PI addressing.
   This behavior is not desirable and such a mechanism is not viewed as
   a viable long term solution.

4.2.  Requirement for using BGP

   Non-LISP sites today use BGP to, among other things, enable ingress
   traffic engineering.  Relaxing this requirement is another primary
   design goal of LISP.

4.3.  Limiting the Impact of Routable EIDs

   Two schemes are proposed to limit the impact of having EIDs announced
   in the current global Internet routing table:

   1.  Section 5 discusses the LISP Proxy Tunnel Router, an approach
       that provides ITR functionality to bridge LISP-capable and non-
       LISP-capable sites.

   2.  Section 6 discusses another approach, LISP-NAT, in which NAT
       [RFC2993] is combined with ITR functionality to limit the the
       impact of routable EIDs on the Internet routing infrastructure.

4.4.  Use of Routable EIDs for Testing LISP

   A primary design goal for LISP (and other Locator/ID separation
   proposals) is to facilitate topological aggregation of addresses and,
   thus, decrease global routing system state.  Another goal is to
   achieve the benefits of improved aggregation as soon as possible.
   Sites advertising routes for LISP EID prefixes into the global
   routing system is therefore not recommended.

   That being said, single homed sites (or multi-homed sites that are
   not leaking more specific exceptions) and that are already using
   provider-aggregated prefixes can use these prefixes as LISP EIDs
   without adding state to the routing system; in other words, such



Lewis, et al.            Expires August 17, 2010               [Page 11]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   sites do not cause additional prefixes to be advertised.  For such
   sites, connectivity to a non-LISP sites does not require interworking
   machinery because the "PA" EIDs are already routable (they are
   effectively LISP-R type sites).  Their EIDs are found in the LISP
   mapping system, and their (aggregate) PA prefix(es) are found in the
   DFZ Internet.

   The continued announcements of an existing site's Provider
   Independent (or "PI") prefix(s) is of course under control of that
   site, and some period of transition where a site is is found both in
   the LISP mapping system and as a discrete prefix in the Internet
   routing system may be a viable transition strategy.  Care should be
   taken not to advertise additional more specific LISP EID prefixes
   into the DFZ.





































Lewis, et al.            Expires August 17, 2010               [Page 12]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


5.  Proxy Ingress Tunnel Routers

   Proxy Ingress Tunnel Routers (PITRs) allow for non-LISP sites to
   communicate with LISP-NR sites.  A PITR is a new network element that
   shares many characteristics with the LISP ITR.  PITRs allow non-LISP
   sites to send packets to LISP-NR sites without any changes to
   protocols or equipment at the non-LISP site.  PITRs have two primary
   functions:

   Originating EID Advertisements:  PITRs advertise highly aggregated
      EID-prefix space on behalf of LISP sites to so that non-LISP sites
      can reach them.

   Encapsulating Legacy Internet Traffic:  PITRs also encapsulate non-
      LISP Internet traffic into LISP packets and route them towards
      their destination RLOCs.

5.1.  PITR EID announcements

   A key part of PITR functionality is to advertise routes for highly-
   aggregated EID prefixes into part of the global routing system.
   Aggressive aggregation is performed to minimize the number of new
   announced routes.  In addition, careful placement of PITRs can
   greatly reduce the scope of these new routes.  To this end, PITRs
   should be deployed close to non-LISP-speaking rather than close to
   LISP sites.  Such deployment not only limits the scope of EID-prefix
   route advertisements, it also also allows traffic forwarding load to
   be spread among many PITRs.

5.2.  Packet Flow with PITRs

   Packets from a non-LISP site can reach a LISP-NR site with the aid of
   a PITR.  By advertising a route for a particular EID prefix into the
   global routing system, traffic destined for that EID prefix is routed
   to the PITR, which then performs LISP encapsulation.  Once
   encapsulated, traffic packets use the LISP (outer) header's
   destination address to reach the destination ETR.

   What follows is an example of the path a packet would take when using
   a PITR.  In this example, the LISP-NR site is given the EID prefix
   240.0.0.0/24.  For the purposes of this example, this prefix and no
   covering aggregate is present in the global routing system.  In other
   words, if a packet with this destination were to reach a router in
   the "Default Free Zone", it would be dropped.

   A full protocol exchange example follows:





Lewis, et al.            Expires August 17, 2010               [Page 13]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   1.  Source host makes a DNS lookup EID for destination, and gets
       240.1.1.1 in return.

   2.  Source host has a default route to customer Edge (CE) router and
       forwards the packet to the CE.

   3.  The CE has a default route to its Provider Edge (PE) router, and
       forwards the packet to the PE.

   4.  The PE has route to 240.0.0.0/24 and the next hop is the PITR.

   5.  The PITR has or acquires a mapping for 240.1.1.1 and LISP
       encapsulates, the packet now has a destination address of the
       RLOC.  The source address of this encapsulated packet is the
       PITR's RLOC.

   6.  The PITR looks up the RLOC, and forwards LISP packet to the next
       hop.

   7.  The ETR decapsulates the packet and delivers the packet to the
       240.1.1.1 host in the destination LISP site.

   8.  Packets from host 240.1.1.1 will flow back through the LISP
       site's ITR.  Such packets are not encapsulated because the ITR
       knows that the destination (the original source) is a non-LISP
       site.  The ITR knows this because it can check the LISP mapping
       database for the destination EID, and on a failure determine that
       the destination site is not LISP enabled.

   9.  Packets are then routed natively and directly to the destination
       (original source) site.

   Note that in this example the return path is asymmetric, so return
   traffic will not go back through the PITR.  This is because the
   LISP-NR site's ITR will discover that the originating site is not a
   LISP site, and not encapsulate the returning packet (see [LISP] for
   details of ITR behavior).

   The asymmetric nature of traffic flows allows the PITR to be
   relatively simple - it will only have to encapsulate LISP packets.

5.3.  Scaling PITRs

   PITRs attract traffic by announcing the LISP EID namespace into parts
   of the non-LISP-speaking global routing system.  There are several
   ways that a network could control how traffic reaches a particular
   PITR to prevent it from receiving more traffic than it can handle:




Lewis, et al.            Expires August 17, 2010               [Page 14]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   First, the PITR's aggregate routes might be selectively announced,
   giving a coarse way to control the quantity of traffic attracted by
   that PITR.

   Second, the same address might be announced by multiple PITRs in
   order to share the traffic using IP Anycast.  The asymmetric nature
   of traffic flows allows the PITR to be relatively simple - it will
   only have to encapsulate LISP packets.

5.4.  Impact of the PITRs placement in the network

   There are several approaches that a network could take in placing
   PITRs.  Placing the PITR near the ingress of traffic allows for the
   communication between the non-LISP site and the LISP site to have the
   least "stretch" (i.e. the least number of forwarding hops when
   compared to an optimal path between the sites).

   Some proposals, for example CRIO [CRIO], have suggested grouping
   PITRs near an arbitrary subset of ETRs and announcing a 'local'
   subset of EID space.  This model cannot guarantee minimum stretch if
   the EID prefix route advertisement points are changed (such a change
   might occur if a site adds, removes, or replaces one or more ISPs
   connections).

5.5.  Benefit to Networks Deploying PITRs

   When traffic destined for LISP-NR site arrives and is encapsulated at
   a PITR, a new LISP packet header is pre-pended.  This causes the
   packet's destination to be set to the destination site RLOC.  Because
   traffic is thus routed towards RLOCs, it can potentially better
   follow the network's traffic engineering policies (such as closest
   exit routing).  This also means that providers who are not default-
   free and do not deploy PITRs end up sending more traffic to expensive
   transit links rather than to RLOC addresses, to which they may have
   settlement-free peering.  For large transit providers, deploying
   PITRs may attract more traffic, and therefore more revenue, from
   their customers.














Lewis, et al.            Expires August 17, 2010               [Page 15]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


6.  LISP-NAT

   LISP Network Address Translation (LISP-NAT) is a limited form of NAT
   [RFC2993].  LISP-NAT is designed to enable the interworking of non-
   LISP sites and LISP-NR sites by ensuring that the LISP-NR's site
   addresses are always routable.  LISP-NAT accomplishes this by
   translating a host's source address from an 'inner' value to an
   'outer' value and keeping this translation in a table that it can
   reference for subsequent packets.

   In addition, existing RFC 1918 [RFC1918] sites can use LISP-NAT to
   talk to both LISP or non-LISP sites.

   The basic concept of LISP-NAT is that when transmitting a packet, the
   ITR replaces a non-routable EID source address with a routable source
   address, which enables packets to return to the site.

   There are two main cases that involve LISP-NAT:

   1.  Hosts at LISP sites that use non-routable global EIDs speaking to
       non-LISP sites using global addresses.

   2.  Hosts at LISP sites that use RFC 1918 private EIDs speaking to
       other sites, who may be either LISP or non-LISP.

   Note that LISP-NAT is not needed in the case of LISP-R (routable
   global EIDs) sources.  This case occurs when a site is announcing its
   prefix into both the LISP mapping system as well as the Internet DFZ.
   This is because the LISP-R source's address is routable, and return
   packets will be able to natively reach the site.

6.1.  LISP-NAT for LISP-NR addressed hosts

   LISP-NAT allows a host with a LISP-NR EID to communicate with non-
   LISP hosts by translating the LISP-NR EID to a globally unique
   address.  This globally unique address may be a either a PI or PA
   address.

   An example of this translation follows.  For this example, a site has
   been assigned a LISP-NR EID of 220.1.1.0/24.  In order to utilize
   LISP-NAT, the site has also been provided the PA EID of
   128.200.1.0/24, and uses the first address (128.200.1.1) as the
   site's RLOC.  The rest of this PA space (128.200.1.2 to
   128.200.1.254) is used as a translation pool for this site's hosts
   who need to communicate with non-LISP hosts.

   The translation table might look like the following:




Lewis, et al.            Expires August 17, 2010               [Page 16]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


     Site NR-EID    Site R-EID      Site's RLOC    Translation Pool
     =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
     220.1.1.0/24   128.200.1.0/24  128.200.1.1    128.200.1.2-254

                    Figure 1: Example Translation Table

   The Host 220.1.1.2 sends a packet destined for a non-LISP site to its
   default route (the ITR).  The ITR receives the packet, and determines
   that the destination is not a LISP site.  How the ITR makes this
   determination is up to the ITRs implementation of the EID-to-RLOC
   mapping system used (see, for example [LISP-ALT]).

   The ITR then rewrites the source address of the packet from 220.1.1.2
   to 128.200.1.2, which is the first available address in the LISP-R
   EID space available to it.  The ITR keeps this translation in a table
   in order to reverse this process when receiving packets destined to
   128.200.1.2.

   Finally, when the ITR forwards this packet without encapsulating it,
   it uses the entry in its LISP-NAT table to translate the returning
   packets' destination IPs to the proper host.

6.2.  LISP Sites with Hosts using RFC 1918 Addresses Sending to non-LISP
      Sites

   In the case where RFC 1918 addressed hosts desire to communicate with
   non-LISP hosts the LISP-NAT implementation acts much like an existing
   IPv4 NAT device.  The ITR providing the NAT service must use LISP-R
   EIDs for its global pool as well as providing all the standard NAT
   functions required today.

   The source of the packet must be translated to a LISP-R EID in a
   manner similar to Section 6, and this packet must be forwarded to the
   ITR's next hop for the destination, without LISP encapsulation.

6.3.  LISP Sites with Hosts using RFC 1918 Addresses   Communicating to
      Other LISP Sites

   LISP-NAT allows a host with a RFC 1918 address to communicate with
   LISP hosts by translating the RFC 1918 address to a LISP EID.  After
   translation, the communication between source and destination ITR and
   ETRs continues as described in [LISP].

   An example of this translation and encapsulation follows.  For this
   example, a host has been assigned a RFC 1918 address of 192.168.1.2.
   In order to utilize LISP-NAT, the site also has been provided the
   LISP-R EID of 192.0.2.0/24, and uses the first address (192.0.2.1) as
   the site's RLOC.  The rest of this PA space (192.0.2.2 to



Lewis, et al.            Expires August 17, 2010               [Page 17]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   192.0.2.254) is used as a translation pool for this site's hosts who
   need to communicate with both non-LISP and LISP hosts.

   The Host 192.168.1.2 sends a packet destined for a non-LISP site to
   its default route (the ITR).  The ITR receives the packet and
   determines that the destination is a LISP site.  How the ITR makes
   this determination is up to the ITRs implementation of the EID/RLOC
   mapping system.

   The ITR then rewrites the source address of the packet from
   192.168.1.2 to 192.0.2.2, which is the first available address in the
   LISP EID space available to it.  The ITR keeps this translation in a
   table in order to reverse this process when receiving packets
   destined to 192.0.2.2.

   The ITR then LISP encapsulates this packet (see [LISP] for details).
   The ITR uses the site's RLOC as the LISP outer header's source and
   the translation address as the LISP inner header's source.  Once it
   decapsulates returning traffic, it uses the entry in its LISP-NAT
   table to translate the returning packet's destination IP address and
   then forward to the proper host.

6.4.  LISP-NAT and multiple EIDs

   When a site has two addresses that a host might use for global
   reachability, care must be chosen on which EID is found in DNS.  For
   example, whether applications such as DNS use the LISP-R EID or the
   LISP-NR EID.  This problem exists for NAT in general, but the
   specific issue described above is unique to LISP.  Using PITRs can
   mitigate this problem, since the LISP-NR EID can be reached in all
   cases.

6.5.  When LISP-NAT and PITRs used by the same LISP Site

   With LISP-NAT, there are two EIDs possible for a given host, the
   LISP-R EID and the LISP-NR EID.  When a site has two addresses that a
   host might use for global reachability, name-to-address directories
   may need to be modified.

   This problem, global addressability, exists for NAT in general, but
   the specific issue described above is unique to LOC/ID split schemes.
   Some schemes [ref: 6-1 proxy] have suggested running a separate DNS
   instance for legacy types of EIDs.  This solves the problem but
   introduces complexity for the site.  Alternatively, using PITRs can
   mitigate this problem, because the LISP-NR EID can be reached in all
   cases.

   In summary, there are two options for interworking LISP with IPv4 and



Lewis, et al.            Expires August 17, 2010               [Page 18]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   V6.  In the NAT case the LISP site can use NAT and manage the
   transition on its own.  In the PITR case, we add a new network
   element called a PITR that can relieve that burden on the site, with
   the downside of potentially adding stretch to sites trying to reach
   the LISP site.














































Lewis, et al.            Expires August 17, 2010               [Page 19]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


7.  Proxy Egress Tunnel Routers

   Proxy Egress Tunnel Routers (PETRs) allow for LISP-NR sites to
   communicate with non-LISP sites in the case where the access network
   does not allow for the LISP-NR site send packets with the source
   address of the site's EID(s).  A PETR is a new network element that
   conceptually acts as an ETR for traffic destined to non-LISP sites.
   This also has the effect of allowing an ITR avoid having to decide
   whether to encapsulate packets or not - it will always encapsulate
   packets.  Packets destined to LISP sites will travel directly to that
   site's ETR, all other packets will be sent to the site's PETR.

   There are two primary reasons why sites would want to utilize a PETR:

   Avoiding strict uRPF failures:  Some provider's access networks
      require the source of the packets emitted to be within the
      addressing scope of the access networks. (see section 9)

   Traversing a different IP Protocol:  A LISP site may want to transmit
      packets to a non-LISP site where the some of the intermediate
      network does not support an IP protocol (v4 or v6).  PETRs can
      allow this LISP site's data to 'hop over' this by utilizing LISP's
      support for mixed protocol encapsulation.

7.1.  Packet Flow with Proxy Egress Tunnel Routers

   Packets from a LISP site can reach a non-LISP site with the aid of a
   Proxy-ETR (or PETR).  An ITR is simply configured to send all non-
   LISP traffic, which it normally would have forwarded natively (non-
   encapsulated), to a PETR.  Note that this outer encapsulation may be
   in another IP protocol than the (inner) encapsulated data.  Traffic
   then uses use the LISP (outer) header's destination address to reach
   the destination PETR.

   A PETR should verify the (inner) source EID of the packet at time of
   decapsulation in order to verify that this is from a configured LISP
   site.  This is to prevent spoofed inner sources from being
   encapsulated through the Proxy-ETR.

   What follows is an example of the path a packet would take when using
   a PETR.  In this example, the LISP-NR site is given the EID prefix
   240.2.0.0/24, and it is trying to reach host at a non-LISP site with
   the IP prefix of 192.0.2.0/24.  For the purposes of this example, the
   destination is a non-LISP site and 192.0.2.0/24 is found in the
   Internet's routing system.

   A full protocol exchange example follows:




Lewis, et al.            Expires August 17, 2010               [Page 20]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


   1.  Source host makes a DNS lookup for the destination, and gets
       192.0.2.100 (a non-LISP site) in return.

   2.  Source host has a default route to customer Edge (CE) router and
       forwards the packet towards the CE.

   3.  The CE is a LISP ITR, and is configured to encapsulate traffic
       destined for non-lisp sites to a Proxy-ETR.

   4.  The Proxy ETR decapsulates the LISP packet and forwards the
       original packet to its next hop.

   5.  The packet is then routed natively and directly to the
       destination (non-LISP) site 192.0.2.0/24.

   Note that in this example the return path is asymmetric, so return
   traffic will not go back through the Proxy-ITR.  This means that in
   order to reach LISP-NR sites, non-lisp sites must still use Proxy
   ITRs.
































Lewis, et al.            Expires August 17, 2010               [Page 21]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


8.  Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs (PETRs)

   In summary, there are three options for interworking LISP with non-
   LISP Sites (for both IPv4 and IPv6).  In the LISP-NAT option the LISP
   site can manage and control the interworking on its own.  In the PITR
   case, we add a new network element relieve that burden on the site,
   with the cost of potentially adding stretch to the connections of
   non-LISP sites communicating with the LISP site.  The third option is
   Proxy-ETRs, which are optionally used by sites relying on PITRs case
   to mitigate two caveats for LISP sites communicating with non-LISP
   sites.  This means Proxy-ETRs are not expected to be deployed by
   themselves, they will always be used to assist sites already using
   PITRs.

8.1.  How Proxy-ITRs and Proxy-ETRs Interact

   There is a subtle difference between Symmetrical (LISP-NAT) vs
   Asymmetrical (Proxy-ITR and Proxy-ETR) Interworking techniques.
   Operationally, Proxy-ITRs (PITRs) and Proxy-ETRs (PETRs) can (and
   likely should) be decoupled since Proxy-ITRs are best deployed
   closest to non-LISP sites, and Proxy-ETRs are best located close to
   the LISP site's they are decapsulating on behalf of.  This asymmetric
   placement of the two network elements keeps the stretched imposed on
   the connection to a minimum, while still allowing for coarsely
   aggregated announcements of EIDs into the Internet's routing table.


























Lewis, et al.            Expires August 17, 2010               [Page 22]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


9.  Security Considerations

   Like any LISP ITR, PITRs will have the opportunity to inspect traffic
   at the time that they encapsulate.  The location of these devices in
   the network can have implications for dropping malicious traffic on
   behalf of ETRs who request this behavior (via the drop action bit in
   Map-Reply packets for an EID or EID prefix).

   As with traditional NAT, LISP-NAT will obscure the actual host
   LISP-NR EID behind the LISP-R addresses used as the NAT pool.

   When LISP Sites send packets to non-LISP sites (these non-LISP rely
   on PITRs to enable Interworking), packets will have the Site's EID as
   its source IP address.  These EIDs may not be recognized by their
   Internet Service Provider's Unicast Reverse Path Forwarding (uRPF)
   rules enabled on the Provider Edge Router.  Several options are
   available to the service provider.  For example they could enable a
   less strict version of uRPF, where they only look for the existence
   of the the EID prefix in the routing table.  Another, more secure,
   option is to add a static route for the customer on the PE router,
   but not redistribute this route into the provider's routing table.
   Finally, Proxy-ETRs can enable LISP sites to bypass this uRPF check
   by encapsulating all of their egressing traffic destined to non-LISP
   sites to the Proxy-ETR (thus ensuring the outer IP source address is
   the site's RLOC).


























Lewis, et al.            Expires August 17, 2010               [Page 23]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


10.  Acknowledgments

   Thanks goes to Christian Vogt, Lixia Zhang, Robin Whittle, Michael
   Menth, and Xuewei Wang who have made insightful comments with respect
   to LISP Interworking and transition mechanisms.

   A special thanks goes to Scott Brim for his initial brainstorming of
   these ideas and also for his careful review.











































Lewis, et al.            Expires August 17, 2010               [Page 24]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


11.  IANA Considerations

   This document creates no new requirements on IANA namespaces
   [RFC2434].















































Lewis, et al.            Expires August 17, 2010               [Page 25]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


12.  References

12.1.  Normative References

   [LISP]     Farinacci, D., Fuller, V., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol (LISP)",
              draft-ietf-lisp-06 (work in progress), January 2010.

   [LISP-ALT]
              Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "LISP
              Alternative Topology (LISP-ALT)",
              draft-ietf-lisp-alt-02.txt (work in progress),
              January 2010.

   [RFC1918]  Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and
              E. Lear, "Address Allocation for Private Internets",
              BCP 5, RFC 1918, February 1996.

   [RFC4632]  Fuller, V. and T. Li, "Classless Inter-domain Routing
              (CIDR): The Internet Address Assignment and Aggregation
              Plan", BCP 122, RFC 4632, August 2006.

12.2.  Informative References

   [CRIO]     Zhang, X., Francis, P., Wang, J., and K. Yoshida, "CRIO:
              Scaling IP Routing with the Core Router-Integrated
              Overlay".

   [RFC2434]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 2434,
              October 1998.

   [RFC2993]  Hain, T., "Architectural Implications of NAT", RFC 2993,
              November 2000.

















Lewis, et al.            Expires August 17, 2010               [Page 26]
=0C
Internet-Draft    Interworking LISP with IPv4 and IPv6     February 2010


Authors' Addresses

   Darrel Lewis
   Cisco Systems, Inc.

   Email: darlewis@cisco.com


   David Meyer
   Cisco Systems, Inc.

   Email: dmm@cisco.com


   Dino Farinacci
   Cisco Systems, Inc.

   Email: dino@cisco.com


   Vince Fuller
   Cisco Systems, Inc.

   Email: vaf@cisco.com



























Lewis, et al.            Expires August 17, 2010               [Page 27]
=0C


--Apple-Mail-8--45498354
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii



On Feb 12, 2010, at 3:16 PM, Darrel Lewis wrote:

>=20
> Here is an updated version of the LISP Interworking specification that =
I'd like to
> publish to the Internet Drafts repository.
>=20
> The main addition to the draft is a the introduction of an optional =
network element called the "Proxy Egress Tunnel Router" or PETR.  =20
>=20
> Both html diffs and the full text of the new draft are attached.
>=20
> Comments appreciated.  I'd like to get this posted next Friday (by
> Feb 22nd).
>=20
> -Darrel
> 	(for the other Interworking authors: Dino, Dave, and Vince)
>=20
> =
<draft-ietf-lisp-Interworking-00-to-01-diff.html><draft-ietf-lisp-interwor=
king-01.txt>_______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


--Apple-Mail-8--45498354--

From terry.manderson@icann.org  Wed Feb 17 15:40:20 2010
Return-Path: <terry.manderson@icann.org>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6551B3A7E07 for <lisp@core3.amsl.com>; Wed, 17 Feb 2010 15:40:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.67
X-Spam-Level: 
X-Spam-Status: No, score=-5.67 tagged_above=-999 required=5 tests=[AWL=-0.929,  BAYES_20=-0.74, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kou6x-2Y8oVC for <lisp@core3.amsl.com>; Wed, 17 Feb 2010 15:40:19 -0800 (PST)
Received: from EXPFE100-2.exc.icann.org (expfe100-2.exc.icann.org [64.78.22.237]) by core3.amsl.com (Postfix) with ESMTP id BF70E3A7A70 for <lisp@ietf.org>; Wed, 17 Feb 2010 15:40:19 -0800 (PST)
Received: from EXVPMBX100-1.exc.icann.org ([64.78.22.232]) by EXPFE100-2.exc.icann.org ([64.78.22.237]) with mapi; Wed, 17 Feb 2010 15:41:59 -0800
From: Terry Manderson <terry.manderson@icann.org>
To: "lisp@ietf.org" <lisp@ietf.org>
Date: Wed, 17 Feb 2010 15:42:00 -0800
Thread-Topic: LISP Secretary
Thread-Index: AcqwKsyHa3HwvfyG7k27XzFD3YdLdQ==
Message-ID: <C7A2BBE8.2A85%terry.manderson@icann.org>
Accept-Language: en, en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en, en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [lisp] LISP Secretary
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Feb 2010 23:40:20 -0000

Hi All,

This is a quick note to introduce Wassim Haddad to the Working Group.

Wassim has kindly volunteered to take on the LISP-WG secretary role.

Wassim has been floating around the IETF since 2003 and has been involved i=
n
IPv6 mobility, IPv6 network access security (SeND), and v4/v6 transition. H=
e
has co-authored RFC4866 and is now editing the security threat model for
6lowpan WG and also co-authoring the "NEMO Prefix Delegation" draft which i=
s
in last call.

Please welcome Wassim to the fold and assist him in any way you can.

Cheers
Terry


From terry.manderson@icann.org  Thu Feb 18 22:20:58 2010
Return-Path: <terry.manderson@icann.org>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 93A153A7721 for <lisp@core3.amsl.com>; Thu, 18 Feb 2010 22:20:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.289
X-Spam-Level: 
X-Spam-Status: No, score=-6.289 tagged_above=-999 required=5 tests=[AWL=0.310,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Py7M17TU2cfm for <lisp@core3.amsl.com>; Thu, 18 Feb 2010 22:20:56 -0800 (PST)
Received: from EXPFE100-1.exc.icann.org (expfe100-1.exc.icann.org [64.78.22.236]) by core3.amsl.com (Postfix) with ESMTP id 096633A7C6C for <lisp@ietf.org>; Thu, 18 Feb 2010 22:20:56 -0800 (PST)
Received: from EXVPMBX100-1.exc.icann.org ([64.78.22.232]) by EXPFE100-1.exc.icann.org ([64.78.22.236]) with mapi; Thu, 18 Feb 2010 22:22:40 -0800
From: Terry Manderson <terry.manderson@icann.org>
To: "lisp@ietf.org" <lisp@ietf.org>
Date: Thu, 18 Feb 2010 22:22:40 -0800
Thread-Topic: Lisp Secretaries
Thread-Index: AcqxK+/l6mLQhWNfSEGYB7ri2VbC9w==
Message-ID: <C7A46B50.2AE0%terry.manderson@icann.org>
Accept-Language: en, en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en, en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [lisp] Lisp Secretaries
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Feb 2010 06:20:58 -0000

Hi Folks,

Joel and I have decided to take on two WG secretaries for LISP.

Please welcome Luigi Iannone as our additional secretary.

Many of you already know Luigi, so just to recap:

Luigi started participating in the IETF and IRTF in 2007,
mainly involved in the routing area WGs. He is actively working
in the LISP WG and is one of the developers of OpenLISP, an
open source LISP implementation.

Please welcome Luigi to the collective and assist him in any way you can.

We (Joel and I) are looking forward to working with both Luigi and Wassim.

Cheers
Terry


From jmh@joelhalpern.com  Fri Feb 19 06:30:41 2010
Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F26E83A7CDD for <lisp@core3.amsl.com>; Fri, 19 Feb 2010 06:30:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.484
X-Spam-Level: 
X-Spam-Status: No, score=-3.484 tagged_above=-999 required=5 tests=[AWL=0.115,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id crduMBxUONKC for <lisp@core3.amsl.com>; Fri, 19 Feb 2010 06:30:39 -0800 (PST)
Received: from hermes.mail.tigertech.net (hermes.mail.tigertech.net [64.62.209.72]) by core3.amsl.com (Postfix) with ESMTP id 50F483A6A3D for <lisp@ietf.org>; Fri, 19 Feb 2010 06:30:39 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by hermes.tigertech.net (Postfix) with ESMTP id 6B73E430034 for <lisp@ietf.org>; Fri, 19 Feb 2010 06:32:26 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at hermes.tigertech.net
Received: from [10.10.10.102] (pool-71-161-51-31.clppva.btas.verizon.net [71.161.51.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by hermes.tigertech.net (Postfix) with ESMTPSA id C8B1F430032 for <lisp@ietf.org>; Fri, 19 Feb 2010 06:32:25 -0800 (PST)
Message-ID: <4B7EA0F8.2070905@joelhalpern.com>
Date: Fri, 19 Feb 2010 09:32:24 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: "lisp@ietf.org" <lisp@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [lisp] Interworking and Deployment documentation
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Feb 2010 14:30:41 -0000

There are a number of folks who are reviewing our documents, and trying 
to understand our work without the benefit of the WG context.  This is 
very good, as the documents need to stand alone.
These folks have raised a number of questions with me.

After talking with Terry and Darrel about some of these issues, we would 
like to plan on resurrecting one of the documents that has been allowed 
to languish, to address part of this.  Darrel had previously written a 
document on LISP Interworking.  This will focus on the technical means 
that are needed to enable Interwoking between LISP and the large, 
non-upgraded, world.

In addition it seems likely that we need a document that describes 
practical deployments for LISP.  This would be similar to an 
applicability statement, but somewhat broader.  What follows are some of 
the things I think could be in this document.  But first, the questions.

Do folks think we need a deployment document?
Is anyone willing to work on or be the editor for such a document?

Potential contents would seem to include:
Placement of ITRs and ETRs (and who is responsible for managing them.)
Structure for EID allocation.
Placement and management of ALT routers, at the top of the hierarchy.
Relationship between LISP EID delegation and ALT Router operations, 
including issues of ALT-Provider lockin.
Placement and operation of PITRs (and incentives for same.)
Placement and operation of PETRs.
Placement and operation of MS/MR devices.

Some of the items above may not be worth writing up.
Some are probably very simple along the lines of "logical component X 
goes with logical component Y."
But that list does seem to be a set of questions that will help folks 
understand how the system will work, and what problems it can or can not 
address.

Yours,
Joel M. Halpern

From jnc@mercury.lcs.mit.edu  Fri Feb 19 07:21:04 2010
Return-Path: <jnc@mercury.lcs.mit.edu>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DEF5E3A711D for <lisp@core3.amsl.com>; Fri, 19 Feb 2010 07:21:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.436
X-Spam-Level: 
X-Spam-Status: No, score=-6.436 tagged_above=-999 required=5 tests=[AWL=0.163,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SXfAoIp62Rxh for <lisp@core3.amsl.com>; Fri, 19 Feb 2010 07:21:03 -0800 (PST)
Received: from mercury.lcs.mit.edu (mercury.lcs.mit.edu [18.26.0.122]) by core3.amsl.com (Postfix) with ESMTP id EAF3F3A769C for <lisp@ietf.org>; Fri, 19 Feb 2010 07:21:02 -0800 (PST)
Received: by mercury.lcs.mit.edu (Postfix, from userid 11178) id 663F56BE5A5; Fri, 19 Feb 2010 10:22:47 -0500 (EST)
To: lisp@ietf.org
Message-Id: <20100219152247.663F56BE5A5@mercury.lcs.mit.edu>
Date: Fri, 19 Feb 2010 10:22:47 -0500 (EST)
From: jnc@mercury.lcs.mit.edu (Noel Chiappa)
Cc: jnc@mercury.lcs.mit.edu
Subject: Re: [lisp] Interworking and Deployment documentation
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Feb 2010 15:21:05 -0000

    > From: "Joel M. Halpern" <jmh@joelhalpern.com>

    > it seems likely that we need a document that describes practical
    > deployments for LISP.
    > ..
    > Do folks think we need a deployment document?

I think it would be very useful/nice to have such a document.

As in, I don't think the effort will fail without it (as would be true with,
for instance, the inter-working document you mentioned, where that capability
is _critical_). On the other hand, I also agree that would be very useful to
have such a document, because i) it will help outsiders understand all these
aspects, and ii) more importantly, going through it all in detail might find
some holes.

On the gripping hand, we have a limited amount of manpower available, and the
question is, would it be better to deploy that manpower to work on some of
the outstanding technical issues (I have a long list of them here :-), or
should we do this document instead?

I guess it all comes down to 'do we have someone who will do it who isn't
already fully used up working on other stuff' - which, providentially,
was your next question! :-)

    > Is anyone willing to work on or be the editor for such a document?

Not me, alas... Although anyone who does volunteer will have my deep
gratitude! :-)


    > Potential contents would seem to include:
    > Placement of ITRs and ETRs (and who is responsible for managing them.)
    > Structure for EID allocation.

Not sure there's a _lot_ to say there, but it's probably worth mentioning the
topic.

    > Placement and management of ALT routers, at the top of the hierarchy.
    > Relationship between LISP EID delegation and ALT Router operations,
    > including issues of ALT-Provider lockin.
    > Placement and operation of PITRs (and incentives for same.)
    > Placement and operation of PETRs.
    > Placement and operation of MS/MR devices.

Seems like a good list - I can't off the top of my head think of anything
that's missing. {Ponders}

How about how to configure LISP to do stuff like making best use of
multi-homing, in particular configuring the RLOC list (with the weights and
priorities)? Although fully exploring all the capabiltiies available with
those mechanisms might be a document in itself (particularly when allied with
source-specific mappings, and nested mappings)...

And also use of LISP behind a NAT box - what are the current limitations,
what kinds of NAT does it work with, etc.


    > Some of the items above may not be worth writing up.
    > Some are probably very simple

If they are questions that people are asking, it is very worth writing up
answers, even if the answers are simple. (Hey, that will makes the scribe's
job that much easier... :-)

    > But that list does seem to be a set of questions that will help folks
    > understand how the system will work, and what problems it can or can not
    > address.

That might be another section (or perhaps a separate document at some point):
'what LISP can/will and can't/won't do for you and the Internet as a whole'.

	Noel

From job@instituut.net  Fri Feb 19 09:04:22 2010
Return-Path: <job@instituut.net>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A3A0828C169 for <lisp@core3.amsl.com>; Fri, 19 Feb 2010 09:04:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.602
X-Spam-Level: *
X-Spam-Status: No, score=1.602 tagged_above=-999 required=5 tests=[AWL=2.039,  BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_NET=0.611,  RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dgRSsTIFQ1Rl for <lisp@core3.amsl.com>; Fri, 19 Feb 2010 09:04:20 -0800 (PST)
Received: from masteen.6core.net (unknown [212.19.216.212]) by core3.amsl.com (Postfix) with ESMTP id 9FECD28C316 for <lisp@ietf.org>; Fri, 19 Feb 2010 09:03:54 -0800 (PST)
Received: from [172.16.42.148] (252-119.citynet.ftth.internl.net [85.223.119.252]) by masteen.6core.net (Postfix) with ESMTPSA id 554A410808B4; Fri, 19 Feb 2010 18:07:12 +0100 (CET)
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: "Job W. J. Snijders" <job@instituut.net>
In-Reply-To: <20100219152247.663F56BE5A5@mercury.lcs.mit.edu>
Date: Fri, 19 Feb 2010 18:05:40 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <671B5749-8EB2-4F95-AEBB-176C34AF50CD@instituut.net>
References: <20100219152247.663F56BE5A5@mercury.lcs.mit.edu>
To: jnc@mercury.lcs.mit.edu (Noel Chiappa)
X-Mailer: Apple Mail (2.1077)
Cc: Gregg Schudel <gschudel@cisco.com>, lisp@ietf.org
Subject: Re: [lisp] Interworking and Deployment documentation
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Feb 2010 17:04:22 -0000

Dear LISPers,

I'm new to the list. I just recently got more actively involved with =
LISP because Cisco put LISP (ipv4) support in IOS 15.1(1)XB ! :-)

On 19 feb 2010, at 16:22, Noel Chiappa wrote:

>> it seems likely that we need a document that describes practical
>> deployments for LISP.
>> ..
>> Do folks think we need a deployment document?
>=20
> I think it would be very useful/nice to have such a document.

I agree! More guidance as to what lisp does, what the benefits are for =
businesses, how it works, how it relates to the world as we know it =
would be welcome.=20

Right now I am setting up a semi-production network in cooperation with =
Gregg Schudel, David Meyer & the other Cisco guys.=20

>> Potential contents would seem to include:
>> Placement of ITRs and ETRs (and who is responsible for managing =
them.)
>> Structure for EID allocation.
>=20
> Not sure there's a _lot_ to say there, but it's probably worth =
mentioning the
> topic.

I'm curious about the structure for EID allocation, how is it currently =
done?=20

>> Placement and management of ALT routers, at the top of the hierarchy.
>> Relationship between LISP EID delegation and ALT Router operations,
>> including issues of ALT-Provider lockin.
>> Placement and operation of PITRs (and incentives for same.)
>> Placement and operation of PETRs.
>> Placement and operation of MS/MR devices.
>=20
> Seems like a good list - I can't off the top of my head think of =
anything
> that's missing. {Ponders}

These are things I am going to deal with, and I would be more then happy =
to share my progress on these topics as i struggle. I'm not entirely =
sure what format the document should be and what information is useful, =
so maybe I can hop along and help a more experienced editor with my =
experiences?=20

My goals currently are:
	- get EID allocation from 153.16.0.0/16 and 2610:00D0::/32 for =
some smaller sites and some larger sites
	- setup xTR routers at various places
	- connect to ALT
	- setup MS/MR
	- setup PITR/PETR routers in AS8283 and make additional globally =
routable space available to 'the EID' for third (testing) parties.

Through one of my employers: InTouch NV in Amsterdam (AS8283) i have =
been generously provided with hardware and connectivity & some ipspace =
to accomplish all of this. Some of you might remember InTouch for =
accomodating one of the first ipv6 tunnel brokers in europe (now SIXXS) =
and providing services to 6BONE.=20

I am completly new to trying to cooperate in a IETF WG, and I'm also =
kind of a beginner when it comes to LISP, so please bear with me. :-)

Kind regards,

Job Snijders
InTouch NV
JWJS1-RIPE


From jmh@joelhalpern.com  Fri Feb 19 13:35:08 2010
Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 101023A7E0E for <lisp@core3.amsl.com>; Fri, 19 Feb 2010 13:35:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.497
X-Spam-Level: 
X-Spam-Status: No, score=-3.497 tagged_above=-999 required=5 tests=[AWL=0.102,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xkk-btGl2JGE for <lisp@core3.amsl.com>; Fri, 19 Feb 2010 13:35:05 -0800 (PST)
Received: from hermes.mail.tigertech.net (hermes.mail.tigertech.net [64.62.209.72]) by core3.amsl.com (Postfix) with ESMTP id 268E73A7B77 for <lisp@ietf.org>; Fri, 19 Feb 2010 13:35:05 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by hermes.tigertech.net (Postfix) with ESMTP id 6E57C43B311 for <lisp@ietf.org>; Fri, 19 Feb 2010 13:36:53 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at hermes.tigertech.net
Received: from [10.10.10.102] (pool-71-161-51-31.clppva.btas.verizon.net [71.161.51.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by hermes.tigertech.net (Postfix) with ESMTPSA id EF3BE439FC8 for <lisp@ietf.org>; Fri, 19 Feb 2010 13:36:52 -0800 (PST)
Message-ID: <4B7F0474.3070202@joelhalpern.com>
Date: Fri, 19 Feb 2010 16:36:52 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: "lisp@ietf.org" <lisp@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [lisp] Scheduling
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Feb 2010 21:35:08 -0000

We have been tentatively given two slots.
If you see an important conflict we overlooked, please let us know.
(There are always some conflicts.)

Thank you,
Joel M. Halpern

MONDAY, March 22, 2010 1300-1500 Afternoon Session I
California B 	APP 	oauth 	Open Authentication Protocol WG
California A 	INT 	6lowpan 	IPv6 over Low power WPAN WG
Huntington 	INT 	lisp 	Locator/ID Separation Protocol WG
Manhattan 	OPS 	bmwg 	Benchmarking Methodology WG
Palos Verdes 	RAI 	martini 	Multiple AoR reachabiliTy
                                 InformatioN Indication WG
California D 	RTG 	ccamp 	Common Control and Measurement Plane WG
Redondo 	SEC 	nea 	Network Endpoint Assessment WG

WEDNESDAY, March 24, 2010 0900-1015 Morning Session I
Manhattan 	APP 	vcarddav 	vCard and CardDAV WG
Huntington 	INT 	ancp 	Access Node Control Protocol WG
California B 	INT 	lisp 	Locator/ID Separation Protocol WG
California A 	OPS 	opsawg 	Operations and Management Area Working
                                 Group WG
Palos Verdes 	RAI 	drinks 	Data for Reachability of
                                 Inter/tra-NetworK SIP WG
California C 	RTG 	sidr 	Secure Inter-Domain Routing WG
Redondo 	SEC 	emu 	EAP Method Update WG
California D 	TSV 	conex 	Congestion Exposure

From vaf@cisco.com  Mon Feb 22 14:31:34 2010
Return-Path: <vaf@cisco.com>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 46C6028C40F for <lisp@core3.amsl.com>; Mon, 22 Feb 2010 14:31:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.332
X-Spam-Level: 
X-Spam-Status: No, score=-8.332 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_43=0.6, RCVD_IN_DNSWL_HI=-8, SARE_HTML_SINGLETS=1.666]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nHa2wqe4zbk8 for <lisp@core3.amsl.com>; Mon, 22 Feb 2010 14:31:26 -0800 (PST)
Received: from sj-iport-1.cisco.com (sj-iport-1.cisco.com [171.71.176.70]) by core3.amsl.com (Postfix) with ESMTP id 0953728C419 for <lisp@ietf.org>; Mon, 22 Feb 2010 14:31:26 -0800 (PST)
Authentication-Results: sj-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-Files: rfcdiff-alt-02-to-03.html, draft-ietf-lisp-alt-03.txt : 103715, 52752
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEACeVgkurR7Hu/2dsb2JhbACbAXOkZIpajUmCSgwDghIEgxWLRg
X-IronPort-AV: E=Sophos;i="4.49,521,1262563200";  d="txt'?html'217?scan'217,208,217";a="301807795"
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-1.cisco.com with ESMTP; 22 Feb 2010 22:33:25 +0000
Received: from vaf-lnx1 (vaf-lnx1.cisco.com [128.107.165.254]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id o1MMXPc6019925 for <lisp@ietf.org>; Mon, 22 Feb 2010 22:33:25 GMT
Received: by vaf-lnx1 (Postfix, from userid 113818) id 6418320765; Mon, 22 Feb 2010 14:29:58 -0800 (PST)
Date: Mon, 22 Feb 2010 14:29:58 -0800
From: Vince Fuller <vaf@cisco.com>
To: lisp@ietf.org
Message-ID: <20100222222958.GB11758@vaf-lnx1.cisco.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="A6N2fC+uXW/VQSAv"
Content-Disposition: inline
User-Agent: Mutt/1.5.20 (2009-06-14)
Subject: [lisp] proposed draft-ietf-lisp-alt-03 draft
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Feb 2010 22:31:34 -0000

--A6N2fC+uXW/VQSAv
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Here is a -03 version of the LISP+ALT specification.

Changes are mostly editorial and for clarity. There are also now more
dependencies on the Map-Server document, with emphasis that ITRs and
ETRs generally use the Map-Server/Map-Resolver interface rather than
connecting directly to the ALT.

One significant clarification is how an aggregating ALT router (which may be
a Map-Server) should handle reception of a Map-Request that matches a "hole"
in an aggregate EID prefix it is originating.

Both html diffs (from the -02 version) and the full text of the new draft
are attached.

Comments appreciated. I'd like to post this to the Internet-Drafts repository
by the end of the business day (PST) on Monday, March 1st.

        --Vince
        (for the other ALT authors: Dino, Dave, and Darrel)

--A6N2fC+uXW/VQSAv
Content-Type: text/html; charset=us-ascii
Content-Disposition: attachment; filename="rfcdiff-alt-02-to-03.html"

<html><head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<title>wdiff draft-ietf-lisp-alt-02.txt draft-ietf-lisp-alt-03.txt</title></head><body>
<pre>
Network Working Group                                          V. Fuller
Internet-Draft                                              D. Farinacci
Intended status: Experimental                                   D. Meyer
Expires: <strike><font color="red">July 29,</font></strike> <strong><font color="green">August 21,</font></strong> 2010                                        D. Lewis
                                                                   Cisco
                                                        <strike><font color="red">January 25,</font></strike>
                                                       <strong><font color="green">February 17,</font></strong> 2010

                  LISP Alternative Topology (LISP+ALT)
                       <strike><font color="red">draft-ietf-lisp-alt-02.txt</font></strike>
                       <strong><font color="green">draft-ietf-lisp-alt-03.txt</font></strong>

Abstract

   This document describes a method of building an <strike><font color="red">alternative, logical
   topology for managing</font></strike> <strong><font color="green">Alternative Logical
   Topology (ALT) to be used by the Locator/ID Separation Protocol
   (LISP) to find</font></strong> Endpoint Identifier <strong><font color="green">(EID)</font></strong> to Routing Locator <strike><font color="red">mappings
   using the Locator/ID Separation Protocol.</font></strike> <strong><font color="green">(RLOC)
   mappings.</font></strong>  The <strike><font color="red">logical network</font></strike> <strong><font color="green">ALT</font></strong> is built as an overlay on the public Internet
   using existing technologies and tools, specifically the Border
   Gateway Protocol and the Generic Routing Encapsulation.  An important
   design goal for LISP+ALT is to allow for the relatively easy
   deployment of <strike><font color="red">an
   efficient</font></strike> <strong><font color="green">a</font></strong> mapping system while minimizing changes to existing
   hardware and software.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on <strike><font color="red">July 29,</font></strike> <strong><font color="green">August 21,</font></strong> 2010.

Copyright Notice
   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the BSD License.

Table of Contents

   1.  Requirements Notation  . . . . . . . . . . . . . . . . . . . .  4
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.  Definition of Terms  . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">6</font></strike>  <strong><font color="green">7</font></strong>
   4.  The <strike><font color="red">LISP 1.5</font></strike> <strong><font color="green">LISP+ALT</font></strong> model . . . . . . . . . . . . . . . . . . . . . .  <strike><font color="red">8</font></strike> <strong><font color="green">10</font></strong>
     4.1.  Routeability of EIDs . . . . . . . . . . . . . . . . . . .  <strike><font color="red">8</font></strike> <strong><font color="green">10
       4.1.1.  Mechanisms for an ETR to originate EID-prefixes  . . . 11
       4.1.2.  Mechanisms for an ITR to forward to EID-prefixes . . . 11
       4.1.3.  Map Server Model preferred . . . . . . . . . . . . . . 11</font></strong>
     4.2.  Connectivity to non-LISP sites . . . . . . . . . . . . . .  <strike><font color="red">9</font></strike> <strong><font color="green">11</font></strong>
     4.3.  Caveats on the use of Data Probes  . . . . . . . . . . . .  <strike><font color="red">9</font></strike> <strong><font color="green">12</font></strong>
   5.  LISP+ALT: Overview . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">10</font></strike> <strong><font color="green">13</font></strong>
     5.1.  ITR traffic handling . . . . . . . . . . . . . . . . . . . <strike><font color="red">11</font></strike> <strong><font color="green">14</font></strong>
     5.2.  EID Assignment - Hierarchy and Topology  . . . . . . . . . <strike><font color="red">11</font></strike> <strong><font color="green">14</font></strong>
     5.3.  <strike><font color="red">LISP+ALT Router (or ALT router for short)  . . . . . . . . 12
     5.4.  ITR and ETR in a LISP+ALT Environment  . . . . . . . . . . 13
     5.5.</font></strike>  Use of GRE and BGP between LISP+ALT Routers  . . . . . . . <strike><font color="red">13</font></strike> <strong><font color="green">16</font></strong>
   6.  <strike><font color="red">EID Prefix</font></strike>  <strong><font color="green">EID-prefix</font></strong> Propagation and Map-Request Forwarding  . . . . . . <strike><font color="red">14</font></strike> <strong><font color="green">17</font></strong>
     6.1.  Changes to ITR behavior with LISP+ALT  . . . . . . . . . . <strike><font color="red">14</font></strike> <strong><font color="green">17</font></strong>
     6.2.  Changes to ETR behavior with LISP+ALT  . . . . . . . . . . <strike><font color="red">14</font></strike> <strong><font color="green">17</font></strong>
   7.  BGP configuration and protocol considerations  . . . . . . . . <strike><font color="red">16</font></strike> <strong><font color="green">19</font></strong>
     7.1.  Autonomous System Numbers (ASNs) in LISP+ALT . . . . . . . <strike><font color="red">16</font></strike> <strong><font color="green">19</font></strong>
     7.2.  Sub-Address Family Identifier (SAFI) for LISP+ALT  . . . . <strike><font color="red">16</font></strike> <strong><font color="green">19</font></strong>
   8.  <strike><font color="red">EID-Prefix</font></strike>  <strong><font color="green">EID-prefix</font></strong> Aggregation . . . . . . . . . . . . . . . . . . . . <strike><font color="red">17</font></strike> <strong><font color="green">20</font></strong>
     8.1.  Traffic engineering with LISP and LISP+ALT . . . . . . . . <strike><font color="red">17</font></strike> <strong><font color="green">20</font></strong>
     8.2.  Edge aggregation and dampening . . . . . . . . . . . . . . <strike><font color="red">18</font></strike> <strong><font color="green">21</font></strong>
   9.  Connecting sites to the ALT network  . . . . . . . . . . . . . <strike><font color="red">19</font></strike> <strong><font color="green">22</font></strong>
     9.1.  ETRs originating information into the ALT  . . . . . . . . <strike><font color="red">19</font></strike> <strong><font color="green">22</font></strong>
     9.2.  ITRs Using the ALT . . . . . . . . . . . . . . . . . . . . <strike><font color="red">19</font></strike> <strong><font color="green">22</font></strong>
   10. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">21</font></strike> <strong><font color="green">24</font></strong>
   11. Security Considerations  . . . . . . . . . . . . . . . . . . . <strike><font color="red">22</font></strike> <strong><font color="green">25</font></strong>
     11.1. Apparent LISP+ALT Vulnerabilities  . . . . . . . . . . . . <strike><font color="red">22</font></strike> <strong><font color="green">25</font></strong>
     11.2. Survey of LISP+ALT Security Mechanisms . . . . . . . . . . <strike><font color="red">23</font></strike> <strong><font color="green">26</font></strong>
     11.3. <strike><font color="red">Using existing</font></strike> <strong><font color="green">Use of new IETF standard</font></strong> BGP Security mechanisms . . . . . <strike><font color="red">. . . . . 23</font></strike> <strong><font color="green">26</font></strong>
   12. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">24</font></strike> <strong><font color="green">27</font></strong>
   13. References . . . . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">25</font></strike> <strong><font color="green">28</font></strong>
     13.1. Normative References . . . . . . . . . . . . . . . . . . . <strike><font color="red">25</font></strike> <strong><font color="green">28</font></strong>
     13.2. Informative References . . . . . . . . . . . . . . . . . . <strike><font color="red">25</font></strike> <strong><font color="green">28</font></strong>
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . <strike><font color="red">26</font></strike> <strong><font color="green">29</font></strong>

1.  Requirements Notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

2.  Introduction

   This document describes a method of building an <strike><font color="red">alternative logical
   topology for managing Endpoint identifier</font></strike> <strong><font color="green">Alternative Logical
   Topology (ALT)</font></strong> to <strike><font color="red">Routing Locator mappings
   using</font></strike> <strong><font color="green">be used by</font></strong> the Locator/ID Separation Protocol <strike><font color="red">[LISP].</font></strike>
   <strong><font color="green">(LISP) to find Endpoint Identifier (EID) to Routing Locator (RLOC)
   mappings.</font></strong>  This logical topology uses existing technology and tools,
   specifically the Border Gateway Protocol [RFC4271] and its <strike><font color="red">multi-protocol</font></strike> <strong><font color="green">multi-
   protocol</font></strong> extension [RFC2858], along with the Generic Routing
   Encapsulation [RFC2784] protocol to construct an overlay network of
   devices <strike><font color="red">that advertise</font></strike> <strong><font color="green">(ALT Routers) which operate on</font></strong> EID-prefixes <strike><font color="red">only.  These Endpoint Identifier Prefix Aggregators hold
   hierarchically-assigned pieces</font></strike> <strong><font color="green">and use EIDs as
   forwarding destinations.

   ALT Routers advertise hierarchically-delegated segments</font></strong> of the <strike><font color="red">Endpoint Identifier space</font></strike> <strong><font color="green">EID
   namespace</font></strong> (i.e., prefixes) <strike><font color="red">and their next hops</font></strike> <strong><font color="green">toward the rest of the ALT; they also
   forward traffic destined for an EID covered by one of those prefixes</font></strong>
   toward the network element which is authoritative for <strike><font color="red">Endpoint Identifier-to-Routing Locator mapping
   for</font></strike> that <strike><font color="red">prefix.  Tunnel routers can use this overlay to make queries
   against and respond to mapping requests made against</font></strike> <strong><font color="green">EID (i.e.
   is</font></strong> the <strike><font color="red">distributed
   Endpoint Identifier-to-Routing Locator mapping database.  Note</font></strike> <strong><font color="green">origin of</font></strong> the
   <strike><font color="red">database is distributed (as described</font></strike> <strong><font color="green">advertisement of the EID-to-RLOC mapping which
   applies to that EID).  Map Resolvers (MRs; see [LISP-MS]) and,</font></strong> in
   <strong><font color="green">some cases, Ingress Tunnel Routers (ITRs) use this overlay to send
   mapping requests (using</font></strong> [LISP]) <strike><font color="red">and is stored in</font></strike> <strong><font color="green">to</font></strong> the
   <strike><font color="red">ETRs.

   Note</font></strike> <strong><font color="green">Egress Tunnel Routers (ETRs)</font></strong>
   that <strike><font color="red">an important design goal of LISP+ALT</font></strike> <strong><font color="green">hold the EID-to-RLOC mappings for a particular EID-prefix

   It</font></strong> is <strong><font color="green">important</font></strong> to <strike><font color="red">minimize</font></strike> <strong><font color="green">note that</font></strong> the
   <strike><font color="red">number of changes</font></strike> <strong><font color="green">ALT does not distibute actual EID-
   to-RLOC mappings.  What it does provide is a forwarding path from an
   ITR (or MR) which requires an EID-to-RLOC mapping</font></strong> to <strike><font color="red">existing hardware and/or software</font></strike> <strong><font color="green">an ETR which
   holds</font></strong> that <strike><font color="red">are
   required</font></strike> <strong><font color="green">mapping.  The ITR/MR uses this path to send an ALT
   Datagram (see Section 4)</font></strong> to <strike><font color="red">deploy</font></strike> <strong><font color="green">an ETR which then responds with a Map-
   Reply containing</font></strong> the <strong><font color="green">needed</font></strong> mapping <strike><font color="red">system.  It</font></strike> <strong><font color="green">information.

   One design goal for LISP+ALT</font></strong> is <strike><font color="red">envisioned that in most
   cases</font></strike> <strong><font color="green">to use</font></strong> existing technology <strike><font color="red">can be used</font></strike> <strong><font color="green">wherever
   possible.  To this end, the ALT is intended</font></strong> to <strong><font color="green">be built using off-
   the-shelf routers which already</font></strong> implement <strike><font color="red">and deploy LISP+
   ALT.  Since</font></strike> the <strike><font color="red">deployment of LISP+ALT adds new</font></strike> <strong><font color="green">required protocols (BGP
   and GRE); little, if any, LISP-specific modifications should be
   needed for such</font></strong> devices to <strong><font color="green">be deployed on</font></strong> the
   <strike><font color="red">network, existing devices not need changes or upgrades.  They can
   function as they</font></strike> <strong><font color="green">ALT.  Note, though,
   that organizational and operational considerations suggest that ALT
   Routers be both logically and physically separate from the "native"
   Internet packet transport system; deploying this overlay on those
   routers which</font></strong> are <strike><font color="red">to realize an underlying</font></strike> <strong><font color="green">already participating in the global routing system</font></strong>
   and <strike><font color="red">robust physical
   topology.</font></strike> <strong><font color="green">actively forwarding Internet traffic is not recommended.</font></strong>

   The remainder of this document is organized as follows: Section 3
   provides the definitions of terms used in this document.  Section 4
   outlines the basic LISP 1.5 model.  Section 5 provides a basic
   overview of the LISP Alternate Topology architecture, and Section 6
   describes how the ALT uses BGP to propagate Endpoint Identifier
   reachability over the overlay network.  Section 8 describes the
   construction of the ALT aggregation hierarchy, and Section 9
   discusses how LISP+ALT elements are connected to form the overlay
   network.

3.  Definition of Terms

   LISP+ALT operates on two name spaces and introduces a new network
   element, the LISP+ALT Router (see below).  This section provides
   high-level definitions of the LISP+ALT name spaces, network elements,
   and message types.

   <strike><font color="red">The</font></strike>

    Alternative Logical Topology (ALT):  The virtual overlay network
      made up of tunnels between <strike><font color="red">EID Prefix Aggregators.</font></strike> <strong><font color="green">LISP+ALT Routers.</font></strong>  The Border Gateway
      Protocol (BGP) runs between ALT <strike><font color="red">routers</font></strike> <strong><font color="green">Routers</font></strong> and is used to carry
      reachability information for <strike><font color="red">EID prefixes.

   Legacy Internet:</font></strike> <strong><font color="green">EID-prefixes.</font></strong>  The <strike><font color="red">portion of</font></strike> <strong><font color="green">ALT provides a way
      to forward Map-Requests (and, if supported, Data Probes) toward</font></strong>
      the <strike><font color="red">Internet which does not run LISP</font></strike> <strong><font color="green">ETR that "owns" and EID-prefix.  As a tunneled overlay, its
      performance is expected to be quite limited so use of it to
      forward high-bandwidth flows of Data Probes is strongly
      discouraged (see Section 4.3 for additional discussion).

    Legacy Internet:  The portion of the Internet which does not run
      LISP</font></strong> and does not participate in LISP+ALT.

   <strike><font color="red">LISP+ALT</font></strike>

    <strong><font color="green">ALT</font></strong> Router:  The devices which run on the ALT.  The ALT is a static
      network built using tunnels between <strike><font color="red">LISP+ALT routers.</font></strike> <strong><font color="green">ALT Routers.</font></strong>  These routers
      are deployed in a <strike><font color="red">hierarchy</font></strike> <strong><font color="green">roughly-hierarchical mesh</font></strong> in which routers at
      each level in the <strike><font color="red">this hierarchy</font></strike> <strong><font color="green">topology</font></strong> are responsible for aggregating <strike><font color="red">all
      EID</font></strike> <strong><font color="green">EID-</font></strong>
      prefixes learned from those logically "below" them and advertising
      summary prefixes to <strike><font color="red">the routers</font></strike> <strong><font color="green">those</font></strong> logically "above" them.  <strike><font color="red">All prefix</font></strike>  <strong><font color="green">Prefix</font></strong> learning
      and propagation between <strike><font color="red">levels</font></strike> <strong><font color="green">ALT Routers</font></strong> is done using BGP.  <strike><font color="red">A LISP+ALT router</font></strike>  <strong><font color="green">An ALT
      Router</font></strong> at the lowest level, or "edge" of the ALT, learns <strike><font color="red">EID</font></strike> <strong><font color="green">EID-</font></strong>
      prefixes from its "client" ETRs.  See Section 4.1 for a
      description of how <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong> are learned at the "edge" of the
      ALT.  See also Section 7 for details on how BGP is configured
      between the different network elements.

      <strike><font color="red">The primary function of LISP+ALT routers is to provide a
      lightweight</font></strike>  <strong><font color="green">When an ALT Router
      receives an ALT Datagram, it looks up the destination EID in its</font></strong>
      forwarding <strike><font color="red">infrastructure for LISP control-plane
      messages (Map-Request and Map-Reply),</font></strike> <strong><font color="green">table (composed of EID prefix routes it learned from
      neighboring ALT Routers)</font></strong> and <strong><font color="green">forwards it</font></strong> to <strike><font color="red">transport data
      packets when the packet has</font></strike> the <strike><font color="red">same destination address in both</font></strike> <strong><font color="green">logical next-hop
      on</font></strong> the <strike><font color="red">inner (encapsulating) destination and outer destination
      addresses ((i.e., a Data Probe packet).</font></strike> <strong><font color="green">overlay network.</font></strong>

    Endpoint ID (EID):  A 32-bit (for IPv4) or 128-bit (for ipv6) value
      used <strike><font color="red">in</font></strike> <strong><font color="green">to identify</font></strong> the <strong><font color="green">ultimate</font></strong> source <strike><font color="red">and</font></strike> <strong><font color="green">or</font></strong> destination <strike><font color="red">address fields of the first
      (most inner) LISP header of</font></strike> <strong><font color="green">for</font></strong> a <strong><font color="green">LISP-
      encapsulated</font></strong> packet.  <strong><font color="green">See [LISP] for details.

    EID-prefix:</font></strong>  A <strike><font color="red">packet that is emitted by
      a system contains</font></strike> <strong><font color="green">set of</font></strong> EIDs <strong><font color="green">delegated</font></strong> in <strike><font color="red">its headers and LISP headers</font></strike> <strong><font color="green">a power-of-two block.  EID-
      prefixes</font></strong> are
      <strike><font color="red">prepended only when</font></strike> <strong><font color="green">routed on</font></strong> the <strike><font color="red">packet reaches an Ingress Tunnel Router
      (ITR)</font></strike> <strong><font color="green">ALT (not</font></strong> on the <strike><font color="red">data path</font></strike> <strong><font color="green">global Internet) and
      are expected</font></strong> to <strike><font color="red">the destination EID.

      In LISP+ALT, EID-prefixes MUST BE</font></strike> <strong><font color="green">be</font></strong> assigned in a hierarchical manner <strike><font color="red">(in power-of-two)</font></strike> such that
      they can be aggregated by <strike><font color="red">LISP+</font></strike> ALT <strike><font color="red">routers.  In addition,</font></strike> <strong><font color="green">Routers.  Such a block is
      characterized by a prefix and</font></strong> a <strong><font color="green">length.  Note that while the ALT
      routing system considers an EID-prefix to be an opaque block of
      EIDs, an end</font></strong> site may <strike><font color="red">have site-local</font></strike> <strong><font color="green">put site-local, topologically-relevant</font></strong>
      structure <strike><font color="red">in
      how EIDs are topologically organized</font></strike> (subnetting) <strong><font color="green">into an EID-prefix</font></strong> for <strike><font color="red">routing
      within the site; this structure is not visible to the global
      routing system.

   EID-Prefix Aggregate:</font></strike> <strong><font color="green">intra-site routing.

    Aggregated EID-prefixes:</font></strong>  A set of <strong><font color="green">individual</font></strong> EID-prefixes <strike><font color="red">said to be aggregatable</font></strike> <strong><font color="green">that have
      been aggregated</font></strong> in the [RFC4632] sense.  <strike><font color="red">That is, an EID-Prefix aggregate is
      defined to be</font></strike>

    <strong><font color="green">Map Server (MS):   An edge ALT Router that provides</font></strong> a <strike><font color="red">single contiguous power-of-two EID-prefix block.
      Such</font></strike> <strong><font color="green">registration
      function for non-ALT-connected ETRs, originates EID-prefixes into
      the ALT on behalf of those ETRs, and forwards Map-Reqeusts to
      them.  See [LISP-MS] for details.

    Map Resolver (MR):   An edge ALT Router that accepts an Encapsulated
      Map-Reqeust from</font></strong> a <strike><font color="red">block is characterized by</font></strike> <strong><font color="green">non-ALT-connected ITR, decapsulates it, and
      forwards it on to the ALT toward the ETR which owns the requested
      EID-prefix.  See [LISP-MS] for details.

    Ingress Tunnel Router (ITR):   A router which sends LISP Map-
      Requests or encapsulates IP datagrams with LISP headers, as
      defined in [LISP].  In this document, the term refers to any
      device implementing ITR functionality, including</font></strong> a <strike><font color="red">prefix</font></strike> <strong><font color="green">Proxy-ITR (see
      [LISP-IW]).  Under some circumstances, a LISP Map Resolver may
      also originate Map-Requests (see [LISP-MS]).

    Egress Tunnel Router (ETR):   A router which sends LISP Map-Replies
      in response to LISP Map-Requests</font></strong> and <strong><font color="green">decapsulates LISP-
      encapsulated IP datagrams for delivery to end systems, as defined
      in [LISP].  In this document, the term refers to any device
      implementing ETR functionality, including</font></strong> a <strike><font color="red">length.</font></strike> <strong><font color="green">Proxy-ETR (see
      [LISP-IW]).  Under some circumstances, a LISP Map Server may also
      respond to Map-Requests (see [LISP-MS]).</font></strong>

    Routing Locator (RLOC):  <strike><font color="red">An</font></strike>  <strong><font color="green">A routable</font></strong> IP address <strike><font color="red">of an egress</font></strike> <strong><font color="green">for a LISP</font></strong> tunnel
      router
      <strike><font color="red">(ETR).  It is</font></strike> <strong><font color="green">(ITR or ETR).  Also</font></strong> the output of a EID-to-RLOC mapping <strike><font color="red">lookup.  An EID</font></strike>
      <strong><font color="green">lookup; an EID-prefix</font></strong> maps to one or more RLOCs.  Typically, RLOCs
      are numbered from topologically-aggregatable blocks that are
      assigned to a site at each point to which it attaches to the
      global Internet; where the topology is defined by the connectivity
      of provider <strike><font color="red">networks,</font></strike> <strong><font color="green">networks.</font></strong>  RLOCs can be thought of as Provider
      Aggregatable (PA) addresses.
      <strike><font color="red">Note that in LISP+ALT,</font></strike>  <strong><font color="green">Routing for</font></strong> RLOCs <strike><font color="red">are</font></strike> <strong><font color="green">is</font></strong> not carried <strike><font color="red">by LISP+ALT routers.</font></strike> <strong><font color="green">on
      the ALT.</font></strong>

    EID-to-RLOC Mapping:  A binding between an <strike><font color="red">EID</font></strike> <strong><font color="green">EID-prefix</font></strong> and the <strike><font color="red">RLOC-set</font></strike> <strong><font color="green">set of
      RLOCs</font></strong> that can be used to reach <strike><font color="red">the EID.  The term "mapping" refers</font></strike> <strong><font color="green">it; sometimes referred</font></strong> to <strike><font color="red">an
      EID-to-RLOC mapping.

    EID Prefix</font></strike> <strong><font color="green">simply
      as a "mapping".

    EID-prefix</font></strong> Reachability:  An <strike><font color="red">EID prefix</font></strike> <strong><font color="green">EID-prefix</font></strong> is said to be "reachable" if
      one or more of its locators are reachable.  That is, an <strike><font color="red">EID prefix</font></strike> <strong><font color="green">EID-prefix</font></strong>
      is reachable if the ETR (or its proxy) that is authoritative for a
      given EID-to-RLOC mapping is reachable.

    Default Mapping:  A Default Mapping is a mapping entry for EID-
      prefix 0.0.0.0/0 (0::/0 for ipv6).  It maps to a locator-set used
      for all EIDs in the Internet.  If there is a more specific EID-
      prefix in the mapping cache it overrides the Default Mapping
      entry.  The Default Mapping <strike><font color="red">route</font></strike> can be learned by configuration or
      from a Map-Reply message.

    <strong><font color="green">ALT</font></strong> Default Route:  A <strike><font color="red">Default Route in the context of LISP+ALT is a EID-
      prefix</font></strike> <strong><font color="green">EID-prefix</font></strong> value of 0.0.0.0/0 (or 0::/0 for
      ipv6) which <strike><font color="red">is advertised
      by BGP on top of</font></strike> <strong><font color="green">may be learned from</font></strong> the <strike><font color="red">ALT.</font></strike> <strong><font color="green">ALT or statically configured
      on an edge ALT Router.</font></strong>  The <strike><font color="red">Default</font></strike> <strong><font color="green">ALT-Default</font></strong> Route <strike><font color="red">is used to create</font></strike> <strong><font color="green">defines</font></strong> a forwarding
      path for a packet to be sent into the ALT <strike><font color="red">(and ALT
      datagram)</font></strike> on a router which does
      not have a full ALT forwarding database.

4.  The <strike><font color="red">LISP 1.5</font></strike> <strong><font color="green">LISP+ALT</font></strong> model

   <strike><font color="red">As documented in [LISP], the LISP 1.5</font></strike>

   <strong><font color="green">The LISP+ALT</font></strong> model uses the same basic query/response protocol <strike><font color="red">machinery as LISP 1.0.</font></strike> <strong><font color="green">that
   is documented in [LISP].</font></strong>  In particular, <strike><font color="red">LISP+
   ALT</font></strike> <strong><font color="green">LISP+ALT</font></strong> provides two <strike><font color="red">mechanisms for</font></strike> <strong><font color="green">types
   packet that</font></strong> an ITR <strong><font color="green">can originate</font></strong> to obtain EID-to-RLOC <strike><font color="red">mappings
   (both</font></strike> <strong><font color="green">mappings:

   Map-Request:  A Map-Request message is sent into the ALT to request
      an EID-to-RLOC mapping.  The ETR which owns the mapping will
      respond to the ITR with a Map-Reply message.  Since the ALT only
      forwards on EID destinations, the DA</font></strong> of <strike><font color="red">these techniques are described in more detail in
   Section 9.2):</font></strike> <strong><font color="green">the Map-Request sent on
      the ALT MUST be an EID.  See [LISP] for the format of Map-Request
      and Map-Reply packets.</font></strong>

   Data Probe:  <strike><font color="red">An</font></strike>  <strong><font color="green">Alternatively, an</font></strong> ITR may <strong><font color="green">encapsulate and</font></strong> send the first <strike><font color="red">few</font></strike>
      data <strike><font color="red">packets</font></strike> <strong><font color="green">packet destined for a EID with no known RLOCs</font></strong> into the ALT
      <strike><font color="red">to</font></strike> <strong><font color="green">as
      a Data Probe.  This might be done</font></strong> minimize packet loss and to
      probe for the <strike><font color="red">mapping;</font></strike> <strong><font color="green">mapping.  As above,</font></strong> the authoritative ETR <strong><font color="green">for the
      EID-prefix</font></strong> will respond to the ITR with a Map-Reply message when
      it receives the data packet over the ALT.  <strong><font color="green">As a side-effect, the
      encapsulated data packet is delivered to the end-system at the ETR
      site.</font></strong>  Note that <strike><font color="red">in this
      case,</font></strike> <strong><font color="green">the Data Probe</font></strong> the inner Destination Address
      (DA), which is an EID, is copied to the outer DA and <strike><font color="red">is</font></strike> <strong><font color="green">so that the
      resulting packet can be</font></strong> routed over the ALT.

   <strike><font color="red">Map-Request:  An ITR may also send a Map-Request message into the ALT
      to request the mapping.  As in the Data Probe case, the
      authoritative ETR will respond to the ITR with a Map-Reply
      message.  Since the ALT only forwards on EID destinations, the DA
      of the Map-Request sent in to the ALT MUST be an EID.</font></strike>  See <strike><font color="red">[LISP]</font></strike> <strong><font color="green">Section 4.3</font></strong> for
      <strong><font color="green">caveats on</font></strong> the <strike><font color="red">format</font></strike> <strong><font color="green">usability</font></strong> of <strike><font color="red">Map-Request and Map-Reply packets.

   ALT datagram:  A</font></strike> <strong><font color="green">Data Probes.

   The term "ALT Datagram" is short-hand for a</font></strong> Map-Request or Data Probe
   to be sent into or forwarded on the ALT.  <strong><font color="green">Note that while the outer
   header Source Address of an ALT Datagram is currently expected to be
   an RLOC, there may be situations (i.e. for experimentation with
   caching in intermediate ALT nodes) where an EID would be used to
   force a Map-Reply to be routed back through the ALT.</font></strong>

4.1.  Routeability of EIDs

   <strike><font color="red">As with</font></strike>

   <strong><font color="green">A</font></strong> LISP <strike><font color="red">1.0, EIDs are routable</font></strike> <strong><font color="green">EID has the same syntax as IP address</font></strong> and can be used,
   unaltered, as the source <strike><font color="red">and</font></strike> <strong><font color="green">or</font></strong> destination <strike><font color="red">addresses in</font></strike> <strong><font color="green">of an</font></strong> IP <strike><font color="red">datagrams.  Unlike in LISP
   1.0, LISP 1.5</font></strike> <strong><font color="green">datagram.  In
   general, though,</font></strong> EIDs are not routable on the public Internet; <strike><font color="red">instead,
   they are only routed over</font></strike> <strong><font color="green">LISP+
   ALT provides</font></strong> a separate, virtual <strike><font color="red">topology referred to</font></strike> <strong><font color="green">network, known</font></strong> as the LISP
   Alternative <strike><font color="red">Virtual Network.</font></strike> <strong><font color="green">Logical Topology (ALT) on which a datagram using an EID
   as a destination address may be transmitted.</font></strong>  This network is built
   as an overlay on the public Internet using tunnels to interconnect <strike><font color="red">LISP+ALT
   routers.</font></strike>
   <strong><font color="green">ALT Routers.</font></strong>  BGP <strike><font color="red">is run</font></strike> <strong><font color="green">runs</font></strong> over these tunnels to propagate <strike><font color="red">the</font></strike> <strong><font color="green">path</font></strong>
   information needed to <strike><font color="red">route</font></strike> <strong><font color="green">forward</font></strong> ALT <strike><font color="red">datagrams.</font></strike> <strong><font color="green">Datagrams.</font></strong>  Importantly, while the
   ETRs are the source(s) of the unaggregated <strike><font color="red">EID prefix data,</font></strike> <strong><font color="green">EID-prefixes,</font></strong> LISP+ALT
   uses existing BGP mechanisms to <strike><font color="red">aggressively</font></strike> aggregate this information.  <strike><font color="red">Note</font></strike>

<strong><font color="green">4.1.1.  Mechanisms for an ETR to originate EID-prefixes

   There are three ways</font></strong> that an ETR <strong><font color="green">may originate its mappings into the
   ALT:

   1.  By registration with a Map Server as documented in [LISP-MS].
       This</font></strong> is <strike><font color="red">not required</font></strike> <strong><font color="green">the common case and is expected</font></strong> to <strike><font color="red">participate (or prevented from
   participating) in LISP+ALT;</font></strike> <strong><font color="green">be used by the
       majority of ETRs.

   2.  Using a "static route" on the ALT.  Where no Map-Server is
       available,</font></strong> an <strike><font color="red">ETR</font></strike> <strong><font color="green">edge ALT Router</font></strong> may <strike><font color="red">choose</font></strike> <strong><font color="green">be configured with a "static
       EID-prefix route" pointing to an ETR.

   3.  Edge connection</font></strong> to <strike><font color="red">communicate</font></strike> <strong><font color="green">the ALT.  If a site requires fine- grained
       control over how</font></strong> its
   <strike><font color="red">mappings</font></strike> <strong><font color="green">EID-prefixes are advertised in</font></strong> to <strong><font color="green">the ALT,
       it may configure</font></strong> its <strike><font color="red">serving LISP+ALT router(s) using subscription time
   static configuration or through</font></strike> <strong><font color="green">ETR(s) with tunnel and BGP connections to
       edge ALT Routers.

4.1.2.  Mechanisms for an ITR to forward to EID-prefixes

   There are three ways that an ITR may send ALT Datagrams:

   1.  Through</font></strong> a <strike><font color="red">dynamic mechanism such</font></strike> <strong><font color="green">Map Resolver</font></strong> as <strike><font color="red">that
   described</font></strike> <strong><font color="green">documented</font></strong> in [LISP-MS].  <strike><font color="red">An</font></strike>  <strong><font color="green">This is the
       common case and is expected to be used by the majority of ITRs.

   2.  Using a "default route".  Where a Map Resolver is not available,
       an</font></strong> ITR may <strike><font color="red">similarly use</font></strike> <strong><font color="green">be configured with</font></strong> a static <strike><font color="red">EID
   "default route" or other configuration</font></strike> <strong><font color="green">ALT Default Route pointing
       to an edge ALT Router.

   3.  Edge connection to the ALT.  If a site requires fine-grained
       knowledge of what prefixes exist on the ALT, it may configure its
       ITR(s) with tunnel and BGP connections to edge ALT Routers.

4.1.3.  Map Server Model preferred

   The ALT-connected ITR and ETR cases are expected to be rare,</font></strong> as <strike><font color="red">described in [LISP-MS]</font></strike> <strong><font color="green">the
   Map Server/Map Resolver model is both simpler for an ITR/ETR operator</font></strong>
   to
   <strike><font color="red">avoid</font></strike> <strong><font color="green">use, and provides a more general service interface to not only</font></strong> the <strike><font color="red">complexity of participating</font></strike>
   <strong><font color="green">ALT, but also to other mapping databases that may be developed</font></strong> in the <strike><font color="red">ALT.</font></strike>
   <strong><font color="green">future.</font></strong>

4.2.  Connectivity to non-LISP sites

   As stated above, EIDs used as IP addresses by LISP sites are not
   routable on the public Internet.  This implies that, absent a
   mechanism for communication between LISP and non-LISP sites,
   connectivity between them is not possible.  To resolve this problem,
   an "interworking" technology has been defined; see <strike><font color="red">[Interworking]</font></strike> <strong><font color="green">[LISP-IW]</font></strong> for
   details.

4.3.  Caveats on the use of Data Probes

   It is worth noting that there has been a great deal of discussion and
   controversy about whether Data Probes are a good idea.  On the one
   hand, using them offers a method of avoiding the "first packet drop"
   problem when an ITR does not have a mapping for a particular EID-
   prefix.  On the other hand, forwarding data packets on the ALT would
   require that it either be engineered to support relatively high
   traffic rates, which is not generally feasible for a tunneled
   network, or that it be carefully designed to aggressively <strike><font color="red">rate- limit</font></strike> <strong><font color="green">rate-limit</font></strong>
   traffic to avoid congestion or DoS attacks.  There <strike><font color="red">are</font></strike> <strong><font color="green">may</font></strong> also <strike><font color="red">other</font></strike> <strong><font color="green">be</font></strong> issues <strike><font color="red">involving</font></strike>
   <strong><font color="green">caused by different</font></strong> latency or other <strike><font color="red">differences</font></strike> <strong><font color="green">performance characteristics</font></strong>
   between the ALT path
   <strike><font color="red">that</font></strike> <strong><font color="green">taken by an</font></strong> initial <strike><font color="red">a</font></strike> Data Probe <strike><font color="red">would take</font></strike> and the
   <strong><font color="green">"Internet"</font></strong> path <strike><font color="red">that</font></strike> <strong><font color="green">taken by</font></strong> subsequent packets on the same flow <strike><font color="red">would take</font></strike> once a
   mapping <strike><font color="red">were</font></strike> <strong><font color="green">is</font></strong> in place on an ITR.  For these and other reasons use of
   Data Probes should be considered experimental and should be disabled
   by default in all ITR implementations.

5.  LISP+ALT: Overview

   LISP+ALT is a hybrid push/pull architecture.  Aggregated <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong>
   are <strike><font color="red">"pushed"</font></strike> <strong><font color="green">advertised</font></strong> among the <strike><font color="red">LISP+ALT routers and, optionally, out</font></strike> <strong><font color="green">ALT Routers and</font></strong> to <strong><font color="green">those (rare)</font></strong> ITRs
   <strike><font color="red">(which may elect</font></strike> <strong><font color="green">that
   are directly connected via a tunnel and BGP</font></strong> to <strike><font color="red">receive</font></strike> the <strike><font color="red">aggregated information, as opposed to
   simply using a default mapping).</font></strike> <strong><font color="green">ALT.</font></strong>  Specific
   EID-to-RLOC mappings are
   <strike><font color="red">"pulled"</font></strike> <strong><font color="green">requested</font></strong> by <strike><font color="red">ITRs</font></strike> <strong><font color="green">an ITR (and returned by an ETR)
   using LISP</font></strong> when <strike><font color="red">they</font></strike> <strong><font color="green">it sends a request</font></strong> either <strike><font color="red">send explicit LISP requests</font></strike> <strong><font color="green">via a Map Resolver</font></strong> or <strike><font color="red">data
   packets on the alternate topology that result in triggered replies
   being generated by ETRs.</font></strike> <strong><font color="green">to an
   edge ALT Router.</font></strong>

   The basic idea embodied in LISP+ALT is to use BGP, running <strike><font color="red">over</font></strike> <strong><font color="green">on a</font></strong>
   tunneled overlay <strike><font color="red">network,</font></strike> <strong><font color="green">network (the ALT),</font></strong> to establish reachability <strike><font color="red">required to route</font></strike> <strong><font color="green">between</font></strong>
   ALT <strike><font color="red">datagrams over an alternate logical topology (ALT).</font></strike> <strong><font color="green">Routers.</font></strong>  The ALT BGPRoute Information Base (RIB) is comprised of <strike><font color="red">EID prefixes</font></strike>
   <strong><font color="green">EID-prefixes</font></strong> and associated next hops.  <strike><font color="red">LISP+ALT routers</font></strike>  <strong><font color="green">ALT Routers</font></strong> interconnect
   using <strike><font color="red">eBGP</font></strike> <strong><font color="green">BGP</font></strong> and propagate <strike><font color="red">EID</font></strike> <strong><font color="green">EID-prefix updates among themselves.  EID-</font></strong>
   prefix <strike><font color="red">updates, which are</font></strike> <strong><font color="green">information is</font></strong> learned <strike><font color="red">over eBGP connections
   to authoritative ETRs, or by</font></strike> <strong><font color="green">from ETRs at the "edge" of the ALT
   either through the use of the Map Server interface (the commmon
   case),</font></strong> static <strike><font color="red">configuration.  ITRs may also
   eBGP peer with one</font></strike> <strong><font color="green">configuration,</font></strong> or <strike><font color="red">more LISP+ALT</font></strike> <strong><font color="green">by BGP-speaking ETRs.

   An ITR use the ALT</font></strong> to learn the best <strike><font color="red">ALT router to
   use to forward</font></strike> <strong><font color="green">path for forwarding</font></strong> an ALT <strike><font color="red">datagram for</font></strike>
   <strong><font color="green">Datagram destined to</font></strong> a particular <strike><font color="red">prefix; in most
   cases, an</font></strike> <strong><font color="green">EID-prefix.  An</font></strong> ITR will <strike><font color="red">have</font></strike> <strong><font color="green">normally
   use</font></strong> a <strike><font color="red">default EID mapping pointing</font></strike> <strong><font color="green">Map Resolver</font></strong> to <strike><font color="red">one</font></strike> <strong><font color="green">send its ALT Datagrams on to the ALT but may,
   in unusual circumstances, use a static ALT Default Route</font></strong> or <strike><font color="red">more
   LISP+ALT routers.</font></strike> <strong><font color="green">connect
   to the ALT using BGP.</font></strong>

   Note that while this document specifies the use of Generic Routing
   Encapsulation (GRE) as a tunneling mechanism, there is no reason that
   <strike><font color="red">an</font></strike>
   <strong><font color="green">parts of the</font></strong> ALT cannot be built using other tunneling <strike><font color="red">technologies.  In</font></strike> <strong><font color="green">technologies,
   particularly in</font></strong> cases where GRE does not meet security, management,
   or other operational
   <strike><font color="red">requirements, it is reasonable to use another tunneling technology
   that does.</font></strike> <strong><font color="green">requirements.</font></strong>  References to "GRE tunnel" in
   later sections of this document should therefore not be taken as
   prohibiting or precluding the use of <strike><font color="red">other, available</font></strike> <strong><font color="green">other</font></strong> tunneling mechanisms.
   Note also that two
   <strike><font color="red">LISP+ALT routers</font></strike> <strong><font color="green">ALT Routers</font></strong> that are directly adjacent (with no
   layer-3 router hops between them) need not use a tunnel between them;
   in this case, BGP may be configured across the interfaces that
   connect to their common subnet and that subnet is <strong><font color="green">then</font></strong> considered to
   be part of the ALT topology.  Use of <strike><font color="red">techniques,</font></strike> <strong><font color="green">techniques</font></strong> such as "eBGP <strike><font color="red">multihop",</font></strike>
   <strong><font color="green">multihop"</font></strong> to <strike><font color="red">forward</font></strike> <strong><font color="green">connect</font></strong> ALT
   <strike><font color="red">datagrams through routers</font></strike> <strong><font color="green">Routers</font></strong> that do not <strike><font color="red">participate</font></strike> <strong><font color="green">share a tunnel or common
   subnet is not recommended as the non-ALT Routers</font></strong> in <strong><font color="green">between the</font></strong> ALT <strike><font color="red">routing, is</font></strike>
   <strong><font color="green">Routers in such a configuration may</font></strong> not <strike><font color="red">recommended.</font></strike> <strong><font color="green">have information necessary to
   forward ALT Datagrams destined to EID-prefixes exchanged across that
   BGP session.</font></strong>

   In summary, LISP+ALT uses BGP to <strike><font color="red">propagate EID-prefix update
   information to facilitate forwarding</font></strike> <strong><font color="green">build paths through ALT Routers so
   that</font></strong> an ALT <strike><font color="red">datagram</font></strike> <strong><font color="green">Datagram sent in to the ALT can be forwarded</font></strong> to the ETR
   that holds the EID-to-RLOC mapping for that EID-prefix.  This
   reachability is carried as IPv4 or <strike><font color="red">IPv6</font></strike> <strong><font color="green">ipv6</font></strong> NLRI without modification
   (since an <strike><font color="red">EID
   prefix</font></strike> <strong><font color="green">EID-prefix</font></strong> has the same syntax as IPv4 or <strike><font color="red">IPv6</font></strike> <strong><font color="green">ipv6</font></strong> address
   prefix).  <strike><font color="red">LISP+ALT
   routers eBGP</font></strike>  <strong><font color="green">ALT Routers BGP</font></strong> peer with one another, forming the ALT.  <strike><font color="red">A LISP+ALT
   router</font></strike>  <strong><font color="green">An
   ALT Router</font></strong> near the edge learns <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong> originated by
   authoritative ETRs.  This may <strike><font color="red">be via eBGP with</font></strike> <strong><font color="green">though</font></strong> the <strike><font color="red">ETRs,</font></strike> <strong><font color="green">Map Server interface,</font></strong> by
   static configuration,
   <strike><font color="red">or through some other dynamic mechanism such as that defined in
   [LISP-MS].  A LISP+ALT router</font></strike> <strong><font color="green">be via BGP with the ETRs.  An ALT Router</font></strong> may
   also be configured to aggregate <strike><font color="red">EID
   prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong> received from ETRs or
   from other LISP+ALT routers that are topologically "downstream" from
   it.

5.1.  ITR traffic handling

   When an ITR receives a packet originated by an end system <strike><font color="red">within</font></strike> <strong><font color="green">withind</font></strong> its
   site (i.e. a host for which the ITR is the exit path out of the site)
   and the destination <strong><font color="green">EID</font></strong> for that packet is not known in the ITR's
   mapping cache, the ITR <strike><font color="red">encapsulates the packet in</font></strike> <strong><font color="green">creates either</font></strong> a <strike><font color="red">LISP header, copying</font></strike> <strong><font color="green">Map-Request for</font></strong> the
   <strike><font color="red">inner</font></strike>
   destination <strike><font color="red">address (EID) to</font></strike> <strong><font color="green">EID or</font></strong> the <strike><font color="red">outer destination address
   (RLOC), and transmits it through</font></strike> <strong><font color="green">original packet encapsulated as</font></strong> a <strike><font color="red">GRE tunnel</font></strike> <strong><font color="green">Data Probe.
   The result, known as an ALT Datagram, is then sent</font></strong> to <strike><font color="red">a LISP+ALT router in
   the</font></strike> <strong><font color="green">an</font></strong> ALT <strong><font color="green">Router</font></strong>
   (see also [LISP-MS] for non-ALT-connected ITRs, noting that
   <strike><font color="red">an ITR cannot send</font></strike> Data
   Probes <strong><font color="green">cannot be sent</font></strong> to a <strike><font color="red">Map-Server).</font></strike> <strong><font color="green">Map-Resolver).</font></strong>  This "first hop"
   <strike><font color="red">LISP+ALT router</font></strike> <strong><font color="green">ALT
   Router</font></strong> uses EID-prefix routing information learned from other <strike><font color="red">LISP+ALT routers</font></strike> <strong><font color="green">ALT
   Routers</font></strong> via BGP to guide the packet to the ETR which "owns" the
   prefix.  Upon receipt by the ETR, normal LISP processing occurs: the
   ETR responds to the ITR with a LISP Map-Reply that lists the RLOCs
   (and, thus, the ETRs to use) for the <strike><font color="red">EID prefix.  The</font></strike> <strong><font color="green">EID-prefix.  For Data Probes,
   the</font></strong> ETR also <strike><font color="red">de-encapsulates</font></strike> <strong><font color="green">decapsulates</font></strong> the packet and transmits it toward its
   destination.

   Upon receipt of the Map-Reply, the ITR installs the RLOC information
   for a given prefix into a local mapping database.  With these mapping
   entries stored, additional packets destined to the given <strike><font color="red">EID prefix</font></strike> <strong><font color="green">EID-prefix</font></strong>
   are routed directly to <strike><font color="red">a viable ETR</font></strike> <strong><font color="green">an RLOC</font></strong> without use of the ALT, until either
   the entry's TTL has expired, or the ITR can otherwise find no
   reachable ETR.  Note that a valid mapping (not timed-out) may exist
   that contains no reachable RLOCs (i.e. all paths to that ETR are
   down); in this case, packets destined to the <strike><font color="red">EID prefix</font></strike> <strong><font color="green">EID-prefix</font></strong> are <strike><font color="red">dropped,
   not routed through the ALT.</font></strike> <strong><font color="green">dropped.</font></strong>

   Traffic routed <strike><font color="red">over</font></strike> <strong><font color="green">on to</font></strong> the ALT <strike><font color="red">therefore</font></strike> consists <strike><font color="red">of:

   o  EID prefix Map-Requests,</font></strike> <strong><font color="green">solely of ALT Datagrams, i.e.
   Map-Requests</font></strong> and

   <strike><font color="red">o  data packets destined for those EID prefixes while the ITR awaits
      map replies</font></strike> <strong><font color="green">Data Probes (if supported).</font></strong>

5.2.  EID Assignment - Hierarchy and Topology

   EID-prefixes will be allocated to a LISP site by Internet Registries.
   Multiple allocations may not be in power-of-2 blocks.  But when they
   are, they will be aggregated into a single, advertised EID-prefix.
   The ALT network is built in a tree-structured hierarchy to allow
   aggregation at merge points in the tree.  Building such a structure
   should minimize the number of EID-prefixes carried by LISP+ALT nodes
   near the top of the hierarchy.

   Since the ALT <strike><font color="red">will</font></strike> <strong><font color="green">does</font></strong> not need <strong><font color="green">in response</font></strong> to <strike><font color="red">change due to subscription</font></strike> <strong><font color="green">changes in policy,
   subscription,</font></strong> or <strike><font color="red">policy
   reasons,</font></strike> <strong><font color="green">the underlying physical connectivity,</font></strong> the topology
   can remain relatively static and aggregation can be sustained.
   Because routing on the ALT uses BGP, the same rules apply for
   generating aggregates; in particular, a <strike><font color="red">LISP+ALT
   router</font></strike> <strong><font color="green">ALT Router</font></strong> should only be
   configured to generate an aggregate if it is configured with BGP
   sessions to all of the originators of components (more-specifics
   prefixes) of that <strike><font color="red">aggregate; not</font></strike> <strong><font color="green">aggregate.  Not</font></strong> all of the components of need to be
   present for the aggregate to be originated (some may be holes in the
   covering prefix and some may be down) but the aggregating router must
   be configured to learn the state of all of the components.

   As an example, consider ETRs that are originating <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong> for
   10.1.0.0/24, 10.1.64.0/24, 10.1.128.0/24, and 10.1.192.0/24.  An ALT
   <strike><font color="red">router</font></strike>
   <strong><font color="green">Router</font></strong> should only be configured to generate an aggregate for
   10.1.0.0/16 if it has BGP sessions configured with all of these ETRs,
   in other words, only if it has sufficient knowledge about the state
   of those prefixes to summarize them.

   Under what circumstances the ALT <strike><font color="red">router</font></strike> <strong><font color="green">Router</font></strong> actually generates the
   aggregate is a matter of local policy: in some cases, it will be
   statically configured to do so at all times with a "static discard"
   route.  In other cases, it may be configured to only generate the
   aggregate prefix if at least one of the components of the aggregate
   is learned via BGP.

   <strike><font color="red">This implies that two</font></strike>

   <strong><font color="green">An</font></strong> ALT <strike><font color="red">routers that share</font></strike> <strong><font color="green">Router MUST NOT genearte</font></strong> an <strike><font color="red">overlapping set of
   prefixes must exchange those prefixes if either is to generate and
   export a covering</font></strike> aggregate <strike><font color="red">for those prefixes.  It also implies</font></strike> that
   <strike><font color="red">an ETR which connects</font></strike> <strong><font color="green">includes a non-
   LISP-speaking hole unless it can be configured</font></strong> to <strike><font color="red">the ALT using BGP must maintain BGP sessions</font></strike> <strong><font color="green">return a Negative
   Map-Reply</font></strong> with <strike><font color="red">all of the</font></strike> <strong><font color="green">action="Natively-Forward" (see [LISP]) if it receives
   an</font></strong> ALT <strike><font color="red">routers</font></strike> <strong><font color="green">Datagram</font></strong> that <strike><font color="red">are configured to originate an
   aggregate which covers</font></strike> <strong><font color="green">matches</font></strong> that <strike><font color="red">prefix.  See also [LISP-MS] for</font></strike> <strong><font color="green">hole.  If it receives</font></strong> an
   <strike><font color="red">example of other ways</font></strike> <strong><font color="green">ALT
   Datagram that matches a LISP-speaking hole</font></strong> that <strike><font color="red">prefix origin consistency and aggregation
   are maintained.

   Note: much</font></strike> is currently <strike><font color="red">uncertain about the best way to build the ALT
   network; as testing and prototype deployment proceeds,</font></strike> <strong><font color="green">not
   reachable, it should return</font></strong> a <strike><font color="red">guide to how
   to best build the ALT network will</font></strike> <strong><font color="green">Negative Map-Reply with action="drop".
   Negative Map-Replies should</font></strong> be <strike><font color="red">developed.

5.3.  LISP+ALT Router (or ALT router for short)

   A LISP+ALT Router has the following functionality:

   1.  It runs, at a minimum, the eBGP part of the BGP protocol.

   2.  It supports a separate RIB which uses next-hop GRE tunnel
       interfaces for forwarding ALT datagrams.

   3.  It can act as</font></strike> <strong><font color="green">returned with</font></strong> a <strike><font color="red">"proxy-ITR" to support non-LISP sites.

   4.  It can act as an ETR, or</font></strike> <strong><font color="green">short TTL,</font></strong> as <strike><font color="red">a recursive or re-encapsulating ITR
       to reduce mapping tables</font></strike>
   <strong><font color="green">specified</font></strong> in <strike><font color="red">site-based LISP routers.

5.4.  ITR and ETR in a LISP+ALT Environment

   An ITR using LISP+ALT may have additional functionality as follows:

   1.  If it is also acting</font></strike> <strong><font color="green">[LISP-MS].  Note that an off-the-shelf, non-LISP-
   speaking router configured</font></strong> as <strike><font color="red">a LISP+ALT Router, it sends</font></strike> <strong><font color="green">an aggregating</font></strong> ALT <strike><font color="red">datagrams
       on the BGP best path computed GRE tunnel for each EID prefix.

   2.  When acting solely as</font></strike> <strong><font color="green">Router cannot send
   Negative Map-Replies, so such</font></strong> a <strike><font color="red">ITR, it sends</font></strike> <strong><font color="green">router must never originate an
   aggregate that includes a non-LISP-speaking hole.

   This implies that two</font></strong> ALT <strike><font color="red">datagrams directly</font></strike> <strong><font color="green">Routers that share an overlapping set of
   prefixes must exchange those prefixes if either is</font></strong> to <strong><font color="green">generate and
   export</font></strong> a
       <strike><font color="red">configured LISP+ALT router.

   An</font></strike> <strong><font color="green">covering aggregate for those prefixes.  It also implies that
   an</font></strong> ETR <strong><font color="green">which connects to the ALT</font></strong> using <strike><font color="red">LISP+ALT may also behave slightly differently:

   1.  If it is also acting as a LISP+ALT router, it advertises its
       configured EID-prefixes into</font></strike> BGP <strike><font color="red">for distribution through</font></strike> <strong><font color="green">must maintain BGP sessions
   with all of</font></strong> the
       <strike><font color="red">ALT.

   2.  It receives</font></strike> ALT <strike><font color="red">datagrams only from its "upstream" LISP+ALT
       routers over the GRE tunnel(s)</font></strike> <strong><font color="green">Routers that are</font></strong> configured to <strike><font color="red">it/them.  It
       responds with Map-Replies</font></strike> <strong><font color="green">originate an
   aggregate which covers that prefix.  See also [LISP-MS]</font></strong> for <strike><font color="red">the EID prefixes</font></strike> <strong><font color="green">an
   example of other ways</font></strong> that <strike><font color="red">it "owns".

5.5.</font></strike> <strong><font color="green">prefix origin consistency and aggregation
   are maintained.

   Note: much is currently uncertain about the best way to build the ALT
   network; as testing and prototype deployment proceeds, a guide to how
   to best build the ALT network will be developed.

5.3.</font></strong>  Use of GRE and BGP between LISP+ALT Routers

   The ALT network is built using GRE tunnels between <strike><font color="red">LISP+ALT routers.
   eBGP</font></strike> <strong><font color="green">ALT Routers.  BGP</font></strong>
   sessions are configured over those tunnels, with each <strike><font color="red">LISP+ALT
   router</font></strike> <strong><font color="green">ALT Router</font></strong>
   acting as a separate AS "hop" in a Path Vector for BGP.  For the
   purposes of LISP+ALT, the AS-path is used solely as a <strike><font color="red">shortest-
   path</font></strike> <strong><font color="green">shortest-path</font></strong>
   determination and loop-avoidance mechanism.  Because all <strike><font color="red">next-
   hops</font></strike> <strong><font color="green">next-hops</font></strong>
   are on tunnel interfaces, no IGP is required to resolve those
   <strike><font color="red">next-hops</font></strike> <strong><font color="green">next-
   hops</font></strong> to exit interfaces.

   LISP+ALT's use of GRE and BGP reduces provider Operational Expense
   (OPEX) because no new protocols need to be either defined or used on
   the overlay topology.  Also, since tunnel IP addresses are local in
   scope, no coordination is needed for their assignment; any addressing
   scheme (including private addressing) can be used for tunnel
   addressing.

6.  <strike><font color="red">EID Prefix</font></strike>  <strong><font color="green">EID-prefix</font></strong> Propagation and Map-Request Forwarding

   As described in Section 9.2, an ITR <strike><font color="red">may send either a Map-Request or
   a data probe</font></strike> <strong><font color="green">sends an ALT Datagram</font></strong> to <strike><font color="red">find</font></strike> a given
   EID-to-RLOC mapping.  The ALT provides the infrastructure that allows
   these requests to reach the authoritative ETR.

   Note <strike><font color="red">that,</font></strike> <strong><font color="green">that</font></strong> under normal <strike><font color="red">circumstances,</font></strike> <strong><font color="green">circumstances</font></strong> Map-Replies are not sent over
   the ALT - an ETR sends a Map-Reply to the source RLOC learned from
   the original Map-Request.  There may be scenarios, perhaps to
   encourage caching of EID-to-RLOC mappings by ALT <strike><font color="red">routers,</font></strike> <strong><font color="green">Routers,</font></strong> where Map-
   Replies could be sent over the ALT or where a "first-hop" ALT router
   might modify the originating RLOC on a Map-Request received from an
   ITR to force the Map-Reply to be <strike><font color="red">sent</font></strike> <strong><font color="green">returned</font></strong> to <strike><font color="red">it; these</font></strike> <strong><font color="green">the "first-hop" ALT
   Router.  These</font></strong> cases will not be supported by initial LISP+ALT
   implementations but may be subject to future experimentation.

   <strike><font color="red">LISP+ALT routers</font></strike>

   <strong><font color="green">ALT Routers</font></strong> propagate <strike><font color="red">mapping</font></strike> <strong><font color="green">path</font></strong> information <strike><font color="red">for use</font></strike> <strong><font color="green">via BGP ([RFC4271]) that is
   used</font></strong> by ITRs <strike><font color="red">(when
   sending</font></strike> <strong><font color="green">to send</font></strong> ALT <strike><font color="red">datagrams) using eBGP [RFC4271]. eBGP</font></strike> <strong><font color="green">Datagrams toward the appropriate ETR for
   each EID-prefix.  BGP</font></strong> is run on the
   <strike><font color="red">inter-LISP+ALT router</font></strike> <strong><font color="green">inter-ALT Router</font></strong> links, and
   possibly between an edge ("last hop") <strike><font color="red">LISP+ALT router</font></strike> <strong><font color="green">ALT Router</font></strong> and an ETR or
   between an edge ("first hop")
   <strike><font color="red">LISP+ALT router</font></strike> <strong><font color="green">ALT Router</font></strong> and an ITR.  The ALT <strike><font color="red">eBGP</font></strike> <strong><font color="green">BGP</font></strong> RIB
   consists of aggregated
   <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong> and their next hops toward the
   authoritative ETR for that <strike><font color="red">EID prefix.</font></strike> <strong><font color="green">EID-prefix.</font></strong>

6.1.  Changes to <strike><font color="red">ITR behavior with LISP+ALT</font></strike> <strong><font color="green">ITR behavior with LISP+ALT

   As previously described, an ITR will usually use the Map Resolver
   interface and will send its Map Requests to a Map Resolver.</font></strong>  When <strike><font color="red">using LISP+ALT,</font></strike> an
   ITR <strong><font color="green">instead connects via tunnels and BGP to the ALT, it</font></strong> sends ALT <strike><font color="red">datagrams</font></strike>
   <strong><font color="green">Datagrams</font></strong> to one of its "upstream" <strike><font color="red">LISP+ALT routers;</font></strike> <strong><font color="green">ALT Routers;</font></strong> these are sent only
   to obtain new <strike><font color="red">EID-
   to-RLOC</font></strike> <strong><font color="green">EID-to-RLOC</font></strong> mappings - RLOC probe and cache TTL refresh
   Map-Requests are not sent on the ALT.  As in basic LISP, it should
   use one of its RLOCs as the source address of these queries; it
   should explicitly not use a tunnel interface as the source address as
   doing so will cause replies to be forwarded over the tunneled
   topology and may be problematic if the tunnel interface address is
   not explicitly routed throughout the ALT.  If the ITR is running BGP
   with the LISP+ALT router(s), it selects the appropriate <strike><font color="red">LISP+ALT router</font></strike> <strong><font color="green">ALT Router</font></strong>
   based on the BGP information received.  If it is not running BGP, it
   uses <strike><font color="red">static
   configuration</font></strike> <strong><font color="green">a statically-configued ALT Default Route</font></strong> to select <strike><font color="red">a LISP+ALT router; in the general case, this
   will effectively be</font></strike> an <strike><font color="red">"EID-prefix default route".</font></strike> <strong><font color="green">ALT
   Router.</font></strong>

6.2.  Changes to ETR behavior with LISP+ALT

   <strike><font color="red">If</font></strike>

   <strong><font color="green">As previously described, an ETR will usually use the Map Server
   interface (see [LISP-MS]) and will register its EID-prefixes with its
   configured Map Servers.  When</font></strong> an ETR <strong><font color="green">instead</font></strong> connects using BGP to
   one or more <strike><font color="red">LISP+ALT router(s),</font></strike> <strong><font color="green">ALT Routers,</font></strong> it
   <strike><font color="red">simply</font></strike> announces its <strike><font color="red">EID-prefix</font></strike> <strong><font color="green">EID-prefix(es)</font></strong> to those <strike><font color="red">LISP+ALT routers.</font></strike> <strong><font color="green">ALT
   Routers.</font></strong>  Note that when an ETR generates a Map-Reply message to
   return to a querying ITR, it sends it to the ITR's source-RLOC (i.e.,
   on the underlying Internet topology, not on the ALT; this avoids any
   latency penalty (or "stretch") that might be incurred by routing over
   the ALT).

7.  BGP configuration and protocol considerations

7.1.  Autonomous System Numbers (ASNs) in LISP+ALT

   The primary use of BGP today is to define the global Internet routing
   topology in terms of its participants, known as Autonomous Systems.
   LISP+ALT specifies the use of BGP to create a global <strong><font color="green">overlay network
   (the ALT) for finding</font></strong> EID-to-RLOC
   <strike><font color="red">mapping database which, while</font></strike> <strong><font color="green">mappings.  While</font></strong> related to the
   global routing database, <strong><font color="green">the ALT</font></strong> serves a very different purpose and
   is organized into a very different hierarchy.  Because LISP+ALT does
   use BGP, however, it uses ASNs in the paths that are propagated among <strike><font color="red">LISP+ALT routers.</font></strike>
   <strong><font color="green">ALT Routers.</font></strong>  To avoid confusion, it needs to be stressed that that
   these LISP+ALT ASNs use a new numbering space that is unrelated to
   the ASNs used by the global routing system.  Exactly how this new
   space will be assigned and managed will be determined during <strike><font color="red">experimental</font></strike> <strong><font color="green">the</font></strong>
   deployment of LISP+ALT.

   Note that the <strike><font color="red">LISP+ALT routers</font></strike> <strong><font color="green">ALT Routers</font></strong> that make up the "core" of the ALT will not
   be associated with any existing core-Internet ASN because
   <strike><font color="red">topology, hierarchy, and aggregation boundaries are</font></strike> <strong><font color="green">the ALT
   topology is</font></strong> completely separate <strike><font color="red">from</font></strike> <strong><font color="green">from,</font></strong> and independent <strike><font color="red">of</font></strike> <strong><font color="green">of,</font></strong> the global
   Internet routing system.

7.2.  Sub-Address Family Identifier (SAFI) for LISP+ALT

   As defined by this document, LISP+ALT may be implemented using BGP
   without modification.  Given the fundamental operational difference
   between propagating global Internet routing information (the <strike><font color="red">current,</font></strike> <strong><font color="green">current</font></strong>
   dominant use of BGP) and <strike><font color="red">managing the global EID-to-RLOC database</font></strike> <strong><font color="green">creating an overlay network for finding EID-
   to-RLOC mappings</font></strong> (the use of BGP proposed by this document), it may
   be desirable to assign a new SAFI [RFC2858] to prevent operational
   confusion and difficulties, including the inadvertent leaking of
   information from one domain to the other.  At present, this document
   does not require the assignment of a new <strike><font color="red">SAFI</font></strike> <strong><font color="green">SAFI,</font></strong> but the authors
   anticipate that experimentation may suggest the need for one in the
   future.

8.  <strike><font color="red">EID-Prefix</font></strike>  <strong><font color="green">EID-prefix</font></strong> Aggregation

   The ALT BGP peering topology should be arranged in a tree-like
   fashion (with some meshiness), with redundancy to deal with node and
   link failures.  A basic assumption is that as long as the routers are
   up and running, the underlying <strike><font color="red">topology</font></strike> <strong><font color="green">Internet</font></strong> will provide alternative
   routes to maintain BGP connectivity among <strike><font color="red">LISP+ALT routers.</font></strike> <strong><font color="green">ALT Routers.</font></strong>

   Note that, as mentioned in Section 5.2, the use of BGP by LISP+ALT
   requires that information <strike><font color="red">can</font></strike> only be aggregated where all active
   <strike><font color="red">more-specific</font></strike> <strong><font color="green">more-
   specific</font></strong> prefixes of a generated aggregate prefix are known.  This <strike><font color="red">implies, for example, that if a given set of prefixes is used by
   multiple, ALT networks, those networks must interconnect and share
   information about all of the prefixes if either were to generate an
   aggregate prefix that covered all of them.  This</font></strike> is
   no different than the way that BGP route aggregation works in the
   existing global routing system: a service provider only generates an
   aggregate route if it is configured to learn to all prefixes that
   make up that aggregate.

8.1.  Traffic engineering with LISP and LISP+ALT

   It is worth noting that LISP+ALT does not directly propagate EID-to-
   RLOC mappings.  What it does is provide a mechanism for <strike><font color="red">a LISP</font></strike> <strong><font color="green">an</font></strong> ITR to
   <strike><font color="red">find</font></strike>
   <strong><font color="green">commonicate with</font></strong> the ETR that holds the mapping for a particular <strike><font color="red">EID</font></strike> <strong><font color="green">EID-</font></strong>
   prefix.  This distinction is important for several reasons.  First, <strike><font color="red">it means
   that the</font></strike>
   <strong><font color="green">since</font></strong> reachability of RLOCs is learned through the LISP ITR-ETR
   <strike><font color="red">exchange so</font></strike>
   <strong><font color="green">exchange,</font></strong> "flapping" <strike><font color="red">of state information through</font></strike> <strong><font color="green">(frequent</font></strong> BGP <strong><font color="green">updates and withdrawals)</font></strong> is not <strike><font color="red">likely
   nor can</font></strike>
   <strong><font color="green">likely, and</font></strong> mapping information <strong><font color="green">cannot</font></strong> become "stale" <strike><font color="red">by</font></strike> <strong><font color="green">due to</font></strong> slow
   propagation through the ALT BGP mesh.  Second, <strike><font color="red">by deferring</font></strike> <strong><font color="green">since an ITR learns an</font></strong>
   EID-to-RLOC mapping
   <strike><font color="red">to an ITR-ETR exchange,</font></strike> <strong><font color="green">directly from the ETR that owns it,</font></strong> it is
   possible to perform site-to-site traffic engineering <strike><font color="red">through a combination of</font></strike> <strong><font color="green">by</font></strong> setting the
   preference
   <strike><font color="red">and</font></strike> <strong><font color="green">and/or</font></strong> weight <strike><font color="red">fields</font></strike> <strong><font color="green">fields,</font></strong> and by <strike><font color="red">returning</font></strike> <strong><font color="green">including</font></strong> more-specific <strike><font color="red">EID-to-RLOC</font></strike> <strong><font color="green">EID-
   to-RLOC</font></strong> information in <strike><font color="red">LISP</font></strike> Map-Reply messages.

   This is a powerful mechanism that can conceivably replace the
   traditional practice of routing prefix deaggregation for traffic
   engineering purposes.  Rather than propagating more-specific
   information into the global routing system for local- or <strike><font color="red">regional-optimization</font></strike> <strong><font color="green">regional-
   optimization</font></strong> of traffic flows, such <strike><font color="red">more-
   specific</font></strike> <strong><font color="green">more-specific</font></strong> information can be
   exchanged, through LISP (not LISP+ALT), on an as-needed basis between
   only those ITRs/ETRs (and, thus, site pairs) that need <strike><font color="red">it; should</font></strike> <strong><font color="green">it.  Should</font></strong> a
   receiving ITR decide that it does not wish to store such <strike><font color="red">more-specific</font></strike> <strong><font color="green">more-
   specific</font></strong> information, it has the option of discarding it as long as a
   shorter, covering <strike><font color="red">EID prefix</font></strike> <strong><font color="green">EID-prefix</font></strong> exists.  <strike><font color="red">Not
   only does this greatly improve the scalability</font></strike>  <strong><font color="green">Such an exchange</font></strong> of <strike><font color="red">the global routing
   system but it also allows improved</font></strike> <strong><font color="green">"more-
   specifics" between sites facilitates</font></strong> traffic <strike><font color="red">engineering techniques</font></strike> <strong><font color="green">engineering,</font></strong> by allowing
   richer and more fine-grained policies to be <strike><font color="red">applied.</font></strike> <strong><font color="green">applied without
   advertising additional prefixes into either the ALT or the global
   routing system.</font></strong>

8.2.  Edge aggregation and dampening

   Note <strike><font color="red">also</font></strike> that normal BGP best common practices apply to the ALT network.
   In particular, first-hop ALT <strike><font color="red">routers</font></strike> <strong><font color="green">Routers</font></strong> will aggregate EID prefixes and
   dampen changes to them in the face of excessive updates.  Since <strike><font color="red">EID</font></strike> <strong><font color="green">EID-</font></strong>
   prefix assignments are not expected to change <strike><font color="red">with anywhere</font></strike> as frequently <strong><font color="green">as global
   routing</font></strong> BGP prefix <strike><font color="red">reachability on the Internet,</font></strike> <strong><font color="green">reachability,</font></strong> such dampening should be very <strike><font color="red">rare</font></strike> <strong><font color="green">rare,</font></strong>
   and might be worthy of logging as an exceptional event.  It is again
   worth noting that the ALT carries only <strike><font color="red">EID
   prefixes, along with BGP-generated</font></strike> <strong><font color="green">EID-prefixes, used to
   construct BGP</font></strong> paths to <strike><font color="red">the ETRs that source
   those prefixes as advertisements travel over the logical topology;</font></strike> <strong><font color="green">their owning ETRs;</font></strong> this set of information is <strike><font color="red">considerablly</font></strike>
   <strong><font color="green">considerably</font></strong> less volatile than the actual EID-to-RLOC mappings.

9.  Connecting sites to the ALT network

9.1.  ETRs originating information into the ALT

   <strike><font color="red">EID prefix</font></strike>

   <strong><font color="green">EID-prefix</font></strong> information is originated into the ALT by <strike><font color="red">two</font></strike> <strong><font color="green">three</font></strong> different
   mechanisms:

   <strike><font color="red">eBGP:  An ETR usually participates</font></strike>

   <strong><font color="green">Map Server:  In most cases, a site will configure its ETR(s) to
      register with one or more Map Servers (see [LISP-MS]), and does
      not participate directly</font></strong> in the <strong><font color="green">ALT.

   BGP:  For a site requiring complex control over their EID-prefix
      origination into the ALT, an ETR may connect to the</font></strong> LISP+ALT
      overlay network by running <strike><font color="red">eBGP</font></strike> <strong><font color="green">BGP</font></strong> to one or more <strike><font color="red">LISP+ALT router(s)</font></strike> <strong><font color="green">ALT Router(s)</font></strong> over
      tunnel(s).  The ETR advertises reachability for its <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong>
      over these
      <strike><font color="red">eBGP</font></strike> <strong><font color="green">BGP</font></strong> connection(s).  The <strike><font color="red">LISP+ALT router(s)</font></strike> <strong><font color="green">edge ALT Router(s)</font></strong> that
      receive(s) these prefixes then propagate(s) them into the ALT.
      Here the ETR is simply an <strike><font color="red">eBGP</font></strike> <strong><font color="green">BGP</font></strong> peer of <strike><font color="red">LISP+ALT router(s)</font></strike> <strong><font color="green">ALT Router(s)</font></strong> at the edge of
      the ALT.  Where possible, <strike><font color="red">a LISP+ALT router</font></strike> <strong><font color="green">an ALT Router</font></strong> that receives <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong>
      from an ETR via <strike><font color="red">eBGP</font></strike> <strong><font color="green">BGP</font></strong> should aggregate that information.

   Configuration:  One or more <strike><font color="red">LISP+ALT router(s)</font></strike> <strong><font color="green">ALT Router(s)</font></strong> may be configured to
      originate an <strike><font color="red">EID prefix</font></strike> <strong><font color="green">EID-prefix</font></strong> on behalf of the non-BGP-speaking ETR that
      is authoritative for a prefix.  As in the case above, the ETR is
      connected to <strike><font color="red">LISP+ALT router(s)</font></strike> <strong><font color="green">ALT Router(s)</font></strong> using GRE tunnel(s) but rather than BGP
      being used, the <strike><font color="red">LISP+ALT router(s)</font></strike> <strong><font color="green">ALT Router(s)</font></strong> are configured with what are in
      effect "static routes" for the <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong> "owned" by the ETR.
      The GRE tunnel is used to route Map-Requests to the ETR.  Note
      that the <strike><font color="red">LISP+ALT router</font></strike> <strong><font color="green">ALT Router</font></strong> could also serve as a proxy for its
      <strike><font color="red">TCP-connected</font></strike> <strong><font color="green">TCP-
      connected</font></strong> ETRs.

   Note:  in <strike><font color="red">both</font></strike> <strong><font color="green">all</font></strong> cases, an ETR may <strike><font color="red">have connections</font></strike> <strong><font color="green">register</font></strong> to <strong><font color="green">multiple Map Servers or
      connect</font></strong> to multiple
      <strike><font color="red">LISP+ALT routers</font></strike> <strong><font color="green">ALT Routers</font></strong> for the following reasons:

      *  redundancy, so that a particular ETR is still reachable <strike><font color="red">through
         the ALT</font></strike> even if
         one path or tunnel is unavailable.

      *  to connect to different parts of the ALT hierarchy if the ETR
         "owns" multiple EID-to-RLOC mappings for <strike><font color="red">EID prefixes</font></strike> <strong><font color="green">EID-prefixes</font></strong> that
         cannot be aggregated by the same <strike><font color="red">LISP+ALT router</font></strike> <strong><font color="green">ALT Router</font></strong> (i.e. are not
         topologically "close" to each other in the ALT).

9.2.  ITRs Using the <strike><font color="red">ALT

   In order to source Map-Requests to the ALT or to route a Data Probe
   packet over the ALT, each ITR participating in the ALT establishes a
   connection to one or more LISP+ALT routers.  These connections can be
   either eBGP or TCP (as described above).

   In the case in which the ITR is running eBGP, the peer LISP+ALT
   routers use these connections to advertise highly aggregated EID-
   prefixes to the peer ITRs.  The ITR then installs the received
   prefixes into a forwarding table that is used to to send LISP Map-
   Requests to the appropriate LISP+ALT router.  In most cases, a LISP+
   ALT router will send a default mapping to its client ITRs so that
   they can send request for any EID prefix into the ALT.

   In the case in which</font></strike> <strong><font color="green">ALT

   In</font></strong> the <strong><font color="green">common configuration, an</font></strong> ITR <strike><font color="red">is connected</font></strike> <strong><font color="green">does not need</font></strong> to <strike><font color="red">some set of LISP+ALT
   routers without eBGP,</font></strike> <strong><font color="green">know anything
   about</font></strong> the <strike><font color="red">ITR</font></strike> <strong><font color="green">ALT, since it</font></strong> sends Map-Requests to <strike><font color="red">any</font></strike> <strong><font color="green">one</font></strong> of its
   <strike><font color="red">connected LISP+ALT routers.

   An</font></strike> <strong><font color="green">configured
   Map-Resolvers (see [LISP-MS]).  There are two exceptional cases:

   Static default:  If a Map Resolver is not available but an</font></strong> ITR <strike><font color="red">may also choose</font></strike> <strong><font color="green">is
      adjacent</font></strong> to <strike><font color="red">send the first few data packets</font></strike> <strong><font color="green">an ALT Router (either</font></strong> over <strong><font color="green">a common subnet or through</font></strong>
      the <strong><font color="green">use of a tunnel), it can use an</font></strong> ALT <strong><font color="green">Default Route route</font></strong> to <strike><font color="red">minimize packet loss</font></strike>
      <strong><font color="green">cause all ALT Datagrams to be sent that ALT Router.  This case is
      expected to be rare.

   Connection to ALT:  A site with complex Internet connectivity needs
      may need more fine-grained distinction between traffic to LISP-
      capable</font></strong> and <strike><font color="red">reduce mapping latency.  In this
   case,</font></strike> <strong><font color="green">non-LISP-capable sites.  Such a site may configure
      each of its ITRs to connect directly to</font></strong> the <strike><font color="red">data packet serves as</font></strike> <strong><font color="green">ALT, using</font></strong> a <strike><font color="red">mapping probe (Data Probe)</font></strike> <strong><font color="green">tunnel</font></strong>
      and <strong><font color="green">BGP connection.  In this case,</font></strong> the
   <strike><font color="red">ETR which receives</font></strike> <strong><font color="green">ITR will receive EID-prefix
      routes from its BGP connection to</font></strong> the <strike><font color="red">data packet (over</font></strike> <strong><font color="green">ALT Router and will LISP-
      encapsulate and send ALT Datagrams through</font></strong> the <strike><font color="red">ALT) responds with a
   Map-Reply is sent</font></strike> <strong><font color="green">tunnel</font></strong> to the <strike><font color="red">ITR's source-RLOC using the underlying
   topology.  Note</font></strike> <strong><font color="green">ALT
      Router.  Traffic to other destinations may be forwarded (without
      LISP encapsulation) to non-LISP next-hop routers</font></strong> that the <strike><font color="red">use of Data Probes is discouraged at this
   time (see Section 4.3).</font></strike> <strong><font color="green">ITR
      knows.</font></strong>

      In general, an ITR <strike><font color="red">will establish connections</font></strike> <strong><font color="green">that connects to the ALT does so</font></strong> only to <strike><font color="red">LISP+ALT
   routers</font></strike> <strong><font color="green">to ALT
      Routers</font></strong> at the "edge" of the ALT (typically two for <strike><font color="red">redundancy) but
   there may also</font></strike> <strong><font color="green">redundancy).
      There may, though,</font></strong> be situations where an ITR would connect to
      other
   <strike><font color="red">LISP+ALT routers</font></strike> <strong><font color="green">ALT Routers</font></strong> to receive additional, shorter path information
      about a portion of the ALT of interest to it.  This can be
      accomplished by establishing GRE tunnels between the ITR and the
      set of <strike><font color="red">LISP+ALT routers</font></strike> <strong><font color="green">ALT Routers</font></strong> with the additional information.  This is a
      purely local policy issue between the ITR and the <strike><font color="red">LISP+ALT routers in
   question.</font></strike> <strong><font color="green">ALT Routers in
      question.

   As described in [LISP-MS], Map-Resolvers do not accept or forward
   Data Probes; in the rare scenario that an ITR does support and
   originate Data Probes, it must do so using one of the exceptional
   configurations described above.  Note that the use of Data Probes is
   discouraged at this time (see Section 4.3).</font></strong>

10.  IANA Considerations

   This document makes no request of the IANA.

11.  Security Considerations

   LISP+ALT shares many of the security characteristics of BGP.  Its
   security mechanisms are comprised of existing technologies in wide
   operational use <strike><font color="red">today.  Securing LISP+ALT is much simpler than</font></strike> <strong><font color="green">today, so</font></strong> securing <strike><font color="red">BGP.

   Compared to BGP, LISP+ALT routers are not topologically bound,
   allowing them to</font></strike> <strong><font color="green">the ALT should</font></strong> be <strike><font color="red">put in locations away from</font></strike> <strong><font color="green">mostly a matter
   of applying</font></strong> the <strike><font color="red">vulnerable AS
   border (unlike eBGP speakers).</font></strike> <strong><font color="green">same technology that is used to secure the BGP-based
   global routing system (see Section 11.3 below).</font></strong>

11.1.  Apparent LISP+ALT Vulnerabilities

   This section briefly lists <strike><font color="red">of</font></strike> the <strike><font color="red">apparent</font></strike> <strong><font color="green">known potential</font></strong> vulnerabilities of <strike><font color="red">LISP+
   ALT.</font></strike>
   <strong><font color="green">LISP+ALT.</font></strong>

   Mapping Integrity:  Can an attacker insert bogus mappings to black-
      hole (create <strike><font color="red">a DoS)</font></strike> <strong><font color="green">Denial-of-Service, or DoS attack)</font></strong> or intercept LISP
      data-plane packets?

   <strike><font color="red">LISP+ALT router</font></strike>

   <strong><font color="green">ALT Router</font></strong> Availability:  Can an attacker DoS the <strike><font color="red">LISP+ALT
      routers</font></strike> <strong><font color="green">ALT Routers</font></strong>
      connected to a given ETR? <strike><font color="red">without access to</font></strike>  <strong><font color="green">If a site's ETR cannot advertise</font></strong> its
      <strong><font color="green">EID-to-RLOC</font></strong> mappings,
      <strike><font color="red">a</font></strike> <strong><font color="green">the</font></strong> site is essentially unavailable.

   ITR Mapping/Resources:  Can an attacker force an ITR or <strike><font color="red">LISP+ALT
      router</font></strike> <strong><font color="green">ALT Router</font></strong> to
      drop legitimate mapping requests by flooding it with random
      destinations <strike><font color="red">that</font></strike> <strong><font color="green">for which</font></strong> it will <strike><font color="red">have to query for.</font></strike> <strong><font color="green">generate large numbers of Map-
      Reqeusts and fill its mapping cache?</font></strong>  Further study is required to
      see the impact of admission control on the overlay network.

   EID Map-Request Exploits for Reconnaissance:  Can an attacker learn
      about a LISP <strike><font color="red">destination sites'</font></strike> <strong><font color="green">site's</font></strong> TE policy by sending legitimate mapping
      requests <strike><font color="red">messages</font></strike> and then observing the RLOC mapping replies?  Is this
      information useful in attacking or subverting peer relationships?
      Note that <strong><font color="green">any public</font></strong> LISP <strike><font color="red">1.0 has a</font></strike> <strong><font color="green">mapping database will have</font></strong> similar <strike><font color="red">data-plane</font></strike> <strong><font color="green">data-
      plane</font></strong> reconnaissance issue.

   Scaling of <strike><font color="red">LISP+ALT router</font></strike> <strong><font color="green">ALT Router</font></strong> Resources:  Paths through the ALT may be of
      lesser bandwidth than more "direct" paths; this may make them more
      prone to high-volume denial-of-service attacks.  For this reason,
      all components of the ALT (ETRs and ALT <strike><font color="red">routers)</font></strike> <strong><font color="green">Routers)</font></strong> should be
      prepared to rate-limit traffic (ALT <strike><font color="red">datagrams)</font></strike> <strong><font color="green">Datagrams)</font></strong> that could be
      received across the ALT.

   UDP Map-Reply from ETR:  Since Map-Replies <strike><font color="red">packets</font></strike> are sent directly from the
      ETR to the ITR's RLOC, the ITR's RLOC may be vulnerable to various
      types of DoS <strike><font color="red">attacks.</font></strike> <strong><font color="green">attacks (this is a general property of LISP, not an
      LISP+ALT vulnerability).</font></strong>

11.2.  Survey of LISP+ALT Security Mechanisms

   Explicit peering:  The devices themselves can both prioritize
      incoming <strike><font color="red">packets</font></strike> <strong><font color="green">packets,</font></strong> as well as potentially do key checks in hardware
      to protect the control plane.

   Use of TCP to connect elements:  This makes it difficult for third
      parties to inject packets.

   Use of HMAC Protected <strike><font color="red">TCP</font></strike> <strong><font color="green">BGP/TCP</font></strong> Connections:  HMAC is used to verify
      message integrity and authenticity, making it nearly impossible
      for third party devices to either insert or modify messages.

   Message Sequence Numbers and Nonce Values in Messages:  This allows
      <strike><font color="red">for devices</font></strike>
      <strong><font color="green">an ITR</font></strong> to verify that the <strike><font color="red">mapping-reply packet was</font></strike> <strong><font color="green">Map-Reply from an ETR is</font></strong> in response to <strike><font color="red">the mapping-request</font></strike>
      <strong><font color="green">a Map-Request originated by</font></strong> that <strike><font color="red">they sent.</font></strike> <strong><font color="green">ITR (this is a general property
      of LISP; LISP+ALT does not change this behavior).</font></strong>

11.3.  <strike><font color="red">Using existing</font></strike>  <strong><font color="green">Use of new IETF standard</font></strong> BGP Security mechanisms

   LISP+ALT's use of BGP allows <strike><font color="red">for</font></strike> the ALT to take advantage of BGP
   security features designed for existing Internet BGP use.

   For example, should either sBGP [I-D.murphy-bgp-secr] or soBGP
   [I-D.white-sobgparchitecture] become widely deployed it expected that
   LISP+ALT could use these mechanisms to provide authentication of EID-
   to-RLOC mappings, and EID origination.

12.  Acknowledgments

   <strike><font color="red">Many</font></strike>

   <strong><font color="green">The authors would like to specially thank J. Noel Chiappa who was a
   key contributer to the design</font></strong> of the <strong><font color="green">LISP-CONS mapping database (many</font></strong>
   ideas <strike><font color="red">described in this document were developed during
   detailed discussions with Scott Brim</font></strike> <strong><font color="green">from which made their way into LISP+ALT)</font></strong> and <strike><font color="red">Darrel Lewis,</font></strike> who <strike><font color="red">made many
   insightful comments on earlier versions of this document.  Additional
   thanks are due</font></strike> <strong><font color="green">has continued</font></strong>
   to <strong><font color="green">provide invaluable insight as the LISP effort has evolved.  Others
   who have provided valuable contributions include John Zwiebel,</font></strong> Hannu <strike><font color="red">Flinck and</font></strike>
   <strong><font color="green">Flinck,</font></strong> Amit <strike><font color="red">Jain who offered many helpful
   suggestions for the -02 version.</font></strike> <strong><font color="green">Jain, and Scott Brim.</font></strong>

13.  References

13.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2784]  Farinacci, D., Li, T., Hanks, S., Meyer, D., and P.
              Traina, "Generic Routing Encapsulation (GRE)", RFC 2784,
              March 2000.

   [RFC2858]  Bates, T., Rekhter, Y., Chandra, R., and D. Katz,
              "Multiprotocol Extensions for BGP-4", RFC 2858, June 2000.

   [RFC4271]  Rekhter, Y., Li, T., and S. Hares, "A Border Gateway
              Protocol 4 (BGP-4)", RFC 4271, January 2006.

   [RFC4632]  Fuller, V. and T. Li, "Classless Inter-domain Routing
              (CIDR): The Internet Address Assignment and Aggregation
              Plan", BCP 122, RFC 4632, August 2006.

13.2.  Informative References

   [I-D.murphy-bgp-secr]
              Murphy, S., "BGP Security Analysis",
              draft-murphy-bgp-secr-04 (work in progress),
              November 2001.

   [I-D.white-sobgparchitecture]
              White, R., "Architecture and Deployment Considerations for
              Secure Origin BGP (soBGP)",
              draft-white-sobgparchitecture-00 (work in progress),
              May 2004.

   <strike><font color="red">[Interworking]</font></strike>

   <strong><font color="green">[LISP]     Farinacci, D., Fuller, V., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol (LISP)",
              draft-ietf-lisp-06.txt (work in progress), January 2010.

   [LISP-IW]</font></strong>  Lewis, D., Meyer, D., Farinacci, D., and V. Fuller,
              "Interworking LISP with IPv4 and ipv6",
              draft-ietf-lisp-interworking-01.txt (work in progress),
              January 2010.

   <strike><font color="red">[LISP]     Farinacci, D., Fuller, V., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol (LISP)",
              draft-ietf-lisp-06.txt (work in progress), January 2010.</font></strike>

   [LISP-MS]  Fuller, V. and D. Farinacci, "LISP Map Server",
              draft-ietf-lisp-ms-04.txt (work in progress),
              October 2009.

Authors' Addresses

   Vince Fuller
   Cisco
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: vaf@cisco.com

   Dino Farinacci
   Cisco
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: dino@cisco.com

   Dave Meyer
   Cisco
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: dmm@cisco.com

   Darrel Lewis
   Cisco
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: darlewis@cisco.com
</pre>
</body></html>
--A6N2fC+uXW/VQSAv
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename="draft-ietf-lisp-alt-03.txt"




Network Working Group                                          V. Fuller
Internet-Draft                                              D. Farinacci
Intended status: Experimental                                   D. Meyer
Expires: August 21, 2010                                        D. Lewis
                                                                   Cisco
                                                       February 17, 2010


                  LISP Alternative Topology (LISP+ALT)
                       draft-ietf-lisp-alt-03.txt

Abstract

   This document describes a method of building an Alternative Logical
   Topology (ALT) to be used by the Locator/ID Separation Protocol
   (LISP) to find Endpoint Identifier (EID) to Routing Locator (RLOC)
   mappings.  The ALT is built as an overlay on the public Internet
   using existing technologies and tools, specifically the Border
   Gateway Protocol and the Generic Routing Encapsulation.  An important
   design goal for LISP+ALT is to allow for the relatively easy
   deployment of a mapping system while minimizing changes to existing
   hardware and software.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 21, 2010.

Copyright Notice




Fuller, et al.           Expires August 21, 2010                [Page 1]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the BSD License.







































Fuller, et al.           Expires August 21, 2010                [Page 2]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


Table of Contents

   1.  Requirements Notation  . . . . . . . . . . . . . . . . . . . .  4
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.  Definition of Terms  . . . . . . . . . . . . . . . . . . . . .  7
   4.  The LISP+ALT model . . . . . . . . . . . . . . . . . . . . . . 10
     4.1.  Routeability of EIDs . . . . . . . . . . . . . . . . . . . 10
       4.1.1.  Mechanisms for an ETR to originate EID-prefixes  . . . 11
       4.1.2.  Mechanisms for an ITR to forward to EID-prefixes . . . 11
       4.1.3.  Map Server Model preferred . . . . . . . . . . . . . . 11
     4.2.  Connectivity to non-LISP sites . . . . . . . . . . . . . . 11
     4.3.  Caveats on the use of Data Probes  . . . . . . . . . . . . 12
   5.  LISP+ALT: Overview . . . . . . . . . . . . . . . . . . . . . . 13
     5.1.  ITR traffic handling . . . . . . . . . . . . . . . . . . . 14
     5.2.  EID Assignment - Hierarchy and Topology  . . . . . . . . . 14
     5.3.  Use of GRE and BGP between LISP+ALT Routers  . . . . . . . 16
   6.  EID-prefix Propagation and Map-Request Forwarding  . . . . . . 17
     6.1.  Changes to ITR behavior with LISP+ALT  . . . . . . . . . . 17
     6.2.  Changes to ETR behavior with LISP+ALT  . . . . . . . . . . 17
   7.  BGP configuration and protocol considerations  . . . . . . . . 19
     7.1.  Autonomous System Numbers (ASNs) in LISP+ALT . . . . . . . 19
     7.2.  Sub-Address Family Identifier (SAFI) for LISP+ALT  . . . . 19
   8.  EID-prefix Aggregation . . . . . . . . . . . . . . . . . . . . 20
     8.1.  Traffic engineering with LISP and LISP+ALT . . . . . . . . 20
     8.2.  Edge aggregation and dampening . . . . . . . . . . . . . . 21
   9.  Connecting sites to the ALT network  . . . . . . . . . . . . . 22
     9.1.  ETRs originating information into the ALT  . . . . . . . . 22
     9.2.  ITRs Using the ALT . . . . . . . . . . . . . . . . . . . . 22
   10. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 24
   11. Security Considerations  . . . . . . . . . . . . . . . . . . . 25
     11.1. Apparent LISP+ALT Vulnerabilities  . . . . . . . . . . . . 25
     11.2. Survey of LISP+ALT Security Mechanisms . . . . . . . . . . 26
     11.3. Use of new IETF standard BGP Security mechanisms . . . . . 26
   12. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 27
   13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 28
     13.1. Normative References . . . . . . . . . . . . . . . . . . . 28
     13.2. Informative References . . . . . . . . . . . . . . . . . . 28
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 29













Fuller, et al.           Expires August 21, 2010                [Page 3]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


1.  Requirements Notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].














































Fuller, et al.           Expires August 21, 2010                [Page 4]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


2.  Introduction

   This document describes a method of building an Alternative Logical
   Topology (ALT) to be used by the Locator/ID Separation Protocol
   (LISP) to find Endpoint Identifier (EID) to Routing Locator (RLOC)
   mappings.  This logical topology uses existing technology and tools,
   specifically the Border Gateway Protocol [RFC4271] and its multi-
   protocol extension [RFC2858], along with the Generic Routing
   Encapsulation [RFC2784] protocol to construct an overlay network of
   devices (ALT Routers) which operate on EID-prefixes and use EIDs as
   forwarding destinations.

   ALT Routers advertise hierarchically-delegated segments of the EID
   namespace (i.e., prefixes) toward the rest of the ALT; they also
   forward traffic destined for an EID covered by one of those prefixes
   toward the network element which is authoritative for that EID (i.e.
   is the origin of the advertisement of the EID-to-RLOC mapping which
   applies to that EID).  Map Resolvers (MRs; see [LISP-MS]) and, in
   some cases, Ingress Tunnel Routers (ITRs) use this overlay to send
   mapping requests (using [LISP]) to the Egress Tunnel Routers (ETRs)
   that hold the EID-to-RLOC mappings for a particular EID-prefix

   It is important to note that the ALT does not distibute actual EID-
   to-RLOC mappings.  What it does provide is a forwarding path from an
   ITR (or MR) which requires an EID-to-RLOC mapping to an ETR which
   holds that mapping.  The ITR/MR uses this path to send an ALT
   Datagram (see Section 4) to an ETR which then responds with a Map-
   Reply containing the needed mapping information.

   One design goal for LISP+ALT is to use existing technology wherever
   possible.  To this end, the ALT is intended to be built using off-
   the-shelf routers which already implement the required protocols (BGP
   and GRE); little, if any, LISP-specific modifications should be
   needed for such devices to be deployed on the ALT.  Note, though,
   that organizational and operational considerations suggest that ALT
   Routers be both logically and physically separate from the "native"
   Internet packet transport system; deploying this overlay on those
   routers which are already participating in the global routing system
   and actively forwarding Internet traffic is not recommended.

   The remainder of this document is organized as follows: Section 3
   provides the definitions of terms used in this document.  Section 4
   outlines the basic LISP 1.5 model.  Section 5 provides a basic
   overview of the LISP Alternate Topology architecture, and Section 6
   describes how the ALT uses BGP to propagate Endpoint Identifier
   reachability over the overlay network.  Section 8 describes the
   construction of the ALT aggregation hierarchy, and Section 9
   discusses how LISP+ALT elements are connected to form the overlay



Fuller, et al.           Expires August 21, 2010                [Page 5]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


   network.


















































Fuller, et al.           Expires August 21, 2010                [Page 6]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


3.  Definition of Terms

   LISP+ALT operates on two name spaces and introduces a new network
   element, the LISP+ALT Router (see below).  This section provides
   high-level definitions of the LISP+ALT name spaces, network elements,
   and message types.

    Alternative Logical Topology (ALT):  The virtual overlay network
      made up of tunnels between LISP+ALT Routers.  The Border Gateway
      Protocol (BGP) runs between ALT Routers and is used to carry
      reachability information for EID-prefixes.  The ALT provides a way
      to forward Map-Requests (and, if supported, Data Probes) toward
      the ETR that "owns" and EID-prefix.  As a tunneled overlay, its
      performance is expected to be quite limited so use of it to
      forward high-bandwidth flows of Data Probes is strongly
      discouraged (see Section 4.3 for additional discussion).

    Legacy Internet:  The portion of the Internet which does not run
      LISP and does not participate in LISP+ALT.

    ALT Router:  The devices which run on the ALT.  The ALT is a static
      network built using tunnels between ALT Routers.  These routers
      are deployed in a roughly-hierarchical mesh in which routers at
      each level in the topology are responsible for aggregating EID-
      prefixes learned from those logically "below" them and advertising
      summary prefixes to those logically "above" them.  Prefix learning
      and propagation between ALT Routers is done using BGP.  An ALT
      Router at the lowest level, or "edge" of the ALT, learns EID-
      prefixes from its "client" ETRs.  See Section 4.1 for a
      description of how EID-prefixes are learned at the "edge" of the
      ALT.  See also Section 7 for details on how BGP is configured
      between the different network elements.  When an ALT Router
      receives an ALT Datagram, it looks up the destination EID in its
      forwarding table (composed of EID prefix routes it learned from
      neighboring ALT Routers) and forwards it to the logical next-hop
      on the overlay network.

    Endpoint ID (EID):  A 32-bit (for IPv4) or 128-bit (for ipv6) value
      used to identify the ultimate source or destination for a LISP-
      encapsulated packet.  See [LISP] for details.

    EID-prefix:  A set of EIDs delegated in a power-of-two block.  EID-
      prefixes are routed on the ALT (not on the global Internet) and
      are expected to be assigned in a hierarchical manner such that
      they can be aggregated by ALT Routers.  Such a block is
      characterized by a prefix and a length.  Note that while the ALT
      routing system considers an EID-prefix to be an opaque block of
      EIDs, an end site may put site-local, topologically-relevant



Fuller, et al.           Expires August 21, 2010                [Page 7]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


      structure (subnetting) into an EID-prefix for intra-site routing.

    Aggregated EID-prefixes:  A set of individual EID-prefixes that have
      been aggregated in the [RFC4632] sense.

    Map Server (MS):   An edge ALT Router that provides a registration
      function for non-ALT-connected ETRs, originates EID-prefixes into
      the ALT on behalf of those ETRs, and forwards Map-Reqeusts to
      them.  See [LISP-MS] for details.

    Map Resolver (MR):   An edge ALT Router that accepts an Encapsulated
      Map-Reqeust from a non-ALT-connected ITR, decapsulates it, and
      forwards it on to the ALT toward the ETR which owns the requested
      EID-prefix.  See [LISP-MS] for details.

    Ingress Tunnel Router (ITR):   A router which sends LISP Map-
      Requests or encapsulates IP datagrams with LISP headers, as
      defined in [LISP].  In this document, the term refers to any
      device implementing ITR functionality, including a Proxy-ITR (see
      [LISP-IW]).  Under some circumstances, a LISP Map Resolver may
      also originate Map-Requests (see [LISP-MS]).

    Egress Tunnel Router (ETR):   A router which sends LISP Map-Replies
      in response to LISP Map-Requests and decapsulates LISP-
      encapsulated IP datagrams for delivery to end systems, as defined
      in [LISP].  In this document, the term refers to any device
      implementing ETR functionality, including a Proxy-ETR (see
      [LISP-IW]).  Under some circumstances, a LISP Map Server may also
      respond to Map-Requests (see [LISP-MS]).

    Routing Locator (RLOC):  A routable IP address for a LISP tunnel
      router (ITR or ETR).  Also the output of a EID-to-RLOC mapping
      lookup; an EID-prefix maps to one or more RLOCs.  Typically, RLOCs
      are numbered from topologically-aggregatable blocks that are
      assigned to a site at each point to which it attaches to the
      global Internet; where the topology is defined by the connectivity
      of provider networks.  RLOCs can be thought of as Provider
      Aggregatable (PA) addresses.  Routing for RLOCs is not carried on
      the ALT.

    EID-to-RLOC Mapping:  A binding between an EID-prefix and the set of
      RLOCs that can be used to reach it; sometimes referred to simply
      as a "mapping".

    EID-prefix Reachability:  An EID-prefix is said to be "reachable" if
      one or more of its locators are reachable.  That is, an EID-prefix
      is reachable if the ETR (or its proxy) that is authoritative for a
      given EID-to-RLOC mapping is reachable.



Fuller, et al.           Expires August 21, 2010                [Page 8]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


    Default Mapping:  A Default Mapping is a mapping entry for EID-
      prefix 0.0.0.0/0 (0::/0 for ipv6).  It maps to a locator-set used
      for all EIDs in the Internet.  If there is a more specific EID-
      prefix in the mapping cache it overrides the Default Mapping
      entry.  The Default Mapping can be learned by configuration or
      from a Map-Reply message.

    ALT Default Route:  A EID-prefix value of 0.0.0.0/0 (or 0::/0 for
      ipv6) which may be learned from the ALT or statically configured
      on an edge ALT Router.  The ALT-Default Route defines a forwarding
      path for a packet to be sent into the ALT on a router which does
      not have a full ALT forwarding database.







































Fuller, et al.           Expires August 21, 2010                [Page 9]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


4.  The LISP+ALT model

   The LISP+ALT model uses the same basic query/response protocol that
   is documented in [LISP].  In particular, LISP+ALT provides two types
   packet that an ITR can originate to obtain EID-to-RLOC mappings:

   Map-Request:  A Map-Request message is sent into the ALT to request
      an EID-to-RLOC mapping.  The ETR which owns the mapping will
      respond to the ITR with a Map-Reply message.  Since the ALT only
      forwards on EID destinations, the DA of the Map-Request sent on
      the ALT MUST be an EID.  See [LISP] for the format of Map-Request
      and Map-Reply packets.

   Data Probe:  Alternatively, an ITR may encapsulate and send the first
      data packet destined for a EID with no known RLOCs into the ALT as
      a Data Probe.  This might be done minimize packet loss and to
      probe for the mapping.  As above, the authoritative ETR for the
      EID-prefix will respond to the ITR with a Map-Reply message when
      it receives the data packet over the ALT.  As a side-effect, the
      encapsulated data packet is delivered to the end-system at the ETR
      site.  Note that the Data Probe the inner Destination Address
      (DA), which is an EID, is copied to the outer DA and so that the
      resulting packet can be routed over the ALT.  See Section 4.3 for
      caveats on the usability of Data Probes.

   The term "ALT Datagram" is short-hand for a Map-Request or Data Probe
   to be sent into or forwarded on the ALT.  Note that while the outer
   header Source Address of an ALT Datagram is currently expected to be
   an RLOC, there may be situations (i.e. for experimentation with
   caching in intermediate ALT nodes) where an EID would be used to
   force a Map-Reply to be routed back through the ALT.

4.1.  Routeability of EIDs

   A LISP EID has the same syntax as IP address and can be used,
   unaltered, as the source or destination of an IP datagram.  In
   general, though, EIDs are not routable on the public Internet; LISP+
   ALT provides a separate, virtual network, known as the LISP
   Alternative Logical Topology (ALT) on which a datagram using an EID
   as a destination address may be transmitted.  This network is built
   as an overlay on the public Internet using tunnels to interconnect
   ALT Routers.  BGP runs over these tunnels to propagate path
   information needed to forward ALT Datagrams.  Importantly, while the
   ETRs are the source(s) of the unaggregated EID-prefixes, LISP+ALT
   uses existing BGP mechanisms to aggregate this information.






Fuller, et al.           Expires August 21, 2010               [Page 10]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


4.1.1.  Mechanisms for an ETR to originate EID-prefixes

   There are three ways that an ETR may originate its mappings into the
   ALT:

   1.  By registration with a Map Server as documented in [LISP-MS].
       This is the common case and is expected to be used by the
       majority of ETRs.

   2.  Using a "static route" on the ALT.  Where no Map-Server is
       available, an edge ALT Router may be configured with a "static
       EID-prefix route" pointing to an ETR.

   3.  Edge connection to the ALT.  If a site requires fine- grained
       control over how its EID-prefixes are advertised in to the ALT,
       it may configure its ETR(s) with tunnel and BGP connections to
       edge ALT Routers.

4.1.2.  Mechanisms for an ITR to forward to EID-prefixes

   There are three ways that an ITR may send ALT Datagrams:

   1.  Through a Map Resolver as documented in [LISP-MS].  This is the
       common case and is expected to be used by the majority of ITRs.

   2.  Using a "default route".  Where a Map Resolver is not available,
       an ITR may be configured with a static ALT Default Route pointing
       to an edge ALT Router.

   3.  Edge connection to the ALT.  If a site requires fine-grained
       knowledge of what prefixes exist on the ALT, it may configure its
       ITR(s) with tunnel and BGP connections to edge ALT Routers.

4.1.3.  Map Server Model preferred

   The ALT-connected ITR and ETR cases are expected to be rare, as the
   Map Server/Map Resolver model is both simpler for an ITR/ETR operator
   to use, and provides a more general service interface to not only the
   ALT, but also to other mapping databases that may be developed in the
   future.

4.2.  Connectivity to non-LISP sites

   As stated above, EIDs used as IP addresses by LISP sites are not
   routable on the public Internet.  This implies that, absent a
   mechanism for communication between LISP and non-LISP sites,
   connectivity between them is not possible.  To resolve this problem,
   an "interworking" technology has been defined; see [LISP-IW] for



Fuller, et al.           Expires August 21, 2010               [Page 11]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


   details.

4.3.  Caveats on the use of Data Probes

   It is worth noting that there has been a great deal of discussion and
   controversy about whether Data Probes are a good idea.  On the one
   hand, using them offers a method of avoiding the "first packet drop"
   problem when an ITR does not have a mapping for a particular EID-
   prefix.  On the other hand, forwarding data packets on the ALT would
   require that it either be engineered to support relatively high
   traffic rates, which is not generally feasible for a tunneled
   network, or that it be carefully designed to aggressively rate-limit
   traffic to avoid congestion or DoS attacks.  There may also be issues
   caused by different latency or other performance characteristics
   between the ALT path taken by an initial Data Probe and the
   "Internet" path taken by subsequent packets on the same flow once a
   mapping is in place on an ITR.  For these and other reasons use of
   Data Probes should be considered experimental and should be disabled
   by default in all ITR implementations.
































Fuller, et al.           Expires August 21, 2010               [Page 12]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


5.  LISP+ALT: Overview

   LISP+ALT is a hybrid push/pull architecture.  Aggregated EID-prefixes
   are advertised among the ALT Routers and to those (rare) ITRs that
   are directly connected via a tunnel and BGP to the ALT.  Specific
   EID-to-RLOC mappings are requested by an ITR (and returned by an ETR)
   using LISP when it sends a request either via a Map Resolver or to an
   edge ALT Router.

   The basic idea embodied in LISP+ALT is to use BGP, running on a
   tunneled overlay network (the ALT), to establish reachability between
   ALT Routers.  The ALT BGPRoute Information Base (RIB) is comprised of
   EID-prefixes and associated next hops.  ALT Routers interconnect
   using BGP and propagate EID-prefix updates among themselves.  EID-
   prefix information is learned from ETRs at the "edge" of the ALT
   either through the use of the Map Server interface (the commmon
   case), static configuration, or by BGP-speaking ETRs.

   An ITR use the ALT to learn the best path for forwarding an ALT
   Datagram destined to a particular EID-prefix.  An ITR will normally
   use a Map Resolver to send its ALT Datagrams on to the ALT but may,
   in unusual circumstances, use a static ALT Default Route or connect
   to the ALT using BGP.

   Note that while this document specifies the use of Generic Routing
   Encapsulation (GRE) as a tunneling mechanism, there is no reason that
   parts of the ALT cannot be built using other tunneling technologies,
   particularly in cases where GRE does not meet security, management,
   or other operational requirements.  References to "GRE tunnel" in
   later sections of this document should therefore not be taken as
   prohibiting or precluding the use of other tunneling mechanisms.
   Note also that two ALT Routers that are directly adjacent (with no
   layer-3 router hops between them) need not use a tunnel between them;
   in this case, BGP may be configured across the interfaces that
   connect to their common subnet and that subnet is then considered to
   be part of the ALT topology.  Use of techniques such as "eBGP
   multihop" to connect ALT Routers that do not share a tunnel or common
   subnet is not recommended as the non-ALT Routers in between the ALT
   Routers in such a configuration may not have information necessary to
   forward ALT Datagrams destined to EID-prefixes exchanged across that
   BGP session.

   In summary, LISP+ALT uses BGP to build paths through ALT Routers so
   that an ALT Datagram sent in to the ALT can be forwarded to the ETR
   that holds the EID-to-RLOC mapping for that EID-prefix.  This
   reachability is carried as IPv4 or ipv6 NLRI without modification
   (since an EID-prefix has the same syntax as IPv4 or ipv6 address
   prefix).  ALT Routers BGP peer with one another, forming the ALT.  An



Fuller, et al.           Expires August 21, 2010               [Page 13]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


   ALT Router near the edge learns EID-prefixes originated by
   authoritative ETRs.  This may though the Map Server interface, by
   static configuration, be via BGP with the ETRs.  An ALT Router may
   also be configured to aggregate EID-prefixes received from ETRs or
   from other LISP+ALT routers that are topologically "downstream" from
   it.

5.1.  ITR traffic handling

   When an ITR receives a packet originated by an end system withind its
   site (i.e. a host for which the ITR is the exit path out of the site)
   and the destination EID for that packet is not known in the ITR's
   mapping cache, the ITR creates either a Map-Request for the
   destination EID or the original packet encapsulated as a Data Probe.
   The result, known as an ALT Datagram, is then sent to an ALT Router
   (see also [LISP-MS] for non-ALT-connected ITRs, noting that Data
   Probes cannot be sent to a Map-Resolver).  This "first hop" ALT
   Router uses EID-prefix routing information learned from other ALT
   Routers via BGP to guide the packet to the ETR which "owns" the
   prefix.  Upon receipt by the ETR, normal LISP processing occurs: the
   ETR responds to the ITR with a LISP Map-Reply that lists the RLOCs
   (and, thus, the ETRs to use) for the EID-prefix.  For Data Probes,
   the ETR also decapsulates the packet and transmits it toward its
   destination.

   Upon receipt of the Map-Reply, the ITR installs the RLOC information
   for a given prefix into a local mapping database.  With these mapping
   entries stored, additional packets destined to the given EID-prefix
   are routed directly to an RLOC without use of the ALT, until either
   the entry's TTL has expired, or the ITR can otherwise find no
   reachable ETR.  Note that a valid mapping (not timed-out) may exist
   that contains no reachable RLOCs (i.e. all paths to that ETR are
   down); in this case, packets destined to the EID-prefix are dropped.

   Traffic routed on to the ALT consists solely of ALT Datagrams, i.e.
   Map-Requests and Data Probes (if supported).

5.2.  EID Assignment - Hierarchy and Topology

   EID-prefixes will be allocated to a LISP site by Internet Registries.
   Multiple allocations may not be in power-of-2 blocks.  But when they
   are, they will be aggregated into a single, advertised EID-prefix.
   The ALT network is built in a tree-structured hierarchy to allow
   aggregation at merge points in the tree.  Building such a structure
   should minimize the number of EID-prefixes carried by LISP+ALT nodes
   near the top of the hierarchy.

   Since the ALT does not need in response to changes in policy,



Fuller, et al.           Expires August 21, 2010               [Page 14]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


   subscription, or the underlying physical connectivity, the topology
   can remain relatively static and aggregation can be sustained.
   Because routing on the ALT uses BGP, the same rules apply for
   generating aggregates; in particular, a ALT Router should only be
   configured to generate an aggregate if it is configured with BGP
   sessions to all of the originators of components (more-specifics
   prefixes) of that aggregate.  Not all of the components of need to be
   present for the aggregate to be originated (some may be holes in the
   covering prefix and some may be down) but the aggregating router must
   be configured to learn the state of all of the components.

   As an example, consider ETRs that are originating EID-prefixes for
   10.1.0.0/24, 10.1.64.0/24, 10.1.128.0/24, and 10.1.192.0/24.  An ALT
   Router should only be configured to generate an aggregate for
   10.1.0.0/16 if it has BGP sessions configured with all of these ETRs,
   in other words, only if it has sufficient knowledge about the state
   of those prefixes to summarize them.

   Under what circumstances the ALT Router actually generates the
   aggregate is a matter of local policy: in some cases, it will be
   statically configured to do so at all times with a "static discard"
   route.  In other cases, it may be configured to only generate the
   aggregate prefix if at least one of the components of the aggregate
   is learned via BGP.

   An ALT Router MUST NOT genearte an aggregate that includes a non-
   LISP-speaking hole unless it can be configured to return a Negative
   Map-Reply with action="Natively-Forward" (see [LISP]) if it receives
   an ALT Datagram that matches that hole.  If it receives an ALT
   Datagram that matches a LISP-speaking hole that is currently not
   reachable, it should return a Negative Map-Reply with action="drop".
   Negative Map-Replies should be returned with a short TTL, as
   specified in [LISP-MS].  Note that an off-the-shelf, non-LISP-
   speaking router configured as an aggregating ALT Router cannot send
   Negative Map-Replies, so such a router must never originate an
   aggregate that includes a non-LISP-speaking hole.

   This implies that two ALT Routers that share an overlapping set of
   prefixes must exchange those prefixes if either is to generate and
   export a covering aggregate for those prefixes.  It also implies that
   an ETR which connects to the ALT using BGP must maintain BGP sessions
   with all of the ALT Routers that are configured to originate an
   aggregate which covers that prefix.  See also [LISP-MS] for an
   example of other ways that prefix origin consistency and aggregation
   are maintained.

   Note: much is currently uncertain about the best way to build the ALT
   network; as testing and prototype deployment proceeds, a guide to how



Fuller, et al.           Expires August 21, 2010               [Page 15]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


   to best build the ALT network will be developed.

5.3.  Use of GRE and BGP between LISP+ALT Routers

   The ALT network is built using GRE tunnels between ALT Routers.  BGP
   sessions are configured over those tunnels, with each ALT Router
   acting as a separate AS "hop" in a Path Vector for BGP.  For the
   purposes of LISP+ALT, the AS-path is used solely as a shortest-path
   determination and loop-avoidance mechanism.  Because all next-hops
   are on tunnel interfaces, no IGP is required to resolve those next-
   hops to exit interfaces.

   LISP+ALT's use of GRE and BGP reduces provider Operational Expense
   (OPEX) because no new protocols need to be either defined or used on
   the overlay topology.  Also, since tunnel IP addresses are local in
   scope, no coordination is needed for their assignment; any addressing
   scheme (including private addressing) can be used for tunnel
   addressing.

































Fuller, et al.           Expires August 21, 2010               [Page 16]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


6.  EID-prefix Propagation and Map-Request Forwarding

   As described in Section 9.2, an ITR sends an ALT Datagram to a given
   EID-to-RLOC mapping.  The ALT provides the infrastructure that allows
   these requests to reach the authoritative ETR.

   Note that under normal circumstances Map-Replies are not sent over
   the ALT - an ETR sends a Map-Reply to the source RLOC learned from
   the original Map-Request.  There may be scenarios, perhaps to
   encourage caching of EID-to-RLOC mappings by ALT Routers, where Map-
   Replies could be sent over the ALT or where a "first-hop" ALT router
   might modify the originating RLOC on a Map-Request received from an
   ITR to force the Map-Reply to be returned to the "first-hop" ALT
   Router.  These cases will not be supported by initial LISP+ALT
   implementations but may be subject to future experimentation.

   ALT Routers propagate path information via BGP ([RFC4271]) that is
   used by ITRs to send ALT Datagrams toward the appropriate ETR for
   each EID-prefix.  BGP is run on the inter-ALT Router links, and
   possibly between an edge ("last hop") ALT Router and an ETR or
   between an edge ("first hop") ALT Router and an ITR.  The ALT BGP RIB
   consists of aggregated EID-prefixes and their next hops toward the
   authoritative ETR for that EID-prefix.

6.1.  Changes to ITR behavior with LISP+ALT

   As previously described, an ITR will usually use the Map Resolver
   interface and will send its Map Requests to a Map Resolver.  When an
   ITR instead connects via tunnels and BGP to the ALT, it sends ALT
   Datagrams to one of its "upstream" ALT Routers; these are sent only
   to obtain new EID-to-RLOC mappings - RLOC probe and cache TTL refresh
   Map-Requests are not sent on the ALT.  As in basic LISP, it should
   use one of its RLOCs as the source address of these queries; it
   should explicitly not use a tunnel interface as the source address as
   doing so will cause replies to be forwarded over the tunneled
   topology and may be problematic if the tunnel interface address is
   not explicitly routed throughout the ALT.  If the ITR is running BGP
   with the LISP+ALT router(s), it selects the appropriate ALT Router
   based on the BGP information received.  If it is not running BGP, it
   uses a statically-configued ALT Default Route to select an ALT
   Router.

6.2.  Changes to ETR behavior with LISP+ALT

   As previously described, an ETR will usually use the Map Server
   interface (see [LISP-MS]) and will register its EID-prefixes with its
   configured Map Servers.  When an ETR instead connects using BGP to
   one or more ALT Routers, it announces its EID-prefix(es) to those ALT



Fuller, et al.           Expires August 21, 2010               [Page 17]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


   Routers.  Note that when an ETR generates a Map-Reply message to
   return to a querying ITR, it sends it to the ITR's source-RLOC (i.e.,
   on the underlying Internet topology, not on the ALT; this avoids any
   latency penalty (or "stretch") that might be incurred by routing over
   the ALT).














































Fuller, et al.           Expires August 21, 2010               [Page 18]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


7.  BGP configuration and protocol considerations

7.1.  Autonomous System Numbers (ASNs) in LISP+ALT

   The primary use of BGP today is to define the global Internet routing
   topology in terms of its participants, known as Autonomous Systems.
   LISP+ALT specifies the use of BGP to create a global overlay network
   (the ALT) for finding EID-to-RLOC mappings.  While related to the
   global routing database, the ALT serves a very different purpose and
   is organized into a very different hierarchy.  Because LISP+ALT does
   use BGP, however, it uses ASNs in the paths that are propagated among
   ALT Routers.  To avoid confusion, it needs to be stressed that that
   these LISP+ALT ASNs use a new numbering space that is unrelated to
   the ASNs used by the global routing system.  Exactly how this new
   space will be assigned and managed will be determined during the
   deployment of LISP+ALT.

   Note that the ALT Routers that make up the "core" of the ALT will not
   be associated with any existing core-Internet ASN because the ALT
   topology is completely separate from, and independent of, the global
   Internet routing system.

7.2.  Sub-Address Family Identifier (SAFI) for LISP+ALT

   As defined by this document, LISP+ALT may be implemented using BGP
   without modification.  Given the fundamental operational difference
   between propagating global Internet routing information (the current
   dominant use of BGP) and creating an overlay network for finding EID-
   to-RLOC mappings (the use of BGP proposed by this document), it may
   be desirable to assign a new SAFI [RFC2858] to prevent operational
   confusion and difficulties, including the inadvertent leaking of
   information from one domain to the other.  At present, this document
   does not require the assignment of a new SAFI, but the authors
   anticipate that experimentation may suggest the need for one in the
   future.
















Fuller, et al.           Expires August 21, 2010               [Page 19]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


8.  EID-prefix Aggregation

   The ALT BGP peering topology should be arranged in a tree-like
   fashion (with some meshiness), with redundancy to deal with node and
   link failures.  A basic assumption is that as long as the routers are
   up and running, the underlying Internet will provide alternative
   routes to maintain BGP connectivity among ALT Routers.

   Note that, as mentioned in Section 5.2, the use of BGP by LISP+ALT
   requires that information only be aggregated where all active more-
   specific prefixes of a generated aggregate prefix are known.  This is
   no different than the way that BGP route aggregation works in the
   existing global routing system: a service provider only generates an
   aggregate route if it is configured to learn to all prefixes that
   make up that aggregate.

8.1.  Traffic engineering with LISP and LISP+ALT

   It is worth noting that LISP+ALT does not directly propagate EID-to-
   RLOC mappings.  What it does is provide a mechanism for an ITR to
   commonicate with the ETR that holds the mapping for a particular EID-
   prefix.  This distinction is important for several reasons.  First,
   since reachability of RLOCs is learned through the LISP ITR-ETR
   exchange, "flapping" (frequent BGP updates and withdrawals) is not
   likely, and mapping information cannot become "stale" due to slow
   propagation through the ALT BGP mesh.  Second, since an ITR learns an
   EID-to-RLOC mapping directly from the ETR that owns it, it is
   possible to perform site-to-site traffic engineering by setting the
   preference and/or weight fields, and by including more-specific EID-
   to-RLOC information in Map-Reply messages.

   This is a powerful mechanism that can conceivably replace the
   traditional practice of routing prefix deaggregation for traffic
   engineering purposes.  Rather than propagating more-specific
   information into the global routing system for local- or regional-
   optimization of traffic flows, such more-specific information can be
   exchanged, through LISP (not LISP+ALT), on an as-needed basis between
   only those ITRs/ETRs (and, thus, site pairs) that need it.  Should a
   receiving ITR decide that it does not wish to store such more-
   specific information, it has the option of discarding it as long as a
   shorter, covering EID-prefix exists.  Such an exchange of "more-
   specifics" between sites facilitates traffic engineering, by allowing
   richer and more fine-grained policies to be applied without
   advertising additional prefixes into either the ALT or the global
   routing system.






Fuller, et al.           Expires August 21, 2010               [Page 20]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


8.2.  Edge aggregation and dampening

   Note that normal BGP best common practices apply to the ALT network.
   In particular, first-hop ALT Routers will aggregate EID prefixes and
   dampen changes to them in the face of excessive updates.  Since EID-
   prefix assignments are not expected to change as frequently as global
   routing BGP prefix reachability, such dampening should be very rare,
   and might be worthy of logging as an exceptional event.  It is again
   worth noting that the ALT carries only EID-prefixes, used to
   construct BGP paths to their owning ETRs; this set of information is
   considerably less volatile than the actual EID-to-RLOC mappings.








































Fuller, et al.           Expires August 21, 2010               [Page 21]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


9.  Connecting sites to the ALT network

9.1.  ETRs originating information into the ALT

   EID-prefix information is originated into the ALT by three different
   mechanisms:

   Map Server:  In most cases, a site will configure its ETR(s) to
      register with one or more Map Servers (see [LISP-MS]), and does
      not participate directly in the ALT.

   BGP:  For a site requiring complex control over their EID-prefix
      origination into the ALT, an ETR may connect to the LISP+ALT
      overlay network by running BGP to one or more ALT Router(s) over
      tunnel(s).  The ETR advertises reachability for its EID-prefixes
      over these BGP connection(s).  The edge ALT Router(s) that
      receive(s) these prefixes then propagate(s) them into the ALT.
      Here the ETR is simply an BGP peer of ALT Router(s) at the edge of
      the ALT.  Where possible, an ALT Router that receives EID-prefixes
      from an ETR via BGP should aggregate that information.

   Configuration:  One or more ALT Router(s) may be configured to
      originate an EID-prefix on behalf of the non-BGP-speaking ETR that
      is authoritative for a prefix.  As in the case above, the ETR is
      connected to ALT Router(s) using GRE tunnel(s) but rather than BGP
      being used, the ALT Router(s) are configured with what are in
      effect "static routes" for the EID-prefixes "owned" by the ETR.
      The GRE tunnel is used to route Map-Requests to the ETR.  Note
      that the ALT Router could also serve as a proxy for its TCP-
      connected ETRs.

   Note:  in all cases, an ETR may register to multiple Map Servers or
      connect to multiple ALT Routers for the following reasons:

      *  redundancy, so that a particular ETR is still reachable even if
         one path or tunnel is unavailable.

      *  to connect to different parts of the ALT hierarchy if the ETR
         "owns" multiple EID-to-RLOC mappings for EID-prefixes that
         cannot be aggregated by the same ALT Router (i.e. are not
         topologically "close" to each other in the ALT).

9.2.  ITRs Using the ALT

   In the common configuration, an ITR does not need to know anything
   about the ALT, since it sends Map-Requests to one of its configured
   Map-Resolvers (see [LISP-MS]).  There are two exceptional cases:




Fuller, et al.           Expires August 21, 2010               [Page 22]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


   Static default:  If a Map Resolver is not available but an ITR is
      adjacent to an ALT Router (either over a common subnet or through
      the use of a tunnel), it can use an ALT Default Route route to
      cause all ALT Datagrams to be sent that ALT Router.  This case is
      expected to be rare.

   Connection to ALT:  A site with complex Internet connectivity needs
      may need more fine-grained distinction between traffic to LISP-
      capable and non-LISP-capable sites.  Such a site may configure
      each of its ITRs to connect directly to the ALT, using a tunnel
      and BGP connection.  In this case, the ITR will receive EID-prefix
      routes from its BGP connection to the ALT Router and will LISP-
      encapsulate and send ALT Datagrams through the tunnel to the ALT
      Router.  Traffic to other destinations may be forwarded (without
      LISP encapsulation) to non-LISP next-hop routers that the ITR
      knows.

      In general, an ITR that connects to the ALT does so only to to ALT
      Routers at the "edge" of the ALT (typically two for redundancy).
      There may, though, be situations where an ITR would connect to
      other ALT Routers to receive additional, shorter path information
      about a portion of the ALT of interest to it.  This can be
      accomplished by establishing GRE tunnels between the ITR and the
      set of ALT Routers with the additional information.  This is a
      purely local policy issue between the ITR and the ALT Routers in
      question.

   As described in [LISP-MS], Map-Resolvers do not accept or forward
   Data Probes; in the rare scenario that an ITR does support and
   originate Data Probes, it must do so using one of the exceptional
   configurations described above.  Note that the use of Data Probes is
   discouraged at this time (see Section 4.3).



















Fuller, et al.           Expires August 21, 2010               [Page 23]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


10.  IANA Considerations

   This document makes no request of the IANA.
















































Fuller, et al.           Expires August 21, 2010               [Page 24]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


11.  Security Considerations

   LISP+ALT shares many of the security characteristics of BGP.  Its
   security mechanisms are comprised of existing technologies in wide
   operational use today, so securing the ALT should be mostly a matter
   of applying the same technology that is used to secure the BGP-based
   global routing system (see Section 11.3 below).

11.1.  Apparent LISP+ALT Vulnerabilities

   This section briefly lists the known potential vulnerabilities of
   LISP+ALT.

   Mapping Integrity:  Can an attacker insert bogus mappings to black-
      hole (create Denial-of-Service, or DoS attack) or intercept LISP
      data-plane packets?

   ALT Router Availability:  Can an attacker DoS the ALT Routers
      connected to a given ETR?  If a site's ETR cannot advertise its
      EID-to-RLOC mappings, the site is essentially unavailable.

   ITR Mapping/Resources:  Can an attacker force an ITR or ALT Router to
      drop legitimate mapping requests by flooding it with random
      destinations for which it will generate large numbers of Map-
      Reqeusts and fill its mapping cache?  Further study is required to
      see the impact of admission control on the overlay network.

   EID Map-Request Exploits for Reconnaissance:  Can an attacker learn
      about a LISP site's TE policy by sending legitimate mapping
      requests and then observing the RLOC mapping replies?  Is this
      information useful in attacking or subverting peer relationships?
      Note that any public LISP mapping database will have similar data-
      plane reconnaissance issue.

   Scaling of ALT Router Resources:  Paths through the ALT may be of
      lesser bandwidth than more "direct" paths; this may make them more
      prone to high-volume denial-of-service attacks.  For this reason,
      all components of the ALT (ETRs and ALT Routers) should be
      prepared to rate-limit traffic (ALT Datagrams) that could be
      received across the ALT.

   UDP Map-Reply from ETR:  Since Map-Replies are sent directly from the
      ETR to the ITR's RLOC, the ITR's RLOC may be vulnerable to various
      types of DoS attacks (this is a general property of LISP, not an
      LISP+ALT vulnerability).






Fuller, et al.           Expires August 21, 2010               [Page 25]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


11.2.  Survey of LISP+ALT Security Mechanisms

   Explicit peering:  The devices themselves can both prioritize
      incoming packets, as well as potentially do key checks in hardware
      to protect the control plane.

   Use of TCP to connect elements:  This makes it difficult for third
      parties to inject packets.

   Use of HMAC Protected BGP/TCP Connections:  HMAC is used to verify
      message integrity and authenticity, making it nearly impossible
      for third party devices to either insert or modify messages.

   Message Sequence Numbers and Nonce Values in Messages:  This allows
      an ITR to verify that the Map-Reply from an ETR is in response to
      a Map-Request originated by that ITR (this is a general property
      of LISP; LISP+ALT does not change this behavior).

11.3.  Use of new IETF standard BGP Security mechanisms

   LISP+ALT's use of BGP allows the ALT to take advantage of BGP
   security features designed for existing Internet BGP use.

   For example, should either sBGP [I-D.murphy-bgp-secr] or soBGP
   [I-D.white-sobgparchitecture] become widely deployed it expected that
   LISP+ALT could use these mechanisms to provide authentication of EID-
   to-RLOC mappings, and EID origination.
























Fuller, et al.           Expires August 21, 2010               [Page 26]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


12.  Acknowledgments

   The authors would like to specially thank J. Noel Chiappa who was a
   key contributer to the design of the LISP-CONS mapping database (many
   ideas from which made their way into LISP+ALT) and who has continued
   to provide invaluable insight as the LISP effort has evolved.  Others
   who have provided valuable contributions include John Zwiebel, Hannu
   Flinck, Amit Jain, and Scott Brim.











































Fuller, et al.           Expires August 21, 2010               [Page 27]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


13.  References

13.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2784]  Farinacci, D., Li, T., Hanks, S., Meyer, D., and P.
              Traina, "Generic Routing Encapsulation (GRE)", RFC 2784,
              March 2000.

   [RFC2858]  Bates, T., Rekhter, Y., Chandra, R., and D. Katz,
              "Multiprotocol Extensions for BGP-4", RFC 2858, June 2000.

   [RFC4271]  Rekhter, Y., Li, T., and S. Hares, "A Border Gateway
              Protocol 4 (BGP-4)", RFC 4271, January 2006.

   [RFC4632]  Fuller, V. and T. Li, "Classless Inter-domain Routing
              (CIDR): The Internet Address Assignment and Aggregation
              Plan", BCP 122, RFC 4632, August 2006.

13.2.  Informative References

   [I-D.murphy-bgp-secr]
              Murphy, S., "BGP Security Analysis",
              draft-murphy-bgp-secr-04 (work in progress),
              November 2001.

   [I-D.white-sobgparchitecture]
              White, R., "Architecture and Deployment Considerations for
              Secure Origin BGP (soBGP)",
              draft-white-sobgparchitecture-00 (work in progress),
              May 2004.

   [LISP]     Farinacci, D., Fuller, V., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol (LISP)",
              draft-ietf-lisp-06.txt (work in progress), January 2010.

   [LISP-IW]  Lewis, D., Meyer, D., Farinacci, D., and V. Fuller,
              "Interworking LISP with IPv4 and ipv6",
              draft-ietf-lisp-interworking-01.txt (work in progress),
              January 2010.

   [LISP-MS]  Fuller, V. and D. Farinacci, "LISP Map Server",
              draft-ietf-lisp-ms-04.txt (work in progress),
              October 2009.





Fuller, et al.           Expires August 21, 2010               [Page 28]

Internet-Draft    LISP Alternative Topology (LISP+ALT)     February 2010


Authors' Addresses

   Vince Fuller
   Cisco
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: vaf@cisco.com


   Dino Farinacci
   Cisco
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: dino@cisco.com


   Dave Meyer
   Cisco
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: dmm@cisco.com


   Darrel Lewis
   Cisco
   Tasman Drive
   San Jose, CA  95134
   USA

   Email: darlewis@cisco.com















Fuller, et al.           Expires August 21, 2010               [Page 29]



--A6N2fC+uXW/VQSAv--

From job@instituut.net  Fri Feb 26 03:21:25 2010
Return-Path: <job@instituut.net>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E9BC93A876F for <lisp@core3.amsl.com>; Fri, 26 Feb 2010 03:21:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.437
X-Spam-Level: 
X-Spam-Status: No, score=-0.437 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_NET=0.611,  RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OVANC+sUIUda for <lisp@core3.amsl.com>; Fri, 26 Feb 2010 03:21:24 -0800 (PST)
Received: from masteen.6core.net (unknown [212.19.216.212]) by core3.amsl.com (Postfix) with ESMTP id CAF1E3A8770 for <lisp@ietf.org>; Fri, 26 Feb 2010 03:21:20 -0800 (PST)
Received: from feanor.lan (ip545039af.adsl-surfen.hetnet.nl [84.80.57.175]) by masteen.6core.net (Postfix) with ESMTPSA id E2DCA102005F; Fri, 26 Feb 2010 12:27:44 +0100 (CET)
From: "Job W. J. Snijders" <job@instituut.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Fri, 26 Feb 2010 12:23:32 +0100
Message-Id: <A1AA99FE-A0CD-4DF4-BA42-044C57B2B921@instituut.net>
To: lisp@ietf.org
Mime-Version: 1.0 (Apple Message framework v1077)
X-Mailer: Apple Mail (2.1077)
Cc: lisp-ops@external.cisco.com
Subject: [lisp] Anycast PETR range for interworking
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Feb 2010 11:21:26 -0000

Dear Fellow LISPers,

I quote from the interworking-01 draft "Proxy Egress Tunnel Routers =
(PETRs)
allow for LISP-NR sites to communicate with non-LISP sites in the case =
where
the access network does not allow for the LISP-NR site send packets with =
the
source address of the site's EID(s)."=20

The two main reasons for using a PETR:=20
	- "Avoiding strict uRPF failures - Some provider's access =
network require=20
	the source of the packets emitted to be within the addressing =
scope of the
	 access networks."
	- "Traversing a different IP Protocol - A LISP site may want to =
transmit
	 packets to a non-LISP site where the some of the intermediate =
network
	 does not support an IP protocol (v4 or v6)."

Currently there are a handful PETR devices that I know of, which all =
have
different IP addresses. To me it seems that the PETR devices could use =
IP
addresses that are anycasted to the internet in a similar way the 6to4 =
prefix
is anycasted. This would allow for ease of configuration on LISP-NR =
sites and
would serve as a service to the public.=20

I want to propose to RIPE to assign a IPv4 /24 and an IPv6 equivalent =
for
"Experimental Purposes"[1] to us (the current testbed). Requesting PI or =
PA
space dedicated for this purpose does not seem applicable because of =
various
reasons. The advantage of "experimental ranges" is that because of their
temporary nature RIPE will be less strict compared to 'normal' =
requirements:
within these ranges we can only account for 1 IPv4 /32 and 1 IPv6 /128.=20=


I already have a sponsoring LIR[2], and through my sponsor I will =
announce
this prefix in europe, and would encourage other people that have PETR =
capable
devices to start using this prefix too, thus increasing the PETR =
capacity and
making the mechanism more resilient. Also I can take the lead in =
documenting
the experiment and and making sure we adhere RIPE policies.=20

If the experiment succeeds we want to move forward, I guess we should =
write a
draft explaining and defending the need for a "Special Purpose" prefix,
similar to RFC 3068, in addition to the interworking draft.=20

Any thoughts on the subject would be appreciated very much! If the list
supports me I will contact RIPE and start the paperwork.=20

Kind regards,

Job Snijders

[1] http://www.ripe.net/docs/ripe-389.html
[2] InTouch NV, Amsterdam, http://www.intouch.eu/


From hartmans@mit.edu  Fri Feb 26 04:14:27 2010
Return-Path: <hartmans@mit.edu>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8032B3A877B for <lisp@core3.amsl.com>; Fri, 26 Feb 2010 04:14:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.657
X-Spam-Level: 
X-Spam-Status: No, score=-2.657 tagged_above=-999 required=5 tests=[AWL=-0.392, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GIyD66Jnk6VZ for <lisp@core3.amsl.com>; Fri, 26 Feb 2010 04:14:26 -0800 (PST)
Received: from mail.suchdamage.org (permutation-city.suchdamage.org [69.25.196.28]) by core3.amsl.com (Postfix) with ESMTP id 598703A7B89 for <lisp@ietf.org>; Fri, 26 Feb 2010 04:14:26 -0800 (PST)
Received: from carter-zimmerman.suchdamage.org (carter-zimmerman.suchdamage.org [69.25.196.178]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "laptop", Issuer "laptop" (not verified)) by mail.suchdamage.org (Postfix) with ESMTPS id 6A6FB201B2; Fri, 26 Feb 2010 07:16:40 -0500 (EST)
Received: by carter-zimmerman.suchdamage.org (Postfix, from userid 8042) id 532779C3DE; Fri, 26 Feb 2010 07:16:37 -0500 (EST)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: "Job W. J. Snijders" <job@instituut.net>
References: <A1AA99FE-A0CD-4DF4-BA42-044C57B2B921@instituut.net>
Date: Fri, 26 Feb 2010 07:16:37 -0500
In-Reply-To: <A1AA99FE-A0CD-4DF4-BA42-044C57B2B921@instituut.net> (Job W. J. Snijders's message of "Fri, 26 Feb 2010 12:23:32 +0100")
Message-ID: <tsl635kry3e.fsf@mit.edu>
User-Agent: Gnus/5.110009 (No Gnus v0.9) Emacs/22.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Cc: lisp@ietf.org, lisp-ops@external.cisco.com
Subject: Re: [lisp] Anycast PETR range for interworking
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Feb 2010 12:14:27 -0000

>>>>> "Job" == Job W J Snijders <job@instituut.net> writes:

    Job> which all have different IP addresses. To me it seems that the
    Job> PETR devices could use IP addresses that are anycasted to the
    Job> internet in a similar way the 6to4 prefix is anycasted. This


As Robbin and I have discussed, we believe that PETR devices need some
for of authentication and access control between the PETR and ITR.  This
is needed to avoid the PETR being used to assist in address spoofing
attacks.


So, while anycast may be useful, I don't think it will be nearly as
useful as say for 6to4.

From jnc@mercury.lcs.mit.edu  Fri Feb 26 13:56:02 2010
Return-Path: <jnc@mercury.lcs.mit.edu>
X-Original-To: lisp@core3.amsl.com
Delivered-To: lisp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B88EC28C333 for <lisp@core3.amsl.com>; Fri, 26 Feb 2010 13:56:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.484
X-Spam-Level: 
X-Spam-Status: No, score=-6.484 tagged_above=-999 required=5 tests=[AWL=0.115,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xVrNd-yzWUGM for <lisp@core3.amsl.com>; Fri, 26 Feb 2010 13:56:02 -0800 (PST)
Received: from mercury.lcs.mit.edu (mercury.lcs.mit.edu [18.26.0.122]) by core3.amsl.com (Postfix) with ESMTP id 017143A8855 for <lisp@ietf.org>; Fri, 26 Feb 2010 13:56:01 -0800 (PST)
Received: by mercury.lcs.mit.edu (Postfix, from userid 11178) id 3FCED6BE5DA; Fri, 26 Feb 2010 16:58:17 -0500 (EST)
To: lisp@ietf.org
Message-Id: <20100226215817.3FCED6BE5DA@mercury.lcs.mit.edu>
Date: Fri, 26 Feb 2010 16:58:17 -0500 (EST)
From: jnc@mercury.lcs.mit.edu (Noel Chiappa)
Cc: jnc@mercury.lcs.mit.edu
Subject: Re: [lisp] Anycast PETR range for interworking
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Feb 2010 21:56:02 -0000

    > From: Sam Hartman <hartmans-ietf@mit.edu>

    > we believe that PETR devices need some for of authentication and access
    > control between the PETR and ITR. This is needed to avoid the PETR
    > being used to assist in address spoofing attacks.

There has been some offline dicussion about the need to be able to track back
LISP traffic, e.g. to find the source of DoS attacks - and in particular, to
deal with cases of address spoofing. (Bear in mind that the source of the DoS
might be a machine which is pwned, so simply refusing traffic from
Cracker-Site-ITR is not a protection from DoS.)

    > So, while anycast may be useful, I don't think it will be nearly as
    > useful as say for 6to4.

If we had better unwanted-traffic tracking/control, it might be useful. In
particular, it might avoid path stretch. But it's too early to say for sure;
sounds like an idea to keep in the back of the mind for future evaluation,
though.

	Noel
